s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:33:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x100004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000000)={0x2, &(0x7f0000000100)=[{0x4000000028, 0x0, 0x0, 0xfffff010}, {0x80000006}]}, 0x10) write$FUSE_INTERRUPT(r1, &(0x7f0000000140)={0x10}, 0xfffffd2a) [ 240.377213] audit: type=1400 audit(1556850784.219:28188): avc: denied { net_admin } for pid=14207 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:33:35 executing program 3: socket$inet(0x2, 0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) [ 240.381764] audit: type=1400 audit(1556850784.219:28189): avc: denied { net_admin } for pid=14257 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 240.381783] audit: type=1400 audit(1556850784.219:28190): avc: denied { net_admin } for pid=14235 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 245.375291] audit_printk_skb: 10937 callbacks suppressed [ 245.375298] audit: type=1400 audit(1556850789.049:31737): avc: denied { net_admin } for pid=16458 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 245.377009] audit: type=1400 audit(1556850789.219:31865): avc: denied { net_admin } for pid=16458 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 245.378293] audit: type=1400 audit(1556850789.219:31866): avc: denied { net_admin } for pid=16446 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 245.378405] audit: type=1400 audit(1556850789.109:31784): avc: denied { net_admin } for pid=16467 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:33:35 executing program 2: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'filter\x00'}, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet6_buf(r1, 0x29, 0x41, &(0x7f0000000000)=""/40, &(0x7f0000001000)=0x28) [ 245.379958] audit: type=1400 audit(1556850789.219:31867): avc: denied { net_admin } for pid=11265 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 245.380323] audit: type=1400 audit(1556850789.219:31868): avc: denied { net_admin } for pid=16467 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 245.380713] audit: type=1400 audit(1556850789.219:31869): avc: denied { net_admin } for pid=16431 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 245.381828] audit: type=1400 audit(1556850789.219:31870): avc: denied { net_admin } for pid=11265 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 245.381904] audit: type=1400 audit(1556850789.219:31871): avc: denied { net_admin } for pid=16451 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 245.386665] audit: type=1400 audit(1556850789.229:31872): avc: denied { net_admin } for pid=9601 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 250.389869] audit_printk_skb: 10842 callbacks suppressed [ 250.389878] audit: type=1400 audit(1556850794.229:35504): avc: denied { net_admin } for pid=15751 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 250.389883] audit: type=1400 audit(1556850794.229:35505): avc: denied { net_admin } for pid=14841 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 250.391842] audit: type=1400 audit(1556850794.229:35506): avc: denied { net_admin } for pid=15751 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 250.391903] audit: type=1400 audit(1556850794.229:35507): avc: denied { net_admin } for pid=14841 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 250.393582] audit: type=1400 audit(1556850794.229:35508): avc: denied { net_admin } for pid=14805 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 250.395873] audit: type=1400 audit(1556850794.239:35509): avc: denied { net_admin } for pid=14872 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 250.397596] audit: type=1400 audit(1556850794.239:35510): avc: denied { net_admin } for pid=14872 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 250.399563] audit: type=1400 audit(1556850794.239:35511): avc: denied { net_admin } for pid=17374 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:33:37 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x42) r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/policy\x00', 0x0, 0x0) ioctl$RTC_RD_TIME(r0, 0x80247009, &(0x7f00000000c0)) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x6) ioctl$sock_SIOCGSKNS(r0, 0x894c, &(0x7f0000000100)=0xffffffffffffffe8) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'ip6gretap0\x00', 0x1000}) [ 250.399848] audit: type=1400 audit(1556850794.239:35512): avc: denied { net_admin } for pid=15745 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 250.401509] audit: type=1400 audit(1556850794.239:35513): avc: denied { net_admin } for pid=17374 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 255.396147] audit_printk_skb: 11016 callbacks suppressed [ 255.396155] audit: type=1400 audit(1556850799.239:39210): avc: denied { net_admin } for pid=16252 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 255.396298] audit: type=1400 audit(1556850799.239:39211): avc: denied { net_admin } for pid=18305 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 255.398081] audit: type=1400 audit(1556850799.239:39212): avc: denied { net_admin } for pid=16252 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 255.398255] audit: type=1400 audit(1556850799.239:39213): avc: denied { net_admin } for pid=18303 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 255.400035] audit: type=1400 audit(1556850799.239:39214): avc: denied { net_admin } for pid=18239 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 255.400195] audit: type=1400 audit(1556850799.239:39215): avc: denied { net_admin } for pid=18303 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 255.401947] audit: type=1400 audit(1556850799.239:39216): avc: denied { net_admin } for pid=18239 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 255.402143] audit: type=1400 audit(1556850799.239:39217): avc: denied { net_admin } for pid=18299 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 255.403922] audit: type=1400 audit(1556850799.239:39218): avc: denied { net_admin } for pid=18252 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 255.404052] audit: type=1400 audit(1556850799.239:39219): avc: denied { net_admin } for pid=18299 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 260.406433] audit_printk_skb: 11175 callbacks suppressed [ 260.406441] audit: type=1400 audit(1556850804.249:42984): avc: denied { net_admin } for pid=19261 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 260.406728] audit: type=1400 audit(1556850804.249:42985): avc: denied { net_admin } for pid=19260 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 260.408368] audit: type=1400 audit(1556850804.249:42986): avc: denied { net_admin } for pid=19261 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 260.408625] audit: type=1400 audit(1556850804.249:42987): avc: denied { net_admin } for pid=19260 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 260.410345] audit: type=1400 audit(1556850804.249:42988): avc: denied { net_admin } for pid=19250 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 260.410571] audit: type=1400 audit(1556850804.249:42989): avc: denied { net_admin } for pid=19263 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 260.412276] audit: type=1400 audit(1556850804.249:42990): avc: denied { net_admin } for pid=19250 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 260.412461] audit: type=1400 audit(1556850804.249:42991): avc: denied { net_admin } for pid=19263 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 260.414257] audit: type=1400 audit(1556850804.249:42992): avc: denied { net_admin } for pid=19251 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 260.414427] audit: type=1400 audit(1556850804.249:42993): avc: denied { net_admin } for pid=19266 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 265.418559] audit_printk_skb: 6364 callbacks suppressed [ 265.418568] audit: type=1400 audit(1556850809.259:45115): avc: denied { net_admin } for pid=14445 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 265.419646] audit: type=1400 audit(1556850809.259:45116): avc: denied { net_admin } for pid=14980 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 265.420522] audit: type=1400 audit(1556850809.259:45117): avc: denied { net_admin } for pid=14445 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 265.429541] audit: type=1400 audit(1556850809.269:45120): avc: denied { net_admin } for pid=14455 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 265.431362] audit: type=1400 audit(1556850809.269:45121): avc: denied { net_admin } for pid=14455 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 265.433086] audit: type=1400 audit(1556850809.269:45122): avc: denied { net_admin } for pid=17362 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 265.434983] audit: type=1400 audit(1556850809.269:45123): avc: denied { net_admin } for pid=17362 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 265.439543] audit: type=1400 audit(1556850809.279:45124): avc: denied { net_admin } for pid=17379 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 265.439716] audit: type=1400 audit(1556850809.279:45125): avc: denied { net_admin } for pid=17382 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 265.441490] audit: type=1400 audit(1556850809.279:45126): avc: denied { net_admin } for pid=17379 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 270.457978] audit_printk_skb: 3037 callbacks suppressed [ 270.457986] audit: type=1400 audit(1556850814.299:46143): avc: denied { net_admin } for pid=20286 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 270.459867] audit: type=1400 audit(1556850814.299:46144): avc: denied { net_admin } for pid=20286 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 270.462374] audit: type=1400 audit(1556850814.299:46145): avc: denied { net_admin } for pid=20281 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 270.464218] audit: type=1400 audit(1556850814.299:46146): avc: denied { net_admin } for pid=20281 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 270.466150] audit: type=1400 audit(1556850814.309:46147): avc: denied { net_admin } for pid=20285 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 270.468040] audit: type=1400 audit(1556850814.309:46148): avc: denied { net_admin } for pid=20285 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 270.469888] audit: type=1400 audit(1556850814.309:46149): avc: denied { net_admin } for pid=20253 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 270.471753] audit: type=1400 audit(1556850814.309:46150): avc: denied { net_admin } for pid=20253 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 270.473608] audit: type=1400 audit(1556850814.309:46151): avc: denied { net_admin } for pid=20259 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 270.486419] audit: type=1400 audit(1556850814.239:46141): avc: denied { net_admin } for pid=18299 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 275.467947] audit_printk_skb: 1736 callbacks suppressed [ 275.467955] audit: type=1400 audit(1556850819.309:46731): avc: denied { sys_admin } for pid=2110 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 275.477902] audit: type=1400 audit(1556850819.319:46732): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 275.479780] audit: type=1400 audit(1556850819.319:46733): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 275.481696] audit: type=1400 audit(1556850819.319:46734): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 275.483635] audit: type=1400 audit(1556850819.319:46735): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 275.516917] audit: type=1400 audit(1556850819.359:46736): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 275.518805] audit: type=1400 audit(1556850819.359:46737): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 275.520719] audit: type=1400 audit(1556850819.359:46738): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 275.522519] audit: type=1400 audit(1556850819.359:46739): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 275.524790] audit: type=1400 audit(1556850819.359:46740): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:33:42 executing program 5: r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000140)="fb7c0df4d0a7aac5f279f83e227a5cd4299b615ae5777b7b5954144c292a15229bee81771926a60fac542e400c2b556b6d3c4fee552f42fbd64392e12b69ae63c741a73672e7d10799efb77867b7d021b76c21a038374cfed50001876244ef3a4205719f05f928ef2d20902dc2da747fc5476561989170a229b181227018250d8d12f6db13409a11") write$FUSE_STATFS(r0, &(0x7f00000000c0)={0x60, 0x0, 0x4, {{0x81, 0x36, 0x4, 0x4, 0x6, 0x7, 0x5, 0x401}}}, 0x60) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r1, 0x107, 0xa, 0x0, &(0x7f0000000080)) 02:33:42 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="3000000010003b0e00"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000001000120008000100767469000400020035501b017a721a96bf472e03f56ac724961a7f3e377c6c69ac09188013d5db81931fc78f7c1e3512b107ab8a13981b5b819cf4e62513c0c71ef1be1b1ced689547e4300db841ae0f311ba4d97f4d7dd83ad7a7fbc5e42b2be35487379d634d18f43171cfe45d15bd77fed9d9c33117b11845281eec845a649361806a13761429e2c7ab9f97096f"], 0x30}}, 0x0) 02:33:42 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) syncfs(r0) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f00000001c0)=0x200000072, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000003c80)={0x0, &(0x7f0000003c40)}, 0x8) setsockopt$sock_int(r0, 0x1, 0x2d, &(0x7f0000000040), 0x4) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket(0x0, 0x0, 0x3) r2 = open(&(0x7f000000fffa)='./bus\x00', 0x400000000141042, 0x0) close(r2) r3 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x40, 0x105082) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000240), 0x4) r4 = memfd_create(&(0x7f0000000640)='\x8ala\x02\x00\x00\x00[', 0xfffffffffffffffc) pwritev(r1, &(0x7f0000000280)=[{&(0x7f0000000140)="415fc886b3b1e1fd3d4f87e2965407c238ebe35738d90377591ae216a7825824e207d608d63429c962fedee34123ba3526d175376fbf8b3d6c09e3b3"}, {&(0x7f00000004c0)="611feb61e439f283fdce3fef3fd1d1eca20ece5e6953ceefd5e7576339b37839a7e78dab174e7958a9873a622381763afa344e3f4beb50fac45b52dd6330038cdb6d16bbb5348fd875408f5bead9a3ee274614c0181bbdec3ec4c2a740892aa92f36fb5b1c5eed996019eb2eb2e40f95c42924733380a4e83e1622254c9c545907b03067b463f1c923352fb48726026a345e1a63fbc5fdc5752b4db9122beddaaba561c2cfdcff6147a0a438afd1cadb11509b2de3365d476c4402017f39659e9dd8a9d9faab34bb633d1c06aaf6bc56b3c56111b9530047fa4bf683b45b216802f18c4311f75d0e57ebdabf5575f248efe81fb331ab49c10df0"}], 0x39a, 0x80000000000) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) renameat2(r2, &(0x7f0000000200)='./bus\x00', r2, &(0x7f0000003bc0)='./bus\x00', 0x7) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r2, 0x0) write$cgroup_type(r2, &(0x7f0000000080)='threaded\x00', 0x9) socketpair$unix(0x1, 0x2004, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x6000) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000300)='TIPCv2\x00') perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000005c0)=ANY=[@ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES64=r5, @ANYRESHEX=r5, @ANYRESOCT=r1, @ANYRESDEC=r3]], 0x8}}, 0x0) write(0xffffffffffffffff, &(0x7f00000001c0), 0x526987c9) read(0xffffffffffffffff, &(0x7f0000000340)=""/250, 0x6737bb14bad0161e) sendfile(r3, r4, 0x0, 0x80003) syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/ip_vs_stats_percpu\x00') 02:33:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000140)='attr\x00') ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) fchdir(r1) syz_execute_func(&(0x7f0000000000)="951cf50f058520d2f8071166460f6d30298f17955bf95bc422d5a634ae2665643e36660fe8780066f66d220ff338df3e420fc5e8cd5466470f18d96641790f381dd0d0fc65660f79ea0f6eba0dfe8cc17373d9e543f500000fbfcec461fa5b1c12f3420861ff8171a38a6ebb577426a501c4740f2d439600004499e2793438c461205ffbf2400ff50a0f3804830a000000") 02:33:42 executing program 1: prctl$PR_GET_TIMERSLACK(0x1e) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/loop-control\x00', 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8017) syz_genetlink_get_family_id$ipvs(&(0x7f00000038c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f00000039c0)={&(0x7f0000003880)={0x10, 0x0, 0x0, 0x104}, 0xc, &(0x7f0000003980)={&(0x7f0000003900)=ANY=[@ANYBLOB="06002dbd7000fedbdf251100000008000600060000000800060026000000080006000004000008000500050000000c00030008000800d300000008000400000000"], 0x1}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) r2 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$update(0x2, r2, &(0x7f0000000080)="332a0d5f501168e96a009e6bb7e91dd2e22b0437e3db6a9115f85880f29c6612fb9f710656e7ad1aabf568df7739793d64bfee0ddfbe4508af793b284396069bdac48334d87b03bdfea42bbca57f04572e4811e72e32eb43d2b3e95310cba581cd6d9120b36d3c1fe750022e6f7b7aa7010209ff5a4e41b2f2a35312ddc46d0c7c7c260e8687fbcf51295343fa4620219eac0638e994bc44d20a885683c3fa541b8ac4bef16c36861b9ab8ad8fdbf81808200f1e36e783d24bfe57a7e4b7d48e740867681080f348d8c6aba63a4283660837ee63f9e196b251d7899e", 0xdc) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 02:33:42 executing program 2: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r0 = gettid() r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mknod(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) mknod(&(0x7f0000000180)='./file0\x00', 0x8001420, 0x0) r2 = open(&(0x7f0000000200)='./file0\x00', 0x2, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r4 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) splice(r3, 0x0, r4, 0x0, 0xffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) tkill(r0, 0x15) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="27000000030000000000546939dc9e194411ae00000000000000000000000600000008000000766d8865743100"], 0x27) [ 280.476659] audit_printk_skb: 4229 callbacks suppressed [ 280.476667] audit: type=1400 audit(1556850824.319:48156): avc: denied { net_admin } for pid=20814 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:33:44 executing program 0: syz_execute_func(&(0x7f0000000500)="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") ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) 02:33:45 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = epoll_create(0x9) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x8000, 0x0) openat$cgroup(r2, &(0x7f0000000100)='syz0\x00', 0x200002, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000000)={0x1}) 02:33:46 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000000080)=""/235, &(0x7f0000000000)=0xeb) getsockopt$inet_tcp_int(r0, 0x6, 0xa, 0x0, &(0x7f0000000040)=0xfffffffffffffefe) [ 280.477390] audit: type=1400 audit(1556850824.319:48157): avc: denied { net_admin } for pid=20858 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 280.479071] audit: type=1400 audit(1556850824.319:48158): avc: denied { net_admin } for pid=20858 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:33:52 executing program 5: syz_execute_func(&(0x7f0000000700)="a84a2ae92c211c429f52bf03000000c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80d1e3e30b110fb8c4014e4e0b5b5b14dee509c421045f4607c422adaf50e35b70c4c4c4a3bd4877f88ac483397fd30067266744df64b2c010f138f653afaf6766f2ab440fec3facacc4c3214cb9a5604b19c201b00b000000f08171a30b8a826e670f542c3d271c00006311660f383be60272d25d78ebeb628f680864360fe25800218de3c0f52641802d08000000fa49c45c0f860030b75fbedcdca1c9c4837d04e33dc462dd3fe566474f383ac4217f12c5a232efecefec") mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x4031, 0xffffffffffffffff, 0x0) 02:33:52 executing program 4: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/166, 0x18}], 0x1) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0xcb) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000100)) r2 = gettid() syz_open_dev$binder(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x800) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x6, 0x100000000000031, 0xffffffffffffffff, 0x0) tkill(r2, 0x1000000000016) 02:33:52 executing program 0: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{&(0x7f00000004c0)=@in6={0xa, 0x4e22, 0x0, @mcast2}, 0x80, 0x0}}], 0x1, 0x0) r0 = socket$inet6(0xa, 0x800, 0x0) sendmmsg(r0, &(0x7f0000007e00), 0x136a88c83115ab7, 0x8005) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000000), &(0x7f0000000080)=0x68) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/enforce\x00', 0x80000, 0x0) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000100)={0x10000, 0x1, 0x0, 0x7ff, 0x5}) write$binfmt_elf32(r0, &(0x7f0000000540)={{0x7f, 0x45, 0x4c, 0x46, 0x401, 0xfffffffffffff7cd, 0x8, 0x8, 0x1, 0x3, 0x3f, 0x100, 0x140, 0x38, 0x1e9, 0x2, 0x200000000, 0x20, 0x1, 0x2, 0x80000000, 0x2}, [{0x2, 0x81, 0x3ff, 0x7, 0xa, 0x7fffffff, 0x3ba, 0x9}, {0x3, 0x7fd, 0x4, 0x6, 0x4, 0x8, 0x1, 0x8001}], "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", [[], [], [], [], [], [], [], [], []]}, 0x1978) [ 280.484501] audit: type=1400 audit(1556850824.319:48159): avc: denied { create } for pid=20538 comm="syz-executor.1" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:33:53 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0x2, 0x0, 0x0, @dev}, 0x1c) recvfrom$inet6(r0, &(0x7f0000000040)=""/37, 0x25, 0x10000, &(0x7f0000000080)={0xa, 0x4e20, 0x9, @rand_addr="2d6cc60310630944bcf790f4996cfa39"}, 0x1c) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f00000001c0)=@add_del={0x2, &(0x7f0000000180)='syzkaller0\x00'}) getsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f00000000c0), &(0x7f0000000140)=0x10) [ 280.485893] audit: type=1400 audit(1556850824.329:48160): avc: denied { net_admin } for pid=20818 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:33:54 executing program 2: r0 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/context\x00', 0x2, 0x0) fchmod(r0, 0x1) fsetxattr$security_selinux(r0, &(0x7f0000000080)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:userio_device_t:s0\x00', 0x25, 0x2) fsetxattr$security_selinux(r0, &(0x7f0000000140)='security.selinux\x00', &(0x7f0000000180)='system_u:object_r:smartcard_device_t:s0\x00', 0x28, 0x2) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x8040, 0x0) fcntl$setsig(r1, 0xa, 0xb) fsync(r1) fcntl$setlease(r1, 0x400, 0x0) rt_sigtimedwait(&(0x7f00000000c0)={0x3}, 0x0, 0x0, 0x1f9) r2 = open(&(0x7f0000000000)='./file0\x00', 0x1, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000001c0)={0x0, @empty, @empty}, &(0x7f0000000200)=0xc) fcntl$getflags(r1, 0x401) [ 280.486392] audit: type=1400 audit(1556850824.329:48161): avc: denied { net_admin } for pid=20252 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:33:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r1, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00030000000000000067681bfd070000000000000000fb6c7a2ce29af91ad4861daf1b0d020000004314524ade761922"}, 0x5f) [ 280.487842] audit: type=1400 audit(1556850824.329:48162): avc: denied { net_admin } for pid=20887 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:33:59 executing program 0: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f0000000080)='\x02@\x94\xb8\x03P\xcaC\x8a\xf9\x16.H\x80\'\xc5\x8d\xab\xf9\x1b@\xd6\xea\xd24\x95\x94\x165\x8f\x18H\xdc\xc9\x98M\xf9\x8d\xcdmp\xf8h\x8fZV\x16\x83\xf1\xa6-c\xcbQ#\'O\xb9\xbb\xe5\xf3P\xf1\x81\xf7\na\v:\xca\xdc\xe9yb\xb9\xc7p\x92\x8b\xe9\xfdEWW\xad\xd50\xd27\x13\xc1\x7fXo\xf3\x92', 0x0) r1 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000100)=0x7) ioctl$RNDCLEARPOOL(r1, 0x5206, &(0x7f0000000140)=0x7) write$binfmt_elf32(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="7f454c46000000000000000000000000030006000000001000000000380000000100000000000000000020000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000eaffffff00"/120], 0x78) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000300)=0xc) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = geteuid() setresuid(r2, r3, r4) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8917, &(0x7f0000000180)={'bridge_slave_0\x00', {0x2, 0x4e21, @loopback}}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) getsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000001c0)={@multicast1, @dev}, &(0x7f0000000280)=0xc) [ 280.488270] audit: type=1400 audit(1556850824.329:48163): avc: denied { net_admin } for pid=20252 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 280.491485] audit: type=1400 audit(1556850824.329:48164): avc: denied { net_admin } for pid=20888 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 280.493446] audit: type=1400 audit(1556850824.329:48165): avc: denied { net_admin } for pid=20888 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 285.486778] audit_printk_skb: 10604 callbacks suppressed [ 285.486787] audit: type=1400 audit(1556850829.329:51734): avc: denied { net_admin } for pid=21774 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 285.487118] audit: type=1400 audit(1556850829.329:51735): avc: denied { net_admin } for pid=21688 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 285.488705] audit: type=1400 audit(1556850829.329:51736): avc: denied { net_admin } for pid=21774 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 285.489011] audit: type=1400 audit(1556850829.329:51737): avc: denied { net_admin } for pid=21688 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 285.490649] audit: type=1400 audit(1556850829.329:51738): avc: denied { net_admin } for pid=21782 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 285.490969] audit: type=1400 audit(1556850829.329:51739): avc: denied { net_admin } for pid=21687 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 285.492548] audit: type=1400 audit(1556850829.329:51740): avc: denied { net_admin } for pid=21782 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 285.492882] audit: type=1400 audit(1556850829.329:51741): avc: denied { net_admin } for pid=21687 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 285.494506] audit: type=1400 audit(1556850829.329:51742): avc: denied { net_admin } for pid=21781 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 285.494809] audit: type=1400 audit(1556850829.329:51743): avc: denied { net_admin } for pid=21707 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 289.250840] input: syz1 as /devices/virtual/input/input24 [ 290.499586] audit_printk_skb: 10733 callbacks suppressed [ 290.499595] audit: type=1400 audit(1556850834.339:55332): avc: denied { net_admin } for pid=21306 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 290.500883] audit: type=1400 audit(1556850834.339:55333): avc: denied { net_admin } for pid=20676 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 290.500926] audit: type=1400 audit(1556850834.339:55334): avc: denied { net_admin } for pid=21306 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 290.505706] audit: type=1400 audit(1556850834.349:55335): avc: denied { net_admin } for pid=21296 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 290.507477] audit: type=1400 audit(1556850834.349:55336): avc: denied { net_admin } for pid=22679 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 290.509395] audit: type=1400 audit(1556850834.349:55337): avc: denied { net_admin } for pid=22679 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 290.509649] audit: type=1400 audit(1556850834.349:55338): avc: denied { net_admin } for pid=21240 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 290.511365] audit: type=1400 audit(1556850834.349:55339): avc: denied { net_admin } for pid=22678 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 290.511565] audit: type=1400 audit(1556850834.349:55340): avc: denied { net_admin } for pid=21240 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 290.513160] audit: type=1400 audit(1556850834.349:55341): avc: denied { net_admin } for pid=22678 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 294.796583] input: syz1 as /devices/virtual/input/input25 [ 295.505233] audit_printk_skb: 10209 callbacks suppressed [ 295.505241] audit: type=1400 audit(1556850839.339:58770): avc: denied { net_admin } for pid=21735 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 295.505308] audit: type=1400 audit(1556850839.339:58771): avc: denied { net_admin } for pid=23531 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 295.507165] audit: type=1400 audit(1556850839.349:58772): avc: denied { net_admin } for pid=21735 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 295.507234] audit: type=1400 audit(1556850839.349:58773): avc: denied { net_admin } for pid=23531 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 295.508912] audit: type=1400 audit(1556850839.349:58774): avc: denied { net_admin } for pid=23514 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 295.509179] audit: type=1400 audit(1556850839.349:58775): avc: denied { net_admin } for pid=23536 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 295.509863] audit: type=1400 audit(1556850839.209:58688): avc: denied { net_admin } for pid=20250 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 295.511166] audit: type=1400 audit(1556850839.349:58776): avc: denied { net_admin } for pid=23536 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 295.511422] audit: type=1400 audit(1556850839.209:58689): avc: denied { net_admin } for pid=20926 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 295.511511] audit: type=1400 audit(1556850839.349:58777): avc: denied { net_admin } for pid=21790 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 300.519821] audit_printk_skb: 10251 callbacks suppressed [ 300.519830] audit: type=1400 audit(1556850844.359:62210): avc: denied { net_admin } for pid=19958 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 300.519862] audit: type=1400 audit(1556850844.359:62211): avc: denied { net_admin } for pid=19855 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 300.521797] audit: type=1400 audit(1556850844.359:62212): avc: denied { net_admin } for pid=19958 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 300.521804] audit: type=1400 audit(1556850844.359:62213): avc: denied { net_admin } for pid=19855 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 300.529959] audit: type=1400 audit(1556850844.369:62215): avc: denied { net_admin } for pid=20557 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 300.529984] audit: type=1400 audit(1556850844.369:62214): avc: denied { net_admin } for pid=17653 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 300.531905] audit: type=1400 audit(1556850844.369:62216): avc: denied { net_admin } for pid=20557 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 300.531922] audit: type=1400 audit(1556850844.369:62217): avc: denied { net_admin } for pid=17653 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 300.540043] audit: type=1400 audit(1556850844.379:62218): avc: denied { net_admin } for pid=22143 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 300.540255] audit: type=1400 audit(1556850844.379:62219): avc: denied { net_admin } for pid=19870 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 305.536098] audit_printk_skb: 10304 callbacks suppressed [ 305.536106] audit: type=1400 audit(1556850849.379:65678): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 305.538055] audit: type=1400 audit(1556850849.379:65679): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 305.539939] audit: type=1400 audit(1556850849.379:65680): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 305.541719] audit: type=1400 audit(1556850849.379:65681): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 305.543595] audit: type=1400 audit(1556850849.379:65682): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 305.547966] audit: type=1400 audit(1556850849.389:65684): avc: denied { net_admin } for pid=25266 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 305.549889] audit: type=1400 audit(1556850849.389:65685): avc: denied { net_admin } for pid=25266 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 305.551860] audit: type=1400 audit(1556850849.389:65686): avc: denied { net_admin } for pid=25270 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 305.553824] audit: type=1400 audit(1556850849.389:65687): avc: denied { net_admin } for pid=25270 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 305.555707] audit: type=1400 audit(1556850849.399:65688): avc: denied { net_admin } for pid=25262 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 310.548572] audit_printk_skb: 2663 callbacks suppressed [ 310.548581] audit: type=1400 audit(1556850854.389:66580): avc: denied { net_admin } for pid=21801 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 310.550084] audit: type=1400 audit(1556850854.389:66581): avc: denied { net_admin } for pid=21696 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 310.553983] audit: type=1400 audit(1556850854.389:66582): avc: denied { net_admin } for pid=21796 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 310.555215] audit: type=1400 audit(1556850854.389:66583): avc: denied { net_admin } for pid=21735 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 310.556608] audit: type=1400 audit(1556850854.399:66584): avc: denied { net_admin } for pid=23514 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 310.557733] audit: type=1400 audit(1556850854.399:66585): avc: denied { net_admin } for pid=23512 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 310.559583] audit: type=1400 audit(1556850854.399:66586): avc: denied { net_admin } for pid=21701 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 310.579664] audit: type=1400 audit(1556850854.419:66587): avc: denied { net_admin } for pid=21732 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 310.581495] audit: type=1400 audit(1556850854.419:66588): avc: denied { net_admin } for pid=21732 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 310.589639] audit: type=1400 audit(1556850854.429:66589): avc: denied { net_admin } for pid=23557 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:34:16 executing program 1: 02:34:16 executing program 2: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uhid\x00', 0x400000002, 0x0) init_module(&(0x7f0000000400)='/dev/uhid\x00', 0xa, &(0x7f0000000440)='\x00') write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000500)=[{&(0x7f0000000040)=""/39, 0x27}], 0x1) r1 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/relabel\x00', 0x2, 0x0) fremovexattr(r0, &(0x7f0000000380)=@known='com.apple.FinderInfo\x00') write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000280)) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, r2, 0x300, 0x70bd2b, 0x25dfdbfb, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x21ba}}, ["", ""]}, 0x24}}, 0x4000000) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x42000, 0x0) setsockopt$IP_VS_SO_SET_EDITDEST(r3, 0x0, 0x489, &(0x7f0000000180)={{0x3a, @broadcast, 0x4e21, 0x2, 'lc\x00', 0x1, 0xfffffffffffffff9, 0x46}, {@multicast1, 0x4e24, 0x3, 0xfffffffffffffffe, 0xae7, 0x7fffffff}}, 0x44) writev(r0, &(0x7f00000006c0)=[{&(0x7f0000000140)="9317c815", 0x4}], 0x1) 02:34:16 executing program 3: syz_execute_func(&(0x7f0000000040)="0c0cb5b598cd801b69e4f56962f5696200d9d9d0c441395bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4da7676f2168f4808eebce00000802000c4c3dd6d68074851518fe9509b9b9bfc0000c1ea01eff265dc5f00c35b5b45363ef80f9966030faee42c240f5e5bf447000026400f0d18c401fe5ff6e3df646736676670664336660fd2938c00000064660f553e6666450f17720d14111d54111d00") r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000140)={0x0, @remote, @remote}, &(0x7f0000000180)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f00000001c0)={@dev={0xfe, 0x80, [], 0x1b}, 0x6e, r1}) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @empty}, &(0x7f0000000100)=0x10) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000280)=0x2, 0x4) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f00000002c0)={'gretap0\x00', {0x2, 0x4e22, @loopback}}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f0000000200)={0x0, @local, @dev}, &(0x7f0000000240)=0xc) 02:34:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @local}, 0x10) r1 = socket$packet(0x11, 0x1, 0x300) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000100)=0x3f, 0x4) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000280)=0x32, 0x4) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @broadcast}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 02:34:16 executing program 5: 02:34:16 executing program 0: [ 313.355992] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 313.362742] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 313.540934] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 313.623071] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 313.706411] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 313.741451] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 02:34:18 executing program 5: 02:34:18 executing program 4: 02:34:18 executing program 3: 02:34:18 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/relabel\x00', 0x2, 0x0) connect$inet6(r0, &(0x7f0000000080), 0x1c) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0xfdd0000000, 0x4}) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) setsockopt$IPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x41, 0x0, 0x13c) readahead(r0, 0x3, 0x1ff) fcntl$setstatus(r1, 0x4, 0x2000) fcntl$setstatus(r0, 0x4, 0x42803) ioctl$LOOP_SET_FD(r1, 0x4c00, r0) [ 314.102316] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 314.102327] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 314.102337] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 314.102348] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 314.102358] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 314.102368] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 314.102378] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 314.102388] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 02:34:18 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000fd0ffc)) syz_open_pts(0xffffffffffffffff, 0x2) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80440, 0x0) write$P9_RATTACH(r2, &(0x7f0000000000)={0x14, 0x69, 0x2, {0x7, 0x0, 0x4}}, 0xfffffffffffffd83) ioctl$TIOCSLCKTRMIOS(0xffffffffffffffff, 0x5457, 0x0) r3 = gettid() clock_gettime(0x0, 0x0) unshare(0x40000000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000000300)={@initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xa9, 0x3, 0xff, 0x1, 0x6ea, 0x100000000}, 0x20) socket$inet_tcp(0x2, 0x1, 0x0) timer_create(0x4, &(0x7f00000001c0)={0x0, 0x13, 0x0, @tid=r3}, &(0x7f0000000240)=0x0) timer_settime(r4, 0x1, &(0x7f0000000280), &(0x7f00000002c0)) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'lo\x00@\x00', 0x1800}) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) prlimit64(r3, 0xe, &(0x7f0000000080)={0x3a8, 0x8}, &(0x7f0000000180)) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8916, &(0x7f00000000c0)={'lo\x00', {0x2, 0x0, @rand_addr=0x2000000}}) ptrace$pokeuser(0x6, 0x0, 0x1, 0x4) 02:34:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) r1 = epoll_create1(0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) epoll_pwait(r1, &(0x7f0000000040)=[{}], 0x1, 0x400, 0x0, 0x0) r2 = syz_open_pts(r0, 0x0) r3 = dup3(r2, r0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)) setsockopt$inet_tcp_int(r3, 0x6, 0x0, &(0x7f0000000000)=0x2, 0x4) [ 314.102398] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 314.102408] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 314.102418] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0 [ 314.118881] hid-generic 0000:0000:0000.0006: hidraw0: HID v0.00 Device [syz1] on syz1 [ 314.855960] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 314.896083] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 314.948618] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 314.992657] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 315.076092] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 315.117321] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz1] on syz1 [ 315.884444] audit_printk_skb: 1269 callbacks suppressed [ 315.884452] audit: type=1400 audit(1556850859.719:67013): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 316.021596] audit: type=1400 audit(1556850859.859:67014): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 316.037177] audit: type=1400 audit(1556850859.879:67015): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 316.121132] audit: type=1400 audit(1556850859.939:67016): avc: denied { sys_admin } for pid=2106 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 316.122809] audit: type=1400 audit(1556850859.939:67017): avc: denied { sys_admin } for pid=2106 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 316.144456] audit: type=1400 audit(1556850859.979:67018): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 316.220332] audit: type=1400 audit(1556850860.059:67019): avc: denied { sys_admin } for pid=2106 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 316.315074] audit: type=1400 audit(1556850860.149:67020): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 316.372917] audit: type=1400 audit(1556850860.199:67021): avc: denied { sys_admin } for pid=2106 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 316.401964] audit: type=1400 audit(1556850860.239:67022): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:34:22 executing program 1: r0 = gettid() clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x70) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x100, 0x8a) ioctl$UI_BEGIN_FF_UPLOAD(r2, 0xc06855c8, &(0x7f0000000180)={0x3, 0x4, {0x55, 0x100000001, 0x2, {0x75b186e4}, {0x78e3, 0x100000000}, @cond=[{0x8d039e9, 0xffff, 0x7, 0x4, 0x400, 0xffffffffffffffff}, {0x5, 0x401, 0x7, 0x9, 0x6, 0x4}]}, {0x0, 0x5d5, 0xfff, {0x3f, 0x20}, {0x3, 0x8001}, @cond=[{0xede6, 0x9, 0x7, 0x8, 0x5, 0x6}, {0xfffffffffffffff8, 0x3ff, 0x1, 0x1000, 0x6, 0x800}]}}) ptrace$cont(0x27, r0, 0x1, 0xfffffffffffffbff) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x11e}) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$UI_SET_KEYBIT(r3, 0x40045565, 0x211) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) getpeername(r3, &(0x7f0000000340)=@xdp, &(0x7f00000003c0)=0x80) ptrace$cont(0x9, r1, 0x0, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x3f, &(0x7f0000000200)=""/225, &(0x7f0000000300)=0xe1) 02:34:22 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bc070") r1 = creat(&(0x7f0000000080)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x14c}, 0x2c) write$binfmt_elf64(r0, &(0x7f0000000740)={{0x7f, 0x45, 0x4c, 0x46, 0x1200000000000, 0x9, 0x2, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x27b, 0x40, 0x2ad, 0x1ff, 0x59, 0x38, 0x1, 0x4, 0x7fff, 0x5}, [{0x7, 0xfffffffffffffffe, 0xb9, 0x8000, 0x401, 0x0, 0x5, 0x400}], "9d1eb98a1a59dc297ad6f1fa482b38a8b5f4802624e46660fb5cf44d4b1b416bbbb15a9c2537143760cc438822a2be74a9e153b1400efa80f1c9bd64f81cad529300fd89b4da59016950be84031e1aab19dda4e260d380f5725aa0d7bce0b8a6dc7aabac831bc5a8ce2dcff713c0d2c21026e85987604dc408cc9444d534d2d3f52448df20232e8e5b5126e916a00b2972e39713071c5fb5e12f67714b63dd323ce0a56e22bd51bd435aa53c75"}, 0x125) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) readv(r2, &(0x7f0000000140)=[{&(0x7f0000000200)=""/255, 0xff}], 0x1) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xff, 0x8001, 0x2, 0x0, 0x1}) r3 = syz_open_pts(r2, 0x2) dup3(r3, r2, 0x0) write(r2, &(0x7f0000c34fff), 0xffffff0b) 02:34:22 executing program 2: syz_execute_func(&(0x7f0000000180)="980f58c51c3d0f05c442791cf0c4a37bf0c53cd01c41e2e92e45d9f767660f6b32fb660f72d50f8f96c403e2c461fc50e243e50808c4e11bf8c420f9c4c4634978f7006db71266f3440f1aecc9dcdc0fbcaf001000002665f3e152acacc401fc53875a000000c4227d3b7ab001b00b000000f081610d2baf826ec442a0f39601000000be0d2d8cc7e862c789e867bb603a3ac461660f5edcc099ee26262688fec4234d46d13d00d0313165660f6a943aa8c8a440a26167f0478148690020007ee3") 02:34:22 executing program 0: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x11, 0x800000003, 0x0) setsockopt$packet_buf(r0, 0x107, 0xf, &(0x7f0000000000)="a2e6fa9a", 0x4) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x79) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)=@deltaction={0x84, 0x31, 0x508, 0x70bd2a, 0x25dfdbfc, {}, [@TCA_ACT_TAB={0x34, 0x1, [{0x10, 0x9, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0xc, @TCA_ACT_INDEX={0x8}}, {0x10, 0x14, @TCA_ACT_INDEX={0x8, 0x3, 0x1b}}]}, @TCA_ACT_TAB={0x3c, 0x1, [{0x14, 0x9, @TCA_ACT_KIND={0xc, 0x1, 'csum\x00'}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0xffffffffb14d95de}}, {0x14, 0x17, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}]}]}, 0x84}}, 0x800) write$binfmt_aout(r0, &(0x7f0000000780)={{0x107, 0x0, 0x0, 0xd, 0x1a0ffffffff, 0x0, 0x0, 0x0, 0xa}}, 0xfdef) 02:34:22 executing program 3: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='task\x00') socket$inet_udplite(0x2, 0x2, 0x88) socket$unix(0x1, 0x2, 0x0) r1 = openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r2 = fcntl$dupfd(r0, 0x0, r1) syz_execute_func(&(0x7f0000000100)="b1dc91cd80c4c1fae62d3cd3d8c56969ef69dc00d9440f0df0d0d0c44139fd5bf9c4e18d72e00dc7c7e4c653fb0fc4014c5868f4a95ff965be3c3bc4e17950ea01efc48192558dc3c36645d1d9730f5726400f0d18a9c14600000a8ab1b182010804f40f667e440f000066400fc730") setsockopt$inet_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) 02:34:22 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c1205000000371803000000000000000e6bf36a4823783df4d46f27f3117b20b9548d72e3c0ddc55a07b66f0b860719a00dcc77d71687e4cb0f3ce4b427421d2320c2ba341e7e54ad38f741bf6ed49dd40c") clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000000)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) setxattr$security_ima(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@ng={0x4, 0x3, "48df18e5b113e2a41ce167"}, 0xd, 0x3) wait4(0x0, 0x0, 0x0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)=0x0) timer_settime(r3, 0x1, &(0x7f0000000180)={{0x0, 0x1c9c380}, {0x77359400}}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x989680}}, 0x0) tkill(r2, 0x1004000000016) [ 319.354237] skbuff: bad partial csum: csum=0/65535 len=14 02:34:23 executing program 4: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_dev$loop(&(0x7f0000000100)='/dev/loop#\x00', 0x0, 0x4402) socket$inet_udp(0x2, 0x2, 0x0) r1 = socket(0x17, 0x8000a, 0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x3010000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x68, r2, 0x320, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_MON={0x54, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfba}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x800}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000881}, 0x80) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000240)={{0xa, 0x4e20, 0x6c, @ipv4={[], [], @local}, 0x7}, {0xa, 0x4e23, 0x40, @local}, 0x7fffffff, [0x6e2, 0xa2, 0x8, 0xffff, 0x4af, 0x2, 0x5, 0x1]}, 0x5c) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000140)='trusted.overlay.upper\x00', &(0x7f0000000180)=ANY=[@ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRES64=r1, @ANYRES16, @ANYRES32=r0], @ANYPTR]], 0x1, 0xfffffffffffffffd) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "282f18cf52ad303d55f80064b251bbb554d655875dd2d83bf436832bd0e03189312908d761073a2beb98bb4bf24088254809b1bf0afc6bfde38c46e8c1cd9e80", "5054fec2f54885f6c875ec3f3da9e66627ec456900"}) 02:34:23 executing program 0: r0 = open(&(0x7f0000000100)='./bus\x00', 0x2000000080, 0x10) mmap(&(0x7f0000004000/0x1000)=nil, 0x1000, 0x2000004, 0x1012, r0, 0x0) write$tun(r0, &(0x7f0000000100)=ANY=[], 0x0) mlock2(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) r1 = perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x100000000, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mlockall(0x1) mount(&(0x7f0000000380)=ANY=[@ANYBLOB="c3ffffffff711b2508a95d"], 0x0, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) syz_genetlink_get_family_id$team(0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) sendmsg$TEAM_CMD_NOOP(0xffffffffffffffff, 0x0, 0x1) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000, 0x3, &(0x7f0000ffc000/0x1000)=nil) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) open(0x0, 0x0, 0x0) r3 = dup(r2) bind$inet6(r2, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) msync(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x2) setsockopt$inet_tcp_int(r3, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) setsockopt$inet_tcp_int(r3, 0x6, 0x18, &(0x7f00000001c0), 0x4) r4 = open(&(0x7f0000000340)='./bus\x00', 0x100000141042, 0x0) ftruncate(r4, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) sendfile(r2, r4, 0x0, 0x8000fffffffe) connect$unix(r3, &(0x7f00000002c0)=@file={0x0, './bus\x00'}, 0x6e) 02:34:23 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000440), 0x0) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$set_timeout(0xf, r2, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet_msfilter(r1, 0x0, 0x29, 0x0, 0xff48) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) write$P9_RMKDIR(r1, &(0x7f0000000100)={0x14, 0x49, 0x2, {0x4, 0x2}}, 0x14) tkill(r3, 0x2b) fcntl$setstatus(r0, 0x4, 0x1000000000042803) 02:34:24 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f00000009c0)='ns/mnt\x00') setns(r0, 0x0) mount(&(0x7f0000000000)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='rootfs\x00', 0x2041, &(0x7f00000000c0)='ns/mnt\x00') 02:34:24 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000000)=""/36) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000080)) [ 320.899738] audit_printk_skb: 519 callbacks suppressed [ 320.899747] audit: type=1400 audit(1556850864.739:67196): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:34:26 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000800, &(0x7f0000000240)={0x2, 0x4e23, @local}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xf}}, 0x10) sendmmsg(r0, &(0x7f0000001e80)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000740)=[{0x10, 0x1, 0xd46e}], 0x10}}], 0x1, 0x4048000) [ 320.939687] audit: type=1400 audit(1556850864.779:67197): avc: denied { sys_admin } for pid=2105 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 320.982348] audit: type=1400 audit(1556850864.819:67198): avc: denied { net_admin } for pid=25326 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 320.984231] audit: type=1400 audit(1556850864.819:67199): avc: denied { net_admin } for pid=25326 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 320.988109] audit: type=1400 audit(1556850864.829:67200): avc: denied { net_admin } for pid=25327 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 320.988315] audit: type=1400 audit(1556850864.829:67201): avc: denied { net_admin } for pid=25345 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 320.990060] audit: type=1400 audit(1556850864.829:67202): avc: denied { net_admin } for pid=25327 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 320.990231] audit: type=1400 audit(1556850864.829:67203): avc: denied { net_admin } for pid=25345 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 320.994660] audit: type=1400 audit(1556850864.829:67204): avc: denied { net_admin } for pid=22758 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 320.994699] audit: type=1400 audit(1556850864.829:67205): avc: denied { net_admin } for pid=25321 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 325.909610] audit_printk_skb: 9512 callbacks suppressed [ 325.909618] audit: type=1400 audit(1556850869.749:70399): avc: denied { net_admin } for pid=26328 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 325.911434] audit: type=1400 audit(1556850869.749:70400): avc: denied { net_admin } for pid=26328 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 325.919788] audit: type=1400 audit(1556850869.759:70401): avc: denied { net_admin } for pid=26266 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 325.919794] audit: type=1400 audit(1556850869.759:70402): avc: denied { net_admin } for pid=25609 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 325.921723] audit: type=1400 audit(1556850869.759:70403): avc: denied { net_admin } for pid=26266 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 325.921759] audit: type=1400 audit(1556850869.759:70404): avc: denied { net_admin } for pid=25609 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 325.926623] audit: type=1400 audit(1556850869.769:70405): avc: denied { net_admin } for pid=25615 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 325.928456] audit: type=1400 audit(1556850869.769:70406): avc: denied { net_admin } for pid=25615 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 325.929545] audit: type=1400 audit(1556850869.769:70407): avc: denied { net_admin } for pid=26250 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 325.931322] audit: type=1400 audit(1556850869.769:70408): avc: denied { net_admin } for pid=26250 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 330.916074] audit_printk_skb: 10947 callbacks suppressed [ 330.916083] audit: type=1400 audit(1556850874.759:74078): avc: denied { net_admin } for pid=26658 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 330.917826] audit: type=1400 audit(1556850874.759:74079): avc: denied { net_admin } for pid=26658 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 330.918813] audit: type=1400 audit(1556850874.759:74080): avc: denied { net_admin } for pid=26758 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 330.919975] audit: type=1400 audit(1556850874.759:74081): avc: denied { net_admin } for pid=26737 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 330.920118] audit: type=1400 audit(1556850874.759:74082): avc: denied { net_admin } for pid=26758 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 330.921185] audit: type=1400 audit(1556850874.759:74083): avc: denied { net_admin } for pid=26772 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 330.921845] audit: type=1400 audit(1556850874.759:74084): avc: denied { net_admin } for pid=26737 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 330.922791] audit: type=1400 audit(1556850874.759:74085): avc: denied { net_admin } for pid=26772 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 330.923417] audit: type=1400 audit(1556850874.759:74086): avc: denied { net_admin } for pid=26764 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 330.929799] audit: type=1400 audit(1556850874.769:74088): avc: denied { net_admin } for pid=26089 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 335.929355] audit_printk_skb: 10999 callbacks suppressed [ 335.929364] audit: type=1400 audit(1556850879.769:77764): avc: denied { net_admin } for pid=26434 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 335.929374] audit: type=1400 audit(1556850879.769:77765): avc: denied { net_admin } for pid=26417 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 335.931296] audit: type=1400 audit(1556850879.769:77766): avc: denied { net_admin } for pid=26434 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 335.931330] audit: type=1400 audit(1556850879.769:77767): avc: denied { net_admin } for pid=26417 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 335.933487] audit: type=1400 audit(1556850879.769:77768): avc: denied { net_admin } for pid=26454 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 335.933610] audit: type=1400 audit(1556850879.769:77769): avc: denied { net_admin } for pid=26400 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 335.937308] audit: type=1400 audit(1556850879.779:77770): avc: denied { net_admin } for pid=27239 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 335.937312] audit: audit_lost=77418 audit_rate_limit=0 audit_backlog_limit=64 [ 335.937315] audit: printk limit exceeded [ 335.939245] audit: type=1400 audit(1556850879.779:77772): avc: denied { net_admin } for pid=27239 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 340.936656] audit_printk_skb: 10815 callbacks suppressed [ 340.936664] audit: type=1400 audit(1556850884.779:81413): avc: denied { net_admin } for pid=29616 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 340.938479] audit: type=1400 audit(1556850884.779:81414): avc: denied { net_admin } for pid=29616 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 340.939475] audit: type=1400 audit(1556850884.779:81415): avc: denied { net_admin } for pid=29567 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 340.940027] audit: type=1400 audit(1556850884.779:81416): avc: denied { net_admin } for pid=27687 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 340.941406] audit: type=1400 audit(1556850884.779:81417): avc: denied { net_admin } for pid=29624 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 340.941494] audit: type=1400 audit(1556850884.779:81418): avc: denied { net_admin } for pid=27687 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 340.946690] audit: type=1400 audit(1556850884.789:81419): avc: denied { net_admin } for pid=27700 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 340.946830] audit: type=1400 audit(1556850884.789:81420): avc: denied { net_admin } for pid=27690 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 340.948624] audit: type=1400 audit(1556850884.789:81421): avc: denied { net_admin } for pid=27700 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 340.948753] audit: type=1400 audit(1556850884.789:81422): avc: denied { net_admin } for pid=27690 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 345.950277] audit_printk_skb: 10883 callbacks suppressed [ 345.950286] audit: type=1400 audit(1556850889.789:85072): avc: denied { net_admin } for pid=26334 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 345.950292] audit: type=1400 audit(1556850889.789:85073): avc: denied { net_admin } for pid=26937 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:35:00 executing program 1: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x10001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x6) r1 = syz_open_procfs(0x0, &(0x7f0000000980)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\x00\x00\xae\x98&@\xd0\xe6\xbbQ\xff\a\x00\x00\x00\x00\x00\x00\xaa1\x91\x98\xe9\x1f\nMCi|+\xcd\xf9N\xdc\xc5\xa2*\x13\x8f\xf3;\xd6d2\xeb\xe5\x14\x0e\x8b\xda\xb7\xfc9h(mf\'\xa19q\x93\"}G3\xc1E\xe6e6\xc6\xc2u\x11%`\xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xa8\x14Ts\xcb\xde\x84\x1d\xc7\xcc;\xb18') sendfile(r0, r1, &(0x7f00000000c0)=0x209, 0x5a) 02:35:00 executing program 4: unlink(&(0x7f0000000040)='./file0\x00') r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") close(r0) 02:35:00 executing program 0: r0 = socket$inet6(0xa, 0xa, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}}, {{@in=@empty, 0x0, 0x32}, 0x0, @in6}}, 0x164) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 02:35:00 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000000)="2f2392e4e58d56c7d0836c30a122f80d2899f6cd89688a49d127485de218e1a4f0", 0x21}], 0x1}, 0x0) r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000180)={'ip6_vti0\x00', @ifru_flags}) r1 = dup3(r0, r0, 0x80000) ioctl$TIOCGSOFTCAR(r1, 0x5419, &(0x7f0000000040)) 02:35:00 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x10, &(0x7f0000000000)=0x6, 0x4) ioctl(r0, 0x1000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000300)="0c02b5b598cd801b69e4f56962f5696200d9d9d0c441395bf9f2680c003f008fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4da767667664d0f7efa8f4808eebce00000802000c4c3dd6d68074851518fe9509b9b9bfc0000c1ea01eff265dc5f00c4c23bdcc4bbbb5b45363ef80f9966030faee46666660fd7d20f5e5bf447000026400f0d18c401fe5ff6e3df646736676670664336660fd2938c0000000f01c36666450f17720d14111d54111d00") r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/status\x00', 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f00000000c0)=0x5, 0x4) [ 345.952222] audit: type=1400 audit(1556850889.789:85074): avc: denied { net_admin } for pid=26334 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 345.952251] audit: type=1400 audit(1556850889.789:85075): avc: denied { net_admin } for pid=26937 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:35:02 executing program 5: fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3) r0 = socket$packet(0x11, 0x2, 0x300) r1 = dup3(r0, 0xffffffffffffffff, 0x0) openat$cgroup_int(r1, &(0x7f00000003c0)='io.weight\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(r2, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r2) bind$packet(0xffffffffffffffff, 0x0, 0x0) 02:35:02 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(r0, r0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='statm\x00') preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x0) 02:35:02 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) stat(0x0, 0x0) lstat(0x0, 0x0) getgid() getuid() fstat(0xffffffffffffffff, 0x0) lstat(0x0, &(0x7f0000001640)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) fstat(r0, 0x0) getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000001ec0)) fcntl$getownex(0xffffffffffffff9c, 0x10, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) fstat(0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BLKRAGET(0xffffffffffffffff, 0x1263, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000002, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) unshare(0x40000000) [ 345.957278] audit: type=1400 audit(1556850889.799:85076): avc: denied { net_admin } for pid=26311 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 345.959115] audit: type=1400 audit(1556850889.799:85077): avc: denied { net_admin } for pid=26950 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 345.959210] audit: type=1400 audit(1556850889.799:85078): avc: denied { net_admin } for pid=26311 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:35:03 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000400)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) write$FUSE_NOTIFY_DELETE(r0, &(0x7f0000000280)={0x31, 0x6, 0x0, {0x1, 0x0, 0x8, 0x0, 'group_id'}}, 0x31) [ 345.960013] audit: type=1400 audit(1556850889.799:85079): avc: denied { net_admin } for pid=30397 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 345.961764] audit: type=1400 audit(1556850889.799:85080): avc: denied { net_admin } for pid=30521 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 345.963662] audit: type=1400 audit(1556850889.799:85081): avc: denied { net_admin } for pid=30521 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 350.959715] audit_printk_skb: 8532 callbacks suppressed [ 350.959724] audit: type=1400 audit(1556850894.799:87936): avc: denied { net_admin } for pid=26443 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 350.959903] audit: type=1400 audit(1556850894.799:87937): avc: denied { net_admin } for pid=26488 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 350.961705] audit: type=1400 audit(1556850894.799:87938): avc: denied { net_admin } for pid=26443 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 350.961793] audit: type=1400 audit(1556850894.799:87939): avc: denied { net_admin } for pid=26488 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 350.969520] audit: type=1400 audit(1556850894.809:87940): avc: denied { net_admin } for pid=27204 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 350.971329] audit: type=1400 audit(1556850894.809:87941): avc: denied { net_admin } for pid=27204 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 350.979974] audit: type=1400 audit(1556850894.819:87942): avc: denied { net_admin } for pid=27211 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 350.980150] audit: type=1400 audit(1556850894.819:87943): avc: denied { net_admin } for pid=26485 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 350.981639] audit: type=1400 audit(1556850894.819:87944): avc: denied { net_admin } for pid=26417 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 350.982093] audit: type=1400 audit(1556850894.819:87945): avc: denied { net_admin } for pid=26485 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 355.993735] audit_printk_skb: 3127 callbacks suppressed [ 355.993744] audit: type=1400 audit(1556850899.829:88995): avc: denied { net_admin } for pid=26715 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 356.013111] audit: type=1400 audit(1556850899.849:88996): avc: denied { net_admin } for pid=31955 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 356.069663] audit: type=1400 audit(1556850899.909:88997): avc: denied { net_admin } for pid=27709 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 356.071546] audit: type=1400 audit(1556850899.909:88998): avc: denied { net_admin } for pid=27709 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 356.075876] audit: type=1400 audit(1556850899.919:88999): avc: denied { net_admin } for pid=27660 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 356.077665] audit: type=1400 audit(1556850899.919:89000): avc: denied { net_admin } for pid=27660 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 356.078162] audit: type=1400 audit(1556850899.919:89001): avc: denied { net_admin } for pid=31955 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 356.080050] audit: type=1400 audit(1556850899.919:89002): avc: denied { net_admin } for pid=27705 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 356.080148] audit: type=1400 audit(1556850899.919:89003): avc: denied { net_admin } for pid=31963 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 356.081989] audit: type=1400 audit(1556850899.919:89004): avc: denied { net_admin } for pid=31963 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 361.007983] audit_printk_skb: 2306 callbacks suppressed [ 361.007991] audit: type=1400 audit(1556850904.849:89780): avc: denied { net_admin } for pid=26900 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 361.009836] audit: type=1400 audit(1556850904.849:89781): avc: denied { net_admin } for pid=26900 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 361.014558] audit: type=1400 audit(1556850904.849:89782): avc: denied { net_admin } for pid=28130 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 361.020222] audit: type=1400 audit(1556850904.859:89783): avc: denied { net_admin } for pid=28142 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 361.022023] audit: type=1400 audit(1556850904.859:89784): avc: denied { net_admin } for pid=28142 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 361.029883] audit: type=1400 audit(1556850904.869:89785): avc: denied { net_admin } for pid=28144 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 361.029940] audit: type=1400 audit(1556850904.869:89786): avc: denied { net_admin } for pid=26788 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 361.031705] audit: type=1400 audit(1556850904.869:89787): avc: denied { net_admin } for pid=26788 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 361.039834] audit: type=1400 audit(1556850904.879:89788): avc: denied { net_admin } for pid=28131 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 361.043013] audit: type=1400 audit(1556850904.879:89789): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 366.017916] audit_printk_skb: 2282 callbacks suppressed [ 366.017925] audit: type=1400 audit(1556850909.859:90556): avc: denied { net_admin } for pid=28993 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:35:11 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x1) ioctl$TCSETAF(r2, 0x5437, 0x0) 02:35:11 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000000a000)={0x0, 0x0, &(0x7f0000012000)={&(0x7f00000000c0)=@getneigh={0x14, 0x1e, 0x303}, 0x14}}, 0x0) 02:35:11 executing program 3: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000001c0)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) [ 366.035738] audit: type=1400 audit(1556850909.849:90554): avc: denied { net_admin } for pid=31390 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 366.037628] audit: type=1400 audit(1556850909.859:90557): avc: denied { net_admin } for pid=31390 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 366.051180] audit: type=1400 audit(1556850909.889:90558): avc: denied { net_admin } for pid=31438 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 366.053205] audit: type=1400 audit(1556850909.889:90559): avc: denied { net_admin } for pid=31438 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 366.054877] audit: type=1400 audit(1556850909.889:90560): avc: denied { net_admin } for pid=31404 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 366.056867] audit: type=1400 audit(1556850909.899:90561): avc: denied { net_admin } for pid=32614 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 366.058707] audit: type=1400 audit(1556850909.899:90562): avc: denied { net_admin } for pid=32614 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 366.061471] audit: type=1400 audit(1556850909.899:90563): avc: denied { net_admin } for pid=32615 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 366.063317] audit: type=1400 audit(1556850909.899:90564): avc: denied { net_admin } for pid=32615 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 371.027183] audit_printk_skb: 9530 callbacks suppressed [ 371.027192] audit: type=1400 audit(1556850914.869:93758): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 371.029943] audit: type=1400 audit(1556850914.869:93759): avc: denied { net_admin } for pid=985 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 371.029985] audit: type=1400 audit(1556850914.869:93760): avc: denied { net_admin } for pid=31255 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 371.031868] audit: type=1400 audit(1556850914.869:93761): avc: denied { net_admin } for pid=985 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 371.031942] audit: type=1400 audit(1556850914.869:93762): avc: denied { net_admin } for pid=31255 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 371.033698] audit: type=1400 audit(1556850914.869:93763): avc: denied { net_admin } for pid=972 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 371.036759] audit: type=1400 audit(1556850914.879:93764): avc: denied { net_admin } for pid=31266 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 371.037061] audit: type=1400 audit(1556850914.879:93765): avc: denied { net_admin } for pid=957 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:35:36 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f00000000c0)=@in={0x2, 0x4e21, @broadcast}, 0x80, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="18d7000000000000b3f9ae00000000f6000000000192484ecea5ab4d6f936298a5626304"], 0x24}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000002340), 0x342, 0x810) 02:35:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xc00000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x105082) ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000100)=ANY=[@ANYBLOB="05000022c629eacde643ea4e1fd2b42a47c7394ac63df93e330a42b2ea2f1c89388cbc87a8e1907b7c07af1583e967eecf2236"]) [ 371.038677] audit: type=1400 audit(1556850914.879:93766): avc: denied { net_admin } for pid=31266 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:35:36 executing program 4: syz_genetlink_get_family_id$ipvs(0x0) syz_execute_func(&(0x7f0000000400)="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") 02:35:36 executing program 5: syz_execute_func(&(0x7f0000000240)="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") syz_execute_func(&(0x7f0000000780)="470f52e94a2be9c4627d0ff9980f053ef3aec4a37bf0c50241e2e9450fe36ac462f10cbc5dbc5d7d30ef90c20f561e221e2200262ff3906646da4e329200d25c6645dad809132525000e81c4415572f0df67450f289369000000b100673e66470f0fa219000000904df30f2cf18282e97c810f69e08f4cbec5c4c2858c3f8f560f01d4dfc5497dbf30470f866f2a37adc35959b427fdffffff67f36ab40f67a2d73b00004cacbc9999ba16f2ae664e0f3a611b04c4c29d962150386c6cb336410fc1f1c4817d28ef491feefe8f08e4a25600b1500909660fdf530967410f58d13e66f6b6e4d10000eae24343a1fa16a4d800000000e4b6660f19c646dce7440f704eee98f00fc7083b7d0f12e400f4c4617be6d2c40379149c626db4000000bb2cbb610a09912af3430f47bb00000000000045126d6d8d8d00c44299ef6a5babb9c463d90d2408433e65660f5cb54c0a0000dd4805c462a52b6e0b8fa810ecd6091a1af20fa576ac8fc978014bc365d085431fe7204577cb040ec4e2f92a5382c4c2f5ba3976767c1002970606b2aa263e0fafd6c422e6912cb1030474f3410f5179a0510648070648eb27c4027502b0f3fe550dc4c179c5caab1010217c29f936660f39058b976192361d09f4f5e58847910002c1045c0b47cc57ce5c0f1ea5322333332ef217640f28006c6c01a9bb000042d8fb4b74b30b31c461c9e86c4e1d3422") 02:35:36 executing program 3: syz_execute_func(&(0x7f0000000180)="1c17b5b598cd801b69e4f5dcdc62f5696200d9d9d0c4c2218e5646795bf2680c000000c443950d74d70011c7e4c753ecc4e101edfec4427d82663ed107c4415814c4f216c44205297e865151c4a27d181ec1ea01eff265dc5f00c401611282030000005b5b304545e269a805f347dbe12f66030fae8fc9788289ffb10000c4a15de1c054635bdedec4a1e1e0eb2651400f0d181801fe67670f1b5508f6c4c1782ea60000adc4c3796140017b8d696f6d6dd4d4443b0fc7bf0d5e00008000800f3a0bc401d5f421") 02:35:36 executing program 2: r0 = syz_open_dev$binder(&(0x7f00000008c0)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) r2 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@newtaction={0x3a4, 0x30, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [{0x168, 0x1, @m_gact={0x164, 0x17, {{0xc, 0x1, 'gact\x00'}, {0x64, 0x2, [@TCA_GACT_PARMS={0x18, 0x2, {0x7, 0x7, 0x8, 0xd6, 0x9}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x14bb, 0x20000000}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x17d1, 0xf}}, @TCA_GACT_PROB={0xc, 0x3, {0x3, 0x2c4}}, @TCA_GACT_PARMS={0x18, 0x2, {0x1000, 0x1000, 0x1, 0xffff, 0x9}}, @TCA_GACT_PROB={0xc, 0x3, {0x3, 0x9a6, 0x20000007}}]}, {0xec, 0x6, "6342936f52aba1edc610f9030e64fc2585425d41a464e1ad86d24a86e246c3f81d5fdc8edae267f29871e9ef37859ab09bc1a68de53c4ef67072683e13bbc7a35d439f67c166c12fc344430f09f2324723c9c44edca5e6d8e4fbc948afdb352304dd84fb32bd9991243d039474c71cc024bbaca09d50d9579009ceabd69ee6fd5a294af15213e32f066f1a8a91ea5cbd33325d631f877b8181ace6f5ed840d80889290ba7c63d10aefeeeb252bcfe7c69470dd50c690ea434377ef83e39120990d35913cbe2cce08148bb121b50017e8dff32e1ed386644aa8dda2859d888c27d77093675e2d"}}}}, {0x98, 0x1, @m_simple={0x94, 0x0, {{0xc, 0x1, 'simple\x00'}, {0x34, 0x2, [@TCA_DEF_PARMS={0x18, 0x2, {0x2, 0x1ff, 0x3, 0x5, 0x2}}, @TCA_DEF_PARMS={0x18, 0x2, {0x1, 0x1, 0x0, 0x5, 0xb4}}]}, {0x4c, 0x6, "c7ec7532bbaed8c7e483b6425f77868e7d9aafc001e67bca3bbc4a7eaa40b4c84fdc304ab181919dcbca8b39e2d1a56ecf46a5d4c30a733e69157a67993679466a2cf3121b7c8cd7"}}}}, {0x128, 0x1, @m_bpf={0x124, 0x16, {{0x8, 0x1, 'bpf\x00'}, {0x54, 0x2, [@TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x40, 0x9, 0x6, 0x3, 0xa06}}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_OPS_LEN={0x8, 0x3, 0x8}, @TCA_ACT_BPF_FD={0x8, 0x5, r2}, @TCA_ACT_BPF_FD={0x8, 0x5, r1}, @TCA_ACT_BPF_OPS_LEN={0x8, 0x3, 0x7}]}, {0xc0, 0x6, "66dfeeb6f8d25da974e0be65d8dfa9780a33b0d9741126dbd11f08ea084b716e1fe253b9cc6c51e77fde098744c9d12c702ce4f72caa444f4bd95534599d7b3a63e06190a53c386c88de2108ba342e44f8fa3d2d59d7b61be28ac2671b2e44c4c8c7ba18311343ebedc668fa7d1781c5af054f4a071cc06d7b644938d4c042f09ba34359f2796b901a169a4c48ded8d7fa40bd940f14da5a6638ed10bb927958dd71dcb34874808081306334790d306aaf02968bd112da15276e"}}}}, {0x68, 0x1, @m_simple={0x64, 0x11, {{0xc, 0x1, 'simple\x00'}, {0x24, 0x2, [@TCA_DEF_DATA={0x8, 0x3, '{-\x00'}, @TCA_DEF_PARMS={0x18, 0x2, {0x2, 0x6, 0x20000000, 0x400, 0x2}}]}, {0x2c, 0x6, "fcbc599fa08823b255b8743e6afbd0d7e130d583b2c8e14d40cc204c1c3fbe01e418d52ac0c0f2d3"}}}}]}, 0x3a4}, 0x1, 0x0, 0x0, 0x800}, 0x4000) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x500000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r4, 0x10, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004800}, 0x8000) ioctl(r3, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f319bd070") ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000140)={0x44, 0x0, &(0x7f0000000300)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) dup2(r2, r0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000100)={0x4, 0x0, &(0x7f0000000000)=[@enter_looper], 0x1, 0x500000000000000, &(0x7f0000000b80)='\x00'}) [ 371.038946] audit: type=1400 audit(1556850914.879:93767): avc: denied { net_admin } for pid=957 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:35:37 executing program 3: r0 = socket$inet6(0xa, 0x807, 0xfffffffffffefffe) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) sendmmsg(r0, &(0x7f0000000240), 0x5c3, 0x0) [ 376.036933] audit_printk_skb: 10517 callbacks suppressed 02:35:37 executing program 0: r0 = syz_open_dev$binder(&(0x7f0000000100)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r1, r0) accept4$packet(r1, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000040)=0x14, 0x0) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000080)={r3, 0x1, 0x6, @local}, 0x10) ioctl$BINDER_SET_CONTEXT_MGR(r2, 0x40046207, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000680)={0x20, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0563044000000000096310400000000000000000000000020000000001634040"], 0x0, 0x0, 0x0}) 02:35:38 executing program 2: clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) rt_sigtimedwait(&(0x7f00000000c0), 0x0, 0x0, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) r1 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @dev}}, &(0x7f0000000080)=0x80) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000180)={{{@in6, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@initdev}}, &(0x7f0000000280)=0xe8) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f00000002c0)={@local, @local, @mcast2, 0x2, 0x5, 0xfff, 0x500, 0x8, 0x110000, r2}) ptrace(0x10, r0) ptrace$cont(0x420a, r0, 0x8, 0x20008000) 02:35:38 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/loop-control\x00', 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000000)) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 02:35:38 executing program 4: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x400000027e, 0x0) vmsplice(r0, &(0x7f00000001c0)=[{0x0, 0x26}], 0x1, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x40) [ 376.036941] audit: type=1400 audit(1556850919.879:97295): avc: denied { net_admin } for pid=1821 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 376.038374] audit: type=1400 audit(1556850919.879:97296): avc: denied { net_admin } for pid=31919 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 376.038403] audit: type=1400 audit(1556850919.879:97297): avc: denied { net_admin } for pid=1821 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 376.040132] audit: type=1400 audit(1556850919.879:97298): avc: denied { net_admin } for pid=1710 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:35:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = memfd_create(&(0x7f0000000140)='\x91\xcc\x80ni\f\xceC\tV\x00\x02}5\xc7I\x8bI\xee\xf4Vy\xee\xd6G\x17\x00\x00\x00\b\x00\x00\x00\x00\x00', 0x0) ftruncate(r1, 0x40001) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000280)=0x5, 0xaa344d8354d35737) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @loopback}, 0x10) r2 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xd, 0x9, &(0x7f0000000040)=ANY=[@ANYBLOB="18160000", @ANYRES32=r1, @ANYBLOB="0000000000000000fff00200200000fc840000003700000018000000fdffffff0000dc5c392b00008500000043000000181a0000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], &(0x7f00000000c0)='GPL\x00', 0x4309, 0x18, &(0x7f0000000100)=""/24, 0x40f00, 0x1, [], 0x0, 0x1, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0xd9e, 0x4}, 0x8, 0x10, &(0x7f0000000200)={0x8000, 0x9, 0x0, 0x1}, 0x10}, 0x70) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) sendfile(r0, r1, 0x0, 0xffe4) [ 376.040235] audit: type=1400 audit(1556850919.739:97174): avc: denied { net_admin } for pid=523 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 376.040297] audit: type=1400 audit(1556850919.879:97299): avc: denied { net_admin } for pid=31919 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 376.046699] audit: type=1400 audit(1556850919.889:97300): avc: denied { net_admin } for pid=1831 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 376.048486] audit: type=1400 audit(1556850919.889:97301): avc: denied { net_admin } for pid=1831 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 376.049029] audit: type=1400 audit(1556850919.889:97302): avc: denied { net_admin } for pid=542 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 376.050080] audit: type=1400 audit(1556850919.889:97303): avc: denied { net_admin } for pid=26235 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 381.049501] audit_printk_skb: 10757 callbacks suppressed [ 381.049511] audit: type=1400 audit(1556850924.889:100900): avc: denied { net_admin } for pid=31367 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 381.049743] audit: type=1400 audit(1556850924.889:100901): avc: denied { net_admin } for pid=31474 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 381.051437] audit: type=1400 audit(1556850924.889:100902): avc: denied { net_admin } for pid=31367 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 381.051661] audit: type=1400 audit(1556850924.889:100903): avc: denied { net_admin } for pid=31474 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 381.056698] audit: type=1400 audit(1556850924.899:100904): avc: denied { net_admin } for pid=996 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 381.058593] audit: type=1400 audit(1556850924.899:100905): avc: denied { net_admin } for pid=996 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 381.059084] audit: type=1400 audit(1556850924.899:100906): avc: denied { net_admin } for pid=1000 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 381.060710] audit: type=1400 audit(1556850924.899:100907): avc: denied { net_admin } for pid=949 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 381.061000] audit: type=1400 audit(1556850924.899:100908): avc: denied { net_admin } for pid=1000 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 381.062492] audit: type=1400 audit(1556850924.899:100909): avc: denied { net_admin } for pid=949 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 386.056859] audit_printk_skb: 11033 callbacks suppressed [ 386.056868] audit: type=1400 audit(1556850929.899:104609): avc: denied { net_admin } for pid=311 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 386.058645] audit: type=1400 audit(1556850929.899:104610): avc: denied { net_admin } for pid=311 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 386.058887] audit: type=1400 audit(1556850929.879:104604): avc: denied { net_admin } for pid=32753 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 386.060716] audit: type=1400 audit(1556850929.899:104611): avc: denied { net_admin } for pid=32753 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 386.062047] audit: type=1400 audit(1556850929.899:104612): avc: denied { net_admin } for pid=3571 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 386.063390] audit: type=1400 audit(1556850929.899:104613): avc: denied { net_admin } for pid=3574 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 386.064700] audit: type=1400 audit(1556850929.899:104614): avc: denied { net_admin } for pid=3616 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 386.065852] audit: type=1400 audit(1556850929.909:104615): avc: denied { net_admin } for pid=3539 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 386.066576] audit: type=1400 audit(1556850929.909:104616): avc: denied { net_admin } for pid=3538 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 386.067928] audit: type=1400 audit(1556850929.909:104617): avc: denied { net_admin } for pid=26168 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 391.070202] audit_printk_skb: 10956 callbacks suppressed [ 391.070211] audit: type=1400 audit(1556850934.909:108281): avc: denied { net_admin } for pid=1893 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 391.070230] audit: type=1400 audit(1556850934.909:108282): avc: denied { net_admin } for pid=1916 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 391.072151] audit: type=1400 audit(1556850934.909:108283): avc: denied { net_admin } for pid=1916 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 391.072155] audit: audit_lost=107825 audit_rate_limit=0 audit_backlog_limit=64 [ 391.072158] audit: printk limit exceeded [ 391.073983] audit: type=1400 audit(1556850934.909:108285): avc: denied { net_admin } for pid=557 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 391.075855] audit: type=1400 audit(1556850934.919:108286): avc: denied { net_admin } for pid=4705 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 391.077552] audit: type=1400 audit(1556850934.919:108287): avc: denied { net_admin } for pid=4705 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 391.079453] audit: type=1400 audit(1556850934.919:108288): avc: denied { net_admin } for pid=4708 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 391.081123] audit: type=1400 audit(1556850934.919:108289): avc: denied { net_admin } for pid=1882 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 393.617413] binder: 4957:4959 transaction failed 29189/-22, size 0-0 line 3013 [ 393.619155] binder: undelivered TRANSACTION_ERROR: 29189 [ 396.092416] audit_printk_skb: 3415 callbacks suppressed [ 396.092424] audit: type=1400 audit(1556850939.929:109428): avc: denied { net_admin } for pid=5227 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 396.094522] audit: type=1400 audit(1556850939.929:109429): avc: denied { net_admin } for pid=5227 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 396.120129] audit: type=1400 audit(1556850939.959:109430): avc: denied { net_admin } for pid=5262 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 396.122080] audit: type=1400 audit(1556850939.959:109431): avc: denied { net_admin } for pid=5262 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 396.122499] audit: type=1400 audit(1556850939.959:109432): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 396.124485] audit: type=1400 audit(1556850939.959:109433): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 396.126529] audit: type=1400 audit(1556850939.969:109434): avc: denied { net_admin } for pid=5252 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 396.128530] audit: type=1400 audit(1556850939.969:109435): avc: denied { net_admin } for pid=5252 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 396.129727] audit: type=1400 audit(1556850939.969:109436): avc: denied { net_admin } for pid=5207 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 396.131599] audit: type=1400 audit(1556850939.969:109437): avc: denied { net_admin } for pid=5207 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 401.286346] audit_printk_skb: 1482 callbacks suppressed [ 401.286354] audit: type=1400 audit(1556850945.129:109935): avc: denied { sys_admin } for pid=2109 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 401.292932] audit: type=1400 audit(1556850945.129:109936): avc: denied { sys_admin } for pid=2109 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 401.311686] audit: type=1400 audit(1556850945.149:109937): avc: denied { sys_admin } for pid=2109 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 401.350636] audit: type=1400 audit(1556850945.189:109938): avc: denied { sys_admin } for pid=2109 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 401.369770] audit: type=1400 audit(1556850945.209:109939): avc: denied { net_admin } for pid=356 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 401.371789] audit: type=1400 audit(1556850945.209:109940): avc: denied { net_admin } for pid=356 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 401.377423] audit: type=1400 audit(1556850945.219:109941): avc: denied { net_admin } for pid=3802 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 401.379389] audit: type=1400 audit(1556850945.219:109942): avc: denied { net_admin } for pid=3802 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 401.379861] audit: type=1400 audit(1556850945.219:109943): avc: denied { net_admin } for pid=31693 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 401.381754] audit: type=1400 audit(1556850945.219:109944): avc: denied { net_admin } for pid=31693 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 406.299198] audit_printk_skb: 1515 callbacks suppressed [ 406.299206] audit: type=1400 audit(1556850950.139:110460): avc: denied { net_admin } for pid=585 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 406.299293] audit: type=1400 audit(1556850950.139:110461): avc: denied { net_admin } for pid=1902 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 406.301018] audit: type=1400 audit(1556850950.139:110462): avc: denied { net_admin } for pid=1902 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 406.318722] audit: type=1400 audit(1556850950.159:110463): avc: denied { net_admin } for pid=1941 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 406.320439] audit: type=1400 audit(1556850950.159:110464): avc: denied { net_admin } for pid=1941 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 406.328939] audit: type=1400 audit(1556850950.169:110465): avc: denied { net_admin } for pid=578 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 406.330758] audit: type=1400 audit(1556850950.169:110466): avc: denied { net_admin } for pid=578 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:35:58 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = dup2(r0, r0) gettid() setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ioctl$PPPIOCGIDLE(r1, 0x8010743f, &(0x7f0000000000)) symlinkat(&(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000200)='./file0\x00') setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f00000000c0)={0x0, {{0x2, 0x0, @empty}}, {{0x2, 0x0, @remote}}}, 0x108) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = socket$inet(0x10, 0x2, 0x0) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000140)="2f0000001c000367ffffff000d00000002000000010000003f0006c91300010023000000000000005867000000050b", 0x2f}], 0x1}, 0x0) tkill(r2, 0x1000000003c) 02:35:58 executing program 1: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000040)={0x4, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="a6000000"], 0x1, 0x0, &(0x7f0000000140)="06"}) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x5, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000012002000"], 0x0, 0x0, 0x0}) 02:35:58 executing program 2: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000580)='/selinux/load\x00', 0x2, 0x0) fsync(r0) ustat(0x7, &(0x7f0000000040)) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="340000002000010800000000000000000a000000000000000000000004000000140011006c6f0000000000000000000000be4500"], 0x34}}, 0x0) 02:35:58 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000000), 0x1c) r2 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r3 = gettid() setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f00000000c0)={0x20}, 0x4) ioctl(r1, 0x1, &(0x7f0000000040)="f663f667e2684d24bf3a76f64aae9c2450387efec661b71b79c17a862fb91b5566ffb0dabac7e6edb623d0b4712c923194962567a8a272") ptrace$setopts(0x4206, r3, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x2) tkill(r3, 0x3c) fcntl$setstatus(r2, 0x4, 0x42803) 02:35:58 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() ptrace$setopts(0x4200, r2, 0x5, 0x44) setsockopt$inet6_buf(r0, 0x29, 0x20000100000049, &(0x7f0000000040)="2695dc4d", 0x4) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r0, 0x4, 0x42803) 02:35:58 executing program 0: r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x0, 0x0) r1 = getpgrp(0x0) r2 = gettid() write$P9_RREADDIR(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="2300000029020001000080800300000003000000000000000800000000000000ff0000"], 0x23) rt_sigprocmask(0x2, &(0x7f0000000080)={0xfffffffffffffffa}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x20, &(0x7f00003efff0)={0x0, 0x0, 0x50005}) rt_sigtimedwait(&(0x7f000031bff8)={0x80000002}, &(0x7f0000000000), 0x0, 0x8) [ 406.361737] audit: type=1400 audit(1556850950.199:110467): avc: denied { net_admin } for pid=530 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:36:00 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) recvfrom$inet6(r0, &(0x7f00000000c0)=""/105, 0x69, 0x20, &(0x7f0000000040)={0xa, 0x4e23, 0x0, @mcast2, 0x2}, 0x1c) close(r0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f0000000000)=@req3={0x6000000, 0x3, 0x6000000, 0x3}, 0x1c) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000080), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) 02:36:01 executing program 0: clone(0x8000000000041fa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket(0x0, 0x800, 0x7) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) r1 = getpid() rt_tgsigqueueinfo(r1, r1, 0x16, &(0x7f0000000000)) ptrace(0x10, r1) ptrace$getsig(0x4202, r1, 0x0, 0x0) 02:36:01 executing program 4: openat(0xffffffffffffffff, &(0x7f0000000000)='./bus\x00', 0x80, 0x40) pipe2(&(0x7f0000000440), 0x84803) openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x40, 0x0) openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/enforce\x00', 0x404082, 0x0) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/policy\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/null\x00', 0x8000, 0x0) r1 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x0, &(0x7f0000000280)=""/106, &(0x7f00000001c0)=0x6a) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r2) r3 = open(&(0x7f0000000340)='./bus\x00', 0x40000141042, 0x0) write$binfmt_misc(r3, &(0x7f0000000000)=ANY=[], 0x323) creat(&(0x7f0000000380)='./bus\x00', 0x0) setsockopt$netlink_NETLINK_RX_RING(r3, 0x10e, 0x6, 0x0, 0xfffffffffffffc65) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000040)) r5 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) getpeername(r1, 0x0, 0x0) r6 = socket(0x10, 0x80002, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r3, 0x10e, 0x4, 0x0, 0x0) bind$netlink(r6, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) write(r6, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) connect$netlink(r6, &(0x7f0000000480)=@proc={0x10, 0x0, 0x1}, 0xc) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r6, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) ioctl$PPPIOCCONNECT(0xffffffffffffffff, 0x4004743a, 0x0) write$binfmt_misc(r5, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0xf3) sendfile(r3, r5, &(0x7f0000000140), 0x8fff) [ 406.363653] audit: type=1400 audit(1556850950.199:110468): avc: denied { net_admin } for pid=530 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:36:01 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000340)={0x627, 0x2e, "1f77e3b1d479ef834be30afd64b3088f9d19592368214b94c26950e3a5ed421c9a087cc5d8d7694141c52f416cc2"}) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/policy\x00', 0x0, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000002c0)=0x14) ioctl$TUNSETIFINDEX(r1, 0x400454da, &(0x7f0000000300)=r2) r3 = dup2(r0, r0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000540)='./file0\x00', 0x0, 0x100000, 0x0) mount(&(0x7f0000000000), &(0x7f0000000180)='./file0\x00', 0x0, 0x3080, 0x0) mount(0x0, &(0x7f0000000080)='.', 0x0, 0x0, 0x0) mount(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x5010, 0x0) umount2(&(0x7f00000004c0)='./file0\x00', 0x2) lsetxattr$security_smack_entry(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64\x00', &(0x7f0000000200)='TIPC\x00', 0x5, 0x2) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000240)={0x14, 0x13, 0x321}, 0x14}}, 0x0) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x1c, r6, 0x0, 0x70bd2a, 0x25dfdbff, {}, ["", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x11}, 0x90) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'ip6tnl0\x00', &(0x7f00000007c0)=ANY=[@ANYBLOB="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"]}) 02:36:01 executing program 5: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f00000000c0)="fc0000001c00071bab0925000900070007ab08000200000000004c93210001c000000000000000000000000000039815fa2c1ec28656aaa79bb94b46fe0000000a00020000036c6c256f1a272fdf0d11512fd633d44000000000008934d07302ade01720d3d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70cec18444ef92e475ef8b29d3ef3d9a48a170e5bba4a463ae4f5566f91cf190201ded815b2ccd243fa95ed94e0ad91bd0734babc7c6d27392ad23f2eeb57d47689cd3dd16b17e583df150c3b880f411f46a60467b4d5715587026f0000080548deac270e33429fd3110175e63fb8d38a00"/252, 0xfc) sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x14, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff}, 0x14}}, 0x0) [ 406.364741] audit: type=1400 audit(1556850950.199:110469): avc: denied { net_admin } for pid=1911 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 411.306959] audit_printk_skb: 6477 callbacks suppressed [ 411.306967] audit: type=1400 audit(1556850955.149:112641): avc: denied { net_admin } for pid=6689 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 411.307012] audit: type=1400 audit(1556850955.149:112642): avc: denied { net_admin } for pid=6703 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:36:09 executing program 5: syz_genetlink_get_family_id$ipvs(0x0) syz_execute_func(&(0x7f0000000e00)="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") 02:36:09 executing program 3: clone(0x2102001ff2, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = memfd_create(&(0x7f00000002c0)='\x00'/10, 0x0) write$binfmt_elf32(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000070000000000000003000300000000000000000038000000000000000000000000002000010000"], 0x2f) execveat(r0, &(0x7f0000000080)='\x00', 0x0, 0x0, 0x1000) [ 411.308886] audit: type=1400 audit(1556850955.149:112643): avc: denied { net_admin } for pid=6689 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 411.308927] audit: type=1400 audit(1556850955.149:112644): avc: denied { net_admin } for pid=6703 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 411.310854] audit: type=1400 audit(1556850955.149:112645): avc: denied { net_admin } for pid=6677 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 411.310872] audit: type=1400 audit(1556850955.149:112646): avc: denied { net_admin } for pid=6704 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 411.312796] audit: type=1400 audit(1556850955.149:112648): avc: denied { net_admin } for pid=6704 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 411.312822] audit: type=1400 audit(1556850955.149:112647): avc: denied { net_admin } for pid=6677 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 411.313607] audit: type=1400 audit(1556850955.149:112649): avc: denied { net_admin } for pid=6633 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 411.314588] audit: type=1400 audit(1556850955.149:112650): avc: denied { net_admin } for pid=6651 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 416.316884] audit_printk_skb: 10643 callbacks suppressed [ 416.316894] audit: type=1400 audit(1556850960.159:116218): avc: denied { net_admin } for pid=7659 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 416.318524] audit: type=1400 audit(1556850960.159:116219): avc: denied { net_admin } for pid=7659 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 416.320491] audit: type=1400 audit(1556850960.159:116220): avc: denied { net_admin } for pid=7672 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 416.320825] audit: type=1400 audit(1556850960.159:116221): avc: denied { net_admin } for pid=6557 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 416.322395] audit: type=1400 audit(1556850960.159:116222): avc: denied { net_admin } for pid=7672 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 416.322724] audit: type=1400 audit(1556850960.159:116223): avc: denied { net_admin } for pid=6557 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 416.324289] audit: type=1400 audit(1556850960.159:116224): avc: denied { net_admin } for pid=7678 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 416.326438] audit: type=1400 audit(1556850960.169:116226): avc: denied { net_admin } for pid=7691 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 416.327367] audit: type=1400 audit(1556850960.169:116227): avc: denied { net_admin } for pid=6623 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 416.328327] audit: type=1400 audit(1556850960.169:116228): avc: denied { net_admin } for pid=7691 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 421.326782] audit_printk_skb: 10504 callbacks suppressed [ 421.326791] audit: type=1400 audit(1556850965.169:119751): avc: denied { net_admin } for pid=6978 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 421.327083] audit: type=1400 audit(1556850965.169:119752): avc: denied { net_admin } for pid=8574 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 421.328701] audit: type=1400 audit(1556850965.169:119753): avc: denied { net_admin } for pid=6978 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 421.330162] audit: type=1400 audit(1556850965.169:119755): avc: denied { net_admin } for pid=7100 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 421.331989] audit: type=1400 audit(1556850965.169:119756): avc: denied { net_admin } for pid=8550 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 421.333589] audit: type=1400 audit(1556850965.169:119757): avc: denied { net_admin } for pid=6385 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 421.333864] audit: type=1400 audit(1556850965.169:119758): avc: denied { net_admin } for pid=8550 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 421.335836] audit: type=1400 audit(1556850965.179:119759): avc: denied { net_admin } for pid=8553 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 421.337552] audit: type=1400 audit(1556850965.179:119760): avc: denied { net_admin } for pid=8553 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 421.339523] audit: type=1400 audit(1556850965.179:119761): avc: denied { net_admin } for pid=8566 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 424.862739] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=9196 comm=syz-executor.5 [ 426.336575] audit_printk_skb: 10465 callbacks suppressed [ 426.336583] audit: type=1400 audit(1556850970.179:123269): avc: denied { net_admin } for pid=6535 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 426.338364] audit: type=1400 audit(1556850970.179:123270): avc: denied { net_admin } for pid=6535 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 426.338486] audit: type=1400 audit(1556850970.169:123266): avc: denied { net_admin } for pid=7525 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 426.339593] audit: type=1400 audit(1556850970.179:123271): avc: denied { net_admin } for pid=7567 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 426.340012] audit: type=1400 audit(1556850970.179:123272): avc: denied { net_admin } for pid=7505 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 426.341531] audit: type=1400 audit(1556850970.179:123273): avc: denied { net_admin } for pid=9488 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 426.341913] audit: type=1400 audit(1556850970.179:123274): avc: denied { net_admin } for pid=7505 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 426.343455] audit: type=1400 audit(1556850970.179:123276): avc: denied { net_admin } for pid=7473 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 426.343461] audit: type=1400 audit(1556850970.179:123275): avc: denied { net_admin } for pid=9488 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 426.346267] audit: type=1400 audit(1556850970.189:123278): avc: denied { net_admin } for pid=7540 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 431.349524] audit_printk_skb: 10469 callbacks suppressed [ 431.349533] audit: type=1400 audit(1556850975.189:126795): avc: denied { net_admin } for pid=8036 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 431.349843] audit: type=1400 audit(1556850975.189:126796): avc: denied { net_admin } for pid=6789 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 431.351480] audit: type=1400 audit(1556850975.189:126797): avc: denied { net_admin } for pid=8036 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 431.351735] audit: type=1400 audit(1556850975.189:126798): avc: denied { net_admin } for pid=6789 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 431.353733] audit: type=1400 audit(1556850975.189:126799): avc: denied { net_admin } for pid=708 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 431.353988] audit: type=1400 audit(1556850975.189:126800): avc: denied { net_admin } for pid=32337 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 431.357441] audit: type=1400 audit(1556850975.199:126801): avc: denied { net_admin } for pid=8035 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 431.359299] audit: type=1400 audit(1556850975.199:126802): avc: denied { net_admin } for pid=8035 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 431.360209] audit: type=1400 audit(1556850975.199:126803): avc: denied { net_admin } for pid=2240 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 431.361251] audit: type=1400 audit(1556850975.199:126804): avc: denied { net_admin } for pid=10323 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 436.360134] audit_printk_skb: 8538 callbacks suppressed [ 436.360143] audit: type=1400 audit(1556850980.199:129667): avc: denied { net_admin } for pid=11072 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 436.361518] audit: type=1400 audit(1556850980.199:129668): avc: denied { net_admin } for pid=11162 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 436.361611] audit: type=1400 audit(1556850980.199:129669): avc: denied { net_admin } for pid=11072 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 436.363494] audit: type=1400 audit(1556850980.199:129670): avc: denied { net_admin } for pid=11162 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 436.363581] audit: type=1400 audit(1556850980.199:129671): avc: denied { net_admin } for pid=11066 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 436.367051] audit: type=1400 audit(1556850980.209:129672): avc: denied { net_admin } for pid=11067 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 436.367075] audit: type=1400 audit(1556850980.209:129673): avc: denied { net_admin } for pid=11168 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 436.368979] audit: type=1400 audit(1556850980.209:129674): avc: denied { net_admin } for pid=11067 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 436.369037] audit: type=1400 audit(1556850980.209:129675): avc: denied { net_admin } for pid=11168 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 436.370975] audit: type=1400 audit(1556850980.209:129676): avc: denied { net_admin } for pid=11062 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 441.367963] audit_printk_skb: 2950 callbacks suppressed [ 441.367971] audit: type=1400 audit(1556850985.209:130660): avc: denied { net_admin } for pid=9509 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 441.368389] audit: type=1400 audit(1556850985.209:130661): avc: denied { net_admin } for pid=9456 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 441.369857] audit: type=1400 audit(1556850985.209:130662): avc: denied { net_admin } for pid=9484 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 441.372685] audit: type=1400 audit(1556850985.209:130663): avc: denied { net_admin } for pid=11745 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 441.374565] audit: type=1400 audit(1556850985.209:130664): avc: denied { net_admin } for pid=11745 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 441.389268] audit: type=1400 audit(1556850985.229:130665): avc: denied { net_admin } for pid=7543 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 441.393578] audit: type=1400 audit(1556850985.229:130666): avc: denied { net_admin } for pid=9494 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 441.393999] audit: type=1400 audit(1556850985.229:130667): avc: denied { net_admin } for pid=7469 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:36:32 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") sendmsg$nl_netfilter(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000c40)={0x20, 0x0, 0x1, 0x1, 0x0, 0x0, {}, [@typed={0xc, 0x1, @u64}]}, 0x20}}, 0x0) syz_execute_func(&(0x7f00000001c0)="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") syz_execute_func(&(0x7f0000000140)="c4815d55daa84a2ae92cb81c0a0f05bfd9000100c4a37bf0c55c41e2e92e363e460f1a7000660fde978fe97c80660f383a9e02000000e30b110f33b8c4014e4e4e5b5b2626660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b4964660f3838520a8dc48da3bd4877f88ac483397fd300d8c0c4a1662ad764d335cfcfafaf6766f2ab440fec3f67ddeaacc462b1f72eed21f4b9a5604ba419c2c2b0c10b0bf08171a30b8a826ec4816016f7a80dd4d466450fc4650000ebeb628f0f4f13a25800218de3c02cf52626802d08000000fa59bf5c450f91f3ffefb5ffffffdcdcc4c3217e218efb110f66474eb83aa2f1fbc422c99f44dafde2") bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0xb, &(0x7f0000000000)='md5sumeth0\x00'}, 0x30) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r2, r3, 0x0, 0x3, &(0x7f00000000c0)='./\x00', 0xffffffffffffffff}, 0x30) 02:36:32 executing program 2: sched_setaffinity(0x0, 0xfffffef4, &(0x7f0000000140)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000280)="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") [ 441.394167] audit: type=1400 audit(1556850984.999:130599): avc: denied { net_admin } for pid=7538 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:36:32 executing program 0: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x11) ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000100)=0x1) r2 = gettid() ptrace$setopts(0x4200, r2, 0x3ff, 0x0) ioctl$RTC_AIE_OFF(r0, 0x7002) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(0x0, 0x0) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f00007b2000/0x3000)=nil) write$FUSE_GETXATTR(r3, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffff9c, 0x9) munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) tgkill(r2, r2, 0x14) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100000c7, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp6\x00') fcntl$setflags(r4, 0x2, 0x0) clock_getres(0x400, 0x0) preadv(r5, &(0x7f0000000480), 0x10000000000002a1, 0x0) 02:36:32 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000000), 0x4) syz_execute_func(&(0x7f0000000140)="410f01f964ff0941c3c4e2c9975842400f5e0166420fe2e33e0f1110c442019dcc6f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x40200100, 0x0, 0x0, 0x0, 0x0) 02:36:32 executing program 3: pause() syz_execute_func(&(0x7f0000001000)="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") 02:36:32 executing program 4: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) socket$key(0xf, 0x3, 0x2) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(r2, 0x0, 0x60, &(0x7f0000000140)={'filter\x00'}, &(0x7f00000000c0)=0x44) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)={0x14}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000001c0)={0x80000003}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000040)) epoll_wait(r1, &(0x7f0000000100)=[{}], 0x1, 0x0) [ 441.395798] audit: type=1400 audit(1556850985.239:130668): avc: denied { net_admin } for pid=9454 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:36:36 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x38) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000200)="0adc1f123c123f319bd070") ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0xf}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x0, 0x0) 02:36:36 executing program 0: r0 = socket$inet6(0x10, 0x80000000002, 0x0) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)="5500000018007f7100fe01b2a4a280930260000000a84302910000003900090023000c00030000000d000500fe8000001100c78b80082314e9030b9d566885b16732009b84e7b1df136ef75afb0000000000000000", 0x55}], 0x1}, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) r1 = dup2(r0, r0) ioctl$KDSETLED(r1, 0x4b32, 0x6) close(r0) 02:36:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000080), 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_int(r1, 0x6, 0x3, &(0x7f0000000300)=0x1, 0x4) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r2, 0x10e, 0x1, &(0x7f0000000040)=0x1e, 0x4) setsockopt$inet_opts(r2, 0x0, 0x0, 0x0, 0x0) [ 446.382133] audit_printk_skb: 3189 callbacks suppressed [ 446.382141] audit: type=1400 audit(1556850990.219:131737): avc: denied { net_admin } for pid=8022 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:36:37 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000000), 0x4) syz_execute_func(&(0x7f0000000140)="410f01f964ff0941c3c4e2c9975842400f5e0166420fe2e33e0f1110c442019dcc6f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x40200100, 0x0, 0x0, 0x0, 0x0) [ 446.390627] audit: type=1400 audit(1556850990.229:131738): avc: denied { net_admin } for pid=6785 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:36:40 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000480)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x129f0817) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000000), 0x4) syz_execute_func(&(0x7f0000000140)="410f01f964ff0941c3c4e2c9975842400f5e0166420fe2e33e0f1110c442019dcc6f") clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendto$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) clone(0x40200100, 0x0, 0x0, 0x0, 0x0) [ 446.392510] audit: type=1400 audit(1556850990.229:131739): avc: denied { net_admin } for pid=6785 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:36:41 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ipv6_route\x00') preadv(r0, &(0x7f0000000400)=[{&(0x7f0000000440)=""/228, 0xe4}], 0x1, 0x0) [ 446.398947] audit: type=1400 audit(1556850990.239:131740): avc: denied { net_admin } for pid=6794 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 446.401154] audit: type=1400 audit(1556850990.239:131741): avc: denied { net_admin } for pid=6794 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 446.402684] audit: type=1400 audit(1556850990.239:131742): avc: denied { net_admin } for pid=6782 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 446.404771] audit: type=1400 audit(1556850990.239:131743): avc: denied { net_admin } for pid=32084 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 446.412062] audit: type=1400 audit(1556850990.249:131744): avc: denied { net_admin } for pid=8044 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 446.414082] audit: type=1400 audit(1556850990.249:131745): avc: denied { net_admin } for pid=12292 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 446.423228] audit: type=1400 audit(1556850990.259:131746): avc: denied { net_admin } for pid=6796 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 451.408751] audit_printk_skb: 2760 callbacks suppressed [ 451.408759] audit: type=1400 audit(1556850995.249:132671): avc: denied { net_admin } for pid=11054 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 451.410772] audit: type=1400 audit(1556850995.249:132672): avc: denied { net_admin } for pid=11054 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 451.411229] audit: type=1400 audit(1556850995.249:132673): avc: denied { net_admin } for pid=12601 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 451.413105] audit: type=1400 audit(1556850995.249:132674): avc: denied { net_admin } for pid=12601 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 451.414785] audit: type=1400 audit(1556850995.249:132675): avc: denied { net_admin } for pid=12719 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 451.416952] audit: type=1400 audit(1556850995.259:132676): avc: denied { net_admin } for pid=12745 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 451.418777] audit: type=1400 audit(1556850995.259:132677): avc: denied { net_admin } for pid=12745 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 451.420666] audit: type=1400 audit(1556850995.259:132678): avc: denied { net_admin } for pid=12747 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 451.422537] audit: type=1400 audit(1556850995.259:132679): avc: denied { net_admin } for pid=12747 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 451.452374] audit: type=1400 audit(1556850995.289:132680): avc: denied { net_admin } for pid=12671 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 456.416737] audit_printk_skb: 9047 callbacks suppressed [ 456.416746] audit: type=1400 audit(1556851000.259:135707): avc: denied { net_admin } for pid=10240 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 456.418631] audit: type=1400 audit(1556851000.259:135708): avc: denied { net_admin } for pid=10240 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 456.419169] audit: type=1400 audit(1556851000.259:135709): avc: denied { net_admin } for pid=10238 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 456.420904] audit: type=1400 audit(1556851000.259:135710): avc: denied { net_admin } for pid=10238 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 456.423120] audit: type=1400 audit(1556851000.259:135711): avc: denied { net_admin } for pid=10260 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 456.425008] audit: type=1400 audit(1556851000.259:135712): avc: denied { net_admin } for pid=10260 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 456.425077] audit: type=1400 audit(1556851000.259:135713): avc: denied { net_admin } for pid=10244 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 456.426428] audit: type=1400 audit(1556851000.269:135714): avc: denied { net_admin } for pid=12180 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 456.428185] audit: type=1400 audit(1556851000.269:135715): avc: denied { net_admin } for pid=12180 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 456.429966] audit: type=1400 audit(1556851000.269:135716): avc: denied { net_admin } for pid=12142 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 457.119385] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 461.426009] audit_printk_skb: 10377 callbacks suppressed [ 461.426018] audit: type=1400 audit(1556851005.269:139198): avc: denied { net_admin } for pid=14394 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 461.427079] audit: type=1400 audit(1556851005.269:139199): avc: denied { net_admin } for pid=14445 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 461.427387] audit: type=1400 audit(1556851005.269:139200): avc: denied { net_admin } for pid=14477 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 461.429025] audit: type=1400 audit(1556851005.269:139201): avc: denied { net_admin } for pid=14445 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 461.429327] audit: type=1400 audit(1556851005.269:139202): avc: denied { net_admin } for pid=14477 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 461.429774] audit: type=1400 audit(1556851005.269:139203): avc: denied { net_admin } for pid=7392 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 461.431201] audit: type=1400 audit(1556851005.269:139204): avc: denied { net_admin } for pid=14474 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 461.436301] audit: type=1400 audit(1556851005.279:139205): avc: denied { net_admin } for pid=13002 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 461.436452] audit: type=1400 audit(1556851005.279:139206): avc: denied { net_admin } for pid=11589 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 461.438269] audit: type=1400 audit(1556851005.279:139207): avc: denied { net_admin } for pid=13002 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 466.435981] audit_printk_skb: 10147 callbacks suppressed [ 466.435988] audit: type=1400 audit(1556851010.279:142619): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 466.437701] audit: type=1400 audit(1556851010.279:142620): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 466.439534] audit: type=1400 audit(1556851010.279:142621): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 466.439624] audit: type=1400 audit(1556851010.279:142622): avc: denied { net_admin } for pid=9971 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 466.441494] audit: type=1400 audit(1556851010.279:142623): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 466.441559] audit: type=1400 audit(1556851010.279:142624): avc: denied { net_admin } for pid=9971 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 466.450065] audit: type=1400 audit(1556851010.289:142626): avc: denied { net_admin } for pid=12036 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 466.450071] audit: type=1400 audit(1556851010.289:142625): avc: denied { net_admin } for pid=12033 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 466.451996] audit: type=1400 audit(1556851010.289:142627): avc: denied { net_admin } for pid=12033 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 466.452003] audit: type=1400 audit(1556851010.289:142628): avc: denied { net_admin } for pid=12036 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 471.448670] audit_printk_skb: 10531 callbacks suppressed [ 471.448679] audit: type=1400 audit(1556851015.289:146163): avc: denied { net_admin } for pid=13970 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 471.448702] audit: type=1400 audit(1556851015.289:146164): avc: denied { net_admin } for pid=6920 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 471.450612] audit: type=1400 audit(1556851015.289:146165): avc: denied { net_admin } for pid=13970 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 471.450662] audit: type=1400 audit(1556851015.289:146166): avc: denied { net_admin } for pid=6920 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 471.455749] audit: type=1400 audit(1556851015.299:146167): avc: denied { net_admin } for pid=13971 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 471.457450] audit: type=1400 audit(1556851015.299:146168): avc: denied { net_admin } for pid=13971 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 471.459392] audit: type=1400 audit(1556851015.299:146169): avc: denied { net_admin } for pid=13912 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 471.459398] audit: type=1400 audit(1556851015.299:146170): avc: denied { net_admin } for pid=16171 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 471.461327] audit: type=1400 audit(1556851015.299:146171): avc: denied { net_admin } for pid=13912 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 471.461350] audit: type=1400 audit(1556851015.299:146172): avc: denied { net_admin } for pid=16171 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 476.459214] audit_printk_skb: 9636 callbacks suppressed [ 476.459222] audit: type=1400 audit(1556851020.299:149398): avc: denied { net_admin } for pid=11590 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 476.461095] audit: type=1400 audit(1556851020.299:149399): avc: denied { net_admin } for pid=11590 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 476.461814] audit: type=1400 audit(1556851020.299:149400): avc: denied { net_admin } for pid=11600 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 476.466751] audit: type=1400 audit(1556851020.309:149401): avc: denied { net_admin } for pid=14367 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 476.468565] audit: type=1400 audit(1556851020.309:149402): avc: denied { net_admin } for pid=14367 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 476.469788] audit: type=1400 audit(1556851020.309:149403): avc: denied { net_admin } for pid=17068 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 476.470003] audit: type=1400 audit(1556851020.309:149404): avc: denied { net_admin } for pid=14485 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 476.471741] audit: type=1400 audit(1556851020.309:149405): avc: denied { net_admin } for pid=17068 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 476.471911] audit: type=1400 audit(1556851020.309:149406): avc: denied { net_admin } for pid=14485 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 476.472754] audit: type=1400 audit(1556851020.309:149407): avc: denied { net_admin } for pid=17015 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 481.479816] audit_printk_skb: 1642 callbacks suppressed [ 481.479825] audit: type=1400 audit(1556851025.319:149957): avc: denied { net_admin } for pid=17677 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 481.479852] audit: type=1400 audit(1556851025.319:149958): avc: denied { net_admin } for pid=12025 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 481.481615] audit: type=1400 audit(1556851025.319:149959): avc: denied { net_admin } for pid=17677 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 481.482722] audit: type=1400 audit(1556851025.319:149960): avc: denied { net_admin } for pid=17643 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 481.489471] audit: type=1400 audit(1556851025.329:149961): avc: denied { net_admin } for pid=13432 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 481.489504] audit: type=1400 audit(1556851025.329:149962): avc: denied { net_admin } for pid=12028 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 481.491428] audit: type=1400 audit(1556851025.329:149963): avc: denied { net_admin } for pid=12028 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 481.491459] audit: type=1400 audit(1556851025.329:149964): avc: denied { net_admin } for pid=13432 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 481.500130] audit: type=1400 audit(1556851025.339:149965): avc: denied { net_admin } for pid=12071 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 481.501975] audit: type=1400 audit(1556851025.339:149966): avc: denied { net_admin } for pid=12071 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 486.892878] audit_printk_skb: 2836 callbacks suppressed [ 486.892887] audit: type=1400 audit(1556851030.729:150917): avc: denied { net_admin } for pid=13948 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:37:12 executing program 1: 02:37:12 executing program 0: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback, 0x0, 0x0, 0xff, 0x1}, 0x23) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f0000000000)={{0xa, 0x4e24, 0x7ff, @remote, 0x43}, {0xa, 0x4e24, 0x8, @ipv4={[], [], @empty}, 0x7}, 0x1f80000000000000, [0x1, 0x9, 0x1f, 0x1, 0x6, 0x6, 0xcd, 0x7fffffff]}, 0x5c) 02:37:12 executing program 2: timerfd_create(0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") flistxattr(r0, &(0x7f0000000040)=""/71, 0x47) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='fdinfo/3\x00') setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f00000002c0)=@raw={'raw\x00', 0x9, 0x3, 0x2f8, 0x0, 0xe8, 0x0, 0xe8, 0x0, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, &(0x7f0000000100), {[{{@ipv6={@mcast2, @ipv4={[], [], @empty}, [0xff, 0xffffff00, 0x0, 0xff000000], [0xff, 0x0, 0xff000000, 0xffffffff], 'veth1_to_hsr\x00', 'bond0\x00', {0xff}, {}, 0x2b, 0x3f, 0x6, 0x2}, 0x0, 0xc8, 0xe8}, @unspec=@NOTRACK={0x20, 'NOTRACK\x00'}}, {{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x2}}, @inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x358) preadv(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/246, 0xf6}], 0x1, 0x0) 02:37:12 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fcntl$getown(r0, 0x9) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000200)='/proc/thread-self/attr/current\x00', 0x2, 0x0) sendfile(r1, r1, 0x0, 0x27) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000001c0)) r2 = dup3(r1, r0, 0x80000) ioctl$EVIOCGKEYCODE_V2(r2, 0x80284504, &(0x7f0000000000)=""/87) 02:37:12 executing program 5: setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) pause() syz_execute_func(&(0x7f0000000000)="3666440f50f564ff0941c3c4e1a5f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000014c0)="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") 02:37:12 executing program 4: [ 486.903080] audit: type=1400 audit(1556851030.739:150918): avc: denied { net_admin } for pid=18172 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 486.904982] audit: type=1400 audit(1556851030.739:150919): avc: denied { net_admin } for pid=18172 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 486.924379] audit: type=1400 audit(1556851030.759:150920): avc: denied { net_admin } for pid=13796 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 486.929710] audit: type=1400 audit(1556851030.769:150921): avc: denied { net_admin } for pid=16314 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 486.931416] audit: type=1400 audit(1556851030.769:150922): avc: denied { net_admin } for pid=16314 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 486.972509] audit: type=1400 audit(1556851030.809:150923): avc: denied { net_admin } for pid=18175 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 486.980378] audit: type=1400 audit(1556851030.819:150924): avc: denied { net_admin } for pid=13796 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 486.998967] audit: type=1400 audit(1556851030.839:150925): avc: denied { net_admin } for pid=18174 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 487.000934] audit: type=1400 audit(1556851030.839:150926): avc: denied { net_admin } for pid=18174 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:37:15 executing program 4: [ 491.896983] audit_printk_skb: 2290 callbacks suppressed [ 491.896991] audit: type=1400 audit(1556851035.739:151700): avc: denied { net_admin } for pid=18552 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:37:15 executing program 2: 02:37:15 executing program 0: 02:37:15 executing program 5: 02:37:16 executing program 3: mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) write$FUSE_ENTRY(r0, &(0x7f0000000380)={0x90}, 0x90) r1 = open$dir(&(0x7f0000000180)='./file0\x00', 0x1000000000004202, 0x0) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) sendfile(r0, r1, 0x0, 0x7fffffff) sendfile(r1, r1, 0x0, 0x8800000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x40001000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") [ 491.923297] audit: type=1400 audit(1556851035.739:151701): avc: denied { net_admin } for pid=17310 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:37:23 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000005, &(0x7f00008d4fe4)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 491.926392] audit: type=1400 audit(1556851035.739:151703): avc: denied { net_admin } for pid=11770 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 491.928115] audit: type=1400 audit(1556851035.769:151704): avc: denied { net_admin } for pid=11770 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 491.929733] audit: type=1400 audit(1556851035.769:151705): avc: denied { net_admin } for pid=17323 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 491.931603] audit: type=1400 audit(1556851035.769:151706): avc: denied { net_admin } for pid=17323 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 491.932194] audit: type=1400 audit(1556851035.769:151707): avc: denied { net_admin } for pid=13211 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 491.933860] audit: type=1400 audit(1556851035.769:151708): avc: denied { net_admin } for pid=17438 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 491.936738] audit: type=1400 audit(1556851035.779:151709): avc: denied { net_admin } for pid=14827 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 491.938578] audit: type=1400 audit(1556851035.779:151710): avc: denied { net_admin } for pid=14827 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 496.907460] audit_printk_skb: 8953 callbacks suppressed [ 496.907469] audit: type=1400 audit(1556851040.749:154711): avc: denied { net_admin } for pid=14377 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 496.907688] audit: type=1400 audit(1556851040.749:154712): avc: denied { net_admin } for pid=12924 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 496.909414] audit: type=1400 audit(1556851040.749:154713): avc: denied { net_admin } for pid=14377 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 496.909598] audit: type=1400 audit(1556851040.749:154714): avc: denied { net_admin } for pid=12924 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 496.911014] audit: type=1400 audit(1556851040.749:154715): avc: denied { net_admin } for pid=19327 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 496.912755] audit: type=1400 audit(1556851040.749:154716): avc: denied { net_admin } for pid=19327 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 496.914753] audit: type=1400 audit(1556851040.749:154717): avc: denied { net_admin } for pid=13010 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 496.914777] audit: type=1400 audit(1556851040.749:154718): avc: denied { net_admin } for pid=19329 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 496.920449] audit: type=1400 audit(1556851040.759:154719): avc: denied { net_admin } for pid=14383 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 496.920467] audit: type=1400 audit(1556851040.759:154720): avc: denied { net_admin } for pid=12978 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 501.917525] audit_printk_skb: 10252 callbacks suppressed [ 501.917533] audit: type=1400 audit(1556851045.759:158158): avc: denied { net_admin } for pid=18920 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 501.917700] audit: type=1400 audit(1556851045.759:158159): avc: denied { net_admin } for pid=18911 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 501.919456] audit: type=1400 audit(1556851045.759:158160): avc: denied { net_admin } for pid=18920 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 501.919610] audit: type=1400 audit(1556851045.759:158161): avc: denied { net_admin } for pid=18911 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 501.921199] audit: type=1400 audit(1556851045.759:158162): avc: denied { net_admin } for pid=20181 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 501.923022] audit: type=1400 audit(1556851045.759:158163): avc: denied { net_admin } for pid=20183 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 501.924602] audit: type=1400 audit(1556851045.759:158164): avc: denied { net_admin } for pid=18913 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 501.924932] audit: type=1400 audit(1556851045.759:158165): avc: denied { net_admin } for pid=20183 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 501.930265] audit: type=1400 audit(1556851045.769:158166): avc: denied { net_admin } for pid=18924 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 501.930300] audit: type=1400 audit(1556851045.769:158167): avc: denied { net_admin } for pid=18915 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 506.930494] audit_printk_skb: 10572 callbacks suppressed [ 506.930503] audit: type=1400 audit(1556851050.769:161710): avc: denied { net_admin } for pid=19340 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 506.930682] audit: type=1400 audit(1556851050.769:161711): avc: denied { net_admin } for pid=19334 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 506.932423] audit: type=1400 audit(1556851050.769:161712): avc: denied { net_admin } for pid=19340 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 506.932583] audit: type=1400 audit(1556851050.769:161713): avc: denied { net_admin } for pid=19334 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 506.933033] audit: type=1400 audit(1556851050.769:161714): avc: denied { net_admin } for pid=21046 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 506.937315] audit: type=1400 audit(1556851050.779:161715): avc: denied { net_admin } for pid=19299 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 506.939176] audit: type=1400 audit(1556851050.779:161716): avc: denied { net_admin } for pid=19299 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 506.944322] audit: type=1400 audit(1556851050.779:161717): avc: denied { net_admin } for pid=19341 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 506.944344] audit: type=1400 audit(1556851050.779:161718): avc: denied { net_admin } for pid=19353 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 506.950177] audit: type=1400 audit(1556851050.789:161719): avc: denied { net_admin } for pid=17060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 511.939698] audit_printk_skb: 10403 callbacks suppressed [ 511.939707] audit: type=1400 audit(1556851055.779:165220): avc: denied { net_admin } for pid=19819 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 511.941629] audit: type=1400 audit(1556851055.779:165222): avc: denied { net_admin } for pid=19819 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 511.941653] audit: type=1400 audit(1556851055.779:165223): avc: denied { net_admin } for pid=19702 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 511.947501] audit: type=1400 audit(1556851055.789:165224): avc: denied { net_admin } for pid=19674 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 511.949441] audit: type=1400 audit(1556851055.789:165226): avc: denied { net_admin } for pid=19674 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 511.949443] audit: printk limit exceeded [ 511.951192] audit: type=1400 audit(1556851055.789:165227): avc: denied { net_admin } for pid=19672 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 511.951356] audit: type=1400 audit(1556851055.789:165228): avc: denied { net_admin } for pid=19803 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 511.952914] audit: type=1400 audit(1556851055.789:165229): avc: denied { net_admin } for pid=19672 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 511.953775] audit: type=1400 audit(1556851055.789:165230): avc: denied { net_admin } for pid=21893 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 516.946764] audit_printk_skb: 10797 callbacks suppressed [ 516.946773] audit: type=1400 audit(1556851060.789:168858): avc: denied { net_admin } for pid=22817 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 516.947011] audit: type=1400 audit(1556851060.789:168859): avc: denied { net_admin } for pid=17836 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 516.948642] audit: type=1400 audit(1556851060.789:168860): avc: denied { net_admin } for pid=22817 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 516.948686] audit: type=1400 audit(1556851060.789:168861): avc: denied { net_admin } for pid=17895 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 516.950403] audit: type=1400 audit(1556851060.789:168862): avc: denied { net_admin } for pid=17895 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 516.952656] audit: type=1400 audit(1556851060.789:168863): avc: denied { net_admin } for pid=20232 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 516.953705] audit: type=1400 audit(1556851060.789:168864): avc: denied { net_admin } for pid=17902 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 516.954571] audit: type=1400 audit(1556851060.789:168865): avc: denied { net_admin } for pid=20232 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 516.960425] audit: type=1400 audit(1556851060.799:168867): avc: denied { net_admin } for pid=17878 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 516.960428] audit: audit_lost=168156 audit_rate_limit=0 audit_backlog_limit=64 [ 522.367433] audit_printk_skb: 3564 callbacks suppressed [ 522.367440] audit: type=1400 audit(1556851066.209:170060): avc: denied { net_admin } for pid=18552 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 522.839401] audit: type=1400 audit(1556851066.679:170062): avc: denied { net_admin } for pid=19453 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 522.839581] audit: type=1400 audit(1556851066.679:170063): avc: denied { net_admin } for pid=19440 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 522.841321] audit: type=1400 audit(1556851066.679:170064): avc: denied { net_admin } for pid=19440 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 522.847146] audit: type=1400 audit(1556851066.669:170061): avc: denied { net_admin } for pid=19413 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 522.891379] audit: type=1400 audit(1556851066.729:170065): avc: denied { net_admin } for pid=18540 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 522.899958] audit: type=1400 audit(1556851066.739:170066): avc: denied { net_admin } for pid=21155 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 522.900004] audit: type=1400 audit(1556851066.739:170067): avc: denied { net_admin } for pid=21183 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 522.909323] audit: type=1400 audit(1556851066.749:170068): avc: denied { net_admin } for pid=21176 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 522.913835] audit: type=1400 audit(1556851066.749:170069): avc: denied { net_admin } for pid=21179 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:37:49 executing program 1: ioprio_set$uid(0x3, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getegid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000014c0)='cgroup.threads\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001500)) fstat(0xffffffffffffffff, &(0x7f0000001540)) getegid() socket$netlink(0x10, 0x3, 0xf) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getresuid(&(0x7f0000001700), &(0x7f0000001740), 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) stat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000001b40)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) ioprio_set$uid(0x3, 0x0, 0x0) 02:37:49 executing program 2: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r0, &(0x7f0000005940)=[{{&(0x7f0000000880)=@in6={0xa, 0x0, 0x0, @ipv4}, 0x80, 0x0, 0x0, &(0x7f0000001cc0)=[{0x10}], 0x10}}], 0x1, 0x8004) 02:37:49 executing program 0: syz_execute_func(&(0x7f0000000080)="410f01f9c4e1f573d50664ff0941c3c4e2c99758423e46d85312660fd2323e0f1110d4b842419dcccc") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x11, 0x2, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RLOCK(r1, 0x0, 0xffffff3a) 02:37:49 executing program 5: pause() syz_open_dev$sndtimer(0x0, 0x0, 0x0) syz_execute_func(&(0x7f00000014c0)="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") 02:37:49 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bc070") sendmmsg(0xffffffffffffffff, &(0x7f0000007fc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001000)=ANY=[@ANYBLOB="180000000000000002"], 0x9}}], 0x1, 0x0) sigaltstack(&(0x7f0000003000/0x4000)=nil, &(0x7f0000000080)) sigaltstack(&(0x7f0000000000/0x4000)=nil, &(0x7f0000004480)) 02:37:49 executing program 4: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/status\x00', 0x0, 0x0) write$P9_RFLUSH(r1, &(0x7f0000000040)={0x7, 0x6d, 0x1}, 0x7) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x6, 0x4, 0x5, 0x4, 0x0, 0x0, 0x800000000000}, 0x3c) 02:37:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000140)=ANY=[@ANYBLOB="6e6185316737740000000000000000e4dbb77497e90104000000000040800005000000001b1f41000503000018030000cc000000ac01000000000000ed03d1be90e17e916dd282e0f34f8dfac0dc1695c4d700001009b772c4bb11dc1df0291c65e07e2557182aa36f7344194919e4029c1e94688d9ce9e69d76cf4dc61dc5a4"], 0x1) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/attr/current\x00', 0x2, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x2, [{}, {}]}, 0x48) getsockopt$IP_VS_SO_GET_SERVICE(r1, 0x0, 0x483, &(0x7f00000000c0), &(0x7f00000001c0)=0x68) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f00000012c0)=0x1) write$P9_RLERRORu(r1, &(0x7f0000000200)={0x25, 0x7, 0x2, {{0x18, '/proc/self/attr/current\x00'}, 0x6759476f}}, 0x25) tkill(r2, 0x3c) sendto$unix(r0, &(0x7f0000000240)="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", 0x1000, 0x4000010, &(0x7f0000001240)=@file={0x0, './file0\x00'}, 0x6e) 02:37:51 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e22}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) getsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000000c0)=""/91, &(0x7f0000000040)=0x5b) 02:37:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = syz_open_pts(r0, 0x0) ioctl$TCFLSH(r1, 0x540b, 0x0) [ 527.377438] audit_printk_skb: 1068 callbacks suppressed [ 527.377447] audit: type=1400 audit(1556851071.219:170429): avc: denied { net_admin } for pid=23795 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:37:51 executing program 0: socketpair(0x0, 0x800, 0x2, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuset.effective_cpus\x00', 0x0, 0x0) write$UHID_INPUT(r2, &(0x7f0000000280)={0x8, "ea7dd8836ae1bc41db7def3174722c3efa933e549867ef014132e905f6557264d49db51e5b8f2751fc9bdd0dee68ef186ced20873e2f449f41b05d530900898b44daade0d3338364664916a891cb63a101f5fb5824192e6b07e52c20c3303d4802ae39f3968d69a6769178ceee8b6bca6eaf3ecdeca87f6eff2717ca32b6e4063e22dc5721d7a38c015ddabe93af26d99cfad87ef264c655084a1a17f53fb6d1ece17616dbba91a56778c58ffbf3417fa1ad88492c0f072fca1481094a5563045bf024b35bf9e50c1610b9982e70ea3ddfabe71125501b0bd2722bf2a352f0c78cffe9b37505342449dd91fe971156025de4944407fed1602886f3fd4fef51e0ee36db371d8abe4158ed8db6a390725f93119b9e7059a22f703b817491f69aa93a73a4458e853790e03f2470bcc28d92291a1d8d049868f7bb541d33a495c337b277bfb262e524c97eba5011a5237a6006355a3ec1aa026dc2470e95046d88ac2ad1993ada076dc2a19670f7cb9293ecdfb1c976cbf464dc68bacba470f8f697268760639d40f6cea93b33226c5e5284440053967fdf89b2bc07289b0120390fe06ff1ae865b1e1c8d479cf67cab01b8c614f6b1a1ed0db0f0298fa57590d5b9d135e71fce10bab9b665f91030921a39ee7b4aae579ac0a203dfe3d700ef3e8e7f631e208165104dbb324ab63ff3a7659eddc35d46fd30dcd876239f9d72d3b3554aa3ea040ad878c256109ffe6156c8adbe7fa2d900b923e7adf6143185deed4851e28f830e59c7b217612b9db61e96fe84217322b5f0ff42a998414a6b3a2edac0dc46f3f44bda0b69f15d4e0a577c89759497fa690e322f8bff865a138764dddfb9c51f7debddebb178830730ab823f692631a1ca09aff58a9c674d3ef7678994d02506f246607746c8ba0c5f106385470e9f93e1df377f068f3c22f5e9975ef2e126ca0244f0fbd3b0ba6665c23b05dcc716c7b5c62501b9686026b9f3036600078c3f0b94844268f87e30e15a43681002d3c74d7ebae0ce302cc61498585ccad26c85fb26c2ffdd9d768626c9db8857e1108448ba1998d54940f5f5c4934715f49f18d7a298549d051f93dff17461dd93cffa0b3aa28d435f5bf56166b1b9d171db9cbe0cd033a04624841bc3be982f6207e09f1a2b39de0a057d8d7daa96e838977857d939ddd3a72f52a06d98136e05e445c4547360ff67404d9fea46b364acb222b8aa6620bd41a216cc731b76787d2a1ec2ad5c186d250a79a2dae5f6e3afb4b7d95beaee19fa5829dbd02081a721d5be6eea01b595796d50d096c3db45fa7184b7ab5df2d018345f9d55efcdb830a2d0cc7006380a68b527ee12ec0c9e16a21d357767bc72b133f2b9a6d3b52f76d381a3e7fd3f0d0c6876277981cbc973a014be1c27f514f09c8a1998dd59af61524c0fade3ca27799f97c036a94a7906686ba364476034cbc6ebf6ad8ba73dc7958d258892c1e4427baf6898c3aa48fd62dfb5c5f108865390ed0f9a542c037fc9755c6110af17784613c3a94322b64fe46df0edd55d839449f824f31c885a467f94a833b2b0007345a22554c3e2b7590aef1d3d17ca719f65a2a4679705320786b2dbdc921416d17228f5babb6c58080139788960747a98c3c09739d96a1857d169a7d99d93865b45c4630aaae15eed15c90948f56ba7f3c777a74c1f3870ddf4db92eadae8f1567248e70233cf877d5020bcaa5bb8b18d70e6d271515633d0b86d26e46cf158d9fe71e9212f6786557cc5c7045f4307c818c7878bfec8da680681f3f59b2e8450139273b1f6cf3ad52b5491ffa9b67ae2df045afc3b861290ce1d32c96501c895f180dffa148bafca06a021a9cafbb962735c09ac01d3ad1cc5af5e6fa6bf39b31aa48667f61eff7004c49c1e60ee4c8eff6ddc9e319a04c7d42c270985aba7c4893ebdb83b317cf95e563641884fb6200624949ab6a17686531629c0ca5a2acc94c608552069760da345bfab10325a3b568eecb452ebcf60e8a153a3c23e7e7f15503d42cfc2a3afcf2843e1b6703bb6ade632fb1d19e74332da1e7da9f5d3e8416662eeff84e522ffad86f90b982a946d3fbc0278ab4db19c12cd19c2c8debb0612c1b8673505e78792c811d386ecb003d9410aa3d6895b13ebb0c9baf5bc7418e95e4b6644c24becbe2c51e86b46b9b0b0e8637eaf00dda5f7c49838b31f3009ce164708d99db4ad03959985d8b2fb88ab26b2af4402824caa881ee9d80722d99ad68b78ca464d3083cb8665baafd63d343d64c1a57f51bd147280e98867ec25c0a386e9aba16c3377916f69ba776daf80ec495f79f9118784dec9026c9231cf6fbd5744fe9ed86608db1ac851aebabaa3615d8224e84083ffa6cf5a27aba04f1a372fd6093ab4cdd88f290146d2c7783a445aca2a082243785cf591b7e48058d33bf5ded472f132501735471a94388ae5cefaf3328c6bd4da89180d226a9cbd63f9786fd0b44fea149b2e8d3d61a17b9e4b9a227f8cd6512f6b65a459e1327567e4ecec02c49e251c34a53561e884ebc0357e84d621b6267fa8073ad9c2b90197b21b32062d51fd62a12051e9418f16dc40689d3baa5621d4e8028bddb1b16d71cd551a36997f4813afe862f0a020ea6126d55352324dce237967b4e90bc368b1e63334fc7baaa64e141c37646b47f180bcdf0dfb3b6f8a6540f670324f69ee8f7a00d50f4300b2a82ea9c4bccf068ed91cbe2af11b6388c47882d90204c95e410b587b8195ed04201e07bda7b5aa0d2cb969cadad00fe0f5e214d4a90a5c0636f37f8c462467787ab9e44547d7eba5ed6ef196555bc6075c10e19071e728ff933aef636a402fb09486994b675dc02ba9174b633e319cf03db85e6c0bbd77f2b9e11b5dc52f5cff941021d6df108f18a7620105d346f6794499dd9b084a29eb4dae350369f82063ac79b39f646d2ff8bd9a2ac77fb7c963cb7b64e92fa448a2d794a79ea22331e8eae5bb88788eb48bae7c712ca392ac6bf8dd6ade1f64b90948ac8c19169d1f0bfb7561d2faa3bb74511465e335d921a26be74cd05694741508c7c4b9aab0e9721fffc5ce232dd71514412a44d7928fab3bc71781ccdea8a164649488713e4ce7544add3c89d841fe9ba6ccfefbd3520177a0088f2593db6ab1b2a2156b47048672644cce4c17badcf27f52f98558abeb5743bc51d879a75a6244b2f0352dc1cfe377d9323f2ca2cc61f1bd144baac32f5663e0c1f608acdb63d8ee549ef2ff757f66b9a53ed235b23714ac4565e872d55c8aa1d8bb606963539d41d678c47946907ae1f82f41d50eb948a2678fd4cdfbedc486d509012a92f23609fb7bcfa1defff908a14ad120e7ee72b6272a797460534f8a1569aa031c6f9a6873f042b7c99f9e12ccc6a350793fc731633bccc49fb403af3b94b4a453276c476b1086d683448b383511e6aa51557064006300d2be5b218ba380d49a49e26a5c60de57daa35a242a0722edc80ac73ab8e6bbbe0d7061bbfec7474d41f3e5cfdac879a679a11593d86cfa6c845b2690bf9e51dad169c668d47e1eb5054a57f354623c850b541900087820de078177216ea30b99b685486550db36098be4d7b96c3fa939afe44e5d218776a016d994cca2c925add3f458943b63af9bd86ba5b7a0f369cc60ec8f40d0e9b0a60656d1453396323fccd557720b53e058416849a9ab0da7bf8561818710ee33ca2cd4aa3e99482d18bfde965d65145ec2c3dac80acf7c568779097175266a25f8c2ab7f70a03bb9e7bcfc637d391b16f08e9e2874ca9a5c5c30701868a313a8c4ad62ee5234c622dae9a1ffa97568d9598981e5fd0e072495e9bca316aa0331355f49c6539600f38ac2d280c502496cdbf611b75353ce84daca08e5c28df96a03c193074ab30fa29a49e58961632f006f818c23eb496a4e3a4df1698c37f8acf5cb198c81382cf4cc30461b3082d557c97f6ce50ba9e0e158800ad025a2dab47808268aa3b76812fc3a278456ed471b520ac88b37e20e1029344559a462887a6a77cbebf8b0254b15b8b8304b91a8625701699a833568c4f30fb04c30a44a7f8224a25a07bdf7b86befdbc5614806f7e0a68fad9893383a2d8e3f455003a4e69474faee74503464c95cd593124ee1ca8e5c1648c0471800332e4c764475685debff48e6cadc5a6f2a571e359e3dad14d3569f99f84daf95c3b8e99a084bc039fa4077f49c24398098f53c0c2d2b13ad3551cee42ec78642ab5461709391c9ecbc5436d8e8b78f9b48797f0b94fd22ae0f57e8ff4eb5c396781e8d71c1977515aac0d7fd88ecad6b21f8a812f430b8cc473fae83e8e21683ce708b6b4638a5c220d346a69ef2649eefc8e1c5cfedea27f66bedf6656c310e8c9d50bb5dc3e8b39fae31584bd633e9e293fbae2d22813e7fb4cfbe3f5aedab5769d1b939c4b2866ad8788a092641027b7957169d0cdb540a67fb5cc6466630684f3d39e7e9bfa60db93a5c4f62b9e50e21e6d381b3b23fbf0019b28e68ba01c5b6eb1664fcfe87d1e52d5b7b577a58cd0885bf819756c09f5449f191d8831af48cd9a5458d717741a801de32407bc855a24f47001caa82fcd40981c3197bc0faa167b13297510c70e0d03f856a816effa7b7dea9afa8ba7b5b7caaa38213ebcbb991e7afa8a6e65b72463a3415d89e7f1a1e37e62971cf9f2ca6d40c8f104254dd9cbfbcf761ee2c90050119e8d6a145a1f1516d8fa480b9318a9afa6c763f69f7ada453c957eee9897337a9750ecc587126b21e8cc358352cd11ca2b6246e36d3fc87e625ce7709994051f66c4fbadc9d85023c0e1c7b06d7be8333e9089982854a7db878c0545c31f29f132f58626b90d494272e0411b1d645723e5e72e21a537a8a36092e1db78aeb1162b4b4cfb97ee637a80c5f56893a7fb091e41c6d677d55b563cc17d9e441ae50ae8991ef09d0513bed4c84511ed0559a716b7ba85695e89f4aa5033ef6f7c37ed1f87d451ccf3579ff1462e068872891879d6bb49c4b1efb54120d93bac3414787fef23d42e9ef30255cbd7a3dfa0b3e88e3ab9c5668b42682a6636b0f162043f94510a83891eacaebd0a5973ffb7534c9a02b81f5a71185e3377c61d5ef0a72518a07bfb9e80342a276776745d189c2ed6d0b87eae6e2e84994a26e190c295a084f224666dfe6f1b79ef216b6b71d28330cef1d2a6809cb3be1d13c4e4c7e5c759888f761644b196aa3a0b7c04a28570b443ee500bc4b31570fe1a4c0e32e9148724754761502a8adb847aed286492b6b4f5f0b388b3720fb5a93c92f01c589d7d2e697e7be93f3c23f212240df9d759715b9f93e46093924acf3920b592da5fc2a5189ca3c696a53fde4c23e0fa952e68bfa43fb08e59a76fe9c34c596e3a4e801f638bc210a9f93aad2ace803b5d3200a18e6c91c8e34be96d4fe223ed93e7e03ab013fa5b0b5422c2860401998e45c75060a4a9f431d623cdd1577103afa9f4a0e2a28ac86bb348bf1f7bc529aaef56575d3784bcfb2eb495cd2d98c0cbdd7c50b8ba1081dc912ba63419abfe136ea19927624039ea3e8198c1ea6bcb937110aae35bf1bb9765adf618a6ed8e779c9ecd8f2ef0f099ee2c29189413482d1cd1a109656276e6abe1b6817d092ffd1486de07d28739ce8ce7c2f514813d83f97ba093ca9bd8e732e18d599a0ed85f873e06c691c313c4c6b82937e53327fb1a4ef78258a13db306729bea46850cb6c036e0d6bdd45c7a073811a9c4d2a200c069a5bb3c1e13f8ea6d554256f45477489056f", 0x1000}, 0x1006) mkdir(&(0x7f00000012c0)='./file0\x00', 0x40) setsockopt$inet6_int(r1, 0x29, 0xce, &(0x7f00000001c0)=0x85e, 0x4) syz_execute_func(&(0x7f0000000000)="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") setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f0000001300)={0xc7a000000000000, {{0xa, 0x4e20, 0x200, @mcast1, 0x7}}, {{0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x1b}, 0x800}}}, 0x108) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000200)={'ifb0\x00', 0x500}) [ 527.409715] audit: type=1400 audit(1556851071.249:170430): avc: denied { net_admin } for pid=23752 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:37:52 executing program 5: r0 = memfd_create(&(0x7f0000000040)='\x00\x00\x06\x00\x00\x00\x00\x00\x00\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000300)=ANY=[@ANYBLOB='\n'], 0x1) r1 = fcntl$getown(r0, 0x9) r2 = getpgrp(0xffffffffffffffff) setpgid(r1, r2) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) recvmsg(0xffffffffffffff9c, &(0x7f0000000340)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f00000001c0)=[{&(0x7f0000000100)=""/59, 0x3b}, {&(0x7f0000000140)=""/3, 0x3}, {&(0x7f0000000180)=""/25, 0x19}], 0x3, &(0x7f0000000200)=""/221, 0xdd}, 0x40000060) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000380)={'bond_slave_0\x00', {0x2, 0x4e20, @local}}) execveat(r0, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) [ 527.411214] audit: type=1400 audit(1556851071.249:170431): avc: denied { net_admin } for pid=23756 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 527.413307] audit: type=1400 audit(1556851071.249:170432): avc: denied { net_admin } for pid=23737 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 527.421590] audit: type=1400 audit(1556851071.259:170433): avc: denied { net_admin } for pid=23760 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:37:55 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200200}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0xe4, r3, 0x500, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6_vti0\x00'}]}, @IPVS_CMD_ATTR_DEST={0x50, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x81}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x4c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller1\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1f}]}, 0xe4}, 0x1, 0x0, 0x0, 0x20000000}, 0x14) ioctl(r0, 0x21000008912, &(0x7f0000000080)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000680)="656425a74a2ae92ca842980f05bf21000000c4a37bf0c50141e2e9b5c422ebaabb3c00ba00c7a4ea70db000000000f383a9e020000002e420ff84116c481b972f7928f698099005ba265aa104b5f26660f39391e2fdee5bebec421044f46eec421dd584243c4e10bf8d426d8f045f6196cf36d620f66420f5dc423c96cb83d000000fec4a3694c9d0a87ffff35c4a3bd4877f88a0383397fd3ff420298ffefffff65f20ffe7cd8d8a1a12ad764d3cf53afaf6766f2ab440fec3fc461b5fb6e74660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f36ccffd2c4c40f9f3c6436b2aa42664d950f31c46500000ff7d29978c104c4415ac0dc59a0f907f9b3ddcdcda2f247c0f600c481c5f89780000000c4c1045ccc7d7526802d08bb0000fa0f5fd25c450f91f3dada0f5ea5a9a50000ffff35159861c9553131b83a00a2f1fbfb3b62") ioctl$TIOCLINUX4(r1, 0x541c, &(0x7f0000000280)) [ 527.422832] audit: type=1400 audit(1556851071.259:170434): avc: denied { net_admin } for pid=23792 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 527.424775] audit: type=1400 audit(1556851071.259:170435): avc: denied { net_admin } for pid=23792 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 527.427271] audit: type=1400 audit(1556851071.269:170436): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 527.429020] audit: type=1400 audit(1556851071.269:170437): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 527.434395] audit: type=1400 audit(1556851071.269:170438): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 532.429060] audit_printk_skb: 1511 callbacks suppressed [ 532.429068] audit: type=1400 audit(1556851076.269:170945): avc: denied { net_admin } for pid=18972 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 532.430917] audit: type=1400 audit(1556851076.269:170946): avc: denied { net_admin } for pid=18972 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 532.433130] audit: type=1400 audit(1556851076.269:170947): avc: denied { net_admin } for pid=17963 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 532.440139] audit: type=1400 audit(1556851076.279:170948): avc: denied { net_admin } for pid=18991 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 532.441945] audit: type=1400 audit(1556851076.279:170949): avc: denied { net_admin } for pid=18991 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 532.448861] audit: type=1400 audit(1556851076.289:170950): avc: denied { net_admin } for pid=24097 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 532.450728] audit: type=1400 audit(1556851076.289:170951): avc: denied { net_admin } for pid=24097 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 532.454300] audit: type=1400 audit(1556851076.289:170952): avc: denied { net_admin } for pid=24107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 532.463424] audit: type=1400 audit(1556851076.299:170953): avc: denied { net_admin } for pid=22902 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 532.468994] audit: type=1400 audit(1556851076.309:170954): avc: denied { net_admin } for pid=22933 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 537.438386] audit_printk_skb: 5273 callbacks suppressed [ 537.438398] audit: type=1400 audit(1556851081.279:172717): avc: denied { net_admin } for pid=24750 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 537.440119] audit: type=1400 audit(1556851081.279:172718): avc: denied { net_admin } for pid=24750 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 537.440702] audit: type=1400 audit(1556851081.229:172689): avc: denied { net_admin } for pid=23225 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 537.442066] audit: type=1400 audit(1556851081.279:172719): avc: denied { net_admin } for pid=24760 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 537.442168] audit: type=1400 audit(1556851081.279:172720): avc: denied { net_admin } for pid=23225 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 537.443925] audit: type=1400 audit(1556851081.279:172721): avc: denied { net_admin } for pid=24760 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 537.444311] audit: type=1400 audit(1556851081.279:172722): avc: denied { net_admin } for pid=19117 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 537.445920] audit: type=1400 audit(1556851081.289:172723): avc: denied { net_admin } for pid=24761 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 537.447039] audit: type=1400 audit(1556851081.289:172724): avc: denied { net_admin } for pid=23226 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 537.447238] audit: type=1400 audit(1556851081.289:172725): avc: denied { net_admin } for pid=24761 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 542.449486] audit_printk_skb: 10671 callbacks suppressed [ 542.449496] audit: type=1400 audit(1556851086.289:176300): avc: denied { net_admin } for pid=24174 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 542.449502] audit: type=1400 audit(1556851086.289:176301): avc: denied { net_admin } for pid=24799 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 542.451424] audit: type=1400 audit(1556851086.289:176302): avc: denied { net_admin } for pid=24174 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 542.451454] audit: type=1400 audit(1556851086.289:176303): avc: denied { net_admin } for pid=24799 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 542.454391] audit: type=1400 audit(1556851086.289:176304): avc: denied { net_admin } for pid=24189 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 542.455764] audit: type=1400 audit(1556851086.299:176305): avc: denied { net_admin } for pid=25653 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 542.457464] audit: type=1400 audit(1556851086.299:176306): avc: denied { net_admin } for pid=25653 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 542.458668] audit: type=1400 audit(1556851086.299:176307): avc: denied { net_admin } for pid=24189 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 542.459914] audit: type=1400 audit(1556851086.299:176308): avc: denied { net_admin } for pid=24801 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 542.460588] audit: type=1400 audit(1556851086.299:176309): avc: denied { net_admin } for pid=25656 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 547.455738] audit_printk_skb: 10646 callbacks suppressed [ 547.455747] audit: type=1400 audit(1556851091.299:179881): avc: denied { net_admin } for pid=26549 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 547.457404] audit: type=1400 audit(1556851091.299:179882): avc: denied { net_admin } for pid=26549 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 547.459372] audit: type=1400 audit(1556851091.299:179883): avc: denied { net_admin } for pid=26556 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 547.459553] audit: type=1400 audit(1556851091.299:179884): avc: denied { net_admin } for pid=25294 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:38:32 executing program 1: pause() syz_open_procfs(0x0, 0x0) syz_execute_func(&(0x7f0000000100)="3666440f50f564ff0941c366440f56c9660f3a16649c6700c4617b12e5712d41dfd049b6100f11d46f") syz_execute_func(&(0x7f0000000140)="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") 02:38:32 executing program 0: add_key(&(0x7f00000000c0)='logon\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) 02:38:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4200, r1, 0x64, 0x4d) tkill(r1, 0x33) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="059e25e20d2fc7540a2b4e3de18ef29759f24521bbef1cb6a37ae2d174bee2eafa114227367e86301e5c6869f68f01235334ed005bda7fe300"], 0x39) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r1, 0x0, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@generic={0x0, 0x9374, 0xb9f7}) 02:38:32 executing program 3: syz_execute_func(&(0x7f0000000080)="410f01f9c4e1f573d50664ff0941c3c4e2c99758423e46d85312660fd2323e0f1110d4b842419dcccc") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x1ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x11, 0x2, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) write$P9_RSETATTR(r1, 0x0, 0x0) 02:38:32 executing program 5: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1, 0x28089, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) setxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000140), 0xffffff35) 02:38:32 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cpuset.sched_relax_domain_level\x00', 0x2, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000240)='3', 0x1}], 0x1) [ 547.461484] audit: type=1400 audit(1556851091.299:179885): avc: denied { net_admin } for pid=25294 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 547.461643] audit: type=1400 audit(1556851091.299:179886): avc: denied { net_admin } for pid=26559 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 547.463430] audit: type=1400 audit(1556851091.299:179887): avc: denied { net_admin } for pid=26559 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 547.466274] audit: type=1400 audit(1556851091.309:179889): avc: denied { net_admin } for pid=24632 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 547.467080] audit: type=1400 audit(1556851091.309:179890): avc: denied { net_admin } for pid=26551 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 547.468181] audit: type=1400 audit(1556851091.309:179891): avc: denied { net_admin } for pid=24632 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 552.467696] audit_printk_skb: 11012 callbacks suppressed [ 552.467704] audit: type=1400 audit(1556851096.309:183587): avc: denied { net_admin } for pid=24260 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 552.469422] audit: type=1400 audit(1556851096.309:183588): avc: denied { net_admin } for pid=24874 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 552.469613] audit: type=1400 audit(1556851096.309:183589): avc: denied { net_admin } for pid=24260 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 552.470766] audit: type=1400 audit(1556851096.289:183582): avc: denied { net_admin } for pid=25738 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 552.472521] audit: type=1400 audit(1556851096.309:183590): avc: denied { net_admin } for pid=25738 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 552.474528] audit: type=1400 audit(1556851096.309:183591): avc: denied { net_admin } for pid=27463 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 552.474548] audit: type=1400 audit(1556851096.309:183592): avc: denied { net_admin } for pid=25747 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 552.476809] audit: type=1400 audit(1556851096.319:183593): avc: denied { net_admin } for pid=27459 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 552.478569] audit: type=1400 audit(1556851096.319:183594): avc: denied { net_admin } for pid=27459 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 552.480246] audit: type=1400 audit(1556851096.319:183595): avc: denied { net_admin } for pid=24864 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:38:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip_mr_vif\x00') read$FUSE(r0, 0x0, 0x0) 02:38:34 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup2(r0, r0) clone(0x203, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='./file1\x00') r2 = creat(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x109) r3 = dup2(r1, r2) execve(&(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x0, 0x0) open$dir(0x0, 0x841, 0x0) clone(0x4003102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000240)='./file1\x00', 0x0, 0x0) write$P9_RCLUNK(r3, 0x0, 0x0) 02:38:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$unix(r1, &(0x7f0000000200)=@abs, 0x6e) clone(0x1000002102001ff4, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @mcast2}, 0x1c) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, 0x0, 0x0) 02:38:35 executing program 3: pause() syz_execute_func(&(0x7f0000000b80)="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") 02:38:36 executing program 5: setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000100)={0x0, 0x6}, 0x4) syz_emit_ethernet(0xffffffffffffffbe, &(0x7f0000000080)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x2b6}}}}}, &(0x7f0000000040)={0x0, 0x3, [0x0, 0x2d9, 0x3]}) [ 557.476918] audit_printk_skb: 10625 callbacks suppressed [ 557.476926] audit: type=1400 audit(1556851101.319:187170): avc: denied { net_admin } for pid=26035 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 557.477048] audit: type=1400 audit(1556851101.319:187171): avc: denied { net_admin } for pid=28350 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 557.478845] audit: type=1400 audit(1556851101.319:187172): avc: denied { net_admin } for pid=26035 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 557.478948] audit: type=1400 audit(1556851101.319:187173): avc: denied { net_admin } for pid=28350 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 557.484124] audit: type=1400 audit(1556851101.319:187175): avc: denied { net_admin } for pid=26224 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:38:39 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) [ 557.484131] audit: type=1400 audit(1556851101.319:187174): avc: denied { net_admin } for pid=26082 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 557.486864] audit: type=1400 audit(1556851101.329:187176): avc: denied { net_admin } for pid=28371 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 557.488665] audit: type=1400 audit(1556851101.329:187177): avc: denied { net_admin } for pid=28371 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 557.490181] audit: type=1400 audit(1556851101.329:187178): avc: denied { net_admin } for pid=26051 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 557.490184] audit: audit_lost=186387 audit_rate_limit=0 audit_backlog_limit=64 [ 562.485218] audit_printk_skb: 10929 callbacks suppressed [ 562.485226] audit: type=1400 audit(1556851106.319:190849): avc: denied { net_admin } for pid=29276 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 562.485438] audit: type=1400 audit(1556851106.129:190706): avc: denied { net_admin } for pid=29256 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 562.486683] audit: type=1400 audit(1556851106.329:190851): avc: denied { net_admin } for pid=29259 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 562.486700] audit: type=1400 audit(1556851106.329:190852): avc: denied { net_admin } for pid=29277 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 562.488622] audit: type=1400 audit(1556851106.329:190853): avc: denied { net_admin } for pid=29277 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 562.488653] audit: type=1400 audit(1556851106.329:190854): avc: denied { net_admin } for pid=29290 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 562.489325] audit: type=1400 audit(1556851106.329:190855): avc: denied { net_admin } for pid=26578 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 562.489840] audit: type=1400 audit(1556851106.329:190856): avc: denied { net_admin } for pid=29212 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 562.490494] audit: type=1400 audit(1556851106.329:190857): avc: denied { net_admin } for pid=29290 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 562.491533] audit: type=1400 audit(1556851106.329:190858): avc: denied { net_admin } for pid=29246 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 567.551223] audit_printk_skb: 4408 callbacks suppressed [ 567.551232] audit: type=1400 audit(1556851111.389:192334): avc: denied { net_admin } for pid=30060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 567.553153] audit: type=1400 audit(1556851111.389:192335): avc: denied { net_admin } for pid=30060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 567.555096] audit: type=1400 audit(1556851111.389:192336): avc: denied { net_admin } for pid=30078 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 567.556954] audit: type=1400 audit(1556851111.399:192337): avc: denied { net_admin } for pid=30041 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 567.716591] audit: type=1400 audit(1556851111.559:192338): avc: denied { net_admin } for pid=30069 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 567.773210] audit: type=1400 audit(1556851111.609:192339): avc: denied { net_admin } for pid=30070 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 567.777073] audit: type=1400 audit(1556851111.619:192341): avc: denied { net_admin } for pid=30025 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 567.778867] audit: type=1400 audit(1556851111.619:192342): avc: denied { net_admin } for pid=30025 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 567.780774] audit: type=1400 audit(1556851111.619:192343): avc: denied { net_admin } for pid=30017 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 567.808299] audit: type=1400 audit(1556851111.649:192344): avc: denied { net_admin } for pid=30055 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 572.556958] audit_printk_skb: 1169 callbacks suppressed [ 572.556967] audit: type=1400 audit(1556851116.399:192736): avc: denied { net_admin } for pid=30450 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:38:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'\x00\x00\x00\xe6\xff\xff\xff\x00\x00\x00\x00\x00\x02\x00', 0x5002}) ioctl$TUNSETOFFLOAD(r0, 0x400454d8, 0x507100) r1 = open(&(0x7f0000000000)='./file0\x00', 0x400, 0x18) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) ioctl$PPPIOCSCOMPRESS(r1, 0x4010744d) [ 572.561189] audit: type=1400 audit(1556851116.399:192737): avc: denied { net_admin } for pid=30387 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:38:42 executing program 4: ioprio_set$uid(0x3, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getegid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000014c0)='cgroup.threads\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001500)) fstat(0xffffffffffffffff, &(0x7f0000001540)) getegid() socket$netlink(0x10, 0x3, 0xf) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getresuid(&(0x7f0000001700), &(0x7f0000001740), 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) stat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000001b40)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) ioprio_set$uid(0x3, 0x0, 0x0) 02:38:42 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) prctl$PR_GET_THP_DISABLE(0x2a) sendto$inet6(r2, 0x0, 0x0, 0x20000004, &(0x7f000031e000)={0xa, 0x4e22}, 0x1c) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x220) shutdown(r2, 0x1) recvfrom$inet6(r2, &(0x7f0000000000)=""/31, 0x1f, 0x0, 0x0, 0x0) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000040)=' ', 0x1, 0x0, 0x0, 0x0) dup2(r0, r2) 02:38:42 executing program 0: ioprio_set$uid(0x3, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getegid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000014c0)='cgroup.threads\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001500)) fstat(0xffffffffffffffff, &(0x7f0000001540)) getegid() socket$netlink(0x10, 0x3, 0xf) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getresuid(&(0x7f0000001700), &(0x7f0000001740), 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) stat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000001b40)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) ioprio_set$uid(0x3, 0x0, 0x0) [ 572.563050] audit: type=1400 audit(1556851116.399:192738): avc: denied { net_admin } for pid=30387 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:38:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x6, &(0x7f0000000140)="0adc1f123c123f319bd070") r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @remote}, 0x10) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x9, 0x400) socket(0xa, 0x1, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000040)={0x5, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000100), 0x60f0305c) 02:38:43 executing program 5: syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0xd13, 0x2000) [ 572.566021] audit: type=1400 audit(1556851116.409:192739): avc: denied { net_admin } for pid=30476 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:38:45 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e22, @broadcast}, 0x10) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000596000)=0x9, 0x4) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f00009abffc)=0x5, 0x4) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e22, @local}, 0xffffffffffffffb4) 02:38:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") fchdir(r0) syz_execute_func(&(0x7f0000000280)="b12f91cd806969ef69dc00d9d0d0c44139fd5bf91cc1c7c7e4c653fb0fc4014c5868f4a95ff9c44149f2168f4808eebce00000802000c421fc51c1ea01eff33e36646442e9000000010f186746f3400faee47c7c730f5726400f0d18c401fe5ff6e3df646736676666430fefb3000000003665d95702f30f1a1254111d54111d00") 02:38:46 executing program 0: ioprio_set$uid(0x3, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getegid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000014c0)='cgroup.threads\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001500)) fstat(0xffffffffffffffff, &(0x7f0000001540)) getegid() socket$netlink(0x10, 0x3, 0xf) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getresuid(&(0x7f0000001700), &(0x7f0000001740), 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) stat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000001b40)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) ioprio_set$uid(0x3, 0x0, 0x0) [ 572.567857] audit: type=1400 audit(1556851116.409:192740): avc: denied { net_admin } for pid=30476 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:38:47 executing program 4: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000100)=0x0) r1 = getpgrp(r0) r2 = gettid() rt_sigprocmask(0x0, &(0x7f00000000c0)={0xfffffffffffffffe}, 0x0, 0x8) rt_tgsigqueueinfo(r1, r2, 0x33, &(0x7f0000000180)={0x0, 0x0, 0x70003}) rt_sigtimedwait(&(0x7f0000000040)={0x7fffffffffffff66}, &(0x7f0000a72ff0), &(0x7f0000000000)={0x77359400}, 0x8) [ 572.582672] audit: type=1400 audit(1556851116.419:192741): avc: denied { net_admin } for pid=30314 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 572.586710] audit: type=1400 audit(1556851116.429:192743): avc: denied { net_admin } for pid=30492 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:38:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r0, &(0x7f0000000440)={0xa, 0x4e22, 0x0, @ipv4}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x5) sendmsg$nl_generic(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f00000000c0)={0xc4, 0x34, 0x400, 0x70bd2b, 0x25dfdbff, {0xa}, [@generic="dd0ee683c0abeb24fc26d0b5bbebd2d57ac8797bfeec90f98edb61489a1a30eb89e943fbca68c752ed868b1ead4499037bb5f3d9e0d5254db627f9c8faf313fcaea9f934aa27743653e12a35aca4b67465f03c10f805ff368b38edd76501a6bad8c198321105db43842299983f94cae214e7245e6ddfa3c9addb37d0c9a2cfeabf54d611c283fb12b1f443fabfadace845d23d3a668aa66f3f", @typed={0x14, 0x90, @ipv6=@local}]}, 0xc4}, 0x1, 0x0, 0x0, 0x81}, 0x84) listen(r0, 0xfffffffffffffffe) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x8000000000000f, &(0x7f0000000000)=0x5, 0x4) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x403}, 0x1c) listen(r2, 0x0) 02:38:51 executing program 5: mount(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000180)={{{@in=@multicast2, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@local}}, &(0x7f00000002c0)=0xe8) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r2, r3) connect$inet6(r0, &(0x7f0000000000), 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = dup2(r0, r4) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r5, 0x6, 0x16, &(0x7f0000000000), 0x10e755) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x42000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000000100)='\n', 0x1) getsockopt$IP_VS_SO_GET_SERVICE(r4, 0x0, 0x483, 0x0, &(0x7f0000000140)) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(0xffffffffffffffff, 0x40286608, &(0x7f0000000100)={0x8001}) socket$unix(0x1, 0x0, 0x0) utimensat(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 572.588635] audit: type=1400 audit(1556851116.429:192744): avc: denied { net_admin } for pid=30492 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 572.591271] audit: type=1400 audit(1556851116.429:192745): avc: denied { net_admin } for pid=30319 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 572.635047] audit: type=1400 audit(1556851116.469:192746): avc: denied { net_admin } for pid=30469 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 577.575849] audit_printk_skb: 744 callbacks suppressed [ 577.575857] audit: type=1400 audit(1556851121.419:192992): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 577.578659] audit: type=1400 audit(1556851121.419:192993): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 577.598318] audit: type=1400 audit(1556851121.439:192994): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 577.600207] audit: type=1400 audit(1556851121.439:192995): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 577.601996] audit: type=1400 audit(1556851121.439:192996): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 577.603822] audit: type=1400 audit(1556851121.439:192997): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 577.702968] audit: type=1400 audit(1556851121.539:192998): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 577.704913] audit: type=1400 audit(1556851121.539:192999): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 577.706771] audit: type=1400 audit(1556851121.549:193000): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 577.760233] audit: type=1400 audit(1556851121.579:193001): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 582.589856] audit_printk_skb: 3950 callbacks suppressed [ 582.589865] audit: type=1400 audit(1556851126.429:194324): avc: denied { net_admin } for pid=30433 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 582.589924] audit: type=1400 audit(1556851126.429:194325): avc: denied { net_admin } for pid=30419 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 582.591837] audit: type=1400 audit(1556851126.429:194326): avc: denied { net_admin } for pid=30433 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 582.591852] audit: type=1400 audit(1556851126.429:194327): avc: denied { net_admin } for pid=30419 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 582.599194] audit: type=1400 audit(1556851126.439:194328): avc: denied { net_admin } for pid=30410 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 582.599325] audit: type=1400 audit(1556851126.439:194329): avc: denied { net_admin } for pid=30424 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 582.601135] audit: type=1400 audit(1556851126.439:194330): avc: denied { net_admin } for pid=30410 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 582.601253] audit: type=1400 audit(1556851126.439:194331): avc: denied { net_admin } for pid=30424 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 582.607276] audit: type=1400 audit(1556851126.449:194332): avc: denied { net_admin } for pid=30429 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 582.609162] audit: type=1400 audit(1556851126.449:194333): avc: denied { net_admin } for pid=30429 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 587.597291] audit_printk_skb: 10471 callbacks suppressed [ 587.597300] audit: type=1400 audit(1556851131.439:197841): avc: denied { net_admin } for pid=29615 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 587.597318] audit: type=1400 audit(1556851131.439:197842): avc: denied { net_admin } for pid=31215 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 587.599242] audit: type=1400 audit(1556851131.439:197843): avc: denied { net_admin } for pid=29615 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 587.599248] audit: type=1400 audit(1556851131.439:197844): avc: denied { net_admin } for pid=31215 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 587.604285] audit: type=1400 audit(1556851131.439:197845): avc: denied { net_admin } for pid=29609 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 587.604350] audit: type=1400 audit(1556851131.439:197846): avc: denied { net_admin } for pid=29577 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 587.606282] audit: type=1400 audit(1556851131.449:197847): avc: denied { net_admin } for pid=29609 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 587.606395] audit: type=1400 audit(1556851131.449:197848): avc: denied { net_admin } for pid=32001 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 587.608244] audit: type=1400 audit(1556851131.449:197849): avc: denied { net_admin } for pid=32010 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 587.608316] audit: type=1400 audit(1556851131.449:197850): avc: denied { net_admin } for pid=32001 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 592.606155] audit_printk_skb: 10147 callbacks suppressed [ 592.606163] audit: type=1400 audit(1556851136.449:201254): avc: denied { net_admin } for pid=30385 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 592.606994] audit: type=1400 audit(1556851136.449:201255): avc: denied { net_admin } for pid=395 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 592.608073] audit: type=1400 audit(1556851136.449:201256): avc: denied { net_admin } for pid=372 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 592.608895] audit: type=1400 audit(1556851136.449:201257): avc: denied { net_admin } for pid=395 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 592.609970] audit: type=1400 audit(1556851136.449:201258): avc: denied { net_admin } for pid=372 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 592.610840] audit: type=1400 audit(1556851136.449:201259): avc: denied { net_admin } for pid=396 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 592.611891] audit: type=1400 audit(1556851136.449:201260): avc: denied { net_admin } for pid=376 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 592.612736] audit: type=1400 audit(1556851136.449:201261): avc: denied { net_admin } for pid=396 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 592.613722] audit: type=1400 audit(1556851136.449:201262): avc: denied { net_admin } for pid=376 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 592.615594] audit: type=1400 audit(1556851136.459:201263): avc: denied { net_admin } for pid=394 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 597.616847] audit_printk_skb: 10578 callbacks suppressed [ 597.616855] audit: type=1400 audit(1556851141.459:204815): avc: denied { net_admin } for pid=1281 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 597.618630] audit: type=1400 audit(1556851141.459:204816): avc: denied { net_admin } for pid=1281 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 597.620443] audit: type=1400 audit(1556851141.459:204817): avc: denied { net_admin } for pid=1250 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 597.620459] audit: type=1400 audit(1556851141.459:204818): avc: denied { net_admin } for pid=31262 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 597.622368] audit: type=1400 audit(1556851141.459:204819): avc: denied { net_admin } for pid=31262 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 597.627827] audit: type=1400 audit(1556851141.469:204822): avc: denied { net_admin } for pid=32075 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 597.627833] audit: type=1400 audit(1556851141.469:204821): avc: denied { net_admin } for pid=32104 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 597.629768] audit: type=1400 audit(1556851141.469:204823): avc: denied { net_admin } for pid=32104 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 597.629797] audit: type=1400 audit(1556851141.469:204824): avc: denied { net_admin } for pid=32075 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 597.629880] audit: type=1400 audit(1556851141.459:204820): avc: denied { net_admin } for pid=1288 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 602.626163] audit_printk_skb: 10556 callbacks suppressed [ 602.626171] audit: type=1400 audit(1556851146.469:208365): avc: denied { net_admin } for pid=2191 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 602.627812] audit: type=1400 audit(1556851146.469:208366): avc: denied { net_admin } for pid=2191 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 602.629336] audit: type=1400 audit(1556851146.469:208367): avc: denied { net_admin } for pid=2195 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 602.630001] audit: type=1400 audit(1556851146.469:208368): avc: denied { net_admin } for pid=32553 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 602.630436] audit: type=1400 audit(1556851146.469:208369): avc: denied { net_admin } for pid=27401 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 602.631986] audit: type=1400 audit(1556851146.469:208370): avc: denied { net_admin } for pid=2155 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 602.632325] audit: type=1400 audit(1556851146.469:208371): avc: denied { net_admin } for pid=27401 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 602.638200] audit: type=1400 audit(1556851146.479:208372): avc: denied { net_admin } for pid=32543 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 602.638206] audit: type=1400 audit(1556851146.479:208373): avc: denied { net_admin } for pid=31501 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 602.640146] audit: type=1400 audit(1556851146.479:208374): avc: denied { net_admin } for pid=32543 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 607.640757] audit_printk_skb: 10588 callbacks suppressed [ 607.640765] audit: type=1400 audit(1556851151.479:211934): avc: denied { net_admin } for pid=538 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 607.642706] audit: type=1400 audit(1556851151.479:211936): avc: denied { net_admin } for pid=23732 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:39:19 executing program 1: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x80ffffff]}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa, 0x703d}}}, 0xb8}}, 0x0) 02:39:19 executing program 0: ioprio_set$uid(0x3, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000013c0), &(0x7f0000001400)=0xc) getegid() socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$cgroup_procs(0xffffffffffffff9c, &(0x7f00000014c0)='cgroup.threads\x00', 0x2, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000001500)) fstat(0xffffffffffffffff, &(0x7f0000001540)) getegid() socket$netlink(0x10, 0x3, 0xf) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) getresuid(&(0x7f0000001700), &(0x7f0000001740), 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, 0x0) stat(0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001a40)={{{@in6=@ipv4={[], [], @local}, @in=@multicast2}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000001b40)=0xe8) socket$inet_udplite(0x2, 0x2, 0x88) ioprio_set$uid(0x3, 0x0, 0x0) 02:39:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f00000000c0)='ramfs\x00}\x823Hu\x1f\xce.2\xb1G\xc2r\xb4\x92s\xa3\x91\xfdX\xe2\x16\xddQ\xf4N\xcb\xc8\xaf\x9aM\x05\xf2;]c\xa1\xab\xa0)Ey2\x1c\xa93\x89\x83y\x8c\xb8%j\x14\xbc\x1f\x10[\x86\x13\xf8\x8f%nR\x14\'\xb75)\"\xb1w\xa39\xaf\xb5U\v\xe6T\x89\xab\xf1\x1a\x8bAxZ\xdf\x9e\xabY\xd59nae\xc0\xce\x97fy\xb5\xa1\xe6$>\xaf6\xae\xd3\x99&q=\x99\x7f\xec\f\x90\xe7\xbf\x1b#K\x91\x06\xd5\xf8\xfd\xc1\xcf`&;\xedny+\x02\xcd7T\x15\xa9\xd7^\\\x15c_\x04Q\xfc1\t\x85\xee\x95\xed\xfa\xe6\x03p\x99C^\x9bx\x14(}\xa6\bG\"\x97\xb0\x83h\xa2\xaf-\x9b\x84\xe0\xa3\x1e\xee\xf9\xe8\x97\xb9\xe6\x8eew\xbb\xe7\xdf\x19\xcf\xd1\xb0\x93\xc0\xd0\xf0\xf2\xbf\x13T\x89\"y\x89\x8f', 0x210000, 0x0) chdir(&(0x7f00000003c0)='./file0\x00') syz_execute_func(&(0x7f00000007c0)="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") [ 607.642713] audit: type=1400 audit(1556851151.479:211937): avc: denied { net_admin } for pid=538 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:39:19 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x4400, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1000000000000000, &(0x7f0000000080)=""/51, &(0x7f0000000100)=0x33) ioctl(0xffffffffffffffff, 0x1000008910, &(0x7f0000000140)="0adc1f123e123f319bd07078312f1a70f6b2727ed0d839abf5cf420ab95ef035e3a3ea97040eb6c525a803c60b7f4dee7deffc41a1b6a8f011264b2d2b23e7cdcd56168cbdd57fc859acd63b6ea41d7e272fc259724c8296e27fd86b40e5caaed855ad4624547128") openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f00000001c0)={0x1, 0x5051}, 0x8) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) dup2(0xffffffffffffffff, r0) 02:39:19 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0x8de7d8f023d06bd7}, 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r2 = fcntl$dupfd(r1, 0x0, r0) write$UHID_INPUT(r2, &(0x7f00000001c0)={0x9, "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", 0x1000}, 0xd018) 02:39:19 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x800, 0x0, 0xff, 0x1}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x1000000000021, &(0x7f00000005c0)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x380000, @empty}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000200)=@dstopts, 0x8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x400, @ipv4={[], [], @multicast1}, 0x7bac}, 0x1c) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f00000000c0)=@dstopts, 0x8) sendmsg(r1, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[{0xc}], 0xc}, 0x0) [ 607.642816] audit: type=1400 audit(1556851151.469:211932): avc: denied { net_admin } for pid=31715 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 607.644537] audit: type=1400 audit(1556851151.479:211938): avc: denied { net_admin } for pid=31715 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 607.646424] audit: type=1400 audit(1556851151.489:211939): avc: denied { net_admin } for pid=3102 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 607.647942] audit: type=1400 audit(1556851151.489:211940): avc: denied { net_admin } for pid=467 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:39:21 executing program 3: pause() syz_execute_func(&(0x7f0000000040)="3666440f50f564ff0941c3c4e1f97300660f3a8e16649c675100617b12e5c441dfd04b00c442019dccd211d46f") syz_execute_func(&(0x7f0000002080)="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") 02:39:21 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000000)=0x400100000001, 0x1c0c) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x40103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) gettid() r2 = dup2(r0, r0) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, 0x0, 0x0) ptrace(0x10, 0x0) fcntl$setstatus(r0, 0x4, 0x26ec) 02:39:21 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r1) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000340)={'syz'}, 0x0, 0x0, r2) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000200)={'syz'}, r1) 02:39:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x30, r2, 0x105, 0x0, 0x0, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x0, @bearer=@l2={'eth', 0x3a, 'syz_tun\x02'}}}}}, 0x30}}, 0x0) [ 607.648322] audit: type=1400 audit(1556851151.489:211941): avc: denied { net_admin } for pid=3102 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:39:22 executing program 2: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) ioctl$VT_DISALLOCATE(0xffffffffffffffff, 0x5608) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000640)='/dev/loop-control\x00', 0x101000, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) [ 607.649824] audit: type=1400 audit(1556851151.489:211942): avc: denied { net_admin } for pid=467 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 607.649832] audit: type=1400 audit(1556851151.489:211943): avc: denied { net_admin } for pid=3118 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 612.726632] audit_printk_skb: 4375 callbacks suppressed [ 612.726640] audit: type=1400 audit(1556851156.569:213409): avc: denied { net_admin } for pid=3766 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:39:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000, 0x0, 0x2}, 0xfeda) r1 = socket(0x1e, 0x805, 0x0) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900030000000000000226cc573c080000c03724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff0100e0ff000004af50d50700003ec0000000e3ad316a19830000803e1d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) [ 612.820504] audit: type=1400 audit(1556851156.659:213410): avc: denied { net_admin } for pid=31278 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 612.840589] audit: type=1400 audit(1556851156.679:213411): avc: denied { net_admin } for pid=29575 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 612.845530] audit: type=1400 audit(1556851156.689:213412): avc: denied { net_admin } for pid=32094 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 612.847436] audit: type=1400 audit(1556851156.689:213413): avc: denied { net_admin } for pid=32094 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 612.849269] audit: type=1400 audit(1556851156.689:213414): avc: denied { net_admin } for pid=3828 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 612.851007] audit: type=1400 audit(1556851156.689:213415): avc: denied { net_admin } for pid=3828 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 612.852851] audit: type=1400 audit(1556851156.689:213416): avc: denied { net_admin } for pid=3830 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 612.854664] audit: type=1400 audit(1556851156.689:213417): avc: denied { net_admin } for pid=3830 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 612.869849] audit: type=1400 audit(1556851156.709:213418): avc: denied { net_admin } for pid=1315 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 617.761729] audit_printk_skb: 1824 callbacks suppressed [ 617.761737] audit: type=1400 audit(1556851161.599:214027): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 617.809577] audit: type=1400 audit(1556851161.649:214028): avc: denied { sys_admin } for pid=2106 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 617.859015] audit: type=1400 audit(1556851161.679:214029): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 617.874025] audit: type=1400 audit(1556851161.709:214030): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 617.921403] audit: type=1400 audit(1556851161.759:214032): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 617.953828] audit: type=1400 audit(1556851161.789:214033): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 617.966929] audit: type=1400 audit(1556851161.719:214031): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 618.015933] audit: type=1400 audit(1556851161.859:214035): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 618.026687] audit: type=1400 audit(1556851161.869:214036): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 618.028715] audit: type=1400 audit(1556851161.869:214037): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 622.776243] audit_printk_skb: 1182 callbacks suppressed [ 622.776252] audit: type=1400 audit(1556851166.619:214431): avc: denied { sys_admin } for pid=2109 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 622.778066] audit: type=1400 audit(1556851166.619:214432): avc: denied { sys_admin } for pid=2109 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 622.783550] audit: type=1400 audit(1556851166.619:214433): avc: denied { sys_admin } for pid=2109 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 622.796378] audit: type=1400 audit(1556851166.629:214434): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 622.801849] audit: type=1400 audit(1556851166.639:214435): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 622.810985] audit: type=1400 audit(1556851166.649:214436): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 622.816549] audit: type=1400 audit(1556851166.659:214437): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:39:57 executing program 1: [ 622.842858] audit: type=1400 audit(1556851166.679:214438): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:39:57 executing program 3: creat(&(0x7f0000000140)='./bus\x00', 0x0) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f00000005c0)="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") write$selinux_attr(0xffffffffffffffff, 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r0, 0x0) 02:39:57 executing program 2: bpf$OBJ_GET_MAP(0x7, &(0x7f0000000080)={0x0, 0x0, 0x48}, 0x10) r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) sendmmsg(0xffffffffffffffff, &(0x7f0000001e80)=[{{&(0x7f00000002c0)=@in={0x2, 0x4e21, @broadcast}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="180000000000000000000000010000008307041700320800"], 0x18}}], 0x1, 0x0) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x810) r1 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x80080000004a0a) ioctl$BLKZEROOUT(r1, 0x127f, 0x0) 02:39:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0x6) ioctl$TCSETAF(r1, 0x5423, &(0x7f0000000080)) 02:39:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000001200)={0x10001, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x1, [{{0x2, 0x4e20, @multicast2}}]}, 0x110) 02:39:57 executing program 5: r0 = open(&(0x7f0000000080)='./file0\x00', 0x400000, 0x151) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{}, {0x0, 0x7530}}, 0x100) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000180)) sendmsg$IPVS_CMD_GET_DEST(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f00000001c0)={0x6, 0x81}) tkill(r3, 0x1000000000015) [ 622.850079] audit: type=1400 audit(1556851166.689:214439): avc: denied { net_admin } for pid=577 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:39:59 executing program 2: syz_execute_func(&(0x7f0000000080)="1c0cb5b598cd80f56962f5696200d9d9d017795bf9f2680c0000008fe9589b26c7e4c753fbc4e101edfec4427d82c4c17b2df9c4c2b90a23f4f2168f4808eebce00000802000c422b18cb60700000051c4a27d181eadeff265dc5f00f9575baaaa304545c4412956e6a841000f996ec6e4340f340f2c240f54635bdedcd4a1e1e0ef26400f0d186641e6bae30fad6736660fd2938c000000c4c1f913376666450f17720d2e440fc7bf0d00008066660f3a0b0865") 02:39:59 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000080)=[{&(0x7f00000000c0)="580000001400192340834b80040d8c560a067f0200ff810040010000000058000b4824ca945f64009400050028845a01000000000000008000f0fffeffe809000000fff5dd00000010000100070c0800004d750001400000", 0x58}], 0x1) [ 622.852058] audit: type=1400 audit(1556851166.689:214440): avc: denied { net_admin } for pid=577 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:39:59 executing program 5: seccomp(0x0, 0x0, 0x0) seccomp(0x1, 0x0, &(0x7f0000000180)={0x1, &(0x7f0000000380)=[{0x6, 0x0, 0x0, 0xffffff7f7fffffff}]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_execute_func(&(0x7f0000000ec0)="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") [ 627.786931] audit_printk_skb: 5752 callbacks suppressed [ 627.786940] audit: type=1400 audit(1556851171.629:216372): avc: denied { net_admin } for pid=5044 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 627.788786] audit: type=1400 audit(1556851171.629:216373): avc: denied { net_admin } for pid=5044 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:40:02 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000940)='/dev/uhid\x00', 0x802, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000980)={0xb, 'syz0\x00', 'syz0\x00', 'syz1\x00', 0xeec, 0x0, 0x0, 0x0, 0x0, 0x0, "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"}, 0x1004) sendfile(r0, r1, 0x0, 0x8000fffffffe) [ 627.789267] audit: type=1400 audit(1556851171.629:216374): avc: denied { net_admin } for pid=1352 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:40:04 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xf81U\ro}\xe6l\xf67\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5`\x8a\xaf\xf0\x1eyR4\f\xd6\xfd\x00\x00\x00\x00', 0x275a, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x2000002) fallocate(r0, 0x0, 0x0, 0x10ffff) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000000)) [ 627.789486] audit: type=1400 audit(1556851171.569:216329): avc: denied { net_admin } for pid=32147 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 627.789823] audit: type=1400 audit(1556851171.629:216375): avc: denied { net_admin } for pid=32093 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:40:06 executing program 5: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x5) ptrace$cont(0x20, r0, 0x0, 0x7) ptrace$cont(0x2000000000000009, r0, 0x0, 0x0) [ 627.791613] audit: type=1400 audit(1556851171.629:216376): avc: denied { net_admin } for pid=32093 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 627.796390] audit: type=1400 audit(1556851171.639:216377): avc: denied { net_admin } for pid=5070 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 627.799898] audit: type=1400 audit(1556851171.639:216379): avc: denied { net_admin } for pid=1376 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 627.799905] audit: type=1400 audit(1556851171.639:216380): avc: denied { net_admin } for pid=5071 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 627.801832] audit: type=1400 audit(1556851171.639:216381): avc: denied { net_admin } for pid=5071 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 632.795811] audit_printk_skb: 10844 callbacks suppressed [ 632.795820] audit: type=1400 audit(1556851176.639:220012): avc: denied { net_admin } for pid=5961 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 632.797280] audit: type=1400 audit(1556851176.639:220013): avc: denied { net_admin } for pid=5049 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 632.797578] audit: type=1400 audit(1556851176.639:220014): avc: denied { net_admin } for pid=5966 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 632.799186] audit: type=1400 audit(1556851176.639:220015): avc: denied { net_admin } for pid=5049 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 632.799335] audit: type=1400 audit(1556851176.639:220016): avc: denied { net_admin } for pid=5968 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 632.800950] audit: type=1400 audit(1556851176.639:220017): avc: denied { net_admin } for pid=32153 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 632.801259] audit: type=1400 audit(1556851176.639:220018): avc: denied { net_admin } for pid=6004 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 632.802021] audit: type=1400 audit(1556851176.639:220019): avc: denied { net_admin } for pid=32158 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 632.803128] audit: type=1400 audit(1556851176.639:220020): avc: denied { net_admin } for pid=6004 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 632.803923] audit: type=1400 audit(1556851176.639:220021): avc: denied { net_admin } for pid=5978 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 637.811543] audit_printk_skb: 10788 callbacks suppressed [ 637.811551] audit: type=1400 audit(1556851181.649:223642): avc: denied { net_admin } for pid=6935 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 637.813457] audit: type=1400 audit(1556851181.649:223644): avc: denied { net_admin } for pid=5490 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 637.813463] audit: type=1400 audit(1556851181.649:223643): avc: denied { net_admin } for pid=6935 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 637.816860] audit: type=1400 audit(1556851181.659:223645): avc: denied { net_admin } for pid=6933 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 637.818645] audit: type=1400 audit(1556851181.659:223646): avc: denied { net_admin } for pid=6933 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 637.820111] audit: type=1400 audit(1556851181.659:223647): avc: denied { net_admin } for pid=5500 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 637.820146] audit: type=1400 audit(1556851181.659:223648): avc: denied { net_admin } for pid=6934 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 637.822041] audit: type=1400 audit(1556851181.659:223649): avc: denied { net_admin } for pid=5500 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 637.822098] audit: type=1400 audit(1556851181.659:223650): avc: denied { net_admin } for pid=6934 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 637.829759] audit: type=1400 audit(1556851181.669:223651): avc: denied { net_admin } for pid=5582 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 642.816705] audit_printk_skb: 10801 callbacks suppressed [ 642.816713] audit: type=1400 audit(1556851186.659:227276): avc: denied { net_admin } for pid=7924 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 642.817019] audit: type=1400 audit(1556851186.659:227277): avc: denied { net_admin } for pid=7906 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 642.818602] audit: type=1400 audit(1556851186.659:227278): avc: denied { net_admin } for pid=7924 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 642.818912] audit: type=1400 audit(1556851186.659:227279): avc: denied { net_admin } for pid=7906 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 642.820188] audit: type=1400 audit(1556851186.659:227280): avc: denied { net_admin } for pid=6050 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 642.820866] audit: type=1400 audit(1556851186.659:227281): avc: denied { net_admin } for pid=7917 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 642.821749] audit: type=1400 audit(1556851186.659:227282): avc: denied { net_admin } for pid=7922 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 642.822744] audit: type=1400 audit(1556851186.659:227283): avc: denied { net_admin } for pid=7917 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 642.823272] audit: type=1400 audit(1556851186.659:227284): avc: denied { net_admin } for pid=7902 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 642.823607] audit: type=1400 audit(1556851186.659:227285): avc: denied { net_admin } for pid=7922 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 647.829983] audit_printk_skb: 10740 callbacks suppressed [ 647.829992] audit: type=1400 audit(1556851191.669:230882): avc: denied { net_admin } for pid=5333 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 647.830011] audit: type=1400 audit(1556851191.669:230883): avc: denied { net_admin } for pid=4718 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 647.831931] audit: type=1400 audit(1556851191.669:230885): avc: denied { net_admin } for pid=5333 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 647.831938] audit: type=1400 audit(1556851191.669:230884): avc: denied { net_admin } for pid=4718 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 647.837213] audit: type=1400 audit(1556851191.679:230886): avc: denied { net_admin } for pid=5300 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 647.839092] audit: type=1400 audit(1556851191.679:230887): avc: denied { net_admin } for pid=5300 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 647.839128] audit: type=1400 audit(1556851191.679:230888): avc: denied { net_admin } for pid=6488 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 647.840959] audit: type=1400 audit(1556851191.679:230889): avc: denied { net_admin } for pid=8843 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 647.841052] audit: type=1400 audit(1556851191.679:230890): avc: denied { net_admin } for pid=6488 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 647.842066] audit: type=1400 audit(1556851191.679:230891): avc: denied { net_admin } for pid=8846 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 652.838945] audit_printk_skb: 10644 callbacks suppressed [ 652.838953] audit: type=1400 audit(1556851196.679:234467): avc: denied { net_admin } for pid=9767 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 652.838971] audit: type=1400 audit(1556851196.679:234468): avc: denied { net_admin } for pid=9734 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 652.840880] audit: type=1400 audit(1556851196.679:234469): avc: denied { net_admin } for pid=9767 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:40:42 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, &(0x7f0000000040)=@req3={0x80000000}, 0xfeda) sendmsg(r0, &(0x7f0000000140)={&(0x7f00004f5000)=@generic={0x10000000001e, "0200000900030000000000000226cc573c080000c03724c71e14dd6a739effea1b48006be61ffe0000e103000000f8000004003f010039d8f986ff0100e0ff000004af50d50700003ec0000000e3ad316a19830000803e1d00e0dfcb24281e27800000100076c3979ac40000bd15020078a1dfd300881a8365b1b16d7436"}, 0x80, 0x0}, 0x0) 02:40:42 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r1) keyctl$search(0xa, r2, &(0x7f0000000080)='keyring\x00', &(0x7f0000000200)={'syz'}, r1) 02:40:42 executing program 5: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x2, 0x3, 0x1, &(0x7f00000000c0)) [ 652.840916] audit: type=1400 audit(1556851196.679:234470): avc: denied { net_admin } for pid=9734 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 652.842838] audit: type=1400 audit(1556851196.679:234471): avc: denied { net_admin } for pid=9766 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 652.842881] audit: type=1400 audit(1556851196.679:234472): avc: denied { net_admin } for pid=9723 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 652.844767] audit: type=1400 audit(1556851196.679:234473): avc: denied { net_admin } for pid=9766 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 652.844833] audit: type=1400 audit(1556851196.679:234474): avc: denied { net_admin } for pid=9723 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 652.846747] audit: type=1400 audit(1556851196.689:234475): avc: denied { net_admin } for pid=9765 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 652.846858] audit: type=1400 audit(1556851196.689:234476): avc: denied { net_admin } for pid=9738 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 657.889399] audit_printk_skb: 2769 callbacks suppressed [ 657.889407] audit: type=1400 audit(1556851201.729:235401): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 657.891279] audit: type=1400 audit(1556851201.729:235402): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 657.893192] audit: type=1400 audit(1556851201.729:235403): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 657.950438] audit: type=1400 audit(1556851201.789:235404): avc: denied { net_admin } for pid=10180 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 657.956200] audit: type=1400 audit(1556851201.799:235405): avc: denied { net_admin } for pid=10180 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 658.156091] audit: type=1400 audit(1556851201.999:235407): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 658.158159] audit: type=1400 audit(1556851201.999:235408): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 658.160001] audit: type=1400 audit(1556851201.999:235409): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 658.161796] audit: type=1400 audit(1556851201.999:235410): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 658.163551] audit: type=1400 audit(1556851201.999:235411): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.956408] audit_printk_skb: 1332 callbacks suppressed [ 662.956417] audit: type=1400 audit(1556851206.329:235823): avc: denied { net_admin } for pid=10679 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.958467] audit: type=1400 audit(1556851206.799:235862): avc: denied { net_admin } for pid=10679 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.959000] audit: type=1400 audit(1556851206.799:235863): avc: denied { net_admin } for pid=10652 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.959100] audit: type=1400 audit(1556851206.099:235788): avc: denied { net_admin } for pid=10698 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 662.999737] audit: type=1400 audit(1556851206.839:235864): avc: denied { net_admin } for pid=10647 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 663.001711] audit: type=1400 audit(1556851206.839:235865): avc: denied { net_admin } for pid=10647 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 663.003742] audit: type=1400 audit(1556851206.839:235866): avc: denied { net_admin } for pid=10660 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 663.006989] audit: type=1400 audit(1556851206.849:235867): avc: denied { net_admin } for pid=10662 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 663.008784] audit: type=1400 audit(1556851206.849:235868): avc: denied { net_admin } for pid=10662 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 663.010688] audit: type=1400 audit(1556851206.849:235869): avc: denied { net_admin } for pid=10670 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 667.971672] audit_printk_skb: 1365 callbacks suppressed [ 667.971681] audit: type=1400 audit(1556851211.809:236327): avc: denied { net_admin } for pid=11049 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 667.973653] audit: type=1400 audit(1556851211.809:236328): avc: denied { net_admin } for pid=11049 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 667.977272] audit: type=1400 audit(1556851211.819:236329): avc: denied { net_admin } for pid=11063 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 667.979103] audit: type=1400 audit(1556851211.819:236330): avc: denied { net_admin } for pid=11063 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 667.980975] audit: type=1400 audit(1556851211.819:236331): avc: denied { net_admin } for pid=11050 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 667.982818] audit: type=1400 audit(1556851211.819:236332): avc: denied { net_admin } for pid=11050 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 667.984666] audit: type=1400 audit(1556851211.819:236333): avc: denied { net_admin } for pid=11055 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 667.986955] audit: type=1400 audit(1556851211.829:236334): avc: denied { net_admin } for pid=11045 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 667.999480] audit: type=1400 audit(1556851211.839:236335): avc: denied { net_admin } for pid=11021 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 668.009449] audit: type=1400 audit(1556851211.849:236336): avc: denied { net_admin } for pid=11047 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 672.976299] audit_printk_skb: 7541 callbacks suppressed [ 672.976308] audit: type=1400 audit(1556851216.819:238853): avc: denied { net_admin } for pid=9871 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 672.976432] audit: type=1400 audit(1556851216.819:238854): avc: denied { net_admin } for pid=9949 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 672.978229] audit: type=1400 audit(1556851216.819:238855): avc: denied { net_admin } for pid=9871 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 672.978361] audit: type=1400 audit(1556851216.819:238856): avc: denied { net_admin } for pid=9949 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 672.979964] audit: type=1400 audit(1556851216.819:238857): avc: denied { net_admin } for pid=11785 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 672.980168] audit: type=1400 audit(1556851216.819:238858): avc: denied { net_admin } for pid=11153 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 672.981876] audit: type=1400 audit(1556851216.819:238859): avc: denied { net_admin } for pid=11785 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 672.982083] audit: type=1400 audit(1556851216.819:238860): avc: denied { net_admin } for pid=11153 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 672.983642] audit: type=1400 audit(1556851216.819:238861): avc: denied { net_admin } for pid=11121 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 672.983831] audit: type=1400 audit(1556851216.819:238862): avc: denied { net_admin } for pid=11777 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 677.987044] audit_printk_skb: 10731 callbacks suppressed [ 677.987053] audit: type=1400 audit(1556851221.829:242466): avc: denied { net_admin } for pid=12677 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 677.987214] audit: type=1400 audit(1556851221.829:242467): avc: denied { net_admin } for pid=11628 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 677.988959] audit: type=1400 audit(1556851221.829:242468): avc: denied { net_admin } for pid=12677 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 677.989134] audit: type=1400 audit(1556851221.829:242469): avc: denied { net_admin } for pid=11628 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 677.994302] audit: type=1400 audit(1556851221.829:242470): avc: denied { net_admin } for pid=11624 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 677.994381] audit: type=1400 audit(1556851221.829:242471): avc: denied { net_admin } for pid=11625 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 677.995632] audit: type=1400 audit(1556851221.839:242472): avc: denied { net_admin } for pid=12652 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 677.996720] audit: type=1400 audit(1556851221.839:242473): avc: denied { net_admin } for pid=11625 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 677.998553] audit: type=1400 audit(1556851221.839:242474): avc: denied { net_admin } for pid=12678 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 678.000003] audit: type=1400 audit(1556851221.839:242476): avc: denied { net_admin } for pid=12678 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 682.997891] audit_printk_skb: 10730 callbacks suppressed [ 682.997900] audit: type=1400 audit(1556851226.839:246076): avc: denied { net_admin } for pid=12027 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 682.999518] audit: type=1400 audit(1556851226.839:246077): avc: denied { net_admin } for pid=12027 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 682.999997] audit: type=1400 audit(1556851226.839:246078): avc: denied { net_admin } for pid=11323 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 683.001886] audit: type=1400 audit(1556851226.839:246079): avc: denied { net_admin } for pid=11323 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 683.001969] audit: type=1400 audit(1556851226.839:246080): avc: denied { net_admin } for pid=8691 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 683.002306] audit: type=1400 audit(1556851226.839:246081): avc: denied { net_admin } for pid=8688 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 683.003953] audit: type=1400 audit(1556851226.839:246082): avc: denied { net_admin } for pid=8691 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 683.004189] audit: type=1400 audit(1556851226.839:246083): avc: denied { net_admin } for pid=8688 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 683.006097] audit: type=1400 audit(1556851226.849:246084): avc: denied { net_admin } for pid=11388 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 683.006208] audit: type=1400 audit(1556851226.849:246085): avc: denied { net_admin } for pid=13571 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 688.005411] audit_printk_skb: 10654 callbacks suppressed [ 688.005419] audit: type=1400 audit(1556851231.839:249654): avc: denied { net_admin } for pid=12599 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 688.006200] audit: type=1400 audit(1556851231.849:249655): avc: denied { net_admin } for pid=11562 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 688.006432] audit: type=1400 audit(1556851231.849:249656): avc: denied { net_admin } for pid=11012 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 688.007311] audit: type=1400 audit(1556851231.849:249657): avc: denied { net_admin } for pid=12559 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 688.008105] audit: type=1400 audit(1556851231.849:249658): avc: denied { net_admin } for pid=11562 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 688.008205] audit: type=1400 audit(1556851231.799:249629): avc: denied { net_admin } for pid=12574 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 688.009180] audit: type=1400 audit(1556851231.849:249659): avc: denied { net_admin } for pid=12559 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 688.009615] audit: type=1400 audit(1556851231.849:249660): avc: denied { net_admin } for pid=11060 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 688.010056] audit: type=1400 audit(1556851231.849:249661): avc: denied { net_admin } for pid=12574 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 688.011049] audit: type=1400 audit(1556851231.849:249662): avc: denied { net_admin } for pid=12511 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 693.016898] audit_printk_skb: 10808 callbacks suppressed [ 693.016906] audit: type=1400 audit(1556851236.859:253289): avc: denied { net_admin } for pid=15360 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 693.018745] audit: type=1400 audit(1556851236.859:253290): avc: denied { net_admin } for pid=15360 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 693.019950] audit: type=1400 audit(1556851236.859:253291): avc: denied { net_admin } for pid=13031 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 693.020690] audit: type=1400 audit(1556851236.859:253292): avc: denied { net_admin } for pid=15358 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 693.021822] audit: type=1400 audit(1556851236.859:253293): avc: denied { net_admin } for pid=13031 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 693.022572] audit: type=1400 audit(1556851236.859:253294): avc: denied { net_admin } for pid=15358 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 693.023230] audit: type=1400 audit(1556851236.859:253295): avc: denied { net_admin } for pid=15386 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 693.025137] audit: type=1400 audit(1556851236.859:253296): avc: denied { net_admin } for pid=15386 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 693.025307] audit: type=1400 audit(1556851236.849:253288): avc: denied { net_admin } for pid=11837 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 693.027010] audit: type=1400 audit(1556851236.869:253298): avc: denied { net_admin } for pid=11837 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 698.052271] audit_printk_skb: 8704 callbacks suppressed [ 698.052279] audit: type=1400 audit(1556851241.889:256219): avc: denied { net_admin } for pid=12145 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 698.063463] audit: type=1400 audit(1556851241.899:256220): avc: denied { net_admin } for pid=8640 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 698.081172] audit: type=1400 audit(1556851241.919:256221): avc: denied { net_admin } for pid=16248 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 698.082953] audit: type=1400 audit(1556851241.739:256207): avc: denied { net_admin } for pid=13559 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 698.096111] audit: type=1400 audit(1556851241.939:256222): avc: denied { net_admin } for pid=16249 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 698.098045] audit: type=1400 audit(1556851241.939:256223): avc: denied { net_admin } for pid=16249 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 698.098484] audit: type=1400 audit(1556851241.939:256224): avc: denied { net_admin } for pid=13563 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 698.107965] audit: type=1400 audit(1556851241.949:256225): avc: denied { net_admin } for pid=16276 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 698.139030] audit: type=1400 audit(1556851241.979:256226): avc: denied { net_admin } for pid=13601 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 698.140962] audit: type=1400 audit(1556851241.979:256227): avc: denied { net_admin } for pid=13601 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 703.362121] audit_printk_skb: 693 callbacks suppressed [ 703.362130] audit: type=1400 audit(1556851247.199:256460): avc: denied { net_admin } for pid=23795 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 703.401959] audit: type=1400 audit(1556851247.239:256461): avc: denied { net_admin } for pid=14562 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 703.403928] audit: type=1400 audit(1556851247.239:256462): avc: denied { net_admin } for pid=14562 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 703.408858] audit: type=1400 audit(1556851247.249:256463): avc: denied { net_admin } for pid=14505 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 703.410727] audit: type=1400 audit(1556851247.249:256464): avc: denied { net_admin } for pid=14505 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 703.429822] audit: type=1400 audit(1556851247.269:256465): avc: denied { net_admin } for pid=16629 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 703.431770] audit: type=1400 audit(1556851247.269:256466): avc: denied { net_admin } for pid=16629 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 703.449330] audit: type=1400 audit(1556851247.289:256467): avc: denied { net_admin } for pid=12628 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 703.451194] audit: type=1400 audit(1556851247.289:256468): avc: denied { net_admin } for pid=12628 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 703.460200] audit: type=1400 audit(1556851247.299:256469): avc: denied { net_admin } for pid=12537 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:40:51 executing program 4: iopl(0xf471) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000240)="0adc22123c12359b26f36c75ae558a48fc23952db2db06ac2b0d5d25a97b7fe62ceff946672db768584118feb63915ede919fd0015adf51e2f4c81da0121462c2c3b1a10e9a2430a7d3bc1d1ad4e7848cd542620399a3503a711ac1db9bb860df34386425819073cb67fed78d7b5f1e4a76ad0fefd9dae0d59c79eacabd40257370235ff6d3a658407748aef0bd1c64d9a3c7825101865d77ab435d9802fe3cf04fede0a") r1 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@remote, 0x800, 0x0, 0x102, 0x100000000000001}, 0x20) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000400)=ANY=[@ANYBLOB="b8000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000036e00000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/112], 0xb8}}, 0x0) write$P9_RVERSION(r2, &(0x7f00000000c0)={0x13, 0x65, 0xffff, 0x5, 0x6, '9P2000'}, 0x13) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000040)={@mcast2={0xff, 0x3, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0x2, 0x1}, 0x20) 02:40:51 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket(0x0, 0x0, 0x0) fchmod(r0, 0x0) 02:40:51 executing program 0: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/checkreqprot\x00', 0x8000, 0x0) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000140)={0x2, &(0x7f00000000c0)=[{}, {}]}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000100)=[{r2}], 0x1, 0xfffffffffffffffa) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000040)) r3 = syz_open_pts(r2, 0x0) dup3(r3, r2, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000016) 02:40:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000640)='./file0\x00', &(0x7f0000000600)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000340)='./file1\x00', 0x0) write$binfmt_elf64(r1, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) creat(&(0x7f0000000380)='./file1/file0\x00', 0x0) clone(0x210007f6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) rename(&(0x7f0000000480)='./file0\x00', &(0x7f0000000440)='./file1/file0\x00') rename(&(0x7f0000000280)='./file1/file0\x00', &(0x7f0000000140)='./file0\x00') 02:40:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_CHILD_SUBREAPER(0x24, 0x1) [ 708.381449] audit_printk_skb: 764 callbacks suppressed [ 708.381457] audit: type=1400 audit(1556851252.219:256728): avc: denied { net_admin } for pid=16846 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 708.391599] audit: type=1400 audit(1556851252.209:256727): avc: denied { net_admin } for pid=16845 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 708.393774] audit: type=1400 audit(1556851252.229:256729): avc: denied { net_admin } for pid=16845 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:40:54 executing program 2: sendmmsg(0xffffffffffffffff, &(0x7f0000007e00)=[{{0x0, 0x0, 0x0, 0x38, &(0x7f0000000200)=ANY=[@ANYBLOB="1400000000000000297e44c00354a84f0b6f7ff1e67f52770000003b000000001995b3"], 0x14}}], 0x1, 0x0) r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000140)={0x2, 0x0, @broadcast}, &(0x7f0000000240)=0x10, 0x805) sendmmsg(r0, &(0x7f0000000840)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000280)="70ed1503c80be6881c7a9dc89e582f4e45dd9a7a2ad6fe72bd29d0e1b35a49a2083cef2419081f2aa0752b2a4b68b1e13b60222370f689c5e704c082b3c593df94b77d010f7d6be69ae1455446fd6ec5966154350e096992ea5957d95c932323653c49dab205866a5f730e00c4fd03291952b17d388d911efff8f601875f2f22e15c9342", 0x84}], 0x1, &(0x7f0000000380)=[{0xf0, 0x88, 0x8, "dc84a3ecad9b4e16c073f97f8a29e3b11f9f284261c11da635f68aced2a6aeef3365ac50a92960f3266f0fb553ef10450f19d8bd36c0750c6b0940c68325be2301b04e5886c226d224ce159bea5ef1bc4ebc372f59a6089e6ed93a9459c2ecb1e81ac99f8d55d1975f33a48441b6635a29adefc94cc7b68993000daa8a2ac3f5ace42368e5f240932cd3ee02b8db682854441426b318ae647463e3a8a24c8c5ba7e4807447b3a15fbf6b58401270c61ec1de29d0fea7c75267b7ee7fd78ad755638fca2ef553772a9346c98b268438d5503dd094817f75f6b7"}, {0x30, 0x10f, 0x4, "db04fb755b60c764dd206e845d3ad9f777295d3cf27b624a588c2d"}, {0x108, 0x13f, 0xfffffffffffffffb, "5d1d3d4f983deed07ad3c7c4766b8f87e22a05a9a20ad6c46a9d2b705eac1bdcafc15e7550989ddcd3b6355039f6a56a636a481dd785339b77843d3902360ef60c03b0bb491127cfa83228928229bc207f46406cb1ce705216e729c1908cdaa20deeba2bc01da5ca3d3e23a2976743085f5e0dac23805e2f7c744ce5ec7f891f094416dafb2c3cd34df5d378763d9566f5c258e6b76c57b37fd3639a89cbdfd359eb492731ce3bffc7f81bcb8cc44ec0d404f7be8d48b46264981f0e210f474279939339dcdb94a4300e68e356d27db3eab8fb6b80f2331f87d9c5e97147d760cc702824fb2f9ceb878b12cc8e01aae47f5e"}, {0x28, 0x6, 0x4, "10eb6bc106ec2e516c7b42106b839703aa87fc025b47"}, {0xb0, 0x1ff, 0x4, "d1ccd0bddd0a2f0c6949d26b61297387c66e8d2dfaeb066e9896d3d43e95805cd801fea6863a428d548b9883ca4da6db13929af9b04c0960d29ac827bd527533485c49c1a7018a570467dde4b9d0707fbf404e5e98e38bb44314daf39212b3dd765ce11d95ce2230ec686f43f771a40f81396d62cbd800cd510be8e8e0316a328c519e241bffee55db30ed132c25873ab4fa9df8789ef8c82d6e"}, {0xc0, 0x10e, 0x2, "9d50be7417dbb46f0f2349d217bb2b66e278867a6f08679333c6444c7e27c2c7106b141ae4669703307c1176cdeebce040b8dbc65aee0843c79d8393adc3880e4f5df2b55356fc2f33d5a0e741cf51d01b24a4e4a6d556350ebe87e25c4c402cdc15abbcafe2205ab77bd4290b761cdbec99e206a568ca1036498297f8e5004885a42348426114f91d2ccac2cecb0643eeb6e1b1cccb9748459c00b99fce70b0d7494989f8304c6d8fec33bd05bb2b86"}, {0x28, 0x10e, 0x0, "7c8c5c6f01acd3e87c299017cb0f43cb095848dac6293a6d"}, {0xb8, 0x113, 0x8, "b2068e3c1e1e15ea289cf93d117b635a27530b97de90cccd5fa8f11817d5bdb161ddc2e8572338bb9d936aadc7eed23972ef4d5abd4a743fd3465829bbf40fc85b36c5707cbc73b2b642555d66ab3d81e1e51c8420f622807197e56a67ca05dd56a048a72967e9a9015ab6005f922a47e16e978d050eeb3a69b5bb944e42f6af2e8348e46355017f784b06659ef1145a600f36f82847959defcf6afa1fa1ed1b016b428d03119411"}], 0x4a0}, 0x9}], 0x1, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @local, 0x4}, 0x5) sendmmsg(r1, &(0x7f0000000200), 0x348, 0xfffffffffffffffb) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x100, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x34, r3, 0x710, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x63}, @IPVS_SVC_ATTR_PROTOCOL={0x8}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x10}}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 02:40:54 executing program 3: mremap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000, 0x0, &(0x7f0000c87000/0x2000)=nil) socket$nl_netfilter(0x10, 0x3, 0xc) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/mls\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x30, r1, 0x208, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4108, 0x0, {0x14, 0x18, {0x7fff, @bearer=@udp='udp:syz0\x00'}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x8000}, 0x40000) r2 = accept$packet(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000040)=0x14) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={'veth0_to_team\x00', {0x2, 0x4e24, @rand_addr=0x6}}) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x400, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in=@loopback}}, {{}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) [ 708.396354] audit: type=1400 audit(1556851252.239:256730): avc: denied { net_admin } for pid=16850 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:40:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r2 = syz_open_procfs(0x0, &(0x7f00000004c0)='net/ipv6_route\x00') r3 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000080)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x4c, r3, 0x715, 0x70bd2c, 0x25dfdbff, {}, [@SEG6_ATTR_DST={0x14, 0x1, @empty}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x8}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4}, 0x8000) setsockopt$inet6_IPV6_ADDRFORM(0xffffffffffffffff, 0x29, 0x1, 0x0, 0x0) sendfile(r1, r2, 0x0, 0xcb49) [ 708.398116] audit: type=1400 audit(1556851252.239:256731): avc: denied { net_admin } for pid=16851 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 708.400390] audit: type=1400 audit(1556851252.239:256732): avc: denied { net_admin } for pid=16839 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:40:56 executing program 5: [ 708.500658] audit: type=1400 audit(1556851252.339:256733): avc: denied { net_admin } for pid=16849 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 708.500855] audit: type=1400 audit(1556851251.799:256725): avc: denied { net_admin } for pid=16880 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 708.524104] audit: type=1400 audit(1556851252.359:256734): avc: denied { sys_admin } for pid=2106 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 709.133080] audit: type=1400 audit(1556851252.969:256735): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 711.122623] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65381 sclass=netlink_xfrm_socket pig=17127 comm=syz-executor.4 [ 711.299867] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=65381 sclass=netlink_xfrm_socket pig=17128 comm=syz-executor.4 [ 713.408680] audit_printk_skb: 1065 callbacks suppressed [ 713.408688] audit: type=1400 audit(1556851257.249:257093): avc: denied { net_admin } for pid=16320 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 713.410684] audit: type=1400 audit(1556851257.249:257094): avc: denied { net_admin } for pid=16320 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 713.422716] audit: type=1400 audit(1556851257.259:257096): avc: denied { net_admin } for pid=16351 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 713.429633] audit: type=1400 audit(1556851257.269:257098): avc: denied { net_admin } for pid=16354 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 713.431507] audit: type=1400 audit(1556851257.269:257099): avc: denied { net_admin } for pid=16354 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 713.435122] audit: type=1400 audit(1556851257.269:257100): avc: denied { net_admin } for pid=16334 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 713.440312] audit: type=1400 audit(1556851257.279:257101): avc: denied { net_admin } for pid=16348 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 713.442202] audit: type=1400 audit(1556851257.279:257102): avc: denied { net_admin } for pid=16348 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:41:27 executing program 1: [ 713.454095] audit: type=1400 audit(1556851257.289:257103): avc: denied { net_admin } for pid=16334 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:41:27 executing program 2: 02:41:27 executing program 4: r0 = socket$inet6(0xa, 0x80806, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000001280)={0x4}, 0x8) close(r0) 02:41:27 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0x1, 0x100000083, 0x4, 0x100000001}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000380)={r0, &(0x7f00000001c0), 0x0, 0x2}, 0x20) 02:41:27 executing program 0: 02:41:27 executing program 5: 02:41:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)) ioctl$TIOCPKT(r0, 0x5420, &(0x7f00000001c0)=0xffffffff) read(r0, &(0x7f0000000280)=""/11, 0x7a0f) r1 = syz_open_pts(r0, 0x0) dup3(r1, r0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) 02:41:29 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r2 = fcntl$dupfd(r1, 0x0, r0) write$UHID_INPUT(r2, &(0x7f00000001c0)={0x9, "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", 0x100a}, 0xfdef) 02:41:29 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000000c0)='bridge0\x00', 0x10) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10) r2 = fcntl$dupfd(r1, 0x0, r0) write$UHID_INPUT(r2, &(0x7f00000001c0)={0x9, "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", 0x100a}, 0xfdef) 02:41:29 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000300)=0xfffffffeffffffff, 0x4) bind$inet6(r0, &(0x7f0000710fe4)={0xa, 0x4e21}, 0x1c) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = dup(r1) bind$inet6(r2, &(0x7f0000000140)={0xa, 0x4e21, 0x0, @ipv4={[], [], @local}}, 0x1c) [ 713.454215] audit: type=1400 audit(1556851257.249:257095): avc: denied { net_admin } for pid=16340 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:41:30 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0xfffffd27, &(0x7f0000000100)={&(0x7f0000000000)={0x2c, 0x35, 0x835, 0x0, 0x0, {0x2801, 0x1000000}, [@nested={0x18, 0x0, [@typed={0x14, 0x1, @ipv6=@loopback={0xf2ffff7f00000000}}]}]}, 0x2c}}, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, 0x0, 0x0) [ 718.416740] audit_printk_skb: 8472 callbacks suppressed [ 718.416749] audit: type=1400 audit(1556851262.259:259941): avc: denied { net_admin } for pid=17533 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 718.417016] audit: type=1400 audit(1556851262.259:259942): avc: denied { net_admin } for pid=18001 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 718.418667] audit: type=1400 audit(1556851262.259:259943): avc: denied { net_admin } for pid=17533 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 718.418912] audit: type=1400 audit(1556851262.259:259944): avc: denied { net_admin } for pid=18001 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:41:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000040)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffefe, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x10) r2 = dup2(r1, r1) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="53b4ba31b320172410941fe0e17da351bf0ef91d077fdb146ccc9cb936c35102e12b4a4dbb77b75cd7aea409ac4b56a3736fb6be9e11"], 0x1}, 0x1, 0x0, 0x0, 0xfffffffffffffffc}, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40002000}, 0xc, &(0x7f0000000240)={&(0x7f0000000380)=@ipv6_newroute={0xb8, 0x18, 0x800, 0x70bd29, 0x25dfdbfe, {0xa, 0x94, 0x94, 0x5, 0xff, 0x3, 0x0, 0xf, 0x2200}, [@RTA_METRICS={0x94, 0x8, "fa58c212256084310b56b52a723900c6c3e6350dd265e92f7808f5b0bac254ea00c832ae339105eef55483b27e446165ef2ff5c3d36116058db8ac49aefe241859a4118b7cd14d01964a3abdac6376e3099dabf11f9f9043fba43411bc2095418d6a41770632e876b355168290254f32c40b70dd54d067cbe3a67ab64afa279f8ecb2f0e86b8d0e9e247fe2f06"}, @RTA_EXPIRES={0x8, 0x17, 0xffffffff80000001}]}, 0xb8}, 0x1, 0x0, 0x0, 0x4000001}, 0x844) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f0000000440)={'filter\x00', 0x85, "c0b51f184513fe06bb38c2c8a00136dd768be7b32254eae5257b6a870ae682556b7963f7b570d43e15648813189c322bb60acdfc20f0f8438198f1d8cec14033dd3371844f28364c318c38d611a4ef667fe42cede118745c76ec21fd5cb53f51077e56963003363734f6ff2699107d8a0ba1d883d158e4808b0663634272ffb3fd1b797231"}, &(0x7f0000000500)=0xa9) r3 = dup2(r1, r1) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, 0x0, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000080)='trusted.overlay.nlink\x00', &(0x7f00000000c0)={'L-', 0x1dc}, 0x28, 0x3) sendmsg$IPVS_CMD_DEL_DAEMON(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)={0x14}, 0x14}}, 0x1) close(r2) [ 718.419360] audit: type=1400 audit(1556851262.259:259945): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 718.419918] audit: type=1400 audit(1556851262.259:259946): avc: denied { net_admin } for pid=16690 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 718.421316] audit: type=1400 audit(1556851262.259:259947): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 718.421389] audit: type=1400 audit(1556851262.259:259948): avc: denied { net_admin } for pid=16690 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 718.423333] audit: type=1400 audit(1556851262.259:259949): avc: denied { net_admin } for pid=17980 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 718.423457] audit: type=1400 audit(1556851262.259:259950): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 723.426779] audit_printk_skb: 10404 callbacks suppressed [ 723.426788] audit: type=1400 audit(1556851267.269:263436): avc: denied { net_admin } for pid=18848 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 723.428571] audit: type=1400 audit(1556851267.269:263437): avc: denied { net_admin } for pid=17963 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 723.428738] audit: type=1400 audit(1556851267.269:263438): avc: denied { net_admin } for pid=18854 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 723.430503] audit: type=1400 audit(1556851267.269:263439): avc: denied { net_admin } for pid=17963 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 723.436303] audit: type=1400 audit(1556851267.279:263441): avc: denied { net_admin } for pid=17518 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 723.438066] audit: type=1400 audit(1556851267.279:263442): avc: denied { net_admin } for pid=17518 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 723.438291] audit: type=1400 audit(1556851267.249:263431): avc: denied { net_admin } for pid=17967 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 723.439964] audit: type=1400 audit(1556851267.279:263443): avc: denied { net_admin } for pid=17972 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 723.440220] audit: type=1400 audit(1556851267.279:263444): avc: denied { net_admin } for pid=17967 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 723.441851] audit: type=1400 audit(1556851267.279:263445): avc: denied { net_admin } for pid=17972 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 728.440951] audit_printk_skb: 10685 callbacks suppressed [ 728.440959] audit: type=1400 audit(1556851272.279:267033): avc: denied { net_admin } for pid=17722 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 728.442890] audit: type=1400 audit(1556851272.279:267035): avc: denied { net_admin } for pid=17722 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 728.442896] audit: type=1400 audit(1556851272.279:267036): avc: denied { net_admin } for pid=17724 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 728.443351] audit: type=1400 audit(1556851272.279:267037): avc: denied { net_admin } for pid=16212 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 728.444657] audit: type=1400 audit(1556851272.279:267038): avc: denied { net_admin } for pid=19757 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 728.446625] audit: type=1400 audit(1556851272.289:267040): avc: denied { net_admin } for pid=17751 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 728.447005] audit: type=1400 audit(1556851272.289:267041): avc: denied { net_admin } for pid=19762 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 728.448550] audit: type=1400 audit(1556851272.289:267042): avc: denied { net_admin } for pid=19745 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 728.448906] audit: type=1400 audit(1556851272.289:267043): avc: denied { net_admin } for pid=19762 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 728.450474] audit: type=1400 audit(1556851272.289:267044): avc: denied { net_admin } for pid=19745 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 733.446691] audit_printk_skb: 10573 callbacks suppressed [ 733.446700] audit: type=1400 audit(1556851277.289:270594): avc: denied { net_admin } for pid=20648 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 733.446765] audit: type=1400 audit(1556851277.289:270595): avc: denied { net_admin } for pid=20623 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 733.448637] audit: type=1400 audit(1556851277.289:270596): avc: denied { net_admin } for pid=20648 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 733.448691] audit: type=1400 audit(1556851277.289:270597): avc: denied { net_admin } for pid=20623 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 733.450593] audit: type=1400 audit(1556851277.289:270598): avc: denied { net_admin } for pid=20649 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 733.450678] audit: type=1400 audit(1556851277.289:270599): avc: denied { net_admin } for pid=20624 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 733.452517] audit: type=1400 audit(1556851277.289:270600): avc: denied { net_admin } for pid=20649 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 733.452609] audit: type=1400 audit(1556851277.289:270601): avc: denied { net_admin } for pid=20624 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 733.453191] audit: type=1400 audit(1556851277.289:270602): avc: denied { net_admin } for pid=20577 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 733.454371] audit: type=1400 audit(1556851277.289:270603): avc: denied { net_admin } for pid=20582 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 738.460581] audit_printk_skb: 10778 callbacks suppressed [ 738.460590] audit: type=1400 audit(1556851282.299:274219): avc: denied { net_admin } for pid=18204 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 738.460926] audit: type=1400 audit(1556851282.299:274220): avc: denied { net_admin } for pid=17284 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:41:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup(r0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f00000000c0), &(0x7f0000000240)=0x14) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x406, r0) r4 = accept4$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14, 0x80000) ioctl$SIOCGSTAMP(r4, 0x8906, &(0x7f00000001c0)) r5 = socket$inet6(0xa, 0x400000000001, 0x6) fcntl$dupfd(r4, 0x0, r3) r6 = dup(r5) bind$inet6(r5, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000004, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r6, 0x6, 0x11, &(0x7f0000000080)=0x1, 0x4) r7 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r7, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x6, 0x0, 0x0, 0x1005}]}, 0x10) sendfile(r6, r7, 0x0, 0xfffffffd) connect$unix(r6, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) 02:41:41 executing program 4: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/enforce\x00', 0x20000, 0x0) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x30000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x338, r1, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x88, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_BEARER={0x30, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast1}}}}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1811}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x149}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfa15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x67}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xab3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e24, @multicast1}}}}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x401}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK={0x40, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x400}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100000001}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xffffffff7fffffff}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x81}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_BEARER={0xd8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x1, @empty, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7fffffff, @loopback, 0xfff}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x5, @ipv4={[], [], @rand_addr=0xfffffffffffff801}, 0x7fff}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3, @mcast1, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x370b024f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xc9}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER={0x88, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x4, @remote, 0x8}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x7fffffff, @empty, 0x1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @remote}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x1f, @mcast1, 0x5a9}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100000001}]}]}, 0x338}, 0x1, 0x0, 0x0, 0x24040011}, 0x8880) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/commit_pending_bools\x00', 0x1, 0x0) syz_execute_func(&(0x7f0000000000)="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") 02:41:41 executing program 0: syz_execute_func(&(0x7f0000000600)="260f93cea84a2ae92c431cd20f05bf14000000c4a37bf0c55c41e2e98fa838ee11c5660fde978fe97c8047d1e3e316b8c4014e4e0b5b5b016d7d14dec422adaf50e3c4e10bf8efc4e2c470c4c4c4a3bd4877f88ac483397fd300f7dcdc0fbcaff20f5d893b3b419538f6af3e6766f2ab38e366410f565e00ac1111c4c3214cb9a5604b19c2c443115da7010001000df0558171a30b8a82cf6ecf6e542c3d27f2a500a80dd4d48f6978d25debc481f87764008de3c0f526264788fef6a1dd7dbbbfdd88f65cf6c649bedcdca1c9660fd33b110f66474f383ae34ba29fb7e2") 02:41:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x400, 0x0) write$smack_current(r1, &(0x7f0000000280)='vmnet1em0&$,[\x00', 0xffffffffffffff17) fsetxattr$security_smack_transmute(r0, &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x1) r2 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @remote}, 0x1c) socket(0x10, 0x8000a, 0x3) sendto$inet6(r2, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e5d37149eb0f4a333726cf6d5b7647306559155f1c69d6bfd145b83576f2df4d85f271fd4119db923e2412c66dd954eb59dddc7e1fd286a83971b2ba1c63b4f99702cf91f3d1ecffb8ae189c79b403805e83650c251a564942896f205640c23b0cf51fe9bd931f54a343794710a9cd53cef20938edddb2bfa3c1f72f8e79e41e30fb8f9d314abd999ba396521b6c10bec7bc9d0745a80299342f5cf89eb9d94044258fbb18cec1cdbbc016a773d3ae41e3e30248e716fd0873d31454902cbe7dcf7d644dfadc255d99652b5ed5a5b1a75e3ad49cf80178678402e9d3a755d009889b2e6138f81dc02eedcc353aceb2f7781aea08aa91be7e1e2416ba3d555b1f2237f68c5d7dcfcb1b917c292a35d6d7e7cf2cb1dd6dba5a50ce55c4638d7d38cb7afd8da02f281ab69392bc6531eb03eb97c1d075e3342c244861d04bcad8991b8f588e48ad7fe218d2f5e604bb31c59241245b485210fe418af3d6377b59d5ab128497efeced38cc5036b1f34cb89674b5179219f34b9e8e1849695d7c23cce77eb8f038ef9f2cd69d1c9e2d6b46610adbadbdad857a77f59d38cb5120709716b87c52a48de249b231d7e39985b8b58094c0d7b4c6d1671a8ff9d2daaca94df2adcff6420077df0ddbc66d00b141ffc6e28bed09a19056e52a905a72c99a04af56b22da83135808ba2bfe87a39753447e78500d16bdad52d97df73d4852a79e7ec6910701b712cfd58c62b3ade86cf6ff0cd78719fa1ae81640381cb33f4f6b03c913e820cf9eb9b5cf7df9c878596c9ac9444cad118673fe339b4b7287b310ecff4742bfea2612d79d418293f0dfe14bc819c466473438ad71ea3b1386d17a9038b1f5a9285481500f84f4c7eabbf2eb071a101c69cce8e7495bda4c28a4e88f6a258abf58579c290eeb742b2678daab3ecc8c2bf97d89e89472901e254dd63ca7d918f8a7523161e29b28f64b285da7bb4a17d0ad734c321623e246bb0b5aaa08e8e7ac42b74ba83c70a8ca80068400be6adc3f4b01ba1050b54e6e4cf72fb567fbd27b74b2bfa7b7cabc6938851c13c6df7d5aaca79afd89b5e925379b959c7929ddfa3399695343f435772d70e5cfa3550377d23f50011ad5657e94c464cd43eb85496fd3b03bcb2d9278ceb432194d9893ffa747dfe85309f256c910e31e81dcd3cd8a13744fc2874737a2ff34bf8c89f15da7cc0853434117d744e30360b38ef1a063f9ee506f048e9980054e6c5c5688d04ece6067ac55bccc9a7773a2c4e21c039d153622130faff9fd675d64ad7284bd011b9b224713a721b4b731cf342357642a1a0bb846f5be443b7e72e9825b5f3a078c6ae09e4512dd93a5be1af13a49e6a33938509d3557aecf2356ac2329871b662a99cf3fd2486b064e7e6f90c1f8d632186a8bda338b02d45da4ea9041d42a23f40b93346dddc473a9f1a3d9f0285b7e48cbb87bc34d44b090a5e2aaf4764a10a44168f1719eff0b0d9bc1ce07750af4c21d0c67eae0799e91328c8b14869e4edd255a41735a2b1818aa9d3b271ba757af010ae6dbad89aa0d8f5b6f8ef3917adcedf247ffcf9ade407dfb5094", 0x534, 0xc001, 0x0, 0x0) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000300)={@remote}, 0x14) sendto$inet6(r2, &(0x7f00000003c0)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d5ca1babf5738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33cdd7300a74dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0x0) r3 = dup(r0) ioctl$EVIOCGBITSND(r3, 0x80404532, &(0x7f0000000180)=""/205) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet6_udp_int(r2, 0x11, 0x1, &(0x7f0000000000), 0x4) 02:41:41 executing program 3: clone(0x20040200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f0000000040)='./file0\x00', 0x1040, 0x0) r0 = gettid() execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000066000)={0x0, 0x12}, &(0x7f00009b1ffc)) r1 = syz_open_procfs(0x0, &(0x7f0000000280)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1\x01$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e){\x9df\xa7\x14R\xb9,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)='\n') r2 = syz_open_procfs(0x0, &(0x7f0000000240)='syscall\x00') sendfile(r1, r2, 0x0, 0x1) utime(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={0x100, 0x3}) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) tkill(r0, 0x1000000000015) [ 738.462490] audit: type=1400 audit(1556851282.299:274221): avc: denied { net_admin } for pid=18204 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:41:45 executing program 0: r0 = timerfd_create(0x0, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) setsockopt$inet6_opts(r1, 0x29, 0x39, &(0x7f0000000140)=@dstopts={0x3c, 0x9, [], [@jumbo={0xc2, 0x4, 0x29}, @hao={0xc9, 0x10, @mcast1}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, [], 0x17}}, @hao={0xc9, 0x10, @rand_addr="709c561c490599ae8dcdc4978c0ceb79"}, @hao={0xc9, 0x10, @ipv4={[], [], @loopback}}]}, 0x58) readv(r0, &(0x7f00000002c0)=[{&(0x7f00000000c0)=""/14, 0xe}], 0x1) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x77359400}, {0x0, 0x1c9c380}}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x80000003, 0x8031, 0xffffffffffffffff, 0x0) clone(0x20002100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mlockall(0x5) r2 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000300)=""/4096, &(0x7f0000000080)=0x1000) syz_execute_func(0x0) [ 738.462802] audit: type=1400 audit(1556851282.299:274222): avc: denied { net_admin } for pid=17284 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 738.468511] audit: type=1400 audit(1556851282.309:274223): avc: denied { net_admin } for pid=19293 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 738.468835] audit: type=1400 audit(1556851282.309:274224): avc: denied { net_admin } for pid=18209 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 738.470438] audit: type=1400 audit(1556851282.309:274225): avc: denied { net_admin } for pid=19293 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 738.471858] audit: type=1400 audit(1556851282.309:274227): avc: denied { net_admin } for pid=17300 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 738.474121] audit: type=1400 audit(1556851282.199:274149): avc: denied { net_admin } for pid=21535 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 738.475334] audit: type=1400 audit(1556851282.309:274228): avc: denied { net_admin } for pid=21539 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 743.468078] audit_printk_skb: 10585 callbacks suppressed [ 743.468086] audit: type=1400 audit(1556851287.309:277781): avc: denied { net_admin } for pid=19681 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 743.469451] audit: type=1400 audit(1556851287.309:277782): avc: denied { net_admin } for pid=19721 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 743.469538] audit: type=1400 audit(1556851287.309:277783): avc: denied { net_admin } for pid=19681 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 743.471197] audit: type=1400 audit(1556851287.309:277784): avc: denied { net_admin } for pid=19721 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 743.474367] audit: type=1400 audit(1556851287.309:277785): avc: denied { net_admin } for pid=19784 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 743.480631] audit: type=1400 audit(1556851287.319:277786): avc: denied { net_admin } for pid=19741 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 743.480637] audit: type=1400 audit(1556851287.319:277787): avc: denied { net_admin } for pid=19760 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 743.482567] audit: type=1400 audit(1556851287.319:277788): avc: denied { net_admin } for pid=19760 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 743.482580] audit: type=1400 audit(1556851287.319:277789): avc: denied { net_admin } for pid=19741 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 743.488053] audit: type=1400 audit(1556851287.329:277790): avc: denied { net_admin } for pid=19761 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 748.500976] audit_printk_skb: 2470 callbacks suppressed [ 748.500984] audit: type=1400 audit(1556851292.339:278617): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 748.523045] audit: type=1400 audit(1556851292.339:278618): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 748.618907] audit: type=1400 audit(1556851292.459:278619): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 748.747287] audit: type=1400 audit(1556851292.589:278620): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 748.750406] audit: type=1400 audit(1556851292.589:278621): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 748.752239] audit: type=1400 audit(1556851292.589:278622): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 748.763110] audit: type=1400 audit(1556851292.599:278623): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 748.764937] audit: type=1400 audit(1556851292.599:278624): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 748.766494] audit: type=1400 audit(1556851292.609:278625): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 748.768291] audit: type=1400 audit(1556851292.609:278626): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 753.632001] audit_printk_skb: 420 callbacks suppressed [ 753.632014] audit: type=1400 audit(1556851297.469:278767): avc: denied { net_raw } for pid=23554 comm="syz-executor.3" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 753.709517] audit: type=1400 audit(1556851297.549:278768): avc: denied { net_admin } for pid=23554 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 753.718240] audit: type=1400 audit(1556851297.559:278769): avc: denied { net_raw } for pid=23554 comm="syz-executor.3" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 753.797333] audit: type=1400 audit(1556851297.639:278770): avc: denied { net_raw } for pid=23554 comm="syz-executor.3" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 754.399490] audit: type=1400 audit(1556851298.239:278771): avc: denied { net_admin } for pid=18251 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 754.401441] audit: type=1400 audit(1556851298.239:278772): avc: denied { net_admin } for pid=18251 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 754.538127] audit: type=1400 audit(1556851298.379:278773): avc: denied { net_admin } for pid=23561 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 754.541183] audit: type=1400 audit(1556851298.379:278774): avc: denied { net_admin } for pid=23561 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 754.959271] audit: type=1400 audit(1556851298.799:278775): avc: denied { net_admin } for pid=19446 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 754.961021] audit: type=1400 audit(1556851298.799:278776): avc: denied { net_admin } for pid=19446 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 758.810170] audit_printk_skb: 912 callbacks suppressed [ 758.810179] audit: type=1400 audit(1556851302.649:279081): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 759.002873] audit: type=1400 audit(1556851302.839:279082): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 759.004810] audit: type=1400 audit(1556851302.839:279083): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 759.011722] audit: type=1400 audit(1556851302.849:279084): avc: denied { sys_admin } for pid=23908 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 759.013021] audit: type=1400 audit(1556851302.849:279085): avc: denied { sys_admin } for pid=23908 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 759.016854] audit: type=1400 audit(1556851302.859:279086): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 759.033777] audit: type=1400 audit(1556851302.869:279087): avc: denied { net_admin } for pid=19925 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 759.039821] audit: type=1400 audit(1556851302.879:279088): avc: denied { net_admin } for pid=18449 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 759.039827] audit: type=1400 audit(1556851302.879:279089): avc: denied { net_admin } for pid=19890 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 759.041763] audit: type=1400 audit(1556851302.879:279090): avc: denied { net_admin } for pid=18449 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 763.817064] audit_printk_skb: 5997 callbacks suppressed [ 763.817073] audit: type=1400 audit(1556851307.659:281099): avc: denied { net_admin } for pid=24434 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 763.817334] audit: type=1400 audit(1556851307.659:281100): avc: denied { net_admin } for pid=23576 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 763.818987] audit: type=1400 audit(1556851307.659:281101): avc: denied { net_admin } for pid=24434 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 763.819209] audit: type=1400 audit(1556851307.659:281102): avc: denied { net_admin } for pid=23576 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 763.820920] audit: type=1400 audit(1556851307.659:281103): avc: denied { net_admin } for pid=24436 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 763.821303] audit: type=1400 audit(1556851307.659:281104): avc: denied { net_admin } for pid=24016 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 763.822824] audit: type=1400 audit(1556851307.659:281105): avc: denied { net_admin } for pid=24436 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 763.823169] audit: type=1400 audit(1556851307.659:281106): avc: denied { net_admin } for pid=24016 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 763.824744] audit: type=1400 audit(1556851307.659:281107): avc: denied { net_admin } for pid=24440 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 763.827296] audit: type=1400 audit(1556851307.669:281109): avc: denied { net_admin } for pid=24025 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 768.826787] audit_printk_skb: 10292 callbacks suppressed [ 768.826796] audit: type=1400 audit(1556851312.669:284563): avc: denied { net_admin } for pid=25330 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 768.826930] audit: type=1400 audit(1556851312.669:284564): avc: denied { net_admin } for pid=25307 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 768.828780] audit: type=1400 audit(1556851312.669:284565): avc: denied { net_admin } for pid=25330 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 768.828858] audit: type=1400 audit(1556851312.669:284566): avc: denied { net_admin } for pid=25307 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 768.829204] audit: type=1400 audit(1556851312.669:284567): avc: denied { net_admin } for pid=25289 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 768.830163] audit: type=1400 audit(1556851312.669:284568): avc: denied { net_admin } for pid=25264 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 768.831071] audit: type=1400 audit(1556851312.669:284569): avc: denied { net_admin } for pid=25289 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 768.832061] audit: type=1400 audit(1556851312.669:284570): avc: denied { net_admin } for pid=25275 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 768.833056] audit: type=1400 audit(1556851312.669:284571): avc: denied { net_admin } for pid=25313 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 768.834060] audit: type=1400 audit(1556851312.669:284572): avc: denied { net_admin } for pid=25335 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 773.837096] audit_printk_skb: 10023 callbacks suppressed [ 773.837104] audit: type=1400 audit(1556851317.679:287949): avc: denied { net_admin } for pid=26136 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 773.839027] audit: type=1400 audit(1556851317.679:287950): avc: denied { net_admin } for pid=26186 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 773.840014] audit: type=1400 audit(1556851317.679:287951): avc: denied { net_admin } for pid=24284 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 773.840919] audit: type=1400 audit(1556851317.679:287952): avc: denied { net_admin } for pid=26186 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 773.841898] audit: type=1400 audit(1556851317.679:287953): avc: denied { net_admin } for pid=24284 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 773.847375] audit: type=1400 audit(1556851317.689:287954): avc: denied { net_admin } for pid=24238 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 773.849263] audit: type=1400 audit(1556851317.689:287955): avc: denied { net_admin } for pid=24238 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 773.849284] audit: type=1400 audit(1556851317.689:287956): avc: denied { net_admin } for pid=24319 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 773.851016] audit: type=1400 audit(1556851317.689:287957): avc: denied { net_admin } for pid=24319 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 773.854115] audit: type=1400 audit(1556851317.689:287958): avc: denied { net_admin } for pid=24285 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 778.847499] audit_printk_skb: 10514 callbacks suppressed [ 778.847508] audit: type=1400 audit(1556851322.689:291480): avc: denied { net_admin } for pid=24458 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 778.849344] audit: type=1400 audit(1556851322.689:291481): avc: denied { net_admin } for pid=24458 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 778.849569] audit: type=1400 audit(1556851322.679:291479): avc: denied { net_admin } for pid=25327 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 778.850294] audit: type=1400 audit(1556851322.689:291482): avc: denied { net_admin } for pid=25359 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 778.851465] audit: type=1400 audit(1556851322.689:291483): avc: denied { net_admin } for pid=25327 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 778.852144] audit: type=1400 audit(1556851322.689:291484): avc: denied { net_admin } for pid=25364 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 778.852163] audit: type=1400 audit(1556851322.689:291485): avc: denied { net_admin } for pid=25359 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 778.852559] audit: type=1400 audit(1556851322.689:291486): avc: denied { net_admin } for pid=27017 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 778.854469] audit: type=1400 audit(1556851322.689:291487): avc: denied { net_admin } for pid=27058 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 778.854870] audit: type=1400 audit(1556851322.689:291488): avc: denied { net_admin } for pid=25392 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 783.860941] audit_printk_skb: 10564 callbacks suppressed [ 783.860949] audit: type=1400 audit(1556851327.699:295036): avc: denied { net_admin } for pid=25809 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 783.860960] audit: type=1400 audit(1556851327.699:295037): avc: denied { net_admin } for pid=24725 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 783.862878] audit: type=1400 audit(1556851327.699:295038): avc: denied { net_admin } for pid=25809 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 783.862896] audit: type=1400 audit(1556851327.699:295039): avc: denied { net_admin } for pid=24725 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 783.864424] audit: type=1400 audit(1556851327.699:295040): avc: denied { net_admin } for pid=24738 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 783.865784] audit: type=1400 audit(1556851327.709:295041): avc: denied { net_admin } for pid=27955 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 783.867690] audit: type=1400 audit(1556851327.709:295042): avc: denied { net_admin } for pid=27955 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 783.867969] audit: type=1400 audit(1556851327.709:295043): avc: denied { net_admin } for pid=23999 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 783.869639] audit: type=1400 audit(1556851327.709:295044): avc: denied { net_admin } for pid=27957 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 783.869865] audit: type=1400 audit(1556851327.709:295045): avc: denied { net_admin } for pid=23999 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 788.866687] audit_printk_skb: 10372 callbacks suppressed [ 788.866695] audit: type=1400 audit(1556851332.709:298521): avc: denied { net_admin } for pid=28817 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 788.868557] audit: type=1400 audit(1556851332.709:298522): avc: denied { net_admin } for pid=28744 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 788.869968] audit: type=1400 audit(1556851332.709:298523): avc: denied { net_admin } for pid=26276 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 788.870300] audit: type=1400 audit(1556851332.709:298524): avc: denied { net_admin } for pid=28768 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 788.871889] audit: type=1400 audit(1556851332.709:298525): avc: denied { net_admin } for pid=26276 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 788.872031] audit: type=1400 audit(1556851332.709:298526): avc: denied { net_admin } for pid=28774 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 788.873413] audit: type=1400 audit(1556851332.709:298527): avc: denied { net_admin } for pid=28753 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 788.874244] audit: type=1400 audit(1556851332.709:298528): avc: denied { net_admin } for pid=28743 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 788.880655] audit: type=1400 audit(1556851332.719:298530): avc: denied { net_admin } for pid=26286 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 788.880693] audit: type=1400 audit(1556851332.719:298531): avc: denied { net_admin } for pid=24968 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 793.892979] audit_printk_skb: 3329 callbacks suppressed [ 793.892988] audit: type=1400 audit(1556851337.729:299644): avc: denied { net_admin } for pid=29498 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 793.895061] audit: type=1400 audit(1556851337.729:299645): avc: denied { net_admin } for pid=29498 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 794.024467] audit: type=1400 audit(1556851337.859:299646): avc: denied { net_admin } for pid=29477 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 794.056411] audit: type=1400 audit(1556851337.899:299647): avc: denied { net_admin } for pid=29477 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 794.057417] audit: type=1400 audit(1556851337.899:299648): avc: denied { net_admin } for pid=29496 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 794.090205] audit: type=1400 audit(1556851337.929:299649): avc: denied { net_admin } for pid=24071 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 794.144368] audit: type=1400 audit(1556851337.979:299650): avc: denied { net_admin } for pid=29562 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 794.156884] audit: type=1400 audit(1556851337.999:299651): avc: denied { net_admin } for pid=29562 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 794.231272] audit: type=1400 audit(1556851338.069:299652): avc: denied { net_admin } for pid=27108 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 794.279447] audit: type=1400 audit(1556851338.119:299653): avc: denied { net_admin } for pid=24465 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 801.595035] audit_printk_skb: 693 callbacks suppressed [ 801.595043] audit: type=1400 audit(1556851345.429:299886): avc: denied { net_admin } for pid=29996 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 801.633104] audit: type=1400 audit(1556851345.439:299887): avc: denied { net_admin } for pid=22202 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 801.677166] audit: type=1400 audit(1556851345.499:299888): avc: denied { net_admin } for pid=29996 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 801.736997] audit: type=1400 audit(1556851345.579:299889): avc: denied { net_admin } for pid=28452 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 801.763959] audit: type=1400 audit(1556851345.599:299890): avc: denied { net_admin } for pid=29999 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 801.765876] audit: type=1400 audit(1556851345.609:299891): avc: denied { net_admin } for pid=29999 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:42:25 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f00000001c0)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) 02:42:25 executing program 4: r0 = socket$inet6(0xa, 0xa, 0x8824) unshare(0x40040000) write$binfmt_aout(r0, &(0x7f00000002c0)={{0x0, 0x2, 0x2a7e9d83, 0x9e, 0xfd, 0x3, 0x2a8, 0x8}, "67eb3465cecb1b86afe793b30a4cf721bf5e1db98391ef4b4a3ffc9b1299ce5038975059aa25807b298c8a4b144b3a0250b580e0b40fd404a92059d5b7072f979d46435c1991b8b5ff14a3a51bc7c66aa64076421a85d213c276e26b806ba39fe33318306c6277146a3fd3d751ef876f59b2d89c76917c5118534ef311fe56ecb3a4c3303ce9c9628a9893f001145ff3894a8eca5158f8a4647ba03b74fa07c368a84d4ae524500cbf4e4aa3a6c52c5d4b4259cfea7514a6681985a747980528105411deef0dbb5b9611751006cdce67739d8f11a4269f08824c519d952b3ae289b30f2ccfa48a8a", [[], [], [], [], [], [], [], [], [], []]}, 0xb08) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90x0) sched_getscheduler(r2) 02:43:01 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) clone(0x2102001ff6, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000140)) fcntl$setpipe(r0, 0x5, 0x400008) 02:43:01 executing program 0: r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000240), 0x8, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x20) r2 = epoll_create1(0x8000000000000000) r3 = creat(&(0x7f0000000180)='./file0\x00', 0x66) ioctl$EVIOCGRAB(r3, 0x40044590, &(0x7f0000000000)=0xfffffffffffffffa) getsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000380)={@empty, 0x0}, &(0x7f0000000440)=0x14) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000480)={@mcast2, r4}, 0x14) ioctl$SNDRV_TIMER_IOCTL_START(r3, 0x54a0) openat$urandom(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x10000, 0x0) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f00000001c0)={0x7d, 0x4, 0x8000}, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000300)='illinois\x00', 0x9) socket$packet(0x11, 0x2, 0x300) writev(r0, &(0x7f0000000100)=[{&(0x7f0000000080), 0x268}, {&(0x7f00000003c0)="e696a5c0e2e62fc0a3515255c0d1a0a712d02aeec475c00c09da3ddc875e5de236c4f9054ffafacfdd6199f6ad06ad28932b988f9fe49f0b769377d536b5fea4a5070a6dff60eb7fa2302fd6efe73311474a777e48bd4e6c23", 0x59}], 0x2) fstatfs(r2, &(0x7f0000000280)=""/122) openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x0, 0x0) ioctl$KDSKBSENT(r3, 0x4b49, &(0x7f0000000080)) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 816.623539] audit: type=1400 audit(1556851360.459:307058): avc: denied { net_admin } for pid=30405 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 816.624707] audit: type=1400 audit(1556851360.459:307059): avc: denied { net_admin } for pid=31883 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:43:02 executing program 5: r0 = socket$inet6(0xa, 0xa, 0x8824) unshare(0x40040000) write$binfmt_aout(r0, &(0x7f00000002c0)={{0x0, 0x2, 0x2a7e9d83, 0x9e, 0xfd, 0x3, 0x2a8, 0x8}, "67eb3465cecb1b86afe793b30a4cf721bf5e1db98391ef4b4a3ffc9b1299ce5038975059aa25807b298c8a4b144b3a0250b580e0b40fd404a92059d5b7072f979d46435c1991b8b5ff14a3a51bc7c66aa64076421a85d213c276e26b806ba39fe33318306c6277146a3fd3d751ef876f59b2d89c76917c5118534ef311fe56ecb3a4c3303ce9c9628a9893f001145ff3894a8eca5158f8a4647ba03b74fa07c368a84d4ae524500cbf4e4aa3a6c52c5d4b4259cfea7514a6681985a747980528105411deef0dbb5b9611751006cdce67739d8f11a4269f08824c519d952b3ae289b30f2ccfa48a8a", [[], [], [], [], [], [], [], [], [], []]}, 0xb08) r1 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t\xa8M*\xe4;~y\xb2\xb3\xba\b;/\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w^2\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf0\xc1\xfb\xae\xb5\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93\x7f\xbc\x1a\x7f\xa90x0}) write$FUSE_LK(r0, &(0x7f0000000540)={0x28, 0x0, 0x4, {{0x2, 0x3ff, 0x1, r3}}}, 0x28) 02:43:47 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup\x00\x1e\xa7\xd4\xea.G\x1c\x99\xa6\xb45\xfd\xbe\x80l(i\xe0\xda\x1e\xb5\x94\xf1y\xc8.\xe2c\xb8\xa0\xe8\xe2\xa2(\\y<;\xc1$<\x8c5B?1\xe3\xba\x96Z/\xf5\xce0\xc5\x86\xcf\xad\'v\xbe\xfb\xb6\x8e\xb7>\xd6#\xe1^\xa5\xfb\xfe\x03\xf8\vH\x92<~y\xc5o\xb7\'V\xc8\\fP\xc6\x12\vd\xf1\xf4N\xd6\x13\x8b\xf6I\x17p\x91\"!\x80\xa8=\xa1\xa0\xda\xbb\xae\xf4\x96\xfb\xaf\xdf\x06\xf4\x93\t3\x97\x17\x97\xa6\x0f\x9a\fT\x8e\x81`\xdd\xb3+\x17g\xcb\xcc\xd76H\xc9\xfa\x97\xe7\xe6\xa7)\x10\x17+\xc6\xb5\xb7\xe6\xe4P\x04*v=\x7f,\x1fB\x96?\xf0\\sE\xa8k\xfe\xef\xd0F\xdc\xbf,\xb2\x90\xc0\x86\x86WZ.\x02\xc2\xb4\xa6\xf31\xcc\xc1\xd9\rH\x93\x1a\xa7\xf1\xe4*\x9cl\x06\xff\x91!\b\x7f\xe4\xc6\xacWX\x95h\x94:6\x90r\x93_\xef(\x8f\ni\xb4\a\xa7\x15xF\xbb\xfasFo6~\xcc\x9ej\xa1\xb2X\x8e)?\xf5\xe8\xf2)\xb6\xc4P\x1f\xbc\xf1-4\x81\xf7\xaf\x02\x83\x05\"\xe7b\xc1\x15\xab\xa2\xc7\x8ei<\xde8\xe9MH:\xe9\xce\xe4\xa7l]\x9a\f\xef\x8a\xa8\x1e\xda\xf4\x92\\}d\xffnh%\xcf8\xf3\x84\x19\xbc\xcex\x13\xaa\xc2\xa6]\x1ck\bd\b\x15%\xb7\x107ra?\x8bI\xf4\xd7\xe6\xf5\xa8\x90\xab\xc9{[\xcc\xbe\x03Mi\x13\x03\x84,\x9d\xca\xcc\x85\xb1\xbf\x8b', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c12060093d0703fc29a698545fb0900d4b67c6ac26e3c2d0fbe103c651bbdddedcd51e93a4ede6bc112e599e546ea4231131655319aac80e952fa9d8485ef243acada6a1372ffdaaf6977a695bd5df369a5d28317435811a31bef13bfbccc20dba101762a65bea6268f92b42024f65b90024587fd5f00199dd8780a8f3d0442ba7687f69b05ebaa75b8cbe50900000000000000efeee1a13b02e6904368ac100e2d05faa2d78ba2466d88781a71bf07e5605b") r2 = openat$cgroup_procs(r0, &(0x7f00000002c0)='cgroup.procs\x00\x10\xb9\x04\x00&K\x8d\x91\xd35\x00\x00\x00\x87<\xf5\x9b\xe7\xbf\xc8\xc6\x99\x01EtO\xcb\xf5\x8fm\v\xab\to\x1fw\"\x04\xac\x93\"\xa55C6g\x0f\x915l >3\b\x93\x13\xbf\x11]\xe6\b\xf4\x8f\xdf\xfa\xbfW\xb3\xc4\x02\x14\xfc\x9e$\xcfS\"\x06\xee\xc1\xb8\xd6:\t\x97\x03\xa7.\xf9\xae\x06\"\a\xf7\xc6w\x8b\x81\x01\x00\x00\x00\xb0\xc0W\xb7\x10\x97\xba\xdd\x94\xfc\\\xe3\x15\x00\x10\x00\x007>\x1c\xf0\"Q\xe8n\xc9#~\x92KH\x1f!\xa6\x15\xb1/\x97\xe8\n\x0e\x11u\x89^\x03\xd4\xc0y7\xd1\xc4\xfbG\xe0b\x9e\t\x00\x00\x00\x00\x00\x00\xc6\x06\aPl\xef\x9c-U[\xd5\xe11n N\xbc\xcf\x175cbR\xc8a\xe5\xde\x9ey\xf8T\xf6\x88\xe7\vG\xf6\x8a\b$?\x90X:a\xcb\x94\x19\xdbqT\xfe,\x01\xb9N\xb0\x96\xc0\xa7\xddko\x9d/R\x87\\g;\xbb\x97\x06y\xe3m\xf2Z%*\xcc&\n\'v\x04\xbc6E\xfe\xa2\xb8k~j\xd1\x13\x1c\x03e\x90\x04\xc3Utck\x9e\x13;\x1a\x19\x97\xcb_Y\xfd.^\x81u\'Pd\xff!W\x12\xfac6*z\x82\xf1\x12#\xc2\xc6\xa5\x8a[\xf3\x96\x00\x87#\x01\xe6h\xf8\xa8$\x87)\x02\xb0\xbe\x832\x10\xdb]\xbc\x8b\x8ct\x06q\x0f\xe4c\x19/\xae%(\xcd\xee\x80K\xd5~\x02`\x11\xed\xa6\xf0\xff\xa1#\xf4\x9f\xcb\xc6\x9a\xc3\x13\xda%\xc1\b\xa4\xcb)t\xbd\xfe\xe8\xbbK^GqB(\xd8C\xf8\x1e\x9a\x06\xd0\xcd\x93\xc1$\xabO\xce\xbfO\x14\x9f&\n\xc5\xa47\xb5\x8f\xb8y\xcf\'9\x86\xa3\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x13\xce\xee\x96\xf7\xeff\xa9\xdb\xe7\xe7aCb\\\xf7TA\xd3z\xa7u\xa8\xac\x98\xa2\xe3\xe6\xc1\x82\xa3u\xfcx\xf1\x19\a@\xb2\xdd<\x04\xc7\xdb\x1e\xbb/\xee\x89E5r\xd9cy', 0x2, 0x0) sendfile(r2, r2, 0x0, 0x2f) ppoll(&(0x7f0000000140)=[{r2}], 0x1, 0x0, &(0x7f0000000200)={0x100000000}, 0x8) [ 831.657097] audit: type=1400 audit(1556851375.499:317436): avc: denied { net_admin } for pid=1998 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 831.658970] audit: type=1400 audit(1556851375.499:317437): avc: denied { net_admin } for pid=2000 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 831.659017] audit: type=1400 audit(1556851375.499:317438): avc: denied { net_admin } for pid=1998 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 836.678537] audit_printk_skb: 8273 callbacks suppressed [ 836.678546] audit: type=1400 audit(1556851380.519:320217): avc: denied { net_admin } for pid=2760 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 836.682057] audit: type=1400 audit(1556851380.519:320218): avc: denied { net_admin } for pid=2736 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 836.683943] audit: type=1400 audit(1556851380.519:320219): avc: denied { net_admin } for pid=2736 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 836.694366] audit: type=1400 audit(1556851380.529:320220): avc: denied { net_admin } for pid=2763 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:43:52 executing program 0: mkdir(0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDMKTONE(r0, 0x4b30, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/raw\x00') preadv(r1, &(0x7f00000017c0), 0x1be, 0x400000000074) [ 836.697156] audit: type=1400 audit(1556851380.539:320221): avc: denied { net_admin } for pid=2746 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 836.699068] audit: type=1400 audit(1556851380.539:320222): avc: denied { net_admin } for pid=2746 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 836.700938] audit: type=1400 audit(1556851380.539:320223): avc: denied { net_admin } for pid=2748 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 836.702756] audit: type=1400 audit(1556851380.539:320224): avc: denied { net_admin } for pid=2748 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 836.704690] audit: type=1400 audit(1556851380.539:320225): avc: denied { net_admin } for pid=2750 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 836.706860] audit: type=1400 audit(1556851380.549:320226): avc: denied { net_admin } for pid=2758 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 841.692993] audit_printk_skb: 1245 callbacks suppressed [ 841.693001] audit: type=1400 audit(1556851385.529:320642): avc: denied { net_admin } for pid=3161 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:43:53 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000040)=0x400100000001, 0x14a) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x400, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() setsockopt$inet6_buf(r1, 0x29, 0x31, 0x0, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x1000000003c) fcntl$setstatus(r1, 0x4, 0x42803) [ 841.693516] audit: type=1400 audit(1556851385.529:320643): avc: denied { net_admin } for pid=3175 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 841.695666] audit: type=1400 audit(1556851385.539:320645): avc: denied { net_admin } for pid=3172 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 841.703698] audit: type=1400 audit(1556851385.529:320644): avc: denied { net_admin } for pid=3175 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 841.704916] audit: type=1400 audit(1556851385.539:320646): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 841.726627] audit: type=1400 audit(1556851385.549:320647): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 841.728385] audit: type=1400 audit(1556851385.549:320648): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:43:53 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) write$P9_RREAD(r1, &(0x7f00000001c0)={0xac, 0x75, 0x2, {0xa1, "c44d7030beab06d71d50a7da1bba98533e4841c431b9122236bebe83ddb9af62fa5d940096952f77364c67123de42bda495b30cb5708a1bb1d15afc85b0446876e662e546bbc8b10ad6f70e17e6e051ceb96cbca0b8945f8dd5bd5e2b53b7cdafc207ce4d23140f3e2fec506a9c9da4e90029975816b352695d717cd8ec44f30d66e7f210fc3ad50b526aa441453ed9017af6cb34c5f6c442b603b015fdedd80c4"}}, 0xac) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'ip6_vti0\x00', &(0x7f00000002c0)=@ethtool_flash={0x33, 0x5, "f2f36fc5b3558013659fc8f368d74e42e06477ac638679c0311d80c953acc90b9e6e50b25d381695f467571835def42f35b5cfacaa31a43043254b522c0c7ba802e7a6ec27ad5aee350d142c4914ad6825e98e216c1fde495123523991991a34b7400b26c891ed5123f0da50119336a150010e352fd42d0776385210338d8f30"}}) [ 841.730062] audit: type=1400 audit(1556851385.549:320649): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 841.731719] audit: type=1400 audit(1556851385.569:320650): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:43:55 executing program 3: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000240)=0xc) r1 = syz_open_procfs(r0, &(0x7f0000000080)='fd/0\x00yFAtz\x9b\x88\xb3\x02\x04\xd7a0x0) tkill(r2, 0x19) write$cgroup_pid(r1, &(0x7f0000000280)=r2, 0x12) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/mls\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x40000) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000100)) r3 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f00000001c0)=[@acquire], 0x0, 0x0, 0x0}) close(r0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000008fd0)={0x8, 0x0, &(0x7f000000dff8)=[@release={0x400c630e}], 0x0, 0x0, 0x0}) ioctl$RTC_EPOCH_SET(r1, 0x4008700e, 0x100) syz_emit_ethernet(0x72, &(0x7f00000002c0)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @remote, [{[{0x9100, 0xcbe, 0x5, 0x1}], {0x8100, 0x70, 0x94, 0x4}}], {@ipv4={0x800, {{0xd, 0x4, 0x288, 0x10001, 0x5c, 0x64, 0xfffffffffffffff7, 0x6, 0x3f, 0x0, @remote, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@end, @noop, @rr={0x7, 0x1b, 0x0, [@rand_addr=0x101, @dev={0xac, 0x14, 0x14, 0x22}, @multicast1, @broadcast, @loopback, @multicast1]}]}}, @icmp=@echo_reply={0x0, 0x0, 0x0, 0x67, 0xffffffff, "ec15fe59b30da2cdcd4406d1b873aa240e2c3dc4f01674887e35ec0fa87bc7fc"}}}}}, &(0x7f0000000240)={0x0, 0x3, [0x13e, 0x4f0, 0x3d4, 0x132]}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f000000dfd0)={0x4, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00\x00\x00\x00'], 0xaf14113f02c18c41, 0x0, &(0x7f0000000680)}) dup(r3) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000040)={0x10, 0x0, &(0x7f00000000c0)=[@clear_death], 0x0, 0x0, 0x0}) [ 841.758093] audit: type=1400 audit(1556851385.599:320651): avc: denied { net_admin } for pid=3163 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:43:56 executing program 2: r0 = socket$packet(0x11, 0x8000000000002, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x2, 0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x8002, 0x0) ioctl$TCGETA(r1, 0x5405, &(0x7f00000000c0)) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) close(r0) [ 846.767230] audit_printk_skb: 849 callbacks suppressed [ 846.767237] audit: type=1400 audit(1556851390.609:320936): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 846.880103] audit: type=1400 audit(1556851390.719:320937): avc: denied { net_admin } for pid=3525 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 846.934143] audit: type=1400 audit(1556851390.769:320938): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 846.963759] audit: type=1400 audit(1556851390.799:320939): avc: denied { sys_admin } for pid=3525 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:43:59 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x6}, 0x1c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2401, 0x6) sendmmsg(r0, &(0x7f0000000440), 0x400000000000211, 0x0) [ 846.984172] audit: type=1400 audit(1556851390.819:320940): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 847.005066] audit: type=1400 audit(1556851390.839:320941): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 847.017938] audit: type=1400 audit(1556851390.859:320942): avc: denied { create } for pid=3525 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 847.019373] audit: type=1400 audit(1556851390.859:320943): avc: denied { write } for pid=3525 comm="syz-executor.0" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 847.069260] audit: type=1400 audit(1556851390.909:320944): avc: denied { sys_admin } for pid=3524 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 847.070572] audit: type=1400 audit(1556851390.909:320945): avc: denied { sys_admin } for pid=3524 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:44:18 executing program 1: 02:44:18 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = creat(&(0x7f0000000180)='./file0\x00', 0x0) unlink(&(0x7f0000000280)='./file0\x00') clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000300)={&(0x7f00000002c0)='./file1\x00'}, 0xc) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f00000000c0)=""/169) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='\\bdev\x98*/mime_type\x98proc-eth1&R@loGPL{,\x00', r1}, 0x10) close(r1) [ 851.780708] audit_printk_skb: 1026 callbacks suppressed [ 851.780716] audit: type=1400 audit(1556851395.619:321295): avc: denied { net_admin } for pid=3168 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:44:18 executing program 5: r0 = socket(0x400000010, 0x802, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000100)={0x18, 0xd, 0x1, {{0x2, 0x3, 0x4}, 0x4}}, 0x18) write(r0, &(0x7f0000000000)="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", 0xfc) 02:44:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r0, 0x0, 0x9, &(0x7f0000000080)='u', 0x1) getsockopt$inet_opts(r0, 0x0, 0x4000000001, 0x0, &(0x7f0000000980)=0xffffffffffffff5a) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="6e617400000354f36ae8092400000000000000001b0000000500000020060000900300000000000040010000b80400000000000088050000625f2f536044f7ed1e3188050000880500008805", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB='\x00'/80], @ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f800400100000000000000000000000000000000000000000000000030006168000000000000000000000000000000000000000000000000000000000700000000000000010000000000000030006164647274797065000000000000000000000000000000000000000000000000a1090000000000000000000000004800444e415400000000000000000000000000000000000000000000000000010f000000ffffffff000000000000000000000000813afc2be0fdb040f251e2910fd626b200654e2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000180250020000000000000000000000000000000000000000000000003000616464727479706500000000000000000000000000000000000000000000440320010000000000000000000000005001686173686c696d697400000000000000000000000000000000000000000276657468315f746f5f627269646765000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700000000000000050000000000000060000000200000000e20000000000000050000000078000082d60000000000003800444e41540000000000000000000000000000000000000000000000000000010000000a0000007f000001000000003f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f000280100000000000000000000000000000000000000000000000030006164647274797065000000000000000000000000000000000000000000000d020200000000000000000000000000280074746c000000000000000000000000000000000000000000000000000000020300000000000038004d415351554552414445000000000000000000000000000000000000000001000000020000007f000001ac1414290800006400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800d0000000000000000000000000000000000000000000000000003800444e415400000000000000000000000000000000000000000000000000000100000002000000e0000001000000000065070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff00000000"], 0x680) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f00000000c0)=0x2) getresgid(&(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0) write$FUSE_ATTR(r1, &(0x7f00000001c0)={0x78, 0x0, 0x2, {0x10001, 0x7, 0x0, {0x2, 0x1f, 0x8001, 0x1, 0x80000001, 0x68, 0x0, 0x9, 0x0, 0xa, 0x8000, r2, r3, 0x6, 0x5}}}, 0x78) 02:44:18 executing program 0: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r0, &(0x7f0000000200), 0x38c, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) r1 = dup3(r0, r0, 0x0) ioctl$ASHMEM_SET_SIZE(r1, 0x40087703, 0x1) 02:44:21 executing program 3: r0 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000080)=0x1c) r1 = dup(r0) lseek(r1, 0x0, 0x4) write$P9_RLOCK(r1, &(0x7f0000000200)={0x8, 0x35, 0x1, 0x79d6af699bb7ead6}, 0x8) ioctl$RTC_SET_TIME(r1, 0x4024700a, &(0x7f00000002c0)={0x3a, 0x21, 0x5, 0x17, 0x4, 0x5, 0x5, 0x7}) flistxattr(r0, &(0x7f0000000140)=""/120, 0x78) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='./file0\x00', &(0x7f0000000240)='f2fs\x00', 0x0, 0x0) ioctl$RNDGETENTCNT(r2, 0x80045200, &(0x7f0000000280)) ioctl$int_out(r2, 0x2, &(0x7f0000000300)) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0x3) 02:44:22 executing program 0: r0 = socket$inet6(0xa, 0x801, 0x0) r1 = dup(r0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x40, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) delete_module(0x0, 0x0) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x10, 0x4) ioctl$sock_TIOCOUTQ(r2, 0x5411, &(0x7f0000000240)) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') r3 = syz_genetlink_get_family_id$team(&(0x7f00000001c0)='team\x00') accept4$packet(r1, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000500)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@loopback, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000000640)=0xe8) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f00000007c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000780)={&(0x7f0000000680)={0xd8, r3, 0x24, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0xbc, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xa1f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}]}}]}, 0xd8}}, 0x20004000) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)=ANY=[@ANYBLOB="82e490627f146ad81142a8f7f6231d1ee4db5774873be6a9664b31d3039c53916f1229be845c314f3ca582c7a5"], 0x1}}, 0x0) ioctl$KDADDIO(0xffffffffffffffff, 0x4b34, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) ioctl$TIOCSBRK(0xffffffffffffffff, 0x5427) syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xffffff83, 0xa, 0x0, 0x0, 0x0, 0x8906}}}}}, 0x0) ioctl$UI_SET_ABSBIT(r1, 0x40045567, 0x2) setsockopt$packet_int(r6, 0x107, 0xe, 0x0, 0x0) setsockopt$packet_tx_ring(r6, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x44) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x8000fffffffe) [ 851.782604] audit: type=1400 audit(1556851395.619:321296): avc: denied { net_admin } for pid=3168 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 851.784249] audit: type=1400 audit(1556851395.619:321297): avc: denied { net_admin } for pid=3101 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 851.787100] audit: type=1400 audit(1556851395.629:321298): avc: denied { net_admin } for pid=3101 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:44:27 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000000000000010000105000600200000000a00000000000000000500e50000070000001f0000000000000300000000000002000100f5000000000000020000000005000500000000000a000000000000000000000000000000001700"/128], 0x80}}, 0x0) sysinfo(&(0x7f0000000280)=""/104) sendmmsg(r0, &(0x7f0000000180), 0x400000000000002, 0x0) 02:44:29 executing program 3: syz_execute_func(&(0x7f00000001c0)="982ce00f050520d0f80791b0024141e2e996855b66c4237909a200800000e60fc4014e66f66d220fa0e5be34d1c4e1f8c421fc22ebd72e41812047002b00c4c27920286eba0dfe8c738888a1c40fbbc4e201acac10000000808f294001b00b0000000f71d539f08171a38a806ebb57c46291ae8ca065600000c4618de3c0740f2d9600000000cadcdc1d440f2b550142c4b6593131b15dfba1c9fb110f0f3804830a000000") write$FUSE_LSEEK(0xffffffffffffffff, &(0x7f0000000100)={0x18, 0x0, 0x0, {0x6}}, 0x18) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x40240, 0x20) ioctl$UI_SET_SNDBIT(r0, 0x4004556a, 0x5) accept4$inet6(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x80800) [ 851.795572] audit: type=1400 audit(1556851395.639:321299): avc: denied { net_admin } for pid=3169 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 851.800716] audit: type=1400 audit(1556851395.639:321300): avc: denied { net_admin } for pid=3161 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 851.802508] audit: type=1400 audit(1556851395.639:321301): avc: denied { net_admin } for pid=3161 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 851.807285] audit: type=1400 audit(1556851395.649:321302): avc: denied { net_admin } for pid=3172 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 851.809059] audit: type=1400 audit(1556851395.649:321303): avc: denied { net_admin } for pid=3172 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:44:34 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = memfd_create(&(0x7f00000003c0)='/d-\x1b\xb3\x82\xf9/J\xb0p*\xd8\x00\xea\x03\x83\xd8\x16\x88Qt\xceh\xeb\xb2\xc4\xfbf\xe1\xd5\xe5\x9aS\x964\xb5L/\xdb\xb4\xec\xd7C\xed\xcf\f\x01\x15\xae!T\x9eU\xee\xc6]3\xdb\xadx\x19\xf0w}y\x0f\xc3\xf2\xea;\x93\xe9\x13\x97E\xd8i\f6\xb6\xf9\\\xbd\xd1\\\x19\x0e\x93\x05\nC\x1b8)\xe3\x9b{\x8bT\x8a\xec\a\xc9-;\xf55n\xd1~\x7f\xa8eB\xc40&l\'a\x19\xdf\xad\x9aan\xaa\xc1h\x9e\x9a\xa94\xdcI{\xa9\xf3\x00u\xfb\x83\xa2An\x1cN\x05w\xcb\x811A\x98G\x87j\x02\x8cC\xed#\xb8+\xf2G6\xe5\xe8\x88<2\x92\x13&\x96\xe6\xdbl\xb0\x99\x9e\xe8Q\xd3\xe9S0\xb9\xb0\'\xf5\x05\xecV}\x89Z\n\xc5.\xf5\xa7\xe1\x97\x9dq\xe8\xa6\x99\x9d8b\xd3\xd9\xbe\x02D\x13\x19b\x7fm2\xed\xad\x04\x80\x12GM\x9dZ@=\xc9\x14\xf8\xdcb\x92@\xd1\xbb\xd2\xa331\x19\x8a\xc8:\xa1\xe6\xc2)', 0x0) write$eventfd(r2, &(0x7f0000000040)=0xffff, 0x8) r3 = dup(r0) ioctl$TIOCNOTTY(r3, 0x5422) sendfile(r2, r2, &(0x7f0000001000), 0xffff) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r2, 0x0) sync_file_range(r0, 0x92, 0x7, 0x0) fchdir(r1) ioctl(r1, 0x0, &(0x7f0000000140)="60e720d7f6d692cd1444f168b815dd916f65af284bc22b63aed47935e152a7e99bbd58463d24d838ca80615548881b768303cc0ed27a81d0b47b1ac30154b432ec1318cec22a65368210d94af8820db6e8f9975841b72a4ace794b9e804709a2551add56242f545ba1129fb63efa50f88e0b29846cec6880f2be69c112a6596ffe32574d12d0805087ecc1bc37c92c877a973b83f93ba979d19c6fbebb5b30ca09e1c89bdfa80a9c7032c19675d2be2ab8961b29bcfa282145039bc9a9bc7838dfacaf80d2c633c1e98082849a34ab38717e8c94a6033c78fc781e0a9b2032f9021a9746d9d55bae86e00187338386b53ae39e3511") ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000200)=ANY=[]) [ 851.813839] audit: type=1400 audit(1556851395.649:321304): avc: denied { net_admin } for pid=3152 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 856.786916] audit_printk_skb: 8844 callbacks suppressed [ 856.786924] audit: type=1400 audit(1556851400.629:324264): avc: denied { net_admin } for pid=5043 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 856.788700] audit: type=1400 audit(1556851400.629:324265): avc: denied { net_admin } for pid=5043 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 856.790289] audit: type=1400 audit(1556851400.629:324266): avc: denied { net_admin } for pid=4448 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 856.790636] audit: type=1400 audit(1556851400.629:324267): avc: denied { net_admin } for pid=5027 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 856.792180] audit: type=1400 audit(1556851400.629:324268): avc: denied { net_admin } for pid=4448 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 856.792524] audit: type=1400 audit(1556851400.629:324269): avc: denied { net_admin } for pid=5027 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 856.792949] audit: type=1400 audit(1556851400.629:324270): avc: denied { net_admin } for pid=4946 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 856.794678] audit: type=1400 audit(1556851400.629:324271): avc: denied { net_admin } for pid=5023 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 856.796070] audit: type=1400 audit(1556851400.639:324272): avc: denied { net_admin } for pid=4964 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 856.797384] audit: type=1400 audit(1556851400.639:324273): avc: denied { net_admin } for pid=4441 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 861.799938] audit_printk_skb: 10560 callbacks suppressed [ 861.799947] audit: type=1400 audit(1556851405.639:327805): avc: denied { net_admin } for pid=4814 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 861.801859] audit: type=1400 audit(1556851405.639:327806): avc: denied { net_admin } for pid=4814 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 861.802247] audit: type=1400 audit(1556851405.639:327807): avc: denied { net_admin } for pid=4495 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 861.804009] audit: type=1400 audit(1556851405.639:327808): avc: denied { net_admin } for pid=4993 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 861.804201] audit: type=1400 audit(1556851405.639:327809): avc: denied { net_admin } for pid=4495 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 861.806244] audit: type=1400 audit(1556851405.649:327810): avc: denied { net_admin } for pid=4470 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 861.807273] audit: type=1400 audit(1556851405.649:327811): avc: denied { net_admin } for pid=4973 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 861.807546] audit: type=1400 audit(1556851405.649:327812): avc: denied { net_admin } for pid=4470 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 861.809197] audit: type=1400 audit(1556851405.649:327813): avc: denied { net_admin } for pid=4973 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 861.809272] audit: type=1400 audit(1556851405.649:327814): avc: denied { net_admin } for pid=4285 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 866.805843] audit_printk_skb: 10479 callbacks suppressed [ 866.805851] audit: type=1400 audit(1556851410.649:331324): avc: denied { net_admin } for pid=6864 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 866.807703] audit: type=1400 audit(1556851410.649:331325): avc: denied { net_admin } for pid=6864 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 866.807847] audit: type=1400 audit(1556851410.649:331326): avc: denied { net_admin } for pid=5380 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 866.809670] audit: type=1400 audit(1556851410.649:331327): avc: denied { net_admin } for pid=6861 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 866.809760] audit: type=1400 audit(1556851410.649:331328): avc: denied { net_admin } for pid=5380 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 866.811564] audit: type=1400 audit(1556851410.649:331329): avc: denied { net_admin } for pid=6861 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 866.811737] audit: type=1400 audit(1556851410.649:331330): avc: denied { net_admin } for pid=5373 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 866.811913] audit: type=1400 audit(1556851410.649:331331): avc: denied { net_admin } for pid=6852 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 866.813633] audit: type=1400 audit(1556851410.649:331332): avc: denied { net_admin } for pid=5373 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 866.813876] audit: type=1400 audit(1556851410.649:331333): avc: denied { net_admin } for pid=6867 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 871.817841] audit_printk_skb: 10329 callbacks suppressed [ 871.817850] audit: type=1400 audit(1556851415.659:334799): avc: denied { net_admin } for pid=5848 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 871.818009] audit: type=1400 audit(1556851415.659:334800): avc: denied { net_admin } for pid=4956 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 871.819771] audit: type=1400 audit(1556851415.659:334801): avc: denied { net_admin } for pid=5848 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 871.819911] audit: type=1400 audit(1556851415.659:334802): avc: denied { net_admin } for pid=4956 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 871.822308] audit: type=1400 audit(1556851415.659:334803): avc: denied { net_admin } for pid=5857 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 871.822392] audit: type=1400 audit(1556851415.659:334804): avc: denied { net_admin } for pid=4948 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 871.824237] audit: type=1400 audit(1556851415.659:334805): avc: denied { net_admin } for pid=5857 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 871.824326] audit: type=1400 audit(1556851415.659:334806): avc: denied { net_admin } for pid=4948 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 871.824655] audit: type=1400 audit(1556851415.629:334789): avc: denied { net_admin } for pid=4952 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 871.826603] audit: type=1400 audit(1556851415.669:334807): avc: denied { net_admin } for pid=4952 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 876.829737] audit_printk_skb: 10502 callbacks suppressed [ 876.829745] audit: type=1400 audit(1556851420.669:338321): avc: denied { net_admin } for pid=4406 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 876.829988] audit: type=1400 audit(1556851420.669:338322): avc: denied { net_admin } for pid=6301 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 876.831727] audit: type=1400 audit(1556851420.669:338323): avc: denied { net_admin } for pid=4406 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 876.831881] audit: type=1400 audit(1556851420.669:338324): avc: denied { net_admin } for pid=6301 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 876.833832] audit: type=1400 audit(1556851420.669:338325): avc: denied { net_admin } for pid=6307 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 876.834816] audit: type=1400 audit(1556851420.669:338326): avc: denied { net_admin } for pid=6311 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 876.835092] audit: type=1400 audit(1556851420.669:338327): avc: denied { net_admin } for pid=6307 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 876.836654] audit: type=1400 audit(1556851420.679:338328): avc: denied { net_admin } for pid=8700 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 876.838396] audit: type=1400 audit(1556851420.679:338329): avc: denied { net_admin } for pid=8698 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 876.840295] audit: type=1400 audit(1556851420.679:338330): avc: denied { net_admin } for pid=8698 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 881.887400] audit_printk_skb: 8545 callbacks suppressed [ 881.887408] audit: type=1400 audit(1556851425.729:341196): avc: denied { net_admin } for pid=9437 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 881.891365] audit: type=1400 audit(1556851425.729:341197): avc: denied { net_admin } for pid=9453 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 881.904046] audit: type=1400 audit(1556851425.739:341198): avc: denied { net_admin } for pid=9453 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 881.924445] audit: type=1400 audit(1556851425.759:341199): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 881.925009] audit: type=1400 audit(1556851425.759:341200): avc: denied { net_admin } for pid=9437 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 881.929207] audit: type=1400 audit(1556851425.769:341201): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 881.930949] audit: type=1400 audit(1556851425.769:341202): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 881.932731] audit: type=1400 audit(1556851425.769:341203): avc: denied { dac_override } for pid=2107 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 881.934606] audit: type=1400 audit(1556851425.769:341204): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 881.992390] audit: type=1400 audit(1556851425.829:341205): avc: denied { net_admin } for pid=9451 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 886.919303] audit_printk_skb: 822 callbacks suppressed [ 886.919312] audit: type=1400 audit(1556851430.759:341483): avc: denied { net_admin } for pid=5870 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 886.922324] audit: type=1400 audit(1556851430.759:341484): avc: denied { net_admin } for pid=5887 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 886.924853] audit: type=1400 audit(1556851430.759:341485): avc: denied { net_admin } for pid=7822 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 886.933548] audit: type=1400 audit(1556851430.769:341486): avc: denied { net_admin } for pid=5866 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 886.937612] audit: type=1400 audit(1556851430.779:341487): avc: denied { net_admin } for pid=5851 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 886.939426] audit: type=1400 audit(1556851430.779:341488): avc: denied { net_admin } for pid=5851 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 886.942266] audit: type=1400 audit(1556851430.779:341489): avc: denied { net_admin } for pid=5864 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 886.944071] audit: type=1400 audit(1556851430.779:341490): avc: denied { net_admin } for pid=5864 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 886.964916] audit: type=1400 audit(1556851430.799:341491): avc: denied { net_admin } for pid=7827 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 886.968625] audit: type=1400 audit(1556851430.809:341492): avc: denied { net_admin } for pid=5892 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 891.966719] audit_printk_skb: 1196 callbacks suppressed [ 891.966727] audit: type=1400 audit(1556851435.809:341890): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 891.999561] audit: type=1400 audit(1556851435.839:341891): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 892.001581] audit: type=1400 audit(1556851435.839:341892): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 892.003370] audit: type=1400 audit(1556851435.839:341893): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 892.204543] audit: type=1400 audit(1556851436.039:341894): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 892.294980] audit: type=1400 audit(1556851436.129:341895): avc: denied { sys_admin } for pid=2109 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 892.331176] audit: type=1400 audit(1556851436.169:341896): avc: denied { sys_admin } for pid=2110 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 892.337998] audit: type=1400 audit(1556851436.179:341897): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 892.343198] audit: type=1400 audit(1556851436.179:341898): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 892.368429] audit: type=1400 audit(1556851436.209:341899): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 896.978401] audit_printk_skb: 1095 callbacks suppressed [ 896.978409] audit: type=1400 audit(1556851440.819:342266): avc: denied { net_admin } for pid=5849 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 896.980232] audit: type=1400 audit(1556851440.819:342267): avc: denied { net_admin } for pid=5849 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 896.980744] audit: type=1400 audit(1556851440.819:342268): avc: denied { net_admin } for pid=4474 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 896.982618] audit: type=1400 audit(1556851440.819:342269): avc: denied { net_admin } for pid=10611 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 896.984466] audit: type=1400 audit(1556851440.819:342270): avc: denied { net_admin } for pid=10611 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 896.986357] audit: type=1400 audit(1556851440.829:342271): avc: denied { net_admin } for pid=10627 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 896.993812] audit: type=1400 audit(1556851440.829:342273): avc: denied { net_admin } for pid=10162 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 897.001776] audit: type=1400 audit(1556851440.839:342274): avc: denied { net_admin } for pid=9894 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 897.003653] audit: type=1400 audit(1556851440.839:342275): avc: denied { net_admin } for pid=9894 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 897.007356] audit: type=1400 audit(1556851440.849:342276): avc: denied { net_admin } for pid=9913 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 901.987057] audit_printk_skb: 9595 callbacks suppressed [ 901.987065] audit: type=1400 audit(1556851445.829:345486): avc: denied { net_admin } for pid=11423 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 901.987166] audit: type=1400 audit(1556851445.829:345487): avc: denied { net_admin } for pid=3429 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 901.988991] audit: type=1400 audit(1556851445.829:345488): avc: denied { net_admin } for pid=11423 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 901.989086] audit: type=1400 audit(1556851445.829:345489): avc: denied { net_admin } for pid=3429 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 901.989554] audit: type=1400 audit(1556851445.829:345490): avc: denied { net_admin } for pid=11309 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 901.991243] audit: type=1400 audit(1556851445.829:345491): avc: denied { net_admin } for pid=11435 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 901.993052] audit: type=1400 audit(1556851445.829:345492): avc: denied { net_admin } for pid=11435 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 901.993170] audit: type=1400 audit(1556851445.489:345245): avc: denied { net_admin } for pid=11349 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 901.994301] audit: type=1400 audit(1556851445.829:345493): avc: denied { net_admin } for pid=10882 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 901.994465] audit: type=1400 audit(1556851445.829:345494): avc: denied { net_admin } for pid=11349 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 906.996737] audit_printk_skb: 10442 callbacks suppressed [ 906.996745] audit: type=1400 audit(1556851450.839:348992): avc: denied { net_admin } for pid=11305 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 906.998568] audit: type=1400 audit(1556851450.839:348993): avc: denied { net_admin } for pid=12262 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 907.000308] audit: type=1400 audit(1556851450.839:348994): avc: denied { net_admin } for pid=10754 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 907.000507] audit: type=1400 audit(1556851450.839:348995): avc: denied { net_admin } for pid=12262 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 907.002213] audit: type=1400 audit(1556851450.839:348996): avc: denied { net_admin } for pid=10754 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 907.002475] audit: type=1400 audit(1556851450.839:348997): avc: denied { net_admin } for pid=12276 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 907.004159] audit: type=1400 audit(1556851450.839:348998): avc: denied { net_admin } for pid=12276 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 907.007378] audit: type=1400 audit(1556851450.849:349000): avc: denied { net_admin } for pid=10703 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 907.009214] audit: type=1400 audit(1556851450.849:349001): avc: denied { net_admin } for pid=10703 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 907.010243] audit: type=1400 audit(1556851450.849:349002): avc: denied { net_admin } for pid=10760 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 912.006970] audit_printk_skb: 10225 callbacks suppressed [ 912.006979] audit: type=1400 audit(1556851455.849:352434): avc: denied { net_admin } for pid=13147 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 912.008064] audit: type=1400 audit(1556851455.849:352435): avc: denied { net_admin } for pid=11034 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 912.008861] audit: type=1400 audit(1556851455.849:352436): avc: denied { net_admin } for pid=13147 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 912.009961] audit: type=1400 audit(1556851455.849:352437): avc: denied { net_admin } for pid=11034 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 912.010760] audit: type=1400 audit(1556851455.849:352438): avc: denied { net_admin } for pid=13152 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 912.012393] audit: type=1400 audit(1556851455.849:352439): avc: denied { net_admin } for pid=13152 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 912.014308] audit: type=1400 audit(1556851455.849:352440): avc: denied { net_admin } for pid=13153 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 912.016320] audit: type=1400 audit(1556851455.859:352442): avc: denied { net_admin } for pid=13159 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 912.018039] audit: type=1400 audit(1556851455.859:352443): avc: denied { net_admin } for pid=13159 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 912.019960] audit: type=1400 audit(1556851455.859:352444): avc: denied { net_admin } for pid=13116 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 917.015977] audit_printk_skb: 10296 callbacks suppressed [ 917.015985] audit: type=1400 audit(1556851460.859:355900): avc: denied { net_admin } for pid=14004 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 917.017436] audit: type=1400 audit(1556851460.859:355901): avc: denied { net_admin } for pid=14026 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 917.017879] audit: type=1400 audit(1556851460.859:355902): avc: denied { net_admin } for pid=14004 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 917.018731] audit: type=1400 audit(1556851460.259:355503): avc: denied { net_admin } for pid=13916 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 917.019279] audit: type=1400 audit(1556851460.859:355903): avc: denied { net_admin } for pid=14026 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 917.020649] audit: type=1400 audit(1556851460.859:355904): avc: denied { net_admin } for pid=14021 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 917.022510] audit: type=1400 audit(1556851460.859:355905): avc: denied { net_admin } for pid=14021 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 917.023367] audit: type=1400 audit(1556851460.859:355906): avc: denied { net_admin } for pid=13937 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 917.031390] audit: type=1400 audit(1556851460.869:355909): avc: denied { net_admin } for pid=12193 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 917.031430] audit: type=1400 audit(1556851460.869:355910): avc: denied { net_admin } for pid=12159 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 917.562047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=269 sclass=netlink_route_socket pig=14076 comm=syz-executor.5 [ 922.027629] audit_printk_skb: 9971 callbacks suppressed [ 922.027638] audit: type=1400 audit(1556851465.869:359248): avc: denied { net_admin } for pid=12596 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 922.029449] audit: type=1400 audit(1556851465.869:359249): avc: denied { net_admin } for pid=12596 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 922.030686] audit: type=1400 audit(1556851465.869:359250): avc: denied { net_admin } for pid=12594 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 922.032380] audit: type=1400 audit(1556851465.869:359251): avc: denied { net_admin } for pid=12594 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 922.034717] audit: type=1400 audit(1556851465.869:359252): avc: denied { net_admin } for pid=12572 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 922.038740] audit: type=1400 audit(1556851465.879:359253): avc: denied { net_admin } for pid=12559 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 922.040202] audit: type=1400 audit(1556851465.879:359254): avc: denied { net_admin } for pid=12574 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 922.040208] audit: type=1400 audit(1556851465.879:359255): avc: denied { net_admin } for pid=12559 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 922.041908] audit: type=1400 audit(1556851465.879:359256): avc: denied { net_admin } for pid=12574 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 922.046993] audit: type=1400 audit(1556851465.889:359258): avc: denied { net_admin } for pid=12573 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 927.040510] audit_printk_skb: 7317 callbacks suppressed [ 927.040519] audit: type=1400 audit(1556851470.879:361716): avc: denied { net_admin } for pid=13193 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 927.040865] audit: type=1400 audit(1556851470.879:361717): avc: denied { net_admin } for pid=13149 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 927.042424] audit: type=1400 audit(1556851470.879:361718): avc: denied { net_admin } for pid=13193 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 927.042752] audit: type=1400 audit(1556851470.879:361719): avc: denied { net_admin } for pid=13149 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 927.050385] audit: type=1400 audit(1556851470.889:361721): avc: denied { net_admin } for pid=13151 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 927.050387] audit: printk limit exceeded [ 927.052322] audit: type=1400 audit(1556851470.889:361722): avc: denied { net_admin } for pid=13151 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 927.052339] audit: type=1400 audit(1556851470.889:361723): avc: denied { net_admin } for pid=13192 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 927.058023] audit: type=1400 audit(1556851470.899:361724): avc: denied { net_admin } for pid=13188 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 927.059629] audit: type=1400 audit(1556851470.899:361725): avc: denied { net_admin } for pid=13196 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 932.048417] audit_printk_skb: 1352 callbacks suppressed [ 932.048425] audit: type=1400 audit(1556851475.889:362176): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 932.060453] audit: type=1400 audit(1556851475.899:362177): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 932.440994] audit: type=1400 audit(1556851476.279:362178): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 932.443172] audit: type=1400 audit(1556851476.279:362179): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 932.514547] audit: type=1400 audit(1556851476.349:362180): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 932.605204] audit: type=1400 audit(1556851476.439:362181): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 932.713378] audit: type=1400 audit(1556851476.549:362182): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 932.750557] audit: type=1400 audit(1556851476.589:362183): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 932.756951] audit: type=1400 audit(1556851476.599:362184): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 932.762399] audit: type=1400 audit(1556851476.599:362185): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 941.777554] audit_printk_skb: 778 callbacks suppressed [ 941.777563] audit: type=1400 audit(1556851485.619:362447): avc: denied { net_admin } for pid=30185 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:44:46 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000000c0)=""/29) syz_execute_func(&(0x7f0000000200)="b12991cd806969ef69dccf00d9d90f708301000000fec44139fd5bf91c1dc1c1c7c4c3090c330053fb1f11cdaec44549f2168f4808eebce00000802000c421fc51c1ea660f383fd1c3c3c4210a5f7a2af3400faee47c7c730f5726400f0d18c401fe5ff6b1dd2025500804f4c40e2d690b72c3d3c3c31d54111d00") r1 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x28000, 0x0) ioctl$VT_OPENQRY(r1, 0x5600, &(0x7f0000000040)) [ 942.157331] audit: type=1400 audit(1556851485.999:362448): avc: denied { sys_admin } for pid=2109 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:44:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0adc1f123c123f319bd070") personality(0x1bb2baf3005ac133) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000000040)={0x53, 0x7, 0x3, {0xb7, 0x40000000000}, {0x7fff, 0x8000}, @ramp={0xb2, 0x0, {0x200, 0x401, 0x9, 0x1}}}) mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x5) 02:44:46 executing program 4: clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$peek(0x3, r0, &(0x7f0000000000)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x13) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x0, 0x146}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) 02:44:46 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x3, 0x70, 0x5, 0x7f, 0xd1e, 0xfffffffffffffffa, 0x0, 0xfcf857b, 0x0, 0x4, 0x9, 0x5, 0x4, 0xb3, 0x25800000, 0xffffffff, 0x404, 0x9d, 0x8000, 0x40, 0x4, 0x80000001, 0x9, 0x2, 0xffffffffffffffff, 0x1, 0x663b, 0x7, 0x0, 0x7, 0x20, 0x4, 0x64, 0x8, 0x4, 0x8, 0x81, 0x6, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000040), 0x2}, 0x20002, 0x2c, 0x3, 0xb, 0x100000000, 0x40, 0x88a}, 0x0, 0x1, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f00000002c0)={0x0, 0x70, 0x2, 0x6, 0x100000001, 0xffff, 0x0, 0x1, 0x12, 0x7, 0x3, 0x81, 0x401, 0x4, 0x1, 0x80, 0x8f, 0x200, 0x48, 0x6, 0x3f, 0x7fffffff, 0x4, 0x5, 0x7f, 0x0, 0x8, 0x5, 0x5, 0x0, 0xfffffffffffffdfd, 0x4, 0x8, 0xffffffff80000001, 0x33, 0x6, 0x8001, 0x81, 0x0, 0x200, 0x1, @perf_bp={&(0x7f0000000140), 0x2}, 0x1, 0x6, 0x3f, 0x7, 0x0, 0x6, 0x5}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='syz_tun\x00', 0x267) connect$inet(r0, &(0x7f0000000180)={0x2, 0x0, @multicast1}, 0xfffffffffffffdc5) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x40a800, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000380)={0x4, 0x1, 0x10000, 0x8, 0x17, 0x5, 0xbd, 0x5, 0x3, 0x0, 0x1f, 0x3}) r3 = socket$netlink(0x10, 0x3, 0x1f) r4 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000480)='/selinux/avc/hash_stats\x00', 0x0, 0x0) perf_event_open$cgroup(&(0x7f0000000400)={0x0, 0x70, 0x101, 0x1000, 0x1f, 0x401, 0x0, 0x7, 0x400, 0x2, 0x7, 0x5, 0x2, 0xffff, 0x9, 0x1, 0x6, 0x1, 0x2, 0x8, 0x2, 0x3, 0xfffffffffffffffb, 0x1ecd, 0x7, 0x814b, 0x400000000000, 0x1, 0xffff, 0x0, 0x1, 0x1, 0x6, 0xcd00, 0xffff, 0x2, 0x176, 0x400, 0x0, 0x3, 0x4, @perf_bp={&(0x7f00000003c0), 0x4}, 0x580, 0x6a, 0x800000000000, 0x6, 0xbaf, 0x200, 0x2}, r4, 0xd, r1, 0x1) ioctl$FS_IOC_GETFSLABEL(r3, 0x81009431, &(0x7f00000001c0)) getsockopt$inet_pktinfo(r0, 0x0, 0xe, 0x0, &(0x7f0000000080)) 02:44:46 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uinput\x00', 0x2, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x4) clock_getres(0x5, &(0x7f00000000c0)) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000180)={{0xa, 0x4e23, 0x4, @mcast2, 0x5}, {0xa, 0x4e20, 0xffffffffffffff15, @ipv4={[], [], @multicast1}, 0x9}, 0x8, [0xffffffffffffff80, 0x8, 0x9, 0xfffffffffffffffe, 0x4, 0x6, 0x2, 0x1f]}, 0x5c) ioctl$PPPIOCSMRRU(r1, 0x4004743b, &(0x7f0000000140)=0x4) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00'}, 0x45c) write$input_event(r0, &(0x7f0000000080)={{}, 0x11, 0x6, 0x3}, 0x18) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000200)={{0x2, 0x4e21, @loopback}, {0x7, @broadcast}, 0x4, {0x2, 0x4e24, @rand_addr=0x6}, 'ip6tnl0\x00'}) r2 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000000)={0x1}) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00', {}, 0x0, [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000]}, 0x45c) poll(&(0x7f00000000c0), 0x0, 0xfffffffffffffffe) 02:44:46 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000300)={'veth0_to_hsr\x00', 0x7fffff}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000000c0)={'vet\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbdh\x00', 0x43732e5398416f1a}) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x175, &(0x7f0000000080)={&(0x7f0000000200)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000802}, 0x81) 02:44:47 executing program 0: r0 = socket(0xa, 0x802, 0x88) r1 = socket$netlink(0x10, 0x3, 0x4) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @loopback}}, 0x1c) r2 = fcntl$getown(r1, 0x9) ptrace$setregset(0x4205, r2, 0x201, &(0x7f0000000100)={&(0x7f0000000040)="8165df99144d4de28bb0192287cca99fb34f733043d994d8d16c8da8d3fb6867f639f4222ce474bea9fdcfd4a385cbd6e1e490b671ab9a37a652b6393f0dac35a95f7cc3f58ab67eb3c4482d2d00b6242268f27d11be02a286252d83ee31dc1a053f518f486d512a2c82c2cd1c02376352bbd3af7fdc877db508339b6ebf6317b4d0475e7e37ca149bb5900a2d43eb6a01d1c42702d0b1", 0x97}) writev(r1, &(0x7f0000fb1000)=[{&(0x7f0000001540)="480000001400197f09004b0101048c590a88ffffff0100c901000000000028213ee205000000000000005e00000000000000000000eaf60d18125d4b18857a9eace3dbe8b12c83fe", 0x48}], 0x1) 02:44:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = creat(&(0x7f0000000100)='./file0\x00', 0x1e0) getpeername$packet(0xffffffffffffffff, &(0x7f000000d140)={0x11, 0x0, 0x0}, &(0x7f000000d180)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f000000d1c0)={@dev={0xfe, 0x80, [], 0x15}, r2}, 0x14) r3 = openat$keychord(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/keychord\x00', 0x0, 0x0) r4 = eventfd(0x0) r5 = openat$cgroup_ro(r3, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getpgid(0xffffffffffffffff) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000500)={{{@in=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in=@multicast2}}, &(0x7f0000000180)=0xe8) sendmsg$netlink(r5, &(0x7f0000003400)={&(0x7f0000000040)=@proc={0x10, 0x0, 0x25dfdbfd, 0x1000000}, 0xc, &(0x7f0000003380)=[{&(0x7f0000000080)={0x14, 0x17, 0x300, 0x70bd26, 0x25dfdbfe, "", [@typed={0x4, 0x10}]}, 0x14}, {&(0x7f0000000240)=ANY=[@ANYBLOB="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"], 0x208}, {&(0x7f0000000600)={0x17d0, 0x27, 0x1, 0x70bd25, 0x25dfdbfc, "", [@generic="05dae8a23f5b80f47b3b88a279b0a61a317a8ce4d713cb011f4ce9d28a98b727dc247b476f15c0d02fc466e25f12f6287b634a07d2fdedbc7ec22837f1691e03fe60b3aae68ec2ad0ff8d74fe992d5e2fad9f251e097ac5dbf318a28fa36368d536ed8ed6fb4447f54e7868cbd4e27836fdd8bb1177f4c167c16a39f625b12", @nested={0x1078, 0x52, [@typed={0x8, 0x54, @uid=r6}, @typed={0x8, 0x2e, @fd}, @typed={0x8, 0x7a, @pid=r7}, @typed={0x8, 0x96, @fd=r3}, @typed={0x4, 0x3e}, @typed={0xc, 0x66, @str='wlan1\x00'}, @generic="be61a177a6bfe9eac80632da9efae9915dd103cbd5a626fbd5603ccf3c738b5d5bc28b80e33a9e495f750dd8320be3", @typed={0x14, 0x21, @ipv6=@ipv4={[], [], @empty}}, @generic="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"]}, @nested={0x2e0, 0x1a, [@generic="a9b4c7e1e2113efbc8b468543c0a6e89f1443537f0d249e6470ec72352822158524d74ba29ca3c1eb53a992797c607b8ead789919596cecacf1dbe1767175c667576f7ddfeb23797b47f8872c09f2dace85053a667a95d3bae7a7fe17f82d9529d744bf594", @typed={0x20, 0x2, @binary="c6fb984c52168f0ab39643934d9439b7fe06251f04c91653539a"}, @generic="236c53cdd88ab3d02b2305a32193bfddeee00a00e322b680a30a935818b9237ece96e5841192ff97aaba1b50406e2d14", @typed={0x9c, 0x83, @binary="36c41e547562a4f154a377d9d1e79f025a05740cb5746e6d047f47452924d7b5931e44c4eab720e49793bc0be3e243f784571b42fc21ca6d073f0b01545cf565e3531374e41eb383682c9b27a8101ae5848eb6314a8fb414d2899e86aeb9de2e5eae0fb7a63ab1e4c76f7c18f24d9fd59142417d0c0213c61839f0b2b61aec8c7438eda983dca3b7e9be7f2ddf85cc07ed9a604c881677b3"}, @generic="c349044d3ea87f202f004d08e8112269e37eb0473682a6bc316364ed5b86f32aa91b1f0eddf79851990c45126bc861d970bfe4c3aa55b4cabd9acdeb543bdc0a33bb6d9737912bde2f089c19d6eabecedf818a0cb9264e150782a2ced5ea9877d1c3e4a662c3abf8146149c91da8e12d1ebb5eda75be34563b13b54c9efd8eb21123237fdd10439b1c3dc75978fab6021b7f6aaa0a4e040d9cf39b84672acabe1f6646", @typed={0x8, 0x65, @uid=r8}, @generic="8a602eddd38e56437f568d3bbbda97b1cf8361aea824ff18ce8f4a28dd6578c642c125bfae581bafdd138ef79689744fad6b6aca7d101d9372470fc2960a03b54fc8a0c521e63da984d8fa3ad69624ef8de85352cf2a406470de9da77b845537e15659fb2bf51370cab33ab0b5dca8c7b610b0735d6ed23ed8d04dbd96fb410a34522f5b6c1800232d5dd92316f4733fa55d11881ef22987321ad5161f391dec31510ee029e89be531c323da73b11559ee8c61f582811baf064d2284742ec85838b16b36219f6cd61866e14e46858031d75b", @typed={0xc, 0x55, @u64=0x6}]}, @nested={0x144, 0x8d, [@generic='\n', @generic="f1497efc081edac6cd66178f86c2c826bca19244a0b4e40110e25f15881459de3fd49d4bd80e9d88a87a64f14ef8db76b93b82923fb8bc23b2728e2061bc93083fe2ef2db59827b0326f835d7add88c3928a1e4de53db9ba1b5829a71b98bae69a5855d9f36fdc2f3391d86934", @generic="342304379799bd7c632b3d7d0cc696b5ee586dc1432e042381cd273d291595703aec532b462c526bb8561ac58396a256bc69a70e2459a4e677612762be74946fa5aa1a702f15936ab0cb1d4da1e0da1e94b5fc3bafdcc58f4ce331b76b4a66f3fad174614be3f51fc631e62fcae39315d37e578b5c7b7609d4d37986d8b15e61dff71302922247bd5b42a8dc9b8c776e3fd3e9971c03630c21a15d73c4b55d0dce3a129ca4e94c", @generic="408d4dbb19033a71ed31422f67f52433613c26cbb0751c072e15458e10b80813256e405205786955c0eabc"]}, @nested={0x158, 0x2b, [@generic="4f61c9371bc46d200729c082074c23c7b1e5d62fba0c7bb37a2e86378cee231a15782ce42f36ee32bc6f4db300e614b809e2cb2936b0684dc78c09a3f5d20957dbae07c5ddf30c17b17864b1b278c300db04696449d99f9a7a7aed25c839e56af7818a8d4ccede7ce1b138be87ae027cc2f87a44b1948671085846a2a2d9c130778fe0f14f20a779cafd990e5f320076a36e2fe3338abbc66d83c7e270d417e6452feb708c80a8d4e2f8ea6df91856bb736716062c1a5461927162e1fa88bec87c1ffcd232023427", @generic="0e881ea4e96fc4bd93b754f0991b07a06f56a6f4ca", @typed={0xc, 0x74, @u64=0x200}, @typed={0x68, 0x8c, @binary="d0a70f36932b872ad6f86733919cfa6c07d1cd7211ce5dd255f58a3b861eb94745cf73e069442a76e49e0d8b96da440e4ce6cd63efb2c404f2cdbf97ac21619cabdb5dcdf38b750ae2f2d31bbf55ac6a6089db483acadbbc5e05a43f8735d5df8f3a3c"}]}, @generic="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", @generic="2ba90402f681cc25ab6848b7dd2cb302ee3b61290c5c1db60ee978dbaff7e19d35f8ef318bb4ec5aba815b6d1b5417735f196bf166c246bcd776a5e8cb2572906a5e90aa2f172d6bf5a0aba3ed3ce7f67e3f"]}, 0x17d0}, {&(0x7f0000001e00)={0x294, 0x35, 0x10c, 0x70bd27, 0x25dfdbfe, "", [@generic="308d5e735161dd83051ee35e6aaacd55725b7ea47112b25865b40cebc659933273e13a91e3a73f69cf01f73437886fb2e804148bbef26beed72dea1989775c093773346ede02adae10916e064ef5a661613584eafd98ddc64f4e616ab82256ac3b0914073602adf729421fe4e41386ee196aa43aded4c37d08cb3219b0562dfbcddaf233356049ffe7e7f3aadd4c2a7c8b60fa0f8dff57985364f907d657eb0b07ac", @nested={0x170, 0x3, [@generic="0daa69a84ce92d872795c5448ce7bcf32458738407dce3f718f7b1e466eb8e75d35996617c2c2310485500bbca34394d0834bc6cf32a768b3228783c8178911cfde6e36a121411146b94a3de406fb15778b2dcbaba02eddccb9cad1aaa1125f3aff7ea8ccdd233c5ba9a6c338e0334828afe117db94dba6795085593c9aca660d6df88a5906983dc5cb96a3e1eef354401b9d6d21f0f6e34a080f2eb3dbac25fa537e10e6423f3729fd754018e0ac9b2fdee37e36c97376a5587ee640b3287732fcfca62050a4a7188eb69bf73091bd4ed27a70ababb9e8d", @generic="000b4e7d5b642b0fbfd9d7fa5825a85e4ef163b64f0b862f05604f0aceb0653635ff89640991f9d8186e737629935b7f4ee5c2a8d37e593e9b684401986224f1afaeaaafc68727de3a2fd96c85e6c94b79081a61c18b2b28f4769d24a8db29a72b65ce362fced45a68d43be153b7e52a6778e2a29e791b9cf2538bf0c0", @typed={0x14, 0x20, @ipv6=@ipv4={[], [], @remote}}]}, @generic="0930e2100c3315028cb5f6b4c20373bbffeb2d2ad6921eae649ab76a061e64f0a7a37cfed4d3970889b086fff9939b169560ba378d94f86abf22a9661fa48ed7508b848a3ce11e8c4b3948686e6cd775554f23dc73e4ec7474805260936110084a1daeeda371f6f8e0066143ab9d97"]}, 0x294}, {&(0x7f00000020c0)={0xdc, 0x2a, 0x100, 0x70bd2d, 0x25dfdbfd, "", [@typed={0x8, 0x8a, @fd=r4}, @typed={0x10, 0xe, @str='\x96:-selinux\x00'}, @nested={0x44, 0x91, [@generic="a223d55ce02cbce1c75a05f483f5b82c630ecccee5b0336cb3f8adeb08b788ef862b24ff747c0b256ca58e1bdadc0733f7cbde005879959adebab049e3c3e9dc"]}, @generic="56d190bdc09223c4947ee914731f0d8801e1c777f7c28ad5", @generic="30ee26830354ebe9f50bcb6cb69857235d3195ef23d01cb9804c64b3066f94f0110ea5af8129039878fd4550e371ff642121916aa3ec389f344d06123c4324d53541a09d30efbc566a76196fff7291d019e01c789e527242"]}, 0xdc}, {&(0x7f00000021c0)={0x11a0, 0x1c, 0x300, 0x70bd25, 0x25dfdbfb, "", [@typed={0x8, 0x88, @fd=r4}, @generic="a6e7b955d35ad547fb86aaaf992d5054fdc1b5a22a99dbbfb71ddd715629a03aec77e733644049f8cb899d93e301772c64de2f9ac5d9e0370a5f22bf310342ce8f26bc34752d33a196220203331b0d18d7fa54dc8936a97c9489753788f4f24a7baa205e3a80a65e5743b13909877e2c2edd1a753c47803e676f59aaec73b819eddfa4f4514c5acf91598316010e41cece13cf5f2dfc174ec442fb3a8bf3bff89913e8a708fa833163ee032c210c87449dff65bbce5adc6ea79d825b497e96a037919b9a86fd45", @typed={0x8, 0xe, @fd=r0}, @typed={0x8, 0x69, @u32=0x5}, @typed={0x8, 0xf, @u32=0x7f}, @generic="6f2cb5d305e2a9c4d2c5ab0fecc33916be93de069e9b273223f1f8bfc59507e89f1c3c0978afcdba346ffb2a02f9c0b265060cd251183d4db6b0fee4d299d53dd1db6898251fac00a00c2de133f3ad9773dd6f28ff8c84cb5de155d92d948635154523c2092f1df09949cef7701b819863239c00533ebb40e6d60fd475bed61fc02523f7e9be421428feff0ba57b30bfce51b3765668036105c275", @typed={0x4, 0x22}, @nested={0x1008, 0x4f, [@typed={0x1004, 0x1f, @binary="68faf2f065f2e9ff81901d0f1e9e4c0fe5f663c5b017bb8c5e189c01cb6217da329309bf441a9c7c4e743d95d42679148a27d5ff2c00f475470f9eb4f5dc1661db3ac9846ef49438d3d1937a025f119b47d197401faedfd79d5ba60a22a81d0e50e45ba82837cb3e3dcf7539362d3be39bcb48893d4d2cc5cf1a44d4a46f6ebcd212a0cedea45e4593cf8c650d7fbf73da6dea5e442614b456f807ec8c4f8bfba5236925edf780135191e878e35f8271a95c2c1dcf9af71cde77197744f86724c0707e5918c6c7992efe735ec44766fe15f8c297a758873833b70e9dc592e20c1ca8949efeeb784f36a00dc12881a75070afbb0c383122a00da416e9858d3a8b2cd16d2aa9d6c1057c259cc530a05a0a07b2759c10c32c69a6e0e860c157a8d48e112440df2654030c9c800c5a764f8a934c80e964386be9d71e069619ea28875559f6e8ce8c2ef08c95d4e0b02f670a20d3d4dc6c15fd8fbb0535827d2e801e238b6e96a5da7c39b30c02448d7ef19ba5f01cec43c3bec9841019c6ccfe5f32ca74744628c6ab4658b8a46951ae264b54c2907292f9bfb08ca91de50614d67efc75dd1713182bf75e1bcacc979c3b4e35bce1fd04f3961b3b83b5da70a225177992fb4959d812a7ea99ab88736ffa61e572d68565eb17dfd77cb4235ca81affd353c99e00407ea6e533571acaa7c5d6bab31b720d26eb05d302feef1601af3bd6a6c5002ffa3a51befe3e5fb87dfd560cc43591c7a92900c1bd0c73d5051518e027739bc008adebacba08e660cdfc23044ee076f3567cbd066ea24282a8a430b579c87c95d7126e699ea1909d8908e11d85adf0209d5fd7f8c9503db2c644cf0413c339cf56157f1fd9145321ca3e661486511fae6167da524f0ecea7a458242eaeb06006df3f0c3dc1a6edec4612ea5a9f73a1471c3bf256f66c9945680f01851d46fe662631928220231f4418b01d5094b5fcc5f2efc9520525ec75b4ab8b3390640a35d032d3ebb0bdeb07ab86c0e3c21b3896869ee1c12f6d50f7e12bcd748540b429c430abaf63e1c1a31c1cf46dbeb10ec514f5d59fec20e46a55a36bf924d9096a8d3a3c96bc7ae14f9973599703c3949a271719c8d77682581fa2bdc78b1e4d578f4357fe341bd0bb3b032b10a3be1af44740e0a2ba57ce7942d919cc99ecde626ca5b25e1430cbc429f814e0708501aeb8771f127f88261dd71535b38ab056c6e1a2dcfd948f81de0cd14b827ab0d4fdfbc0bb5f083ad6aac99ecd7839c7314503647477d25c6944f62eec70af98149972c8172a4357c0d815cd67435087422d750cc8872ad71cc9ad722fd55afab31464b5ed97b7a3a14ec536d3a8bf2b5ad7412ca2d55549b26a6750507c4f7ca7cef399b7e404778ae967de5035570844fe41ccf7996599bffe1e2c7f8f05f8d3aee875bd54cc49e7d6799b19694ad5c527f10b54f069b9b780a5a4d827db22defc00a975c04b96eb8374b1edec934c1d6dadce02b27460e9f1538187309d1084386f6f1ad3b3577879d53bd77fda42be5b72ee2614f9d522753e1894cce70cfa054d7179b55c0447cd7365cebaa671b5fce809351e51df40a41a2e21f9e81c7800efe2649909086487f324b172f51570dcaae66c7668ee9aa3a6eda31c58b0bb87c1c06be31a15de11e927e465392c2debace131b5ccd4f54ae1f6eaedf140a7e08c4c0491d86889e30d7d77439993c9092ae4d5c7ac0bc46b8d2b4b5afadedabc3f1c7ff2e423f057c38c7fff2cb083860effd7788bf163d0fb5138efa9f94f613a3322ed06ffdf270d1fb29dd6045ef9e07bf8dd78ec8d008796ebae1e479ab816ba5d5916562f6b2c31d8698be657ae2fd494267d379e970a3594af07cbe3a30b8e8f321fc458ca1d21f50d70513a49691a1e7eb575fa9495caa89530e907d251478d1234dd3f7819aa12b9a6f07688408908362f3e53e040cdfdd27d3b0bdc1401d20c94d3376046d8f5ac173674074347e098b4d9c3a08b1f3555301009b81d8b8826ce3667dd7dc0b93d093712272d741f8013e5d90809fd0855eb3bdae662ccf3b13ef3f1cc5f16a9759d48078983694999205a4696b45800f1f36d91c4c9e543dd0283b58e095ba385212b23dd21b394514f4d68e786affd2e98414af64f252a1bd04cc9799d63948976eb26c46e02bb4dc523c88d9a3df40c988918c3afcd13af81193a53365b3fabd9791fdce5b990b2a3c9c197bc7dad27e633b44a47e6b9989d072005755a6aecb74cca246f0328f5ccdec376f69cb1fa0543ff22be266feac79c4b742faf34f36af610f8dea538f7cceb5ee51df2d2eedb84ed7731b54954cc1bc2c8912db9901e9ba8b8aa16b3476d7dc58be1cd0892bd9c6fe3765e1b93ef2c5398db629e1097ef6c7ca6449f82fcf0aca6f5128da149033d5f99a6297b855ab24d6dd8b7aec6a037c2ef98ea45917e970bfb810f92921648f66be70252a185e13aba65cbf607634a3cab355caccc9c265c7cad77fc35dcb3e59d8d96ae672d5f510e6b15375ac62cf6d780dbf6efc597aa6f885085ca1eccb310739394b54e06d50b12808ea0629242a78495c0bb4685c87f82b63989b3365ef864ac74d5942085243b7ddad869bac24a1e5f458a01d81c56ae4913e506ad045892f02ff4ab06d095a93a87fe643ddf9eb604e8d6559dd30a1b5d533b04af27b23bff4e4efc578b16f55b5ed432321c4bc6dcc78b6ab2ccfd25ddc15c023eb4473a49d30cc548e2acd6da79e3f7e5d8fe94dcd009eac0e86384f7cffa9ec2bdc43457d4603b69c55108cb3391c08b7de9a1dc59b9d83af31b6aab35e9d27d4bc3c2a57e18c8dfdde3f02d27c8061e8c3d4c7fb62c65256c59f0bafc06101b68c7335c2ae23479a41c36ea80334704e059bd0daa944136684e16c0007235ac8fc2cb3219e9e092f6c019feeecdd1a74f1c5a0cb4effce4ba2e0b0373fc31275c28eb62974370d48f232307d765ad9057128cb6fbc23e7ba6352169151b226009e774392f91537a767feb37c0ff0ccb1b0714e0b652bd39a10e8ab5d3101727edadb266850211a8d32f4ac636cd5ae194e043eda2170f931309c41d4191897d7a03045e7acfac6f27266812940d2726aeb76f2f15b2cf3b3f7f5dd1dfbde31aa4ff6e7fa46d555fef98977861c50a96a063fc2c23c0be2087b723f6a7b77f37bd3332f5a9747ca1cc21d4fbcad1918a2762770912fcde54c0aaec82ebc437e994ea59e06fe37ffe00cef80152eb738dc2ac67b5581b8edb6fb6a9d7338471a69d8783389304468fa34106c487a1a9f79b27ac10c39881ec8d77d0ac900416c713371fadae39d0369f20fa010bd7466ed29284972e346acc513c9a1f3cb418922ee5a93b1e29218f89114a59c4db4819378ac36b29f528feeafecf7101decbc0dc8e9aa89505599344b38e195535a35acf71427221cb87d92856e58350ea03b9daf98db7c3363795b84f869ff6ab4b4cc7996249e97ba7c8c6d6707bf89bbb2b7f41a89f24c1b9a0d1e8bae4d044fac2b85b045656f90a286a0bf5eab366753249db624a7a20174a377c1281cbd9ea9c828310fa801427489ff2fe9557cc1046d162ab4b15d744c00097856566e2a910e829c729e95aa3686184c6c7fbf0ad3051f7033b159484532c7782dd69f410ef8f3e64dcf26b3f39aa0eed3cad5a1ef5bb5ecd2b288c775ed07ea5f8749622a2055fb6d6da145e3d9090dbf6081cf3af3506eeae7962ad0ee987261b5383b8f9ecebf353cf5f5f8ade9fd24bcbfa87d7dc02bcdc5509871fbf03fdbe3fd2861bdd369b4e9792ea13c150b70215875cff82bad4d9b592a016fd4b5dbde8fd7a5bcb67b0887a01b1decad9b99cba190b55343cd392db3df61d48b10d307b0566d63393215ef1e1fa5aae5c9d8df5e76be7706bc18a5868a2de58b4d12bb70e4709138dc905628ab42b53fb9a53135456659f87e28ac92d844f6e070493a27ef3bffd4192c1fde51383405d6965224afc4d1056a96b963eb99300f8fc278d06874d944d2327fbd4b40b0b506e2995e82bcd22c2340e516e0d0b5b7e09b70d3fe446583367df2706e03809bc0090bcac80b78d5e3f26b95a125e0c88912de27ba9b65c9dbb46ca083e1dc5935e5a9fc52a55816f24865816ee03cce4645aec75f223ff89128075d6f5159790af8dc2559a9a52fde44a8768c98a34bc52c2d95cf52e910751020d205ff153976b99710090a94074a2ceb29b913bf015337d77033242dff7a7fc87043be01c18220f0f46c64265cd3cb7634a743f0e3c75f3c298423a59b2dde356df41ca343e372116bbc72103a0458d3b9a206c7ada9a90ff5fa01dff02d1cb0671f54a25df83fd2e5daa7200a6e0b782b685e46bfa4239a91d0cb5a815ad0064a067239ff5e3b08e0238d129f7989e47131fec881ed239037f84ae5133bdb52279b7acfe591461831e86b6a8047e7db76cc7e0cf8e22677366bd69e1548728805dc273e3d2508d1e90acfaad60d8d1da4e5c6a954770c74eb0b4b994e54c17f298509911b92112b40b6bae81ccb43b0cec35c6933d892424e5f8a0f908d3be5fe5a6591a10b25adfcc0b2b3580b6cb65bb2e48787ab3be1d2afa7d9533c8722e12266fdac360fe78ffda0f459cd3fd060f24fbe419d661e29662a379011cd44a4d5e368fc63e8a7b1e98c5f52d8c9376f7f63e1591fb1f1f91169388b429bf8fed78ea46337655a90ab4d45ad294ad08fc8f3dfc3310fe029534dd052204d2987d1134400987372115057d206a9f0568067fbfd770219abed50c4b5ef3fcfb29fc3f72e72371e68d5ae5243534bd86e2a7c826b302ecb7df76dd83f83bc57c62caf0073e39f344b16fb4cebf8abf1e6739f1c36ce0fadd93a6dd4148d187d4a68f5a67bb037105af7a7ed77cc8f49e86ffa3ab181b702f529951c3e1e9acdc42ec253e8294ce46d1a49c86fe392e8d187144b3e2ac3d95d6888268c8f0c780d4a3d9f3dcd7d45384477f7bedb9ba20881d15f2543f1d4d746a23da98571c49d4fc24bb8c94a798b77d30b4a05d4ca43c13d793f2e28818e6704d2acc47309ab3d5e84ad6802b6d20b03a57082b83db5b2028690079b1ed58dc4c93cb01cf1bb144ddac561f422045c8d89aab41da681d0dbc2071b5fd49d063505f2ffe4ef6e5a9d1b3fe0e92385586f70feba38037954968b94c82b371452e78e5260700c3f8d8f2ee0536001b158ae8de2ad9f24833e8ae5c0180729d62be245ce36c8a24bfce5d90b94f9088dfcb770738e170cfe7c57be3858e3c74853428cf0a397d17183daca1052c7cf44dd84ffac76066634909cdf5cca4fc41ac8e0e7eda8662afebdbe5288633395c25838330c8a1c2a1cf300e6e3b4c9e2303380114613ad1acb8d8b627ab7551d258df18a5a64d93293509c2b8f915b9cb7db01d2abd741cab8ae36df2a3a53c68e4f29c82aa83129655e21e61c48a3f49971b2dd08bd09db1ee8190032c617729ed33eb91309fffd52ad63fc2c52c8124b6a76c519cc81624b57c444ce6b04078686828458dbc92c4eddce8e645f92eb1c96c1980c4156310250e34aeedc2d85d7bf903d2b7bab409c08816ee21153402b14a68ee002eab8bc5451cef6588b893b2683b45c78272f32b3e8e3401dbea4f5eeb16d6fb34dc99cb26376306f774cace6a585e04c7c05fbee0635fa4f1e35c6a2a5c47358cdcc92e39110b2ec0e9adb1615dcd089aa5c9e8dc9f51088010cd0203c4cc02507568312a98ca71ac514e9d810f7ddc55d857ac5c83ce421ca4a4"}]}]}, 0x11a0}], 0x6, 0x0, 0x0, 0x4}, 0x80) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) [ 942.700661] audit: type=1400 audit(1556851486.539:362449): avc: denied { sys_admin } for pid=16576 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:44:49 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = dup3(r1, r1, 0x3e3f0a9b28434714) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7) fchdir(r0) open(&(0x7f00000002c0)='./bus\x00', 0xfffffffffffffffa, 0x80) r3 = creat(&(0x7f0000000700)='./bus\x00', 0x0) truncate(&(0x7f0000000080)='./bus\x00', 0x6eb0) removexattr(&(0x7f0000000040)='./bus\x00', &(0x7f00000000c0)=@known='trusted.overlay.opaque\x00') ioctl(r2, 0x20, &(0x7f0000000180)="6411c810cca9019d3f5d63bd938d65c22f5df49b60c8b7b0f0317ed3555fe3b68fa27b0156a38dc806f5ca30619e05d3332bac3e66ea515b62c8f4f77a3daa6a9e2a3e77fb9c963012a9f342aaa9d159a52390892c58dcb1122f5a222d5af1897a48d2e379c436b251587fa45a42d2cc341adb26229b5431110dc92e567a1dac0057c7c95c9923a356acf660f25c1c6cf87c9a") lseek(r3, 0x0, 0x4) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000280)={&(0x7f0000000240)='./bus\x00', 0x0, 0x10}, 0x10) 02:44:50 executing program 5: r0 = syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000700)=[@transaction_sg={0x40486311, {{0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x18, 0x0, &(0x7f0000000480)=[@flat={0x73622a85}], 0x0}}}], 0x0, 0x0, 0x0}) [ 942.701877] audit: type=1400 audit(1556851486.539:362450): avc: denied { sys_admin } for pid=16576 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 942.864616] audit: type=1400 audit(1556851486.699:362451): avc: denied { net_raw } for pid=16577 comm="syz-executor.3" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:44:56 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.net\x00', 0x200002, 0x0) fchdir(r1) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000000)=0x6, 0x4) r2 = creat(&(0x7f0000000400)='./file1\x00', 0x0) write$cgroup_type(r2, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x40100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lseek(r2, 0xffffffffffffffff, 0x4) write$P9_RLOCK(r2, 0x0, 0xffffffffffffff49) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e22, @multicast2}, 0x10) ioctl$void(r2, 0xc0045878) 02:44:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f319bd070") r1 = socket$inet(0x2, 0x8000e, 0x5) sendto$inet(r1, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) sendto$inet(r1, &(0x7f0000000300)="ed", 0x1, 0x8000, 0x0, 0x0) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/validatetrans\x00', 0x1, 0x0) recvmsg(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x2f2}, 0x0) sendto$inet(r1, &(0x7f0000000080)="dd", 0xffffff23, 0x0, 0x0, 0x0) [ 942.929538] audit: type=1400 audit(1556851486.769:362452): avc: denied { net_admin } for pid=11757 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 942.931469] audit: type=1400 audit(1556851486.769:362453): avc: denied { net_admin } for pid=11757 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 942.964427] audit: type=1400 audit(1556851486.799:362454): avc: denied { net_admin } for pid=13454 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 943.021146] audit: type=1400 audit(1556851486.859:362455): avc: denied { net_admin } for pid=13385 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 943.023061] audit: type=1400 audit(1556851486.859:362456): avc: denied { net_admin } for pid=13385 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 943.761220] input: syz1 as /devices/virtual/input/input26 [ 946.786910] audit_printk_skb: 6882 callbacks suppressed [ 946.786918] audit: type=1400 audit(1556851490.199:364522): avc: denied { net_admin } for pid=17124 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 946.786976] audit: type=1400 audit(1556851490.629:364765): avc: denied { net_admin } for pid=17148 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 946.788880] audit: type=1400 audit(1556851490.629:364766): avc: denied { net_admin } for pid=17124 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 946.788903] audit: type=1400 audit(1556851490.629:364767): avc: denied { net_admin } for pid=17148 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 946.791736] audit: type=1400 audit(1556851490.629:364768): avc: denied { net_admin } for pid=17149 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 946.792444] audit: type=1400 audit(1556851490.629:364769): avc: denied { net_admin } for pid=17093 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 946.793617] audit: type=1400 audit(1556851490.629:364770): avc: denied { net_admin } for pid=17149 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 946.794380] audit: type=1400 audit(1556851490.629:364771): avc: denied { net_admin } for pid=17093 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 946.794813] audit: type=1400 audit(1556851490.069:364427): avc: denied { net_admin } for pid=17038 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 946.796394] audit: type=1400 audit(1556851490.639:364772): avc: denied { net_admin } for pid=17146 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 951.796607] audit_printk_skb: 11620 callbacks suppressed [ 951.796616] audit: type=1400 audit(1556851495.639:368655): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 951.798452] audit: type=1400 audit(1556851495.639:368656): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 951.800360] audit: type=1400 audit(1556851495.639:368657): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 951.802192] audit: type=1400 audit(1556851495.639:368658): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 951.804232] audit: type=1400 audit(1556851495.639:368659): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 951.811635] audit: type=1400 audit(1556851495.649:368660): avc: denied { net_admin } for pid=13454 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 951.813564] audit: type=1400 audit(1556851495.649:368661): avc: denied { net_admin } for pid=13454 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 951.819050] audit: type=1400 audit(1556851495.659:368662): avc: denied { net_admin } for pid=16699 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 951.820926] audit: type=1400 audit(1556851495.659:368663): avc: denied { net_admin } for pid=16699 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 951.830401] audit: type=1400 audit(1556851495.669:368664): avc: denied { net_admin } for pid=16853 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 956.805832] audit_printk_skb: 9917 callbacks suppressed [ 956.805840] audit: type=1400 audit(1556851500.649:371996): avc: denied { net_admin } for pid=18876 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 956.807352] audit: type=1400 audit(1556851500.649:371997): avc: denied { net_admin } for pid=18845 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 956.808981] audit: type=1400 audit(1556851500.649:371998): avc: denied { net_admin } for pid=17471 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 956.809664] audit: type=1400 audit(1556851500.649:371999): avc: denied { net_admin } for pid=18816 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 956.810901] audit: type=1400 audit(1556851500.649:372000): avc: denied { net_admin } for pid=17471 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 956.811040] audit: type=1400 audit(1556851500.649:372001): avc: denied { net_admin } for pid=18920 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 956.812057] audit: type=1400 audit(1556851500.649:372002): avc: denied { net_admin } for pid=18787 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 956.813725] audit: type=1400 audit(1556851500.649:372003): avc: denied { net_admin } for pid=18951 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 956.814565] audit: type=1400 audit(1556851500.649:372004): avc: denied { net_admin } for pid=18809 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 956.814814] audit: type=1400 audit(1556851500.649:372005): avc: denied { net_admin } for pid=17532 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 961.815875] audit_printk_skb: 10312 callbacks suppressed [ 961.815884] audit: type=1400 audit(1556851505.659:375470): avc: denied { net_admin } for pid=19764 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 961.816110] audit: type=1400 audit(1556851505.659:375471): avc: denied { net_admin } for pid=19638 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 961.822570] audit: type=1400 audit(1556851505.659:375472): avc: denied { net_admin } for pid=18176 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 961.822589] audit: type=1400 audit(1556851505.659:375473): avc: denied { net_admin } for pid=16650 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 961.824529] audit: type=1400 audit(1556851505.659:375474): avc: denied { net_admin } for pid=16650 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 961.824535] audit: type=1400 audit(1556851505.659:375475): avc: denied { net_admin } for pid=18176 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 961.826083] audit: type=1400 audit(1556851505.669:375476): avc: denied { net_admin } for pid=19882 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 961.827825] audit: type=1400 audit(1556851505.669:375477): avc: denied { net_admin } for pid=19882 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 961.829450] audit: type=1400 audit(1556851505.669:375478): avc: denied { net_admin } for pid=19806 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 961.829881] audit: type=1400 audit(1556851505.669:375479): avc: denied { net_admin } for pid=18161 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 966.825312] audit_printk_skb: 10181 callbacks suppressed [ 966.825321] audit: type=1400 audit(1556851510.659:378884): avc: denied { net_admin } for pid=20658 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 966.826530] audit: type=1400 audit(1556851510.669:378885): avc: denied { net_admin } for pid=20732 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 966.828244] audit: type=1400 audit(1556851510.669:378886): avc: denied { net_admin } for pid=20732 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 966.830198] audit: type=1400 audit(1556851510.669:378887): avc: denied { net_admin } for pid=20733 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 966.830579] audit: type=1400 audit(1556851510.669:378888): avc: denied { net_admin } for pid=18550 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 966.832099] audit: type=1400 audit(1556851510.669:378889): avc: denied { net_admin } for pid=20733 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 966.832473] audit: type=1400 audit(1556851510.669:378890): avc: denied { net_admin } for pid=18550 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 966.833904] audit: type=1400 audit(1556851510.669:378891): avc: denied { net_admin } for pid=20734 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 966.836984] audit: type=1400 audit(1556851510.679:378892): avc: denied { net_admin } for pid=20735 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 966.837248] audit: type=1400 audit(1556851510.679:378893): avc: denied { net_admin } for pid=18558 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 971.836875] audit_printk_skb: 10003 callbacks suppressed [ 971.836884] audit: type=1400 audit(1556851515.679:382257): avc: denied { net_admin } for pid=21554 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 971.838625] audit: type=1400 audit(1556851515.679:382258): avc: denied { net_admin } for pid=17729 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 971.838791] audit: type=1400 audit(1556851515.679:382259): avc: denied { net_admin } for pid=21554 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 971.840559] audit: type=1400 audit(1556851515.679:382260): avc: denied { net_admin } for pid=17729 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 971.840723] audit: type=1400 audit(1556851515.679:382261): avc: denied { net_admin } for pid=21555 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 971.842461] audit: type=1400 audit(1556851515.679:382262): avc: denied { net_admin } for pid=21555 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 971.844362] audit: type=1400 audit(1556851515.679:382263): avc: denied { net_admin } for pid=17878 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 971.844400] audit: type=1400 audit(1556851515.679:382264): avc: denied { net_admin } for pid=21621 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 971.848649] audit: type=1400 audit(1556851515.689:382265): avc: denied { net_admin } for pid=19033 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 971.850614] audit: type=1400 audit(1556851515.689:382266): avc: denied { net_admin } for pid=19033 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 978.674095] audit_printk_skb: 3572 callbacks suppressed [ 978.674104] audit: type=1400 audit(1556851522.509:383452): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 978.678843] audit: type=1400 audit(1556851522.519:383453): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 978.703135] audit: type=1400 audit(1556851522.539:383454): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 978.725635] audit: type=1400 audit(1556851522.569:383455): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 978.780363] audit: type=1400 audit(1556851522.619:383456): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 978.782008] audit: type=1400 audit(1556851522.619:383457): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 978.783830] audit: type=1400 audit(1556851522.619:383458): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 978.845553] audit: type=1400 audit(1556851522.689:383459): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 978.847499] audit: type=1400 audit(1556851522.689:383460): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 978.849316] audit: type=1400 audit(1556851522.689:383461): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:45:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f0000000140)='X', 0x1, r0) r2 = request_key(0x0, 0x0, 0x0, 0xffffffffffffffff) ioctl$EVIOCSMASK(0xffffffffffffffff, 0x40104593, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000380)="d7", 0x1, r2) keyctl$session_to_parent(0x12) r3 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000340), 0x25c, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r3, r3}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'sha3-256-generic\x00\x00\xfe\xff\xff\x00'}}) 02:45:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x2f00, 0x0, 0x0, 0xa, 0x703d}}}, 0xb8}}, 0x0) 02:45:27 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) stat(0x0, &(0x7f0000000800)) lstat(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getgid() getuid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000015c0)) geteuid() getuid() fcntl$getownex(0xffffffffffffff9c, 0x10, 0x0) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002080)) getresuid(0x0, 0x0, &(0x7f0000002140)) r2 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) unshare(0x40000000) 02:45:27 executing program 3: recvmmsg(0xffffffffffffffff, &(0x7f0000002580), 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(0x0, 0x4) write$selinux_create(r0, 0x0, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x24) r3 = inotify_init() ioctl$sock_inet6_tcp_SIOCOUTQ(r2, 0x5411, 0x0) syncfs(r0) inotify_add_watch(r3, &(0x7f0000000080)='.\x00', 0xfe) openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x4000082) write$nbd(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="67446698010000000300eb2c54e907ec4300aded0420220400020000006517a42ac4cb7a63d1a97a7e5a31524e892eac4023b714a3202f99f16d060a35efd21affe238385d4de98c35d691bbbf35c5601687a77cfa847ae2650ba1a966858f89ecba5a489a8520ea6222248378848857a7c0695d547ba26fc19f209f27cc259ce3968934da00"/148], 0x1) sendfile(r4, r4, &(0x7f0000000200), 0xa198) 02:45:27 executing program 1: perf_event_open(&(0x7f0000000580)={0x2, 0x70, 0x5c64, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) 02:45:27 executing program 5: syz_execute_func(&(0x7f00000003c0)="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") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) [ 983.700813] audit_printk_skb: 132 callbacks suppressed [ 983.700822] audit: type=1400 audit(1556851527.539:383506): avc: denied { net_admin } for pid=22675 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 983.710767] audit: type=1400 audit(1556851527.549:383507): avc: denied { net_admin } for pid=18763 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 983.839247] audit: type=1400 audit(1556851527.679:383508): avc: denied { net_admin } for pid=18759 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 983.844920] audit: type=1400 audit(1556851527.679:383509): avc: denied { net_admin } for pid=22681 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 983.850657] audit: type=1400 audit(1556851527.689:383510): avc: denied { net_admin } for pid=21076 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 983.922920] audit: type=1400 audit(1556851527.759:383511): avc: denied { net_admin } for pid=22686 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 983.924942] audit: type=1400 audit(1556851527.759:383512): avc: denied { net_admin } for pid=22686 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:45:30 executing program 5: syz_execute_func(&(0x7f00000003c0)="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") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) 02:45:30 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) stat(0x0, &(0x7f0000000800)) lstat(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getgid() getuid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000015c0)) geteuid() getuid() fcntl$getownex(0xffffffffffffff9c, 0x10, 0x0) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002080)) getresuid(0x0, 0x0, &(0x7f0000002140)) r2 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) unshare(0x40000000) 02:45:30 executing program 4: r0 = socket$inet6(0x18, 0x2, 0x0) r1 = dup2(r0, r0) sendmsg$unix(r1, &(0x7f0000001700)={&(0x7f0000000300)=ANY=[@ANYBLOB="fb18000066696c651486"], 0x1, 0x0}, 0x0) [ 983.956431] audit: type=1400 audit(1556851527.799:383513): avc: denied { net_admin } for pid=22681 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 983.957376] audit: type=1400 audit(1556851527.799:383514): avc: denied { net_admin } for pid=22685 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 983.959195] audit: type=1400 audit(1556851527.799:383515): avc: denied { net_admin } for pid=22685 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:45:32 executing program 2: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000200)) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0x0, &(0x7f00000000c0)="ef71c0f2faac79d73d743a5626f914ce5541a34fad94e12b50dac9c6553e11525d4005d5a1f5565dd4a38b303d9a7a95c1969e148fe11bdf97") 02:45:34 executing program 3: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000280)={0xf97cff8c, 0x8, 'SE Linux', "1200000000c46f0006000000070000003c9f0300000000000000c27ed0e81f00030000000000000067681bfd070000000100000000fb6c7a2ce29af91ad4861daf1b0d"}, 0x53) 02:45:34 executing program 5: syz_execute_func(&(0x7f00000003c0)="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") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) [ 988.738311] audit_printk_skb: 828 callbacks suppressed [ 988.738320] audit: type=1400 audit(1556851532.579:383795): avc: denied { net_admin } for pid=16894 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 988.740332] audit: type=1400 audit(1556851532.579:383796): avc: denied { net_admin } for pid=16894 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 988.741914] audit: type=1400 audit(1556851532.579:383797): avc: denied { net_admin } for pid=22039 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:45:43 executing program 2: r0 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000000)={'syz', 0x0}, &(0x7f0000000140)='X', 0x1, r0) add_key$user(0x0, 0x0, &(0x7f0000000380)="d7", 0x1, 0x0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000340), 0x25c, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000080)={r1, r2, r2}, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={'sha3-256-generic\x00\x00\xfe\xff\xff\x00'}}) 02:45:44 executing program 4: open(&(0x7f0000103ff8)='./file0\x00', 0x141042, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() mount(&(0x7f0000000040)=ANY=[@ANYBLOB="5b643a3a5d2c303aff623a"], 0x0, &(0x7f0000000140)='ceph\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) gettid() tkill(r0, 0x8) wait4(0x0, 0x0, 0x0, 0x0) 02:45:45 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() nanosleep(&(0x7f0000000380)={0x77359400}, &(0x7f00000003c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0xb) 02:45:45 executing program 5: syz_execute_func(&(0x7f00000003c0)="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") mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0, 0x2172, 0xffffffffffffffff, 0x0) [ 988.743767] audit: type=1400 audit(1556851532.579:383798): avc: denied { net_admin } for pid=22039 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 988.745413] audit: type=1400 audit(1556851532.579:383799): avc: denied { net_admin } for pid=22154 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 988.747281] audit: type=1400 audit(1556851532.589:383800): avc: denied { net_admin } for pid=22154 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 988.760187] audit: type=1400 audit(1556851532.599:383801): avc: denied { net_admin } for pid=22005 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 988.762139] audit: type=1400 audit(1556851532.599:383802): avc: denied { net_admin } for pid=17071 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 988.762145] audit: type=1400 audit(1556851532.599:383803): avc: denied { net_admin } for pid=22005 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 988.763414] audit: type=1400 audit(1556851532.599:383804): avc: denied { net_admin } for pid=22187 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 993.746527] audit_printk_skb: 6462 callbacks suppressed [ 993.746535] audit: type=1400 audit(1556851537.589:385965): avc: denied { net_admin } for pid=23553 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 993.748206] audit: type=1400 audit(1556851537.589:385966): avc: denied { net_admin } for pid=23553 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 993.749926] audit: type=1400 audit(1556851537.589:385967): avc: denied { net_admin } for pid=23556 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 993.751607] audit: type=1400 audit(1556851537.589:385968): avc: denied { net_admin } for pid=23556 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:46:07 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_int(r0, 0x0, 0xa, 0x0, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) write$binfmt_elf64(r0, &(0x7f00000011c0)=ANY=[@ANYBLOB="7f454c46000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000038"], 0x37) 02:46:07 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff00c}, {0x80000006}]}, 0x10) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000140)={0x2, 0x81, 0x6, 0x8, 0x10001, 0x80000000}) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000000000004000000000000000000000040000000000000000000000000000000000000000000380000000000000000000000000000000000000000030000000000000000000000080000000000000000000000000000000000000000000000000000000000000000a7bf92ae231d008ade6043dd4eba08295a92af544a74b8b823007e0c4f0206008f80f44f3aae24cb81c0d3bbb20a8d154b8638b18b0000000000008000fb6c0c9deaa2d6e3e6316ea0cd3ac8af310beb66ac1d1c38fc98d682156f7598a8b46fbebb2fd197d2aaa461ff"], 0x78) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) 02:46:07 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents64(r0, &(0x7f0000000440)=""/186, 0x760) getdents64(r0, &(0x7f0000000100)=""/81, 0xfffffe9a) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x40, 0x0) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f0000000200)) getdents(r0, &(0x7f0000000500)=""/4096, 0x1000) [ 993.753290] audit: type=1400 audit(1556851537.589:385969): avc: denied { net_admin } for pid=23558 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 993.754947] audit: type=1400 audit(1556851537.589:385970): avc: denied { net_admin } for pid=23558 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 993.756649] audit: type=1400 audit(1556851537.599:385971): avc: denied { net_admin } for pid=23564 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 993.759371] audit: type=1400 audit(1556851537.599:385972): avc: denied { net_admin } for pid=23564 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 993.761135] audit: type=1400 audit(1556851537.599:385973): avc: denied { net_admin } for pid=23550 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 993.762751] audit: type=1400 audit(1556851537.599:385974): avc: denied { net_admin } for pid=23550 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 998.755664] audit_printk_skb: 11271 callbacks suppressed [ 998.755673] audit: type=1400 audit(1556851542.599:389747): avc: denied { net_admin } for pid=24524 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 998.757042] audit: type=1400 audit(1556851542.599:389748): avc: denied { net_admin } for pid=24508 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 998.757120] audit: type=1400 audit(1556851542.599:389749): avc: denied { net_admin } for pid=24524 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 998.758950] audit: type=1400 audit(1556851542.599:389750): avc: denied { net_admin } for pid=24508 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 998.759107] audit: type=1400 audit(1556851542.599:389751): avc: denied { net_admin } for pid=24546 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 998.760938] audit: type=1400 audit(1556851542.599:389752): avc: denied { net_admin } for pid=24510 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 998.761019] audit: type=1400 audit(1556851542.599:389753): avc: denied { net_admin } for pid=24546 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 998.762863] audit: type=1400 audit(1556851542.599:389754): avc: denied { net_admin } for pid=24510 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 998.762982] audit: type=1400 audit(1556851542.599:389755): avc: denied { net_admin } for pid=24548 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 998.764821] audit: type=1400 audit(1556851542.599:389756): avc: denied { net_admin } for pid=24516 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1003.765229] audit_printk_skb: 9511 callbacks suppressed [ 1003.765237] audit: type=1400 audit(1556851547.589:392934): avc: denied { net_admin } for pid=25330 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1003.766467] audit: type=1400 audit(1556851547.609:392940): avc: denied { net_admin } for pid=25330 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1003.767853] audit: type=1400 audit(1556851547.609:392941): avc: denied { net_admin } for pid=23540 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1003.768409] audit: type=1400 audit(1556851547.609:392942): avc: denied { net_admin } for pid=25331 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1003.769742] audit: type=1400 audit(1556851547.609:392943): avc: denied { net_admin } for pid=23540 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1003.770261] audit: type=1400 audit(1556851547.609:392944): avc: denied { net_admin } for pid=25331 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1003.771962] audit: type=1400 audit(1556851547.609:392945): avc: denied { net_admin } for pid=25332 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1003.773753] audit: type=1400 audit(1556851547.609:392946): avc: denied { net_admin } for pid=25332 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1003.775749] audit: type=1400 audit(1556851547.619:392947): avc: denied { net_admin } for pid=25333 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1003.777393] audit: type=1400 audit(1556851547.619:392948): avc: denied { net_admin } for pid=24281 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1008.776839] audit_printk_skb: 9996 callbacks suppressed [ 1008.776847] audit: type=1400 audit(1556851552.619:396310): avc: denied { net_admin } for pid=26192 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1008.778778] audit: type=1400 audit(1556851552.619:396311): avc: denied { net_admin } for pid=26192 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1008.778939] audit: type=1400 audit(1556851552.619:396312): avc: denied { net_admin } for pid=24423 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1008.780729] audit: type=1400 audit(1556851552.619:396313): avc: denied { net_admin } for pid=26194 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1008.780889] audit: type=1400 audit(1556851552.619:396314): avc: denied { net_admin } for pid=24423 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1008.782466] audit: type=1400 audit(1556851552.619:396315): avc: denied { net_admin } for pid=26194 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1008.784449] audit: type=1400 audit(1556851552.619:396316): avc: denied { net_admin } for pid=26196 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1008.784649] audit: type=1400 audit(1556851552.619:396317): avc: denied { net_admin } for pid=23452 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1008.788709] audit: type=1400 audit(1556851552.629:396318): avc: denied { net_admin } for pid=23716 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1008.790655] audit: type=1400 audit(1556851552.629:396319): avc: denied { net_admin } for pid=23716 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1013.786902] audit_printk_skb: 9983 callbacks suppressed [ 1013.786910] audit: type=1400 audit(1556851557.629:399660): avc: denied { net_admin } for pid=26995 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1013.788848] audit: type=1400 audit(1556851557.629:399661): avc: denied { net_admin } for pid=26995 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1013.788887] audit: type=1400 audit(1556851557.629:399662): avc: denied { net_admin } for pid=23467 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1013.790835] audit: type=1400 audit(1556851557.629:399663): avc: denied { net_admin } for pid=23467 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1013.790844] audit: type=1400 audit(1556851557.629:399664): avc: denied { net_admin } for pid=26997 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1013.800433] audit: type=1400 audit(1556851557.639:399665): avc: denied { net_admin } for pid=22798 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1013.800460] audit: type=1400 audit(1556851557.639:399666): avc: denied { net_admin } for pid=23189 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1013.802384] audit: type=1400 audit(1556851557.639:399667): avc: denied { net_admin } for pid=22798 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1013.802391] audit: type=1400 audit(1556851557.639:399668): avc: denied { net_admin } for pid=23189 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:46:10 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) stat(0x0, &(0x7f0000000800)) lstat(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getgid() getuid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000015c0)) geteuid() getuid() fcntl$getownex(0xffffffffffffff9c, 0x10, 0x0) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002080)) getresuid(0x0, 0x0, &(0x7f0000002140)) r2 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) unshare(0x40000000) 02:46:10 executing program 5: r0 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000440)='/selinux/policy\x00', 0x0, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'rose0\x00', 0x20}) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) getresuid(0x0, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000000)=ANY=[], 0x323) write$ppp(r0, &(0x7f0000000540)="a8d2a967ac84e04054ee86be036acf7e49be11baa374d88a2f457f9c5cfc78980556f686a4816dcbdbddea9d2c96551f778d5b6118be8b74bf5a9b2eb5f1c27b6c2aaf536f2c3911da94092a8f474067646c7fc1b8725a21b13777a9232079b82bf6ed11c87ed1bf7b7ea229a377e8833ac04622c07996efd35ffb51548c1c054dba2babe73c14b281ec237f45ff8acfa12e9981650e91acb104c6e3e5cf445425c0b9b88c6fd5303e8836ee5fcfafa2b7", 0xb1) select(0x40, &(0x7f00000000c0)={0x1c, 0x3, 0x7, 0x0, 0x7, 0x0, 0x7fffffff, 0x7}, &(0x7f0000000180)={0x7f, 0x101, 0x0, 0x800, 0x5, 0x400, 0x8}, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000480)={{0xef, @multicast2, 0x4e23, 0x0, 'nq\x00', 0x8, 0x80000001, 0x26}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e24, 0x10004, 0x8001, 0xe00000, 0x9}}, 0x44) r3 = creat(&(0x7f0000000380)='./bus\x00', 0x0) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000040)) r5 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) ioctl$UI_SET_ABSBIT(r5, 0x40045567, 0x0) r6 = socket(0x10, 0x80002, 0x0) bind$netlink(r6, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc) write(r6, &(0x7f0000000140)="2600000022004701050000000000000005006d20002b1f000a4a51f1ee839cd53400b017ca5b", 0x26) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) connect$netlink(r6, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) fcntl$lock(r5, 0x24, &(0x7f0000000080)={0x2, 0x2, 0x3}) ioctl$FS_IOC_SETFSLABEL(r5, 0x41009432, &(0x7f0000000600)="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") setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000b4bffc), 0x4) sendto(r6, &(0x7f0000000340), 0xac, 0x0, 0x0, 0x0) recvmmsg(r6, &(0x7f0000000780), 0x3ffffffffffff81, 0x2, 0x0) write$selinux_create(r3, &(0x7f00000003c0)=@access={'system_u:object_r:inetd_var_run_t:s0', 0x20, '/usr/sbin/cupsd'}, 0x4a) write$binfmt_misc(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="000000000000008b000000000000"], 0xe) sendfile(r2, r5, &(0x7f0000000140), 0x8fff) 02:46:10 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x19, &(0x7f0000000180)=0x1ff, 0x4) ioctl(r0, 0x4, &(0x7f0000000140)="05e31e123c123ff971294826048d050044a79bd070") setsockopt$inet6_int(r0, 0x29, 0x3e, &(0x7f0000000000)=0xff, 0x1a4) sendto$inet6(r0, 0x0, 0x0, 0x8000, &(0x7f0000000300)={0xa, 0x4e1f, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0xfffffffffffffea7, 0x0, &(0x7f0000000200)={0xa, 0x0, 0x0, @dev}, 0x1c) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000080)={0xfffffffffffff277, 0x7, 0x9875}) 02:46:10 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000000)=""/11, 0xb) r1 = dup2(r0, r0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f00000006c0)="410f01f964ff0941c3c4e2c99758423e46d8731266420fe2e33e0f1110c442019dcc6f") ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mknod(&(0x7f0000000140)='./file1\x00', 0x40, 0x0) execve(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 02:46:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000040)=[{&(0x7f0000000240)="39000000130009006900000000600000ab0080482900000046000107a2770014190002000d000000000003f5000000000000ef38bf461e59d7", 0x39}], 0x1) [ 1013.804481] audit: type=1400 audit(1556851557.639:399669): avc: denied { net_admin } for pid=23338 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1018.795510] audit_printk_skb: 9785 callbacks suppressed [ 1018.795518] audit: type=1400 audit(1556851562.639:402970): avc: denied { net_admin } for pid=25385 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1018.796896] audit: type=1400 audit(1556851562.639:402971): avc: denied { net_admin } for pid=25407 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1018.798228] audit: type=1400 audit(1556851562.639:402972): avc: denied { net_admin } for pid=27804 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1018.798813] audit: type=1400 audit(1556851562.639:402973): avc: denied { net_admin } for pid=25408 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1018.800152] audit: type=1400 audit(1556851562.639:402974): avc: denied { net_admin } for pid=27804 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:46:12 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[], 0xfffffcbe) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000040)='#', 0x1}], 0x1, 0x0) lseek(r0, 0x0, 0x3) fallocate(r2, 0x40, 0x3, 0x5) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) [ 1018.800748] audit: type=1400 audit(1556851562.639:402975): avc: denied { net_admin } for pid=25408 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:46:13 executing program 2: mknod(&(0x7f00000000c0)='./file0\x00', 0x1124, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r0 = creat(&(0x7f0000000440)='./file0\x00', 0x0) ioctl$int_in(r0, 0x5452, &(0x7f0000000040)=0x3ff) [ 1018.801984] audit: type=1400 audit(1556851562.639:402976): avc: denied { net_admin } for pid=27819 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1018.803650] audit: type=1400 audit(1556851562.639:402977): avc: denied { net_admin } for pid=27819 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1018.811740] audit: type=1400 audit(1556851562.649:402978): avc: denied { net_admin } for pid=24296 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1018.811751] audit: type=1400 audit(1556851562.649:402979): avc: denied { net_admin } for pid=24292 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1023.807493] audit_printk_skb: 2982 callbacks suppressed [ 1023.807502] audit: type=1400 audit(1556851567.649:403978): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1023.864919] audit: type=1400 audit(1556851567.699:403979): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1023.868373] audit: type=1400 audit(1556851567.709:403980): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1023.872145] audit: type=1400 audit(1556851567.709:403981): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:46:18 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2000, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0xbb40, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) stat(0x0, &(0x7f0000000800)) lstat(0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, 0x0) lstat(0x0, 0x0) getgid() getuid() ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000015c0)) geteuid() getuid() fcntl$getownex(0xffffffffffffff9c, 0x10, 0x0) getegid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002080)) getresuid(0x0, 0x0, &(0x7f0000002140)) r2 = perf_event_open(&(0x7f0000000080)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) unshare(0x40000000) 02:46:18 executing program 4: r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000140)='/selinux/load\x00', 0x2, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75781200000000c46f0006000000070000003c9f0320000000000000c27ed0e81f00030000000000000067681bfd070000000000000000f829d1fb6c7a"], 0x4b) [ 1023.875740] audit: type=1400 audit(1556851567.719:403982): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1023.879125] audit: type=1400 audit(1556851567.719:403983): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:46:27 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x6, &(0x7f00000001c0)="0afc1f123fb924d18b9172511bc43c1224509b9a00f3") write(r0, &(0x7f00000000c0)="da7bdc9b57b45569fc888178f6a69b5666333ee2f697f1c0978c329edb151f08893a33308ae02d030a67aac9e5e574e40a2c80e760884319665ee4df9c7f9d29a8b9faafbfdfa51d80bd665c51eec3347c7a25ef09b0d75da027c546c1a0a4f5149e5fa12f74feef35a38d5bcaf0b2b67d8178d2129c3f8b4426d8cd7e566872d3286f3a6d35f2f3634017c615672b9cd7f3aa4bee83f3724d", 0x99) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003840)=[{{0x0, 0x0, &(0x7f0000002b80)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='environ\x00') preadv(r2, &(0x7f00000017c0), 0x100000000000020e, 0x0) 02:46:27 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000080), 0x1c) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000100)={&(0x7f0000000840)=ANY=[@ANYBLOB="6241030000", @ANYRES16=r2, @ANYBLOB="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"/874], 0x370}, 0x1, 0x0, 0x0, 0x4004804}, 0x841) r3 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x131f64) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() setsockopt$inet_msfilter(r3, 0x0, 0x29, 0x0, 0xff48) ptrace$setopts(0x4206, r4, 0x0, 0x0) sendmsg$nl_netfilter(r1, &(0x7f0000000200)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f00000001c0)={&(0x7f0000000640)={0x1f0, 0x10, 0x7, 0x430, 0x70bd2c, 0x25dfdbfb, {0x1, 0x0, 0xa}, [@generic="868ab8df5b5195d6d97a3469524090d5ecb039dfa7948c83cc47eba50135b04888a23aec7d76e909ce64cbddc359ee3f060f356a50582086fa107cc4a4ce56e6225b46db08ba12da9ec0f5d869f48b9d21fb9b20bd3130cd610c33bb11128df79a8cfa0c6ce76b7e1fdfcec54f92b7cf0416c24afcd933a1b09c46b648cfd482f9eae2240d852e34d06696dcce233ca32ee9a6ea5171e3a9aa9025edc3f5c8e48deccd10790f6cf8568c531c6cdef97791ffc51602aaab5bdf588deee4759e1084b71ef0ab78360ffb083a1b7837eee645a13347175987e3511da20e5d3a7c96241b83f6", @nested={0xf0, 0x8d, [@generic="f556b9d4ebdd459ec6", @generic="b3c1bdd185ab76b65f606fb46f2fc9a154fbf25c83", @generic="33fc526ede41dbb07dfd12b45d52fda6dd6bf3042183c54adaea2b2e868f657da34047b812db2a5d04a7acfbebea5b7027ca91a5204d0a09ab7b7547a6aea175f71a097a4efc92bffe6e9feee7102fd363d5d57a4d205f2013e7142ebb89f8a9b482f490ef8849edfee58529609014dc51f51d3432644c554edc06b7d3819081d95f2cc97db65b4956f9d819758128dc840fd2591fde6307859a02e7dabf208953368fc160518cc6420d7b3f3905c54fd3ba731c109d7ef5a0e081c5587a9362b65cb9e7fe3e0acbd1d1b76fce74"]}, @typed={0x8, 0x8d, @u32=0x9}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x20040080}, 0x20000000) tkill(r4, 0x2b) fcntl$setstatus(r0, 0x4, 0x1000000000042803) [ 1023.882342] audit: type=1400 audit(1556851567.719:403984): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:46:32 executing program 4: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000003880)={0x0, 0x989680}) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f0000e95fe0), 0x20) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r0, &(0x7f0000000040), 0x0, 0x51) fcntl$setstatus(r0, 0x4, 0x4400) [ 1023.967622] audit: type=1400 audit(1556851567.809:403985): avc: denied { sys_admin } for pid=28746 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:46:33 executing program 2: clone(0x13102001ffa, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3d) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/mls\x00', 0x0, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f0000000040)=[0x1, 0x5]) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x4, 0x0, 0xf0, 0x1}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1f, r0, 0x0, 0x0) [ 1023.968952] audit: type=1400 audit(1556851567.809:403986): avc: denied { sys_admin } for pid=28746 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1023.973989] audit: type=1400 audit(1556851567.809:403987): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1027.597092] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=28770 comm=syz-executor.5 [ 1028.920962] audit_printk_skb: 315 callbacks suppressed [ 1028.920973] audit: type=1400 audit(1556851572.759:404093): avc: denied { net_admin } for pid=28763 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1029.052089] audit: type=1400 audit(1556851572.889:404094): avc: denied { sys_admin } for pid=2106 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1029.053782] audit: type=1400 audit(1556851572.889:404095): avc: denied { sys_admin } for pid=2106 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1029.122646] audit: type=1400 audit(1556851572.949:404096): avc: denied { sys_admin } for pid=2106 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1029.222562] audit: type=1400 audit(1556851573.059:404097): avc: denied { sys_admin } for pid=2106 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1029.718699] audit: type=1400 audit(1556851573.539:404098): avc: denied { net_admin } for pid=23804 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1029.720437] audit: type=1400 audit(1556851573.539:404099): avc: denied { net_admin } for pid=23804 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1029.727240] audit: type=1400 audit(1556851573.569:404100): avc: denied { net_admin } for pid=24944 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1029.808231] audit: type=1400 audit(1556851573.649:404101): avc: denied { sys_admin } for pid=2109 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1029.810066] audit: type=1400 audit(1556851573.649:404102): avc: denied { sys_admin } for pid=2109 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1033.953014] audit_printk_skb: 186 callbacks suppressed [ 1033.956321] audit: type=1400 audit(1556851577.779:404165): avc: denied { net_admin } for pid=28986 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1033.979818] audit: type=1400 audit(1556851577.819:404166): avc: denied { net_admin } for pid=24285 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1033.981697] audit: type=1400 audit(1556851577.819:404167): avc: denied { net_admin } for pid=24285 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1033.990344] audit: type=1400 audit(1556851577.829:404168): avc: denied { net_admin } for pid=23789 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1033.990522] audit: type=1400 audit(1556851577.829:404169): avc: denied { net_admin } for pid=27859 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1033.992259] audit: type=1400 audit(1556851577.829:404170): avc: denied { net_admin } for pid=23789 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1033.992441] audit: type=1400 audit(1556851577.829:404171): avc: denied { net_admin } for pid=27859 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1033.999486] audit: type=1400 audit(1556851577.839:404172): avc: denied { net_admin } for pid=23609 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1034.002340] audit: type=1400 audit(1556851577.839:404173): avc: denied { net_admin } for pid=23609 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1034.007194] audit: type=1400 audit(1556851577.849:404174): avc: denied { net_admin } for pid=25435 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1038.945235] audit_printk_skb: 3914 callbacks suppressed [ 1038.945243] audit: type=1400 audit(1556851582.779:405485): avc: denied { net_admin } for pid=29499 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1038.947351] audit: type=1400 audit(1556851582.789:405486): avc: denied { net_admin } for pid=29515 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1038.947661] audit: type=1400 audit(1556851582.789:405487): avc: denied { sys_admin } for pid=2109 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1038.949273] audit: type=1400 audit(1556851582.789:405488): avc: denied { net_admin } for pid=29515 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1038.951244] audit: type=1400 audit(1556851582.789:405489): avc: denied { net_admin } for pid=29380 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1038.953145] audit: type=1400 audit(1556851582.789:405490): avc: denied { net_admin } for pid=29380 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1038.955123] audit: type=1400 audit(1556851582.789:405491): avc: denied { net_admin } for pid=29387 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1038.956821] audit: type=1400 audit(1556851582.799:405492): avc: denied { net_admin } for pid=29403 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1038.958547] audit: type=1400 audit(1556851582.799:405493): avc: denied { net_admin } for pid=29403 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1038.959827] audit: type=1400 audit(1556851582.799:405494): avc: denied { net_admin } for pid=29412 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1043.958174] audit_printk_skb: 10469 callbacks suppressed [ 1043.958183] audit: type=1400 audit(1556851587.799:408997): avc: denied { net_admin } for pid=29847 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1043.959825] audit: type=1400 audit(1556851587.799:408998): avc: denied { net_admin } for pid=29845 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1043.960123] audit: type=1400 audit(1556851587.799:408999): avc: denied { net_admin } for pid=29847 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1043.961712] audit: type=1400 audit(1556851587.799:409000): avc: denied { net_admin } for pid=29845 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1043.962667] audit: type=1400 audit(1556851587.799:409001): avc: denied { net_admin } for pid=30433 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1043.964538] audit: type=1400 audit(1556851587.799:409002): avc: denied { net_admin } for pid=30433 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1043.964650] audit: type=1400 audit(1556851587.799:409003): avc: denied { net_admin } for pid=29824 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1043.965185] audit: type=1400 audit(1556851587.759:408980): avc: denied { net_admin } for pid=29842 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1043.966551] audit: type=1400 audit(1556851587.809:409004): avc: denied { net_admin } for pid=30429 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1043.967084] audit: type=1400 audit(1556851587.809:409005): avc: denied { net_admin } for pid=29842 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1048.968697] audit_printk_skb: 10281 callbacks suppressed [ 1048.968706] audit: type=1400 audit(1556851592.809:412447): avc: denied { net_admin } for pid=29772 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1048.968861] audit: type=1400 audit(1556851592.809:412448): avc: denied { net_admin } for pid=29789 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1048.970644] audit: type=1400 audit(1556851592.809:412449): avc: denied { net_admin } for pid=29772 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1048.976654] audit: type=1400 audit(1556851592.819:412451): avc: denied { net_admin } for pid=29800 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1048.978435] audit: type=1400 audit(1556851592.819:412452): avc: denied { net_admin } for pid=29800 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1048.978542] audit: type=1400 audit(1556851592.809:412450): avc: denied { net_admin } for pid=29789 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1048.979534] audit: type=1400 audit(1556851592.819:412453): avc: denied { net_admin } for pid=31309 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1048.979572] audit: type=1400 audit(1556851592.819:412454): avc: denied { net_admin } for pid=30130 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:46:57 executing program 5: r0 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) fsetxattr$trusted_overlay_nlink(r0, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'L+', 0x28e7}, 0x28, 0x3) syz_execute_func(&(0x7f0000000200)="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") openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) 02:46:57 executing program 2: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='system_u:object_r:systemd_logind_var_run_t:s0 unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 00000000000000000001I@@%FD'], 0x183) [ 1048.981501] audit: type=1400 audit(1556851592.819:412455): avc: denied { net_admin } for pid=31321 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1048.981534] audit: type=1400 audit(1556851592.819:412456): avc: denied { net_admin } for pid=30130 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1053.981869] audit_printk_skb: 9752 callbacks suppressed [ 1053.981878] audit: type=1400 audit(1556851597.819:415734): avc: denied { net_admin } for pid=30592 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1053.981885] audit: type=1400 audit(1556851597.819:415735): avc: denied { net_admin } for pid=30586 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1053.983809] audit: type=1400 audit(1556851597.819:415736): avc: denied { net_admin } for pid=30586 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1053.983878] audit: type=1400 audit(1556851597.819:415737): avc: denied { net_admin } for pid=30592 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1053.985389] audit: type=1400 audit(1556851597.819:415738): avc: denied { net_admin } for pid=30640 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1053.987111] audit: type=1400 audit(1556851597.829:415739): avc: denied { net_admin } for pid=30640 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1053.989059] audit: type=1400 audit(1556851597.829:415740): avc: denied { net_admin } for pid=31989 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1053.989354] audit: type=1400 audit(1556851597.829:415741): avc: denied { net_admin } for pid=30706 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1053.990974] audit: type=1400 audit(1556851597.829:415742): avc: denied { net_admin } for pid=31989 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1053.991263] audit: type=1400 audit(1556851597.829:415743): avc: denied { net_admin } for pid=30706 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1058.991335] audit_printk_skb: 10129 callbacks suppressed [ 1058.991344] audit: type=1400 audit(1556851602.829:419132): avc: denied { net_admin } for pid=30078 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1058.991366] audit: type=1400 audit(1556851602.829:419133): avc: denied { net_admin } for pid=30031 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1058.993289] audit: type=1400 audit(1556851602.829:419134): avc: denied { net_admin } for pid=30078 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1058.993305] audit: type=1400 audit(1556851602.829:419135): avc: denied { net_admin } for pid=30031 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1058.998623] audit: type=1400 audit(1556851602.839:419136): avc: denied { net_admin } for pid=30079 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1059.000259] audit: type=1400 audit(1556851602.839:419137): avc: denied { net_admin } for pid=29027 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1059.000559] audit: type=1400 audit(1556851602.839:419138): avc: denied { net_admin } for pid=30079 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1059.001926] audit: type=1400 audit(1556851602.839:419139): avc: denied { net_admin } for pid=29027 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1059.003592] audit: type=1400 audit(1556851602.839:419140): avc: denied { net_admin } for pid=524 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1059.004795] audit: type=1400 audit(1556851602.839:419141): avc: denied { net_admin } for pid=29639 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1063.996664] audit_printk_skb: 10004 callbacks suppressed [ 1063.996672] audit: type=1400 audit(1556851607.839:422499): avc: denied { net_admin } for pid=30329 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1063.998312] audit: type=1400 audit(1556851607.839:422500): avc: denied { net_admin } for pid=30329 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1064.000212] audit: type=1400 audit(1556851607.839:422501): avc: denied { net_admin } for pid=1360 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1064.000335] audit: type=1400 audit(1556851607.839:422502): avc: denied { net_admin } for pid=30373 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1064.002137] audit: type=1400 audit(1556851607.839:422503): avc: denied { net_admin } for pid=1360 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1064.002238] audit: type=1400 audit(1556851607.839:422504): avc: denied { net_admin } for pid=30373 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1064.006714] audit: type=1400 audit(1556851607.849:422505): avc: denied { net_admin } for pid=1364 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1064.008639] audit: type=1400 audit(1556851607.849:422506): avc: denied { net_admin } for pid=1364 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1064.008654] audit: type=1400 audit(1556851607.849:422507): avc: denied { net_admin } for pid=30053 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1064.010600] audit: type=1400 audit(1556851607.849:422508): avc: denied { net_admin } for pid=30053 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1069.018918] audit_printk_skb: 6050 callbacks suppressed [ 1069.018925] audit: type=1400 audit(1556851612.859:424539): avc: denied { net_admin } for pid=31993 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1069.061333] audit: type=1400 audit(1556851612.899:424540): avc: denied { net_admin } for pid=32170 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1069.063328] audit: type=1400 audit(1556851612.899:424541): avc: denied { net_admin } for pid=32170 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1069.065455] audit: type=1400 audit(1556851612.909:424542): avc: denied { net_admin } for pid=31998 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1069.067392] audit: type=1400 audit(1556851612.909:424543): avc: denied { net_admin } for pid=31998 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1069.069571] audit: type=1400 audit(1556851612.909:424544): avc: denied { net_admin } for pid=30640 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1069.070352] audit: type=1400 audit(1556851612.909:424545): avc: denied { net_admin } for pid=30584 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1069.071302] audit: type=1400 audit(1556851612.909:424546): avc: denied { net_admin } for pid=31989 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1069.073252] audit: type=1400 audit(1556851612.909:424547): avc: denied { net_admin } for pid=2293 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1069.141626] audit: type=1400 audit(1556851612.979:424548): avc: denied { net_admin } for pid=2292 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1074.053105] audit_printk_skb: 387 callbacks suppressed [ 1074.053114] audit: type=1400 audit(1556851617.889:424676): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1074.055075] audit: type=1400 audit(1556851617.889:424677): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1074.077640] audit: type=1400 audit(1556851617.909:424678): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1074.079381] audit: type=1400 audit(1556851617.909:424679): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1074.081161] audit: type=1400 audit(1556851617.909:424680): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1074.082954] audit: type=1400 audit(1556851617.909:424681): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1074.084600] audit: type=1400 audit(1556851617.909:424682): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1074.092898] audit: type=1400 audit(1556851617.929:424683): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1074.094801] audit: type=1400 audit(1556851617.929:424684): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1074.096876] audit: type=1400 audit(1556851617.939:424685): avc: denied { net_admin } for pid=2105 comm="syz-executor.5" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:47:03 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x15, 0x0, 0x1ef) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000000)="434f4209b4cdb39b55cfccfb9b44340fb4a81b85c3ad86eaa3257a6e348ce868dcaf5005308a0cec8465111516cd78ef41da2455e177b92bd1f8b7a37ade1b7a1cd802d9f737bfe5acf1ef7fd4d2f6ba69764ca1ab478e84c9af54ff9e94a53f625b409a737b9e45feb0140ebd98255a620b10084d2eb29e0781546c3aff3887b06ea64407fa528b7a25d854533d9aa85c1fdb75048300b2c5cdf51e94177fc71473e9adae7c868fdbfeb37083266b4b1701ab5e94e56ec8e2b2a793ec43", 0xbe}, {&(0x7f00000000c0)="71aa440a57a72e50ce59b7675cc82ad37c458b6a489937d95514fdba060cc4f08313d4137e1b743c59444aa8edc2a6e171128207089abddef74b0a6cf8ef53ac40cbed8f0e805bea75b9ae53b3457248286372e44b964c1dba5d715e6dcc2a127c135e9b3c0423e694b1be0147cdbebed8b1ca819dfdef2064eaf7d07f86713591598a5a6c30f1dca0614e4887d802ce255e2401cc4771c242047b1f321f639027b787356aac26ca3608f698a8843e", 0xaf}, {&(0x7f0000000180)="ed0c93d8ccf20cce6cbddd6fa820b325c761ba1f47f606094f2c4af1b54254d80039be6d326eca3ac19d5c46b427f52f7e3b9f7011b4bcea78f7d176163bac96efe3c1509dd8780ffa47400767de43fa00ba86906b4e0c", 0x57}], 0x3) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000240)=0xf91, 0x4) [ 1079.404205] audit_printk_skb: 336 callbacks suppressed 02:47:03 executing program 0: chmod(&(0x7f0000000000)='./file0\x00', 0x10) r0 = socket$inet(0x10, 0x6, 0x8003) shutdown(r0, 0x1) prctl$PR_GET_TSC(0x19, &(0x7f0000000080)) sendmsg(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000380)="240000001a0007041dfffd946f610500020000001f000000000008000800030004000000", 0x24}], 0x1}, 0x0) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) 02:47:03 executing program 4: r0 = socket$inet(0x10, 0x3, 0xc) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/status\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)={0x4}) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000020107031dfffd946fa2830020200a0009000200001d85680c1baba20400ff7e", 0x24}], 0x1, 0x0, 0x0, 0x6c}, 0x0) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/checkreqprot\x00', 0x1, 0x0) ioctl$GIO_FONT(r2, 0x4b60, &(0x7f0000000100)=""/128) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f00000000c0)={0x2, 0x80000001, 0x1, 0x0, 0x10001, 0x1000}) 02:47:03 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x27e, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) vmsplice(r0, &(0x7f0000000840)=[{&(0x7f0000000180)='+', 0x1}], 0x1, 0x0) write$binfmt_elf32(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000001e000200000000380000000000000000000000000020000000000000000000d7c4000000000000100000000000000300000000000000000000000000000000fe000000"], 0x58) 02:47:03 executing program 2: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='system_u:object_r:systemd_logind_var_run_t:s0 unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 00000000000000000001I@@%FD'], 0x183) 02:47:03 executing program 5: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x0, 0x0) fsetxattr$security_selinux(r0, &(0x7f0000000040)='security.selinux\x00', &(0x7f0000000080)='system_u:object_r:etc_t:s0\x00', 0x1b, 0x1) ioctl$UI_DEV_DESTROY(r0, 0x400c55cb) r1 = add_key(0xfffffffffffffffe, &(0x7f00000000c0)={'syz', 0x1}, &(0x7f0000000100), 0x0, 0xfffffffffffffff8) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100000004000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000100)='\x00', r2}, 0x10) keyctl$assume_authority(0x10, r1) [ 1079.404212] audit: type=1400 audit(1556851623.239:424798): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1079.684937] audit: type=1400 audit(1556851623.479:424799): avc: denied { create } for pid=2865 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1079.797380] audit: type=1400 audit(1556851623.589:424800): avc: denied { write } for pid=2865 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1079.801160] audit: type=1400 audit(1556851623.639:424801): avc: denied { net_admin } for pid=2865 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1079.857428] audit: type=1400 audit(1556851623.679:424802): avc: denied { net_admin } for pid=2865 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1079.857454] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1079.919810] audit: type=1400 audit(1556851623.759:424803): avc: denied { create } for pid=2865 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1079.945909] audit: type=1400 audit(1556851623.779:424804): avc: denied { write } for pid=2865 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_netfilter_socket permissive=1 [ 1079.947462] audit: type=1400 audit(1556851623.779:424805): avc: denied { net_admin } for pid=2865 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1079.948656] audit: type=1400 audit(1556851623.779:424806): avc: denied { net_admin } for pid=2865 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1079.948680] netlink: 5 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1079.961225] audit: type=1400 audit(1556851623.799:424807): avc: denied { dac_override } for pid=2869 comm="syz-executor.1" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:47:06 executing program 2: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='system_u:object_r:systemd_logind_var_run_t:s0 unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 00000000000000000001I@@%FD'], 0x183) 02:47:06 executing program 5: 02:47:06 executing program 0: 02:47:06 executing program 4: 02:47:07 executing program 3: [ 1084.409777] audit_printk_skb: 1890 callbacks suppressed [ 1084.409784] audit: type=1400 audit(1556851628.249:425438): avc: denied { net_admin } for pid=2034 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:47:08 executing program 0: 02:47:09 executing program 5: [ 1084.427466] audit: type=1400 audit(1556851628.269:425439): avc: denied { net_admin } for pid=3036 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:47:09 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x0, 0x88012, r0, 0x0) 02:47:11 executing program 2: r0 = openat$selinux_create(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/create\x00', 0x2, 0x0) write$selinux_create(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='system_u:object_r:systemd_logind_var_run_t:s0 unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 00000000000000000001I@@%FD'], 0x183) [ 1084.429284] audit: type=1400 audit(1556851628.269:425440): avc: denied { net_admin } for pid=3036 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1084.434702] audit: type=1400 audit(1556851628.269:425441): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1084.438256] audit: type=1400 audit(1556851628.279:425442): avc: denied { net_admin } for pid=2908 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1084.440002] audit: type=1400 audit(1556851628.279:425443): avc: denied { net_admin } for pid=2908 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1084.444191] audit: type=1400 audit(1556851628.279:425444): avc: denied { net_admin } for pid=3045 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1084.444197] audit: type=1400 audit(1556851628.279:425445): avc: denied { net_admin } for pid=2393 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1084.446820] audit: type=1400 audit(1556851628.289:425446): avc: denied { net_admin } for pid=3039 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1084.448568] audit: type=1400 audit(1556851628.289:425447): avc: denied { net_admin } for pid=3039 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1089.416915] audit_printk_skb: 7783 callbacks suppressed [ 1089.416923] audit: type=1400 audit(1556851633.259:428056): avc: denied { net_admin } for pid=2900 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1089.418746] audit: type=1400 audit(1556851633.259:428057): avc: denied { net_admin } for pid=2900 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1089.419739] audit: type=1400 audit(1556851633.259:428058): avc: denied { net_admin } for pid=3263 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1089.420916] audit: type=1400 audit(1556851633.259:428059): avc: denied { net_admin } for pid=3163 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1089.421062] audit: type=1400 audit(1556851633.259:428060): avc: denied { net_admin } for pid=3263 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1089.426994] audit: type=1400 audit(1556851633.269:428061): avc: denied { net_admin } for pid=3049 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1089.428859] audit: type=1400 audit(1556851633.269:428062): avc: denied { net_admin } for pid=3049 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1089.430996] audit: type=1400 audit(1556851633.269:428064): avc: denied { net_admin } for pid=3188 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1089.431160] audit: type=1400 audit(1556851633.269:428065): avc: denied { net_admin } for pid=2931 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1089.432908] audit: type=1400 audit(1556851633.269:428066): avc: denied { net_admin } for pid=3188 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1094.426221] audit_printk_skb: 11374 callbacks suppressed [ 1094.426230] audit: type=1400 audit(1556851638.269:431894): avc: denied { net_admin } for pid=4009 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1094.427014] audit: type=1400 audit(1556851638.269:431895): avc: denied { net_admin } for pid=4750 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1094.428122] audit: type=1400 audit(1556851638.269:431896): avc: denied { net_admin } for pid=4009 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1094.428888] audit: type=1400 audit(1556851638.269:431897): avc: denied { net_admin } for pid=4750 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1094.430043] audit: type=1400 audit(1556851638.269:431898): avc: denied { net_admin } for pid=4736 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1094.430837] audit: type=1400 audit(1556851638.269:431899): avc: denied { net_admin } for pid=4751 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1094.431929] audit: type=1400 audit(1556851638.269:431900): avc: denied { net_admin } for pid=4736 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1094.432714] audit: type=1400 audit(1556851638.269:431901): avc: denied { net_admin } for pid=4751 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1094.433863] audit: type=1400 audit(1556851638.269:431902): avc: denied { net_admin } for pid=3307 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1094.434485] audit: type=1400 audit(1556851638.269:431903): avc: denied { net_admin } for pid=3144 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1099.440510] audit_printk_skb: 10757 callbacks suppressed 02:47:41 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000040)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4056c0eb1dd25fb7bc390f1aab5940e108919c66dd23f5844933f114d7d7d74f39806b5a199ced4bd24396bb9a00cb7b7ca24b8189b45c60e9751f49b323ff1dd8e90f77a2461971de53e19881f40a75861513076018d352c0694a41931f4074755a1ac479f71bed52b457653945f99facd8589c18181db478cf147313f7900"/241], 0x68) 02:47:41 executing program 0: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000180)='/selinux/avc/hash_stats\x00', 0x0, 0x0) write$FUSE_STATFS(r0, &(0x7f0000000040)={0x60, 0x0, 0x3, {{0xfffffffffffffff7, 0x28bfa00000000000, 0x6, 0x2400000000, 0x8, 0xdc, 0x4d8, 0x7}}}, 0x60) syz_execute_func(&(0x7f00000001c0)="9877774a2ae93db81c0c0f05bd03000000c4a37bf0c55c41e2e92e363e46d51a7000c4c16d608590a00000660f383a9e02000000110f33b8c4014e4e4e5b7f4b4b26660f38091e14dee509c421045f4607c421dd5831c4e10bf8c45b64660f3838520ac4c4a3bd4877f83ec483397fd3fb0000c0c47da1a12ad75344d9fbaf66460f3adfee05440fec3f67ddea660f79cec462b1f72ec3c4e2899294d80000000019c2c2b0c10b0b0000c4414e53d2c4816016f7a80db8d4d466450fc4650000ebeb628f8f89709b6500a25800218de3c02cf52626802d08000000fa49c45c450f91f3ffefffffbedc4e61c9fb110f66474eb83aa2f1fbfbe2") openat$cgroup_procs(r0, &(0x7f00000000c0)='tasks\x00', 0x2, 0x0) 02:47:41 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket(0x0, 0x800, 0x200) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x100, 0xfffffffffffffffe, 0x3, 0x5}, {0x200, 0x1000, 0x7ff, 0x6c}, {0x1, 0xd378, 0x800, 0x2}, {0xd4, 0xffffffffffff37a2, 0x5, 0xfffffffffffffffe}]}, 0x10) sendmsg$nl_xfrm(r0, &(0x7f000000b000)={&(0x7f0000000680), 0xc, &(0x7f00005a6ff0)={&(0x7f00000002c0)=@updsa={0x154, 0x1a, 0x9, 0x0, 0x0, {{@in6=@local, @in=@remote}, {@in=@dev, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0x2, 0x0, 0x3}, [@replay_esn_val={0x1c}, @algo_auth={0x48, 0x1, {{'ghash-generic\x00'}}}]}, 0x154}}, 0x0) 02:47:41 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @local, 0x3}, 0x1c) clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$EBT_SO_SET_COUNTERS(r1, 0x0, 0x81, &(0x7f0000000240)=ANY=[@ANYBLOB="6e617400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b142045d000000000000000000000000000000000000000000000000000000000000000000000000000100"/104, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYBLOB='\x00'/48], @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x78) ptrace$cont(0x14, 0x0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x7fffffff, 0x0, 0x0, 0x9, 0x1}) gettid() ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") ptrace$cont(0x1f, 0x0, 0x0, 0x0) 02:47:41 executing program 2: clone(0x4000003102041ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffff9c) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000080)={0x7, 0x3}) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x36) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB="0e30cff8fcdf7ba6f1b000eececca39d6b5d2723071e643191a1ba8500146738b40200000400000000000000006000000000000000000000005db593ceefc01ac5cb9c756c30ea0bbdeea4061d549ca5659f8fead66048e69592700334bb2c8d75b2d7fcd16da61d727ca7347e9fe84ae30f1a2dc1f919facf23d033e2e31244a1de9cc7cd435bf57a258783a04a80f3b62b367319b667579e9e20186ab5f3e710769406222fc7189c6650b8d56c98ec69d7b38f54b2456688c61d318d33ddd07e0b44e305bbe42f2a54c574ad5d2e424d266c7e800f6550a436ea1b14c1df233d116ad8a1b7463b8e8906aba2a4cb2b36fd40bc780014"], 0xf7) ptrace$cont(0x18, r0, 0x5, 0x1) connect$netlink(r1, &(0x7f00000000c0)=@unspec, 0xc) ptrace$setregs(0xd, r0, 0x9, &(0x7f0000000000)="55c42f9cd1f67575209e8cc3f5ba660d46ec248c3895fb6435727b1845ae29f023a5c328121a5c983beb3aca8a728ec43ee197fa1410a2e50eb4dd3366539a751913919d73d5cb8c70bfb5aea02e16db59fadc8055fc4fc228065c24b95653c7") fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000100)='trusted.overlay.upper\x00', &(0x7f0000000180)={0x0, 0xfb, 0xd2, 0x0, 0xfffffffffffffff7, "89f594ae12162e38e0b2455abc43f705", "00493b0cc8140e40c5408c18b30b1f53fe3fd735ba79da83f919f46f88ed676f34143b00438a96b6850fe7e036590d549485786684c25d209922869700442290c791863cbacac8cc17b976618445778c1f1a8625a5f94956e8a13d8b3213f62f8ff3aec2cc93bec965b056e0a3275c0c2c03311d76696e9ffb1b4bf61486f0631925c9718dcb13439ce19e1f9c29465e9cf76201e66b5cd30cce0e13335e813db2f7cf4767f43e505ad8f8643adf3a80cf6e1d5369c23bfb09676099d0"}, 0xd2, 0x2) ptrace$cont(0x9, r0, 0x800000000000, 0x10000) 02:47:41 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x408000, 0x0) getdents64(r0, &(0x7f0000000440)=""/202, 0xca) ioctl$VT_GETMODE(r0, 0x5601, &(0x7f0000000040)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x8) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000100), 0x1) [ 1099.440519] audit: type=1400 audit(1556851643.279:435477): avc: denied { net_admin } for pid=3934 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:47:43 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f000033efc8)={0x0, 0x0, &(0x7f0000aa8000)={&(0x7f00009b9000)=ANY=[@ANYBLOB], 0x10}}, 0x0) r1 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x800, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r1, 0x0, 0x81, &(0x7f0000000100)={'filter\x00', 0x0, 0x4, 0x4f, [], 0x2, &(0x7f0000000040)=[{}, {}], &(0x7f0000000080)=""/79}, &(0x7f0000000180)=0x78) 02:47:43 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x2020000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'bpq0\x00', 0x420000015001}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) close(r0) getgroups(0x5, &(0x7f0000000140)=[0x0, 0xee00, 0xffffffffffffffff, 0x0, 0xee01]) r3 = dup(r0) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000180)='/dev/keychord\x00', 0x20000, 0x0) ioctl$ION_IOC_ALLOC(r3, 0xc0184900, &(0x7f00000001c0)={0x100000001, 0x8, 0x1, r4}) ioctl$TUNSETGROUP(r0, 0x400454ce, r2) syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x100000001, 0x1) 02:47:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000040)="98cd8080000cf2450fad8700000021a920cf77797779d1b02db5d90070e42267d0840568ea0000430000436f1d0a000000093c3bc4e195db2c560bdc8f69289bd19d670f381d6a2f67450f483bd1d963465776c1616196c4a1395fdac4a1fae6ae34f896dce1b1ac45e22c892ac4a3c17b658130049f") 02:47:43 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x1, 0x0) ioctl(r0, 0x9, &(0x7f0000000080)='\x00'/11) r1 = syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/event#\x00', 0x0, 0x0) timerfd_create(0x3, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000100)=""/4096) 02:47:44 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) pipe(&(0x7f0000000140)={0xffffffffffffffff}) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000180)={0x5, 0x3, 0x8000, 0xfffffffffffff86f, 0x5, 0x40, 0x2, 0x1ff, 0x5e, 0x2, 0x8000, 0x20}) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") syz_execute_func(&(0x7f0000000000)="36e1064a2ae92cb8b64c0f05bf1d000000c4a37bf0c50141e2e9c422e9aabb3c0000004a0fc7a4ea70db000000000f383a9e02000000110f9a4e5b5ba265aa104b26660f38091e2fdee51bc421045f4607c421dd589fc4e10bf8c426f2f045f61964620f38fd66420f5d32262e2e66450f7d64c608c4a3bd4877f88a0383397fd3ff3a0065f20f7cd8efa1a12ad764d3cf53afaf6766f2ab440fec3f67ddea660f79ce768ac3c4899294d800000000000f2d8f0b000000c2a0c10b00cca27a0e0f414e53d2c40f0f9f3c6436b2aa66450fc4650000c4e39978c104c441c05983f9070bb3ddcdcda2660f38346800c481c5f89780000000c4c1045ccc7d7526802d08000000fa0f5fd25c450f91f3f30f5ea5a9a50000ffffbedc4e61c9553131b83a00a2f1fbfb3b62") unlink(0x0) mmap(&(0x7f0000000000/0xddf000)=nil, 0xddf000, 0x0, 0x32, 0xffffffffffffffff, 0x0) [ 1099.440536] audit: type=1400 audit(1556851643.279:435478): avc: denied { net_admin } for pid=3849 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:47:46 executing program 5: setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)=ANY=[@ANYBLOB="73656383726974790900000000000000000000010000003f00000004000e00c5230400000048030000f9426a0ca23f05d77fe833d03d01"], 0x1) clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() futex(&(0x7f0000000140)=0x2, 0x0, 0x2, 0x0, 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r0, 0x3b) write$P9_RREAD(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="053fd7a35c7e566fc75d5f0edd95109331ab4f391900000000000000000000000000000000000100"/52], 0x34) ioctl(0xffffffffffffffff, 0x0, 0x0) ptrace$cont(0x18, r1, 0x0, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f00000000c0)) ptrace$cont(0x7, r1, 0x0, 0x0) [ 1099.442471] audit: type=1400 audit(1556851643.279:435479): avc: denied { net_admin } for pid=3849 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1099.442483] audit: type=1400 audit(1556851643.279:435480): avc: denied { net_admin } for pid=3934 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1099.443454] audit: type=1400 audit(1556851643.279:435481): avc: denied { net_admin } for pid=31904 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1099.445099] audit: type=1400 audit(1556851643.279:435482): avc: denied { net_admin } for pid=31904 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1099.447299] audit: type=1400 audit(1556851643.289:435483): avc: denied { net_admin } for pid=5587 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1099.449067] audit: type=1400 audit(1556851643.289:435484): avc: denied { net_admin } for pid=5587 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1099.450744] audit: type=1400 audit(1556851643.289:435485): avc: denied { net_admin } for pid=3067 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1099.451043] audit: type=1400 audit(1556851643.289:435486): avc: denied { net_admin } for pid=5590 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1104.446131] audit_printk_skb: 9921 callbacks suppressed [ 1104.446140] audit: type=1400 audit(1556851648.289:438809): avc: denied { net_admin } for pid=6466 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1104.447038] audit: type=1400 audit(1556851648.289:438810): avc: denied { net_admin } for pid=6496 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1104.448043] audit: type=1400 audit(1556851648.289:438811): avc: denied { net_admin } for pid=6466 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1104.448878] audit: type=1400 audit(1556851648.289:438812): avc: denied { net_admin } for pid=6496 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1104.450461] audit: type=1400 audit(1556851648.289:438813): avc: denied { net_admin } for pid=6498 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1104.452228] audit: type=1400 audit(1556851648.289:438814): avc: denied { net_admin } for pid=6498 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1104.453979] audit: type=1400 audit(1556851648.289:438815): avc: denied { net_admin } for pid=4270 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1104.454199] audit: type=1400 audit(1556851648.289:438816): avc: denied { net_admin } for pid=6497 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1104.455564] audit: type=1400 audit(1556851648.299:438817): avc: denied { net_admin } for pid=6431 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1104.457201] audit: type=1400 audit(1556851648.299:438818): avc: denied { net_admin } for pid=6499 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1109.456643] audit_printk_skb: 9650 callbacks suppressed [ 1109.456651] audit: type=1400 audit(1556851653.299:442062): avc: denied { net_admin } for pid=5098 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:47:52 executing program 1: timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x77359400}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x300000000000031, 0xffffffffffffffff, 0x0) tkill(0x0, 0x1000000000016) 02:47:52 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f0000000480)={0x800}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000580)={&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000500)="b40f5ad821f2618342ff7a99d15a7ca6902d74fbb8ec06ce7c2bafc5054dedc83e2862153aca4aed400d21e206061f61a93ffea2adb83292a2e8e825258d884a86228e006185e44384e091380bcbd711d8cabbf6d06b4462b5c2a24d7f4a83b13b1614373b4939c8f3983b70681696a18aa31692", 0x74, r0}, 0x68) r1 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f0000000400)=[{&(0x7f0000000140)=""/246, 0xf6}, {&(0x7f0000000040)=""/112, 0x70}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000000c0)=""/14, 0xe}, {&(0x7f00000002c0)=""/97, 0x61}, {&(0x7f0000000340)=""/10, 0xa}, {&(0x7f0000000380)=""/94, 0x5e}], 0x7, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) writev(r2, &(0x7f0000000b40)=[{&(0x7f0000000600)="5f2f984305cdcb676cd7276789902b8d9ea53a472a97d11014c4b19e0ed621a36628e8de08e0c9e8c7e0b2b8756a07be38e12dec615feb0d1f73096df729142d100f042e181c4ceec8e781fd2d5150324ccb9117bb30e921ff54c5a54a31fcf29a31a3368f2e6526d0d25ae37a18649287c99c2a0537cab95e673535a25fc843b851f1f9f7be1ba7e2dff6dd9bb8c5d97a9cfc820fec4a870c2f227e0c6d422b1999015a7975aa856d107b3e3670c95b5db2a65e3b7db17e89255cb6134c1a2c26dd341b104090faa20af00c91744b9aad32ca61c1105e6866d824240f128c6c57d850cad21b489e0a63cd7a68df5854", 0xf0}, {&(0x7f0000000700)="0ae06ac65fa105da0d54bd9e0ed4ab0b7cc15d60222754b3dd3b627cc32d911c341dbab2f24e6d26acb2d0cea9d420920f6a46350ffb9b296cd07802efb8373c4707eca580abaf4328f0f6b595b8cde7805d041d1ed5b658ef90d8497e", 0x5d}, {&(0x7f00000025c0)="1dee603524d6583b57afe06cfc539f85a0fa64d578be6262583c57e19fcb91594da76aa0b05310e14128dc30ad9dee93fbd1f0c676314521a58007a2c08e700789006ef9e30e59e6a33384aea8c954ccfa583abc0f5802b787e6403e0e1ef9478c98443950dd1f6d1d395a5897db3bc1c8a20478ff8ef5552eb244c1cf3b81b6560e72c4d2f91da4c1660e1bdbc8212d834dc7dedb93169e2972fddbcb94b9ee8b951d0988ab2c45d380874102934bea0bc313fc68478a2bff9add08243062ab6d01a5a1e402b98cbea91274548de887ed9f611d68b5f1baa6f636810ac0e857cd58a40f28a8370b918266198c92cfcab8547d5960cb1ca9becc6257b1690c1f31cad3bd9851e688499ec7c8a8ad1f0b02ebb9c8a2fbfdbfc4e8db6e0aa18de7b037cb74e93c7001712e5efa48c8b36f612d7052679005c856ac2f9a698ecbdbf45abcfee6ea3ab318cf9435b2cf929f1fa54c5cc1cb8f5613f483b7fb735b6b872a415cbb631ea802b8e232d840c130d7bafd6b09233703e8359eede0617766c6006dbed666c42af88d7b8879202d7bad142919a6b2f0fa3f792ce79678c4a43c6f984fea0bb695ab97b528f464961467003fa37799276a7b444ae29eb43aa926887591868da4403f4cb5092f02657ebcae929f43eef2c51d33f4ad2186584a48fefeca8441d915cab982a2d9e211b32ae9a0421a8c75b17371dbbb66d5f0d9aa221bdcfa66a62afd7b6a702b5c7589e08e2af5e4ed04c4c4ab1b8af639ca5329bd9dab160f22a97294b685422b339d51f76dda708466dcd1e9314db37f04fa764dd3f1fe16d42eb94c61c55337764b38f978dbd39d422a43f11813bb7accb08d80db71321906e606f4617f0a9bf9fc66ecffba1b1ec676e55a9a82fd69990ed7415aadbe1904792cc4664b8bcef47237b7c6e3ef1b8769aa00303b16ea28b67b1c0e0d280098932dc428d4b0ea44befd772ba8a8edc33e7bebd5c347eeac22acac399080970645a4d69de1bdda76034b2b00741f7be3d2f3830d8444b0b8bb8c2e7364996093b42c2c4fd07543b4db9810dcda5e9ae00388c7944d3792d09c4948f329ee47d24932fbb2dd4fb2bffb9dbd1e84238591a6c4da848ea08e08e38a862f0ff89d79c36ed7207018dec1b8f38bda066007cac8a0a816c0462a8301f5f6079682a790f75f3802bee08349bc4ff3a633bc1bc092fa1ba4122f5f56a7160cb6112cb9268bc90abac0c0da85ce9b46487e6c30d9cbcfe2626b219882a9333160e8f78c1f38a54355e24ab1d8fb3c4894c23ec4e15a255c5fcfda56a9e9cdf4b5adce2acea0383f35e20ba989475cc779cfd8b757ac87b17b23480c56cce83ed4e70cc695c6f75e1ead03081e83dca91742b3b89bef7a43c37d4235403c03b8e9d6dae3a6dc606e0b87a5712b66d0b6481a16895bd22e5913e54839e7f14a3060c7e5142f8b9a3df089b2cda6389d89eb6ac216b24d8d7cdd5192895be683124fa512c7c5d1f279e3b391060cc5921c2573feea6397f7628541f670290ab6f2555e483a1d9582234bf0a357deadeb96392122f75804683bf46993d05df3df6acfa19a6345bd0e648bd06fa5e8373641029bfe317eea37e495b0fa8b2eae8b39f25f8d8fda4b608568a4965535d3a0a10bd16c5d69f121d69008624eac4e490f3992d912f29ba78622b20751a2e2e245cf884b105512925052f15cd75a16c83738ace8df9e5ea0e93185be4108bcb9e7f9ef05d23d7b2091e11c179d16f6c43757d65cb731c7b3e18f4e4b36a778f3ca9cd9f2624d51dc90a92271cd28a782dec3701aaf1c8996562ec3d08df8e46976d909b5a952ab776f0137775eef52e5d6196c01c95b56242a5d9b2b088ca71284866e20f59ab855fffe286449c299f40581bfd4919e90c44633fa84ab4bc11a93cdb3f8283da65c1671838274f427f6dec02769f4418aff1b19431b53ccfab1feeff3272b090a9892f32c5f778873bd6651fa3978f5ecc25754ae8fbc4322396540526758587bf47746aecf19572bcaa7378e78fc54c92a2494708cab0bfb42f043f6ae99a5edb64b9851125df9b8ee9957fc42719c1f1c4c1113cce2a5f65d10b5a5ddc1ab6d400354531e40ea3bed1acff07c250ae2be75742bcdf098523e58f9959b3d11562313b069a5f520746ca9776a04c00386901273b4cbfb14846ffbae9c28725ba43a127a76cf265ae0233d5de5cf4b6f490a951d043f96e1cbfcfc19cd249db8d69ae7a79fd06c458f60fb5a6152c6d2fa276187a39a8faf924f3d1f98482f64cde9d72c7b346c9d96f27a5ab2c828b3d7e34da0235029ad91b1e249833e1b42ce07dd6cabcc773a500c00a301baedfdfb847c4684326b3d1a90e3da50e49d10ed4e47994b1fb8c6fa158fc4888d84edda9e4067ea06aec742c103c95986d100bd041e8e2741e99feb661192dd5af457b351411c08f6fb952ffaf034552ec05cd403b2fc0c9efb90302f4f704335b70d0bf3a8a7eba853148adcf9eb3c4de5172cb84f7ed67a793fe16278ebd3a88ed9b9dc46c5b8bb47d702ba3b32c27b59d395d7e304cf8b2612dcbca7a8977cc7d0fc8d6b9839b7d7e313c81c2d63b70dc690dbebb234a2568ca60353d3768455646cb72936f3d678e43959fdd54dc3a018af8bd183f970c337317113ae3a4865b8fb23179afc092d51060ccb83105c1ad32a47e4851782407c9268cb4e4a4c9a7166f9647898b4581f4cd4936fc4f755a553fb83a4aacdf404311f12a2aee2832dd43382421df76b79e08de242bdb0ca2b4af10fc3e95efad5be21822b324ec75c00d81e61a97b0ee351e95504b90963ffef46446e7b807f6f52964beb6dce23ac1e2b58618cc9e21eca9670a2d79b8d3302823a577705007fdf3114886439a2ae41504dbf0a82867581d1a66f9a6c4d7b8f047597d816b400c69c113874341878f0e1e9f6d0b2311c6fed724d855927351100e2bfb67aa113d12e970ca988c2ef840550177f253aa9cbfffce86eb496ab88806892dbe8f6ed51e2d168d90ec626a8c1fe854ff48548a62d20afd6aca409f30d9d8d6a23640d744369b0535bcb64ddc064e9c5ae630c788f829872e705700c4ea1044904fae880472ff4c28bc94fcdb483263f3a7c87546e3faaebde465016ab60fe778a94016b5be8950ae563a10e98913314130c8c87a06a056a4d909663dd45c92e21b55ef0518c56bfa6075f836b8cc8a0e7bd99ff35709bcf0bdf10fb66c5a480448fdc34595bf82f5c8967d142e9245d25cd4340e2fa6d0e353a5fb35fde7401f32271db936484ca8ec401ccd1217d8ed3abe4fab7d067663590ec7ca2def595cc42614cbe5eb6823d663229baa7cd670a8e2bf0cb19d45a8ea0eea8d3842792f9641c0b44ebd090fd8d4f88ce45204d23c0f9a78d1494e333e15cfd8cc5ce11750762044ed5b72c9e7ca0965fa5d744420778d59170cd6860215b40c972998b1b3a0a0fcb63f81dc84c7228358494dbc2e933427d1d7cb862a378db9e387c970271aef8671c79f2509741742e465d07a4db9a0d37dff8f125b98ee8f31da9b5548f9ef552efb55104bff78fc856dd7e8741013383c1514e144c5a5b0610369695eceeb911d81f7d5338b3447da8e39bebbd7069169c19a9f987d358e106d38357fb8b64c30e2cbcd6923a38d1c188ef0fd7735b31981d8d2d8eb348113f9cfd0d42fd7a46a23e368ae1af18d5036abe77ea0df8bc603552107068b563111fd367896e5d04537d0dfc3de13ff5938fa9186fe5eeb2b4853dde781c54fd661e3602248695b9c589c8fcacd13de682968043927650779b5b1053d48ea0791e5c51e656d8a66d9e19562a50a56190e0f2bec6c406090cb4d1acb373d4f290c8607dd2af3a1614e6f68a7f884b3ada2488711c4a17dc1916f32596598a4f12bcb1806cb150de77e73353bd8a964f4ddce2571961082e77ea629d5774cb4530cca0e1786fc149627783dc1764190ede2d4f70131c405df8bcc3fdc4a44f5fa47c206d30ec29cc51aca7fe0c9b966bea151ae68fe4822ccfc8787a4d6cf5177d9befaaa56dc7c5e88857c3958d111fd4dae083baa64233ebe27249159bdd15dd7984af4e531e6654b49092db7841ab9e876f44a0abca50587262b3475cf1411e699483cc8a4b7852367e1401e045ee767bf4f1e1e61f3d66212bbe59e828731cdc1862c3a5de35ae2d1e987686fd4948478667e01247a3bf41f8a8f619f879e6b872ec22e2d04af4dc44cf3903fba338b016843dcb57c72aa8ca296bdb86d8ffa835fd787f4f65b2d04392a237f0e9f5e901f487e487e14e454f947418cb5fc2e667fe922371d39170072aeac99d00cac5a862cbacb23f66de30e57f9040b7475ac452e2c215a77a71ae139405187da60183c448cbfa60ab4a9ecdb89b84898993ca6f762ed9d41b84197c3944fbbe6e5b1977eba6a04a8639d66c10efe818300b70756fa95f530b0a60c682c9df5bbec0156f6cbebd35036d5d891aafd023b1720ac63f2c0f8d5f852e38458195c203a759a45a3fe57c106fc4aba2b528562e12780134df6165e0a557b6a00800fd77879b8f4dd09d9a96e3802f08df3c605a681aedf14e6f4cf63d4ff5e6d758ed0d75618b5b08d082fe7a1923475658f90956e718a8c461118cb471c6d53c186d5b96297990eecfc6010de0976630d86908513ae74a608af57f689b7ae41a7a5c40b4a42dc3982d7d87631dbb9dbebc2dc92b427a1205c2c6255d69af6ecbca1adbcfcbe19cf99e2ebe6e97456c1f552a395882ef7698a97247df9e5c574fead1656ceae4d07e5c50bf7d2271f1048a2c8a0e3d92e6adf003c20915eed129fec7457f7b8391b007580fce08246ad12984d7de2d455c968a0fe2aa6b6a25b01bba38cb589aabc258de55d7ff7ca43a99135ef351fe122104ce0568335939b4d4fc310e9633a876124d4852ee6c517e1ede77fc36e9e36c37f14f26765ca74a8bdae8c9acbb99bb9fc8be59f09652d7197757a2f82e16a68123b87c8e1a038c44ce74fd48c8ffc802c832b872cbaefeb0354a73f9ec1e6e247df420a5571d637a21b18eb81af992044a3778119193dd946014b3a1c71093e2225acc3256bf9962f5dedfaf80466accec6fef86d48af5a3cac311cd4360ec5f50fe0100397d5d084a143a4c0ad4fe7af8b79773137423afacb8cd6b7d074152edc1c7a80c3b8e0555f13371083e99ed56e2f3ef947f11e145210ad15e45a65781c9bee29d2a834ecf865ba2761057f7365980772406aa39a54e033bcfc8849774636f5438c0a0f8076e786a3da5b36c8b07dcd5434921cc0407a18306dd08c91e57a819713630d9dc9f8c6ba3a8a0a23a5eadb0900b786d3c4cf290ece7a849fe4ded913518e89a1c1eb146526dfc2392937c2830d02be372e1ecff7ca7602de26d8a6e13d4affc28bce50347bdbc09ba61744fae3759c3d489cb7ca96969defb87866ef769eccaa1d5763efdcfe115e19c74f07aad17926b4cc5f85845a87b59a0e1b55c11a362fe61ec8a5d322fb2605edf98666a56c6109b4e22976b5ef3fa605311582def7fef615dfb2e1535bfd951de8245cbf7bbce8034ad830d005f12b34ba25d5f492bbc14edeb6e57e4d516ef60044ebc7fae8827094b190ebac93e16f7dccf73f07b9f1139e70b4d24d556f285e0453d4bcc8316ab0a51eb95b62f941ccaa66d47e91284832515b6e460d9ed60cd83425fb5b1bbccd2c83933b084e5ca18d6402733a608a58d3caf40879fd64c69356fb2fbf80f70b0587472ca28", 0x1000}, {&(0x7f0000000780)="61e5a42814817720a8f3baad76355cf7bf91f28e7324f2cfe6b3f4ad58e1d7d1f6f8c234ac9e3687156508319d54771dc1cf82632243cea455a45104ce5d2a8ff407f2e60669948ef7204770ae1213ac645ac2d8ac725ad9a8cb57aca7810437b6c9e477789f54691c296fa92a7271e4a435c24f94a203246273d0b5010bc2f8571aa6833541df2ded9aae30b5f3eddaedce023a202c520314efcee1314b5ab635d317ef9a81acc5c9c2c374131f1788b281d68a0a51f2229d346c7cb6ef4da012961e9a911cd443a0beb687b349ead8ec982283b149", 0xfffffffffffffe21}, {&(0x7f0000000880)="bc0e662a98cffef706912e3b0c5e43e31f306a0a055cee1e8079cc81aa437555c046b5ea0f2a852ad668b969707aad550be1fdd105d00a1f83b1a930b6057efdb0bdd8051e4ecd2df06bcf2d0090957887552f0c069267dc6f66ff819e2f236fbdaf077e8ae5ac36a9699f", 0x6b}, {&(0x7f0000000900)="201251c7e3974b865b5f20ea64c7f3691136584e2add388026801457eb959275a19764d4120d1cd0b26e108db901431bfdd285076a30b1e1694d900063250ae100f4ecd8d9f48e96fee2597299395fa688fa9b69338eafb89632cfb50175db583f647a0d1793b3b05604d773d66511e60b7e7e0a8213d4e7e238417211ff9168abcb250d7a6474a0e0", 0x89}, {&(0x7f00000009c0)="1220f3640bc14949eb9fe4c4e11193e40aa2f808c5394f9124558a9c1eba77b41a56445777519de96f8001e22c620ffc19ddba924fc379959da770f070c275a3eccf157bcb98eac21092eecf7777676cc42eb4dc1a34e21196c566ebd20f8ca51c8afad358cfab37da14d71e68a803a20d07272c6bd2b0454eddcbf41b1ce8a562aff183e295841cf0de5e21e7400448", 0x90}, {&(0x7f0000000a80)="141104f005c4603a2f40b873a2ca0f88615c558c122df3e4edc7aa3145395837cb3063dbb7a5bea8cea338d0f323a7f3af36a445f1a6371f1d8a05d43f7903", 0x3f}], 0x8) 02:47:52 executing program 4: r0 = socket$inet6(0xa, 0x801, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000001c0)="0adc1f123c123f319bc070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="b4000000000000007b0a00ff000000000000008000000000"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x1, 0xc3, &(0x7f0000000000)=""/195}, 0x48) r2 = dup(r0) bind$inet6(r2, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r4, 0x107, 0xa, &(0x7f0000000100)=0x2, 0x4) setsockopt$packet_tx_ring(r4, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x2b5) ftruncate(r1, 0x20077ff) sendfile(r2, r3, 0x0, 0x8000fffffffe) 02:47:52 executing program 0: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) ioctl$UI_END_FF_ERASE(r0, 0x400c55cb, &(0x7f0000000140)={0xc, 0x3, 0x2}) r2 = socket$inet(0x2, 0x1, 0x0) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f00000000c0)) r3 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) ioctl$RTC_UIE_ON(r3, 0x7003) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) bind$inet(r2, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) write$P9_RFSYNC(r3, &(0x7f0000000100)={0x7, 0x33, 0x2}, 0x7) connect$inet(r2, &(0x7f0000000040)={0x2, 0x4e23, @empty}, 0x10) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @initdev}, 0x10) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) dup2(r0, r2) tkill(r1, 0x1000000000016) [ 1109.458777] audit: type=1400 audit(1556851653.299:442063): avc: denied { net_admin } for pid=5143 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1109.460690] audit: type=1400 audit(1556851653.299:442064): avc: denied { net_admin } for pid=5143 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:47:52 executing program 5: r0 = socket$packet(0x11, 0x400000200003, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0), 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, 0x0, 0xfffffffffffffd12) 02:47:52 executing program 3: mknod(&(0x7f0000000200)='./bus\x00', 0x820c, 0x0) memfd_create(&(0x7f0000000040)='^posix_acl_accessppp1\\\x00', 0x0) write$P9_RRENAME(0xffffffffffffffff, &(0x7f0000000100)={0x169}, 0xfffffe88) r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/checkreqprot\x00', 0x141000, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e21, 0x1, @rand_addr="0542e0e4c8b45dae042fe21455ea39ca"}, {0xa, 0x4e23, 0x4, @empty, 0x1000}, 0x7fff, [0x80, 0x7, 0x5, 0x5, 0xfffffffffffffff9, 0x902, 0x3f]}, 0x5c) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xf) [ 1109.460885] audit: type=1400 audit(1556851653.299:442065): avc: denied { net_admin } for pid=4898 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:47:54 executing program 2: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000400)={'syz'}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000ac0)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$join(0x1, 0x0) r3 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/mls\x00', 0x0, 0x0) fcntl$F_SET_RW_HINT(r3, 0x40c, &(0x7f00000000c0)=0x3) keyctl$search(0xa, r1, &(0x7f0000000a40)='keyring\x00', &(0x7f0000000a80)={'syz'}, r2) 02:47:55 executing program 0: clone(0x20000, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x800, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) setpriority(0x1, 0x0, 0x0) [ 1109.462709] audit: type=1400 audit(1556851653.299:442066): avc: denied { net_admin } for pid=3723 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:47:58 executing program 5: r0 = socket(0x2000000011, 0x4000000000080002, 0x0) setsockopt$packet_int(r0, 0x107, 0x17, &(0x7f0000000000)=0x1, 0x3) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x100, 0x7fffffff, 0x1, 0x1ff, 0x0, 0xffffffffffffffff, 0x9}, 0x1c) sendmmsg(r0, &(0x7f000000f040)=[{{&(0x7f0000004180)=@isdn={0x22, 0x0, 0x0, 0x5}, 0x80, 0x0}}], 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) [ 1109.462803] audit: type=1400 audit(1556851653.299:442067): avc: denied { net_admin } for pid=4898 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:48:00 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bc070") r1 = socket$inet6(0xa, 0x3100000000000002, 0x0) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@multicast1, 0x0, 0x2b}}}, 0xe8) r2 = creat(&(0x7f0000000180)='./file0\x00', 0x0) lremovexattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=@known='system.posix_acl_default\x00') prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) fsetxattr$security_selinux(r2, &(0x7f0000000080)='security.selinux\x00', &(0x7f00000000c0)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x3) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000140)={0xa, 0x4e32, 0x0, @mcast2}, 0x1c) write(r0, &(0x7f00000001c0)="da4e1d4358ee5049fc951f7cc7877814c82a93ca095078f6eb8db0558c92d23833308f935f662ab63c9675f898925c0ac545a0cc3dc1b8990f8622a2c974fbce9975f039a36890ec19fe8f9d9d96016382b86cceee0a928c908202f3ba9920fad51629f82e9bf0fe79e39039691c6563bda9afc1b6dfe1171eaaf413b74043ff14f3599d51aa36bd08818d5d44817a1b2f9feef15785f5a662df52e45de59f6af414b4bdf05c9d80a111d16dd622133562967968b75aa9c79f85fa0a812bcc1494cfbb3a772eaeda3af68959b2b4f44c14112cca256b5a5c4845cbc75e63cadadf63724c0b", 0xe5) 02:48:04 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000400)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) sendmsg(r0, &(0x7f0000014fc8)={&(0x7f0000006ff0)=@in={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[{0x60, 0x0, 0x7, "b0aacf62e213059e97eeda05f13414a8d3d9832a531ff085653b45241eca804177ddca58778eda506a450a0c341f84ac30865a71829d638c2bbb42000c44061561a357c9c4b571d65b33159f192f"}], 0x60}, 0x0) 02:48:05 executing program 3: [ 1109.469013] audit: type=1400 audit(1556851653.309:442068): avc: denied { net_admin } for pid=3068 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1109.470717] audit: type=1400 audit(1556851653.309:442069): avc: denied { net_admin } for pid=3068 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1109.477096] audit: type=1400 audit(1556851653.319:442070): avc: denied { net_admin } for pid=4863 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1109.479035] audit: type=1400 audit(1556851653.319:442071): avc: denied { net_admin } for pid=4863 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1114.467928] audit_printk_skb: 8791 callbacks suppressed [ 1114.467937] audit: type=1400 audit(1556851658.309:445023): avc: denied { net_admin } for pid=5635 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1114.469732] audit: type=1400 audit(1556851658.309:445024): avc: denied { net_admin } for pid=5635 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1114.474099] audit: type=1400 audit(1556851658.309:445025): avc: denied { net_admin } for pid=5683 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1114.477121] audit: type=1400 audit(1556851658.319:445026): avc: denied { net_admin } for pid=5681 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1114.478962] audit: type=1400 audit(1556851658.319:445027): avc: denied { net_admin } for pid=5681 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1114.481352] audit: type=1400 audit(1556851658.319:445028): avc: denied { net_admin } for pid=5686 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1114.483195] audit: type=1400 audit(1556851658.319:445029): avc: denied { net_admin } for pid=5686 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1114.485654] audit: type=1400 audit(1556851658.329:445030): avc: denied { net_admin } for pid=5682 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1114.503743] audit: type=1400 audit(1556851658.339:445031): avc: denied { net_admin } for pid=5639 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1114.511141] audit: type=1400 audit(1556851658.349:445032): avc: denied { net_admin } for pid=5650 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1119.504140] audit_printk_skb: 1027 callbacks suppressed [ 1119.504148] audit: type=1400 audit(1556851663.309:445373): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1119.636327] audit: type=1400 audit(1556851663.429:445374): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1119.638314] audit: type=1400 audit(1556851663.479:445375): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1119.640145] audit: type=1400 audit(1556851663.479:445376): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1119.641807] audit: type=1400 audit(1556851663.479:445377): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:48:28 executing program 1: 02:48:28 executing program 0: 02:48:28 executing program 5: 02:48:28 executing program 2: 02:48:28 executing program 3: 02:48:28 executing program 4: [ 1119.713310] audit: type=1400 audit(1556851663.549:445379): avc: denied { sys_admin } for pid=2110 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1119.735873] audit: type=1400 audit(1556851663.549:445380): avc: denied { sys_admin } for pid=2110 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1119.753113] audit: type=1400 audit(1556851663.589:445381): avc: denied { sys_admin } for pid=2105 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1119.793504] audit: type=1400 audit(1556851663.629:445383): avc: denied { sys_admin } for pid=2109 comm="syz-executor.2" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1119.820036] audit: type=1400 audit(1556851663.659:445384): avc: denied { sys_admin } for pid=2110 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1124.526104] audit_printk_skb: 506 callbacks suppressed [ 1124.526112] audit: type=1400 audit(1556851668.369:445552): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1124.527935] audit: type=1400 audit(1556851668.369:445553): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1124.530779] audit: type=1400 audit(1556851668.369:445554): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:48:29 executing program 4: 02:48:29 executing program 5: 02:48:29 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sched_setattr(0x0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000040)='#', 0x1}], 0x1, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) 02:48:30 executing program 2: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x10000261, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='limits\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x0) 02:48:30 executing program 0: syz_execute_func(&(0x7f00000009c0)="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") syz_execute_func(&(0x7f00000000c0)="c441f055ce64ff0941c3c409e1c4a195673d740a8fff26640f580b69f7a41d000000005181617b12e564660f2ef4c442019dccd2111db8d3f5") syz_execute_func(&(0x7f0000000340)="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") [ 1124.532615] audit: type=1400 audit(1556851668.369:445555): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1124.534413] audit: type=1400 audit(1556851668.369:445556): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1124.537859] audit: type=1400 audit(1556851668.379:445557): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:48:39 executing program 3: syz_execute_func(&(0x7f0000000100)="b14b91cd806969ef79dc00d9c4a17c52d1c482290a6800c7c7e4c653fb0fc4013e4c4c443030410f17a13a000000f966410f106f038f4808eebc1000802000c421fc75c101efc4032568b71a5b2920020d186746402f12c421ede11326ca400f0d18a018a065430f73d71f646736676666430fefb30000000054111d54111d00") [ 1124.565851] audit: type=1400 audit(1556851668.409:445558): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1124.567726] audit: type=1400 audit(1556851668.409:445559): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1124.569568] audit: type=1400 audit(1556851668.409:445560): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:48:49 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8800, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) syz_execute_func(&(0x7f00000004c0)="981c9d0f05f30f59bfd9000000c4a17950c6499141e2e98e228e22c6f8aeb756660f70d50f8d44015349ed1f46ff5f83d1670f01d677c4f4c402592862977612868d2a2adcc8460f38c810c88f863dc442b9ac6a06a40fa40f0e000001866451122929e28f283895b60000000057c4012f7da304000000214cb9a5641419c201b0f3ab0b000000c461fc519a040000002d2dc7c46284a0bb600000c4618de3c05b26264788fe58262e650fa2bfdd335cc65cc6650ba4c40165da3cdd00000000d600000f7f8a0c0000008fe8e4a26399dec9fb110fd9c8c4a261b7e2") 02:48:49 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x400040, 0x20) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001180)='/dev/vga_arbiter\x00', 0x20000, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000001140)=0x0) ptrace$getregs(0xe, r1, 0x7f, &(0x7f0000000040)=""/4096) syz_execute_func(&(0x7f0000001680)="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") sched_setaffinity(r1, 0x8, &(0x7f0000001040)=0x7fffffff) 02:48:49 executing program 5: ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000000)) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) r1 = syz_open_procfs(r0, &(0x7f00000000c0)='oom_score_adj\x00') ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000080)={0x8029, 0x3}) exit(0x0) sendfile(r1, r1, 0x0, 0xe9c) ioctl$FIONREAD(r1, 0x541b, &(0x7f0000000100)) 02:48:49 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f000000aff8)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000180)='./file0\x00') symlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)='./file1\x00') creat(&(0x7f0000000040)='./file1\x00', 0x0) open(&(0x7f0000000400)='./file1\x00', 0x0, 0x0) 02:48:49 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x2) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="64000000b74d883d5758e6d7ee061d195fb6119503ab60459d70b5b7", @ANYRES16=r2, @ANYBLOB="20032dbd7000fedbdf25130000004400060008000100c624556e04000200080001000200000008000100010001000800010004000000040002000800010005000000040002000800010002000000040002000c0007000800020007000000"], 0x64}}, 0x4000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="3800000010003b0e00000000000000000000004c", @ANYRES32=0x0, @ANYBLOB='\x00'/12, @ANYRES32=0x6, @ANYBLOB="10000200000001000000000000000000"], 0x38}}, 0x0) 02:48:49 executing program 3: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200000, 0x0) ioctl$PPPIOCATTACH(r0, 0x4004743d, &(0x7f0000000080)=0x3) clock_gettime(0x4000000000000008, &(0x7f0000000000)) [ 1124.658662] audit: type=1400 audit(1556851668.499:445561): avc: denied { net_admin } for pid=2109 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:48:50 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = openat$cgroup_ro(r0, &(0x7f0000000280)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f00000002c0)) r2 = creat(&(0x7f0000000140)='./bus\x00', 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)="bd4d908cceee40e86223f723655b8b10788742e799db81d953c874ee2d71153d64a1", 0x22}, {&(0x7f0000000180)="5cbea3900a2a5ce178908598b9caccefae19a9a136894928d0393deb8c153e6ab47118f37e7c1285d7e4b5b7e164d149fd589d9d7a4209bf7e350690c1a4bdd997770949295affe72e0e5c3139ab044fec4bb4f6eed3a3ec26f7531ba1d73cbefa99bf2a6f4eacfe32881bc144bd0f090bd10e15e29d715b14712038cddd1d832b6129a17f1f6313e2a5927592daf486b0e3e8dec1c1631c79c76d4a4d7031bd81b520e999bae67ef674ff41c3c7d0513b70374c9dbe33f3998e44eac9664411f1f579b81e116d751d71581426fb61b71761a57b495911b56023cd3e1381a1f6c2155ba60916d8", 0xe7}], 0x2, 0x0) fsetxattr(r2, &(0x7f0000000100)=@known='user.syz\x00', &(0x7f00000000c0)='user.syz\x00', 0x9, 0x0) [ 1129.542413] audit_printk_skb: 498 callbacks suppressed 02:48:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f00000000c0)={0xffff, {{0x2, 0x4, @multicast2}}}, 0xfffffd3c) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @local}, 0xc) setsockopt$inet_group_source_req(r0, 0x0, 0x2d, &(0x7f00000004c0)={0x2, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @dev}}}, 0x108) [ 1129.542421] audit: type=1400 audit(1556851673.379:445731): avc: denied { net_admin } for pid=5682 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:48:51 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140)='/dev/null\x00', 0x10000, 0x0) r1 = getpgrp(0x0) stat(&(0x7f0000000640)='./bus\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000700)='./bus/file0\x00', &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$keychord(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/keychord\x00', 0x82102, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000800)='/dev/net/tun\x00', 0x400000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000840)=0x0) r7 = geteuid() lstat(&(0x7f0000000880)='./bus\x00', &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000940)={0x0}, &(0x7f0000000980)=0xc) stat(&(0x7f00000009c0)='./bus\x00', &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000a80)='./bus\x00', &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = syz_open_pts(0xffffffffffffff9c, 0x20001) r13 = openat$ion(0xffffffffffffff9c, &(0x7f0000001fc0)='/dev/ion\x00', 0xa0001, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002000)={0x0}, &(0x7f0000002040)=0xc) stat(&(0x7f0000002080)='./bus/file0\x00', &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r16 = getgid() pipe2$9p(&(0x7f00000035c0)={0xffffffffffffffff}, 0x80000) r18 = bpf$MAP_CREATE(0x0, &(0x7f0000003600)={0x0, 0x3, 0xc7, 0x7f, 0x10, 0xffffffffffffffff, 0x1, [], 0x0, 0xffffffffffffffff, 0x1000, 0xf0}, 0x3c) r19 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000003640)='/proc/self/net/pfkey\x00', 0x200002, 0x0) r20 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000003680)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r21 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000003700)={&(0x7f00000036c0)='./bus\x00', 0x0, 0x18}, 0x10) r22 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000003740), 0x4) r23 = socket$inet6(0xa, 0x804, 0x3) r24 = syz_open_dev$binder(&(0x7f0000003780)='/dev/binder#\x00', 0x0, 0x2) r25 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f00000037c0)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000003800)={0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000003840)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000038c0)='./bus\x00', &(0x7f0000003900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000003980)=0x0) fstat(0xffffffffffffffff, &(0x7f00000039c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0xa, &(0x7f0000003a40)=[0xffffffffffffffff, 0xee00, 0xee01, 0xee01, 0x0, 0x0, 0x0, 0xee00, 0xee01, 0xffffffffffffffff]) r32 = epoll_create1(0x80000) r33 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000003a80)='/dev/ptmx\x00', 0x420500, 0x0) r34 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x0) r35 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000003b80)='/proc/self/attr/current\x00', 0x2, 0x0) r36 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000003bc0)) r37 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000003c00)='/proc/self/net/pfkey\x00', 0x22000, 0x0) r38 = perf_event_open$cgroup(&(0x7f0000003c40)={0x5, 0x70, 0x1, 0x101, 0x1ff, 0x74a, 0x0, 0x100000001, 0x24a00, 0x9, 0xa839, 0x5, 0x6, 0xffffffffffffff69, 0x6, 0x100, 0xfffffffffffffffd, 0xf8f, 0x4590ea04, 0x2, 0x7fffffff, 0x200, 0xfffffffffffffffb, 0x2, 0x1f, 0x200, 0xfffffffffffffffe, 0xfffffffeffffffff, 0x1, 0xffffffff, 0x1, 0x5, 0x2, 0xc0000000, 0x200, 0x9, 0xf113, 0x4, 0x0, 0x7, 0x1, @perf_config_ext={0x3f, 0x9}, 0x1, 0x10001, 0x2, 0x9, 0x5d, 0x1f, 0x80000000}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1) r39 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000003cc0)='/selinux/validatetrans\x00', 0x1, 0x0) r40 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000004340)={&(0x7f00000041c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x84, 0x6, {"f9d8408731c8fb29168d8b5510e48d18c298451cbcc6dca3c68dcd78e7a68303054980cfc6ed0592dac17dca1ad35aede43cd3008b2e3fbf24106491f536e5ed2435cfeb3ef89c039443f454b215be79a8e2ec22686f4a964825fc75edfdcfdccaab59cedfb1ddaee4a2"}}, {0x0, "b96b6142efebcd59b35cc024e095e267f06a4fc1f545683f73ff01b6531bd3908359f47ee2271fab06428bde4508efb7c150215b00482e172049a8b8bfe91d"}}, &(0x7f00000042c0)=""/118, 0xc5, 0x76, 0x1}, 0x20) r41 = openat$zero(0xffffffffffffff9c, &(0x7f0000004380)='/dev/zero\x00', 0x1, 0x0) r42 = syz_open_dev$sndtimer(&(0x7f00000043c0)='/dev/snd/timer\x00', 0x0, 0x200000) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000004400)=0x0) r44 = getuid() lstat(&(0x7f0000004440)='./bus\x00', &(0x7f0000004480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000004500)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000004540)={0x0, 0x0}, &(0x7f0000004580)=0xc) stat(&(0x7f00000045c0)='./bus\x00', &(0x7f0000004600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r49 = getpid() getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004680)={{{@in6, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000004780)=0xe8) getgroups(0x1, &(0x7f00000047c0)=[0x0]) r52 = socket$nl_xfrm(0x10, 0x3, 0x6) r53 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000004980)='/selinux/policy\x00', 0x0, 0x0) r54 = syz_open_pts(0xffffffffffffffff, 0x103000) r55 = perf_event_open(&(0x7f00000076c0)={0x7, 0x70, 0x1e, 0x61a6, 0x3ff, 0x5, 0x0, 0x9, 0x2000, 0x4, 0x1, 0x9, 0x10001, 0x5, 0x56, 0x3, 0xa000000000000, 0x4, 0x800, 0x2, 0x0, 0x77, 0x1, 0x1, 0x9, 0x2, 0x80000000, 0x7, 0x1f, 0x4, 0x7, 0x80000000, 0x9, 0x100000000, 0x4, 0x2e, 0xbbd0038, 0x8, 0x0, 0xfffffffffffffffb, 0x1, @perf_config_ext={0x0, 0x6}, 0x24004, 0xfffffffffffffff8, 0x5, 0x5, 0x2, 0xff, 0xefa}, 0x0, 0xc, 0xffffffffffffffff, 0x2) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000007740)=0x0) getresuid(&(0x7f0000007780)=0x0, &(0x7f00000077c0), &(0x7f0000007800)) lstat(&(0x7f0000007840)='./bus\x00', &(0x7f0000007880)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000007900)={0x0}, &(0x7f0000007940)=0xc) getresuid(&(0x7f0000007980), &(0x7f00000079c0), &(0x7f0000007a00)=0x0) fstat(0xffffffffffffff9c, &(0x7f0000007a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r62 = openat$cgroup_type(0xffffffffffffff9c, &(0x7f0000007ac0)='cgroup.type\x00', 0x2, 0x0) r63 = inotify_init1(0x800) r64 = eventfd2(0x3, 0x801) r65 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f0000007b00)='/selinux/relabel\x00', 0x2, 0x0) r66 = openat$cgroup_procs(0xffffffffffffff9c, &(0x7f0000007b40)='cgroup.threads\x00', 0x2, 0x0) r67 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000007b80)='/proc/self/net/pfkey\x00', 0x2, 0x0) r68 = socket$netlink(0x10, 0x3, 0x1f) r69 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000007bc0)='net/dev_mcast\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000007c00)=0x0) lstat(&(0x7f0000007c40)='./bus\x00', &(0x7f0000007c80)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000007d00), &(0x7f0000007d40)=0x0, &(0x7f0000007d80)) r73 = open$dir(&(0x7f0000007dc0)='./bus\x00', 0x8000, 0x80) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000007e00)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000007e40)={0x0, 0x0}, &(0x7f0000007e80)=0xc) stat(&(0x7f0000007ec0)='./bus\x00', &(0x7f0000007f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000007fc0)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f0000007f80)='/selinux/checkreqprot\x00'}, 0x30) lstat(&(0x7f0000008000)='./bus\x00', &(0x7f0000008040)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000080c0)='./bus\x00', &(0x7f0000008100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r80 = socket$inet(0x2, 0x7, 0x81) r81 = inotify_init1(0x800) r82 = socket$nl_xfrm(0x10, 0x3, 0x6) r83 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000088c0)={&(0x7f0000008880)='#vboxnet1vmnet1(\x00'}, 0x10) r84 = epoll_create(0x8) r85 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000008900)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r86 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000008980)={&(0x7f0000008940)='/selinux/checkreqprot\x00', 0xffffffffffffff9c}, 0x10) r87 = accept(0xffffffffffffffff, &(0x7f00000089c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast1}}}, &(0x7f0000008a40)=0x80) r88 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000008a80)='/selinux/load\x00', 0x2, 0x0) r89 = socket$inet_tcp(0x2, 0x1, 0x0) r90 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000a0c0)='/selinux/validatetrans\x00', 0x1, 0x0) r91 = openat$uhid(0xffffffffffffff9c, &(0x7f000000a100)='/dev/uhid\x00', 0x802, 0x0) r92 = socket$inet(0x2, 0x4, 0x2) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f000000a180)={0x0, 0xffffffffffffffff, 0x0, 0x16, &(0x7f000000a140)='/selinux/checkreqprot\x00'}, 0x30) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f000000a680)=0x0) getresuid(&(0x7f000000a6c0), &(0x7f000000a700)=0x0, &(0x7f000000a740)) lstat(&(0x7f000000a780)='./bus\x00', &(0x7f000000a7c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f000000a840)=0x0) stat(&(0x7f000000a880)='.\x00', &(0x7f000000a8c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r99 = getegid() r100 = socket$nl_generic(0x10, 0x3, 0x10) r101 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f000000a940)) r102 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r103 = openat$cgroup(0xffffffffffffff9c, &(0x7f000000a980)='syz1\x00', 0x200002, 0x0) r104 = openat$selinux_context(0xffffffffffffff9c, &(0x7f000000a9c0)='/selinux/context\x00', 0x2, 0x0) r105 = socket(0x11, 0x4, 0x2) r106 = signalfd(0xffffffffffffffff, &(0x7f000000aa00)={0xc9b6}, 0x8) r107 = openat$ion(0xffffffffffffff9c, &(0x7f000000aa40)='/dev/ion\x00', 0x8040, 0x0) r108 = accept4(0xffffffffffffff9c, &(0x7f000000aa80)=@rc, &(0x7f000000ab00)=0x80, 0x80000) r109 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f000000ab40)='/selinux/commit_pending_bools\x00', 0x1, 0x0) r110 = epoll_create1(0x80000) pipe2(&(0x7f000000ab80)={0xffffffffffffffff}, 0x800) r112 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f000000abc0)='cgroup.subtree_control\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f000000ac00)={0xffffffffffffffff, 0xffffffffffffffff}) r114 = openat$rtc(0xffffffffffffff9c, &(0x7f000000ac40)='/dev/rtc0\x00', 0x20000, 0x0) r115 = accept$unix(0xffffffffffffff9c, &(0x7f000000ac80), &(0x7f000000ad00)=0x6e) r116 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f000000ad40)='/selinux/validatetrans\x00', 0x1, 0x0) r117 = socket(0xf, 0x1, 0x80000001) r118 = socket$nl_netfilter(0x10, 0x3, 0xc) r119 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r120 = getpgrp(0x0) lstat(&(0x7f000000ad80)='./bus\x00', &(0x7f000000adc0)={0x0, 0x0, 0x0, 0x0, 0x0}) r122 = getgid() sendmmsg$unix(r0, &(0x7f000000af80)=[{&(0x7f0000000240)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f00000005c0)=[{&(0x7f00000002c0)="a50bfb2bc543196f719b85634557c19bf1882cad97abbcd0c1be0eabeee9c5bf4fe80392d3a96a0f4f8404c21f7916182bfa705beec7687899d4dafcbd0a5c02146c", 0x42}, {&(0x7f0000000340)="76ae852c0cdccc21aebd485314ff7ab8fe4c7b7d5e043d7bc9f5adc598316761b4adecd8504a35349d98d86ec2222f96a4f4fd08afef673aa5c7caa86adc59f870a43d83a7af8f76ee6c287ab54b80c9abed29a7293d36f66ef1e42b404036f55f462eb303dc125bba660740ac5981ceeb4adc40c9c98f9ed69cd7639d8e5b09a3fd24a52b3cc9cdc852872b2d715908f9e255ef99a41e934026b3128a36", 0x9e}, {&(0x7f0000000400)="15694944a5e5f75d43f2b35dfac06deafb4947c9a204194c279830b9accb70b8e4eaf73c850f613a31f7572463ddbfb7743e97969da551c46c302f1b6d07fcb5ef14be11070b410d658c47c8fcccbd677373", 0x52}, {&(0x7f0000000480)="ef4fcfcfa2abfd32a48b7e5bc7dec38a16933302f5957076ff313f43ec46e4a6ec52435086bd4ee399f0a838f0e40d4a1e3b0b669244c7fcb41fce829cf66adddab8379053718fbdf745c09c2299f8ad694acbdf31e70dce9a02a8315a1d64bece396b012468beb4607423493ed3dde645b884cc3665a55c70d5", 0x7a}, {&(0x7f0000000500)="b4a9a93ef1ae9fc3eddf164d9582a83b38dd496ba16f4373fa76d3f1f2830cb57f4ef3db4fc7d2d3b3f8420629c43459849d74de141d99d96807d64b3d821d3bd5a3a0ee2bc224a2557e38da23e036069c9c4ed2c90059613dd7d60c0b07ca931117338a12c15de9666316445b31ad748a8aa33bdf88f7e564dce5e1d127843997eb160576b6e232b1eded30166dff4328b4bcb34c8fae8f7a44723dd7", 0x9d}, {&(0x7f00000001c0)="29825c0a881c75a701909c3c434aaeb487cc48eb4313", 0x16}], 0x6, &(0x7f0000000b40)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x18, 0x1, 0x1, [r4, r5]}, @cred={0x20, 0x1, 0x2, r6, r7, r8}, @cred={0x20, 0x1, 0x2, r9, r10, r11}], 0x78, 0x4000}, {&(0x7f0000000bc0)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000001f40)=[{&(0x7f0000000c40)="5c2ede69cabcef4d89fe790bb116eddb82c1d46a4d0601c419a93dccaa83b0d13eb1b5fca891ca644fafff06c56dbc77cf652ceca865d7bcfecc32e0b0092c6fbf4de0005265488817d7bd1e3e3d879c0d2fa8377c053c0a709b083c33e790cd7e3cd10d62b9a89690abad5a1a11b7460dcab9d6007427df482610e2f5bb7aa152ae91bd44b914cccb646d5bf3b78846", 0x90}, {&(0x7f0000000d00)="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", 0x1000}, {&(0x7f0000001d00)="bcc3e59cf705abf9ed9b2fd3662bfc5dff652c16272830eac45b5084d2d508d9e34773887e8a57506aaf3da85537dcefa7bfa23c131ba0344dd585612cf5a39d60a0c57ca1afd10f3a74ece53926bd2b62b1cbeb2efd66", 0x57}, {&(0x7f0000001d80)="6bc2a7a5c6580d5efd653d24f4ace55c7f05576cb8745cc8b23a0b58badee787eecf608103fcf423f6df7ac722a7d641ac82b5c37511ab5b4e64272209c3aac6ea403b20e91a6137be", 0x49}, {&(0x7f0000001e00)="40fb3188ddd0b42a82573074ab6667ba1ced10f40c75a5b389dcfd31c3f0c9c3c148985c060d9ed3bd7241668e2fa16eaaa148286972ea65fe262744d9939bb39b5828de5d80e63c4b4eab51e9c7f5cf4b08196d0eb7ef66fb87687c87523796f09dce155ad9dbaf259d59", 0x6b}, {&(0x7f0000001e80)="0736b3451c1a1931d0ebdd900899f1e7edcf5c15faf04673b012792a9c0ea973015d77f092ceea8da7a31e646db5b85085e27ea91632b3529dd776d5afdedf1e61f8cee74fe3a484e54c8262da601a3c1e8519dcbe8ed08db3b0537216c83b392ee11966224c018d39882de7ce1a2d92d6646e0626124217359abbf04e6561e21956574cae7b780a7eefc91682bca7c70509737513704591f81c4e158788ec292d7e", 0xa2}], 0x6, &(0x7f0000002140)=[@rights={0x18, 0x1, 0x1, [r12, r13]}, @cred={0x20, 0x1, 0x2, r14, r15, r16}], 0x38, 0x4000000}, {&(0x7f0000002180)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000003540)=[{&(0x7f0000002200)="6f3d7cb5b14d856bbec418516661fe7a7d2d15476553a0328a105c5c8e7fb37e117d13179559f9f9c8b9c06b61", 0x2d}, {&(0x7f0000002240)="4b8b475b350f621f16a230a87b64bd0aff4495f0c184b3d56c1bb7b4bedc6bd3fdc74a96471b69bdf197abc77e922e3298947ad6240cf2bc837eb60bb0e2a981c8067641654f6fde380e13a263bb8a36ba8a50b9c4853283155ff456c51578d4a7705740ae7699bcdbac736e0dd8381c9014e10291ea6692c09a61b1313b1a2cc74da8d5c56cb9f0bf7e33", 0x8b}, {&(0x7f0000002300)="745c7484ee294e222a3f57735e1e2401d0815ea33f6afcc10598b5e7667f8f75c8487388a8b31eb25f00cf67204637c09068cc3729df84209c94de41530add39319d3cfb1ed55b53c461bcb5357e3598b6f0a11ba3e46fcd3a9660cb3abe04f03efcac411edf0b279b388e911efb2f4cf2f4e49facb48540fa4221322babd0604c02d0241ee20ed1678afd732216e5c6b2695be80c8bbf0c8dcc437bd2a71ab963d350841a812d38b937d34c708776a3308852e136820cd8520fd69cb087", 0xbe}, {&(0x7f00000023c0)="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", 0x1000}, {&(0x7f00000033c0)="bb82e4c03a6110dc6674bddb383a828673b82dd9533cb2f2194bd10040c0dd10bc1b201e7fc6458630b2c52b1fa6f7bd148c9c944f55aa46d8329c3c75f903d640b18c66490f23ef13235a11a8c8a1a3d369cf899b59988970b1512e06a61b144e4ffce9439ea9801ba593a257832fe10c", 0x71}, {&(0x7f0000003440)="536353004146121d3dcb33c7", 0xc}, {&(0x7f0000003480)="49822bf6e1dcb07b1446d4f8a473345211ffd1e047f132e5db25a3c105c61f887073095638244b4485cbaffb072f761ed4495cfa9394fcc660ee1daef80c31f06adef047bb10647953e516ca2a56c369678dcdb3a0f87db309de0f09b21cd59799baefb45a33d00a83c7fe69be5841c5a3dc573b3f36c529992193913585773af14e77fe9b6d2de8efbd481533c66c7110468e2ef194a91d9629300c87e25bd21f8df2ab4f57884ab556789b72a97bf74878ef32b07e2468f69570de", 0xbc}], 0x7, &(0x7f0000003d00)=[@rights={0x18, 0x1, 0x1, [r17, r18]}, @rights={0x20, 0x1, 0x1, [r19, r20, r21, r22]}, @rights={0x20, 0x1, 0x1, [r23, r24, r25]}, @cred={0x20, 0x1, 0x2, r26, r27, r28}, @cred={0x20, 0x1, 0x2, r29, r30, r31}, @rights={0x30, 0x1, 0x1, [r32, r33, r34, r35, r36, r37, r38, r39]}], 0xc8, 0x4000}, {&(0x7f0000003e00)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f0000004180)=[{&(0x7f0000003e80)="7120403fb7631a30f50b7ce4a5a4add8d015857c242c0ac0bd9b67c6e79644690134e18fd2ea0c10dc901eba2211a3a58e41288f06121d654cad8137c538abd6b0267391043ec8940e6090d2122bc410a4ef5f3425c4d8ad3d925f34c4222ca1a82ab338fecadc9b5e50b41d9fc7a77c2bec6006349b5b2575b238eaf51b1940c8cb0385c215eb4413ef6feee8e7b97afa0a0b5e9ed68a1a50a5ed290b0104bf281d08d09b4cdf381557", 0xaa}, {&(0x7f0000003f40)="df91e19e042eb75972863d9be7f2d160bbf3bdf51ef036fa1a23172c2f3bceedc3979388e436462637d1cd97296bb87326903b0ee9e3aa07ade60e8f21ff31bc00d1186c2d522512235c880d4d6e92c7fad5b21ac8a6ad555b7bf4baa8871e0f73dcefe95e9f3521de00ebd360471ee5bbd295d6f671ff4ae8b9458358f2257a38705f3a2701a06a2e7e22a0e2555367e8b8d8b4296eb49fb7ec45c4ea4c1b5a6322e9bb1dbf4ab989e37c88a850df", 0xaf}, {&(0x7f0000004000)="301a29cb144fb2d1f4f09a8260084fcd9d3f991bdd46ad95e12cc714a3fff13da1dbe5a3aad8a1be28e9c11308dc5b17d5b685884d8c7cd52d87f0851a57ab22ec44926809a03a68f1a3d0855da22444dadea1c2b3ee7e740939c69d0b580e03525e1ddbc936cfc032b53a3fb4d2fe30d1ff0e80de696d02ce0ab9fa0468ed75408ae98625ead3ad", 0x88}, {&(0x7f00000040c0)="9f58c92088bfa513065a5f80560a8c1b3ceec8d1bebbf5283b6fe1b3cf67ce24e4ad4cb50ae3c51c21b96d6b2dc54314395b1373baa7a7fee2b7e6f3b8f8ef47d50786e53bbed414e16f5670e785b70c1de304c11a80018388bfacbd89ada65dd00a465cc392d32f35ab863e96b701cca682dfae0d940afb5d77aed4b9d987058df583b52859469fa6f0415a738e9058616af74cb8ced22129edc852bd72714b", 0xa0}], 0x4, &(0x7f0000004800)=[@rights={0x20, 0x1, 0x1, [r40, r41, r42]}, @cred={0x20, 0x1, 0x2, r43, r44, r45}, @cred={0x20, 0x1, 0x2, r46, r47, r48}, @cred={0x20, 0x1, 0x2, r49, r50, r51}], 0x80, 0x10}, {&(0x7f0000004880)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f0000004940)=[{&(0x7f0000004900)="640d994d6d06", 0x6}], 0x1, &(0x7f0000008180)=[@rights={0x20, 0x1, 0x1, [r52, r53, r54, r55]}, @cred={0x20, 0x1, 0x2, r56, r57, r58}, @cred={0x20, 0x1, 0x2, r59, r60, r61}, @rights={0x30, 0x1, 0x1, [r62, r63, r64, r65, r66, r67, r68, r69]}, @cred={0x20, 0x1, 0x2, r70, r71, r72}, @rights={0x18, 0x1, 0x1, [r73]}, @cred={0x20, 0x1, 0x2, r74, r75, r76}, @cred={0x20, 0x1, 0x2, r77, r78, r79}], 0x108, 0x80}, {&(0x7f00000082c0)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000008800)=[{&(0x7f0000008340)}, {&(0x7f0000008380)="c7c385539276ef619abb5f7f7c2a05e9c75c96650b5a6704c52a3daa4207bc53d71471d6a71513a89bc8c9440b7078eee1a5e3478ce4c2504b7869c38d331d831f0a21da3a07a1a97994d69796c11e01286abaedafe2508abd9fc0bd9840936debf385b97aebc70ab34689ebea48f182c4a96627e8adf8d1f3e70be7002abcd7faa1ab3706feaf5aa8827b4a85e635bf8731349578123391ff6ce671e6e924aa720ceb307567ae18e6301cceaeb1bb90a65796d175044500b6174fa8b3508afad261f2e632671ac256354657927598d8a9b50a", 0xd3}, {&(0x7f0000008480)="0756c0c511d7cefb975e2b024f3438cc4fef5f54398a24e9c4c2ddf9c1fb796713a9b7b8812d0d6f589e5b638b16a5f081c14ac15418dc2f94a485a4385402a1c8b73e73d7a955677bce2934bedd70f5ee3aa37f67d336f157e9b4b6b2acc649f62ae4bc104f44f741169a334d3d200b788c15902beb553baabf49a91b5dc5570e5c7bea02549bcde9923828108387606e0df7ca3809264db5d5bea551a89923", 0xa0}, {&(0x7f0000008540)="26a6e7e93c3c8001699ca544a883a9f61e63ccf602b50a6f007c25c4c1f4f71baa2dac3c740a709cd80068f4411c08e9052e60a7a4c1f8c6b73ecb669d75eff62f89951046b2daa91bce2e0e6636f1be8d18a5690e18e1afd5a07a30f22c9d15f157e6967c9bb19a31866df819c8c9e44597dbe84746aee89cf75fdf4d4dfd6d72193ecf37fdad070879aa85534c45b17c6c833ddd457b3d4935b799caa25106585c4ec872a7270a4ef180be3d8e1349041a3fca1cfa84ada9408dfcbce5e71adb88117049c1183783aafc2e515b68254deefb3d59c47db1f8", 0xd9}, {&(0x7f0000008640)="f08402576bbd9e61640e7182cefcadd4b5b9a917da6a7e7fa1b6b1efcf8d1bdeef64333734757b10e2a08de9307cf8beacccd40fa26bb257612a1d25e5b0298906f9cf2160e2f1001385d51490dbb62d666b6e8cf242c36d5b7533da57c6af4a45cbdaa7a9c2c7a03a11aceb4c70b8b72da829367f1a", 0x76}, {&(0x7f00000086c0)="c876", 0x2}, {&(0x7f0000008700)="b6db073729d9c97519d025e512825b0ca779df4dd420913bdccccc3b22e3cfc6ff802baac736cbb67dc50cf1b8bad3cd6dc78d66332e8a40c7f08ac7a3049ddaefaecb", 0x43}, {&(0x7f0000008780)="002420d3c8d818dc3030671fb38df9864cafefc4604b50dc14e88820c5944ed85adce93b627b2687fcde795a4cac453b5365adfb340b9f12f87f236341fa1321a77bfb6b95f820e03d0e4e9ff7b2cec4ac849acef6099316bb23fe4e", 0x5c}], 0x8, &(0x7f0000008ac0)=[@rights={0x18, 0x1, 0x1, [r80, r81]}, @rights={0x30, 0x1, 0x1, [r82, r83, r84, r85, r86, r87, r88, r89]}], 0x48, 0x4000000}, {&(0x7f0000008b40)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f000000a000)=[{&(0x7f0000008bc0)="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", 0x1000}, {&(0x7f0000009bc0)="06e45bbe93e1557413b0e1f3224c042f6e871ef5c6fff94b0d23b8460b7ed8f0355baa6f3f3512335fea073b062d7e252410e474995f7e769658d8dfbf19b03a4129381d51018b10eb723c2fb2c95d780d43a6ba619d8e7ec822b1a961aa338e578408f0da1a0f05918fa2a64762675a5fc5a92fd15f0dc26b3f8faa6eca4d1348cb8a5f5def2fcbf03c2d28288e3f849fafdfea4179dd96a558149ff818678a81e860d2fe77da599c2946689873c4085374c7abfb2b172404364457e24f8db4cb04328eb3a89b31bc8dc96c67c83169954fe43a874fbb7a0fa78df4e81113b023322346851096", 0xe7}, {&(0x7f0000009cc0)="7cc40438c2aaefe894f770b3388e55fbf3f0d0182d575fb3582463738d74b1a4f94ab9fd907d2c627e3087f79b57320b59486731d2a154e82e4b1d4980532615842d1d442fe6409dbdb50ae0882ed67e483e851216e095d376e2a392014f33d0", 0x60}, {&(0x7f0000009d40)}, {&(0x7f0000009d80)="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", 0xfa}, {&(0x7f0000009e80)="dfc27299f1f470725530949ac7e5efc70e964edf60526a7cf75788", 0x1b}, {&(0x7f0000009ec0)="9c13f991702261724de51197e96f10e6221225c1f056394f199287120d0af03641447312660083d882fec4ed7436a448b8", 0x31}, {&(0x7f0000009f00)="695cfaa3363888b31886e3e082ce02915606f6c38a77948d8848448086ba239b685b642bcdab46cfd5974f2de587be7977b507f4", 0x34}, {&(0x7f0000009f40)="1e5f8dd455650fc2b70da15366ee65a71b6aeaf3f73a680716fa5c41a616c9c2b2f57b2bb573fded902f4f12d91cf20d3eb037863ea9e101a7b8953a5344bec7caa9a7a39442889cd7c832e8f2460e8a36d2e52c71cf64cbbce9eeeabb91331c3c036360f9a7d38ca4d589d1d0b9fe176df82f7431449d2f3cc0873abcb88162539eef5061768649372226f21558e400cae13993", 0x94}], 0x9, &(0x7f000000a1c0)=[@rights={0x20, 0x1, 0x1, [r90, r91, r92, r93]}], 0x20, 0x4000081}, {&(0x7f000000a200)=@file={0x1, './bus\x00'}, 0x6e, &(0x7f000000a600)=[{&(0x7f000000a280)="131239fc33954619aca9a65700abd5e3d09dd5d48edddad652e0e5285fd8cd57751e2a4835c19fab5966b8d0d16622d3c9ae18db9da63ac03d72eac88686bc5f37f47993858a649192bac21bbaf89c53b1ca6503851bac2589e845cba03ba57f0ec4ec6941a310", 0x67}, {&(0x7f000000a300)="ec37d6ab95c7faf0057d0d3bdaa1b2160e549de809", 0x15}, {&(0x7f000000a340)="a0cfc45e6a968838fca0f7063960bf781fa6c33aa0ae833f5319dd457fad81f256dca74d039e1225adcd3fe26ee20251af68d0cd6b5e26d2b2da508a71998277ec85b957045cfa572de6a02fabf241f79243bb42f29b55d4228d52ec958c803c496f8d3f2ec962345d2a3e58ab9637e0b2", 0x71}, {&(0x7f000000a3c0)="181f410e125a30c0499b16cded992ee6d8d14494aee82aa78ad8fe62f29a4f9d123d7034797b899cbecf7540c03647dcc3eb6d3b50f50e81eaf319667564974e5427be6670a80612aa96e630ae9cb31fa4feaeb1a98e113f51d493a0507337bcc3ed44ab40a6fc3cc69ee508d15cc60f9240b311318a4b27f6c91b762051950f4f56b60cac3c65bc33544171a60c71569b6fbf12a3e2a902f8cb9e5b12f335b2c412b1f223f098316e4176b9d5614dd904626178bb7fcf50436d3db14268b6c34011ddc25d330ce8c4708abae7eabc148b3328d079556e93130d704ba9d57800658f", 0xe2}, {&(0x7f000000a4c0)="5a576f9377af2be57dff4d760ed859378387fabf213055c51a3f463e45365a63d15b82f6dbd2f868ed838e647b72dffe63bca74692d238f3dfaf86ca", 0x3c}, {&(0x7f000000a500)="cd41fac895e264c113502c28ff2a8dfac8a398226aa5695b9912e3d87329502b39443313e8", 0x25}, {&(0x7f000000a540)="f58953f1476fdca7f2c3d7c26605ea8e6a25022f34a412d0f66151", 0x1b}, {&(0x7f000000a580)="e6cc9d84097dd57096eb024151d120963cbadc5f39a0e5e52098399162197e6ce745be551235bba8bc6edc7ea2878ffd02594c43b2ab17d8e2aadb2a6865622fc018ef987e994457cc740edee834851f0cdcbc5a7df9ff8d4ba6445bbb74d05132291a830c", 0x65}], 0x8, &(0x7f000000ae40)=[@cred={0x20, 0x1, 0x2, r94, r95, r96}, @cred={0x20, 0x1, 0x2, r97, r98, r99}, @rights={0x18, 0x1, 0x1, [r100]}, @rights={0x20, 0x1, 0x1, [r101, r102, r103, r104]}, @rights={0x20, 0x1, 0x1, [r105, r106, r107, r108]}, @rights={0x38, 0x1, 0x1, [r109, r110, r111, r112, r113, r114, r115, r116, r117]}, @rights={0x18, 0x1, 0x1, [r118, r119]}, @cred={0x20, 0x1, 0x2, r120, r121, r122}], 0x108, 0x800}], 0x8, 0x20000800) r123 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/checkreqprot\x00', 0x80000, 0x0) ioctl$VT_OPENQRY(r123, 0x5600, &(0x7f0000000100)) r124 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r124, 0x1000008912, &(0x7f0000000180)="0adc1f123c123f319bd070") mknod(&(0x7f0000000200)='./bus\x00', 0x100c, 0x0) r125 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x0) open$dir(&(0x7f0000000000)='./bus\x00', 0x44201, 0x0) ppoll(&(0x7f0000000080)=[{r125}, {r124}], 0x2, 0x0, 0x0, 0x0) 02:48:52 executing program 3: mknod(&(0x7f0000000200)='./file0\x00', 0x1120, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x27e, 0x0) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x0, 0x11, r1, 0x0) splice(r1, &(0x7f0000000000), r0, &(0x7f0000000080), 0xfffffffffffffffb, 0xe) vmsplice(r0, &(0x7f0000000400)=[{&(0x7f0000000880)="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", 0x781}], 0x1, 0x0) 02:48:53 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2, 0x3, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, [@sadb_key={0x1, 0x9}, @sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_sa={0x2}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x58}}, 0x0) r1 = fcntl$dupfd(r0, 0x406, r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r1, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80200}, 0xc, &(0x7f00000003c0)={&(0x7f0000000240)={0x170, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x50, 0x1, [@TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x357d}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER={0xfc, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x800}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x352}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8c75}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffffffffffb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xe5}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bcsf0\x00'}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x40000}, 0x20044004) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000200)='/selinux/policy\x00', 0x0, 0x0) ioctl$UI_END_FF_UPLOAD(r3, 0x406855c9, &(0x7f0000000140)={0xe, 0x80000001, {0x51, 0x6, 0x0, {0x1, 0x100}, {0x4, 0x7ff}, @cond=[{0x2, 0x7fff, 0x40, 0x8, 0x70e5, 0xffffffffffffff98}, {0x3, 0xa7c, 0x81, 0x10000, 0x334, 0x6}]}, {0x0, 0x5, 0x7f, {0x4, 0x200}, {0xffffffff80000001, 0x5cccaec6}, @const={0x0, {0x1, 0x800, 0x100000000, 0x4}}}}) [ 1129.548859] audit: type=1400 audit(1556851673.389:445732): avc: denied { net_admin } for pid=5688 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1129.550850] audit: type=1400 audit(1556851673.389:445733): avc: denied { net_admin } for pid=5688 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:48:55 executing program 5: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x20080000) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0xca, &(0x7f0000000040)={0x9, 0xaadbce4966f72442, 0x6, 0x18, 0x101}, 0xc) syz_execute_func(&(0x7f0000000200)="b1ec91cd803e8038a60ffefa3c13134139fd5bf91cc10fc4014c5868f4a95fc44149f2168f68eca263be7cc421fc51c1ea01efc48192558dc3c39766459645966746f3400faee4749826261f696926400fe618c401fe5ff6e3df646736676666430fefb300000000c4e10f7d4cdce5f30f1a1254111d54111d00") [ 1129.561462] audit: type=1400 audit(1556851673.389:445734): avc: denied { net_admin } for pid=5652 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:48:56 executing program 4: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='\xef\xe8dYU4\x8bw;\xef\xb3\x13l\x1dNG#\x14[\xc7z)\xe2\x01;\xb0\x14^\x946\xae\x9dCv\x91ms\x9d\xae5\xbb\x0f\x15\x00\x00\x00\x00\x00\x00\x00\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r1, 0x2008200) r2 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x8000fffffffe) r3 = open(&(0x7f0000000180)='./bus\x00', 0x141042, 0x8) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000000040)=0x0) fcntl$setownex(r0, 0xf, &(0x7f00000000c0)={0x1, r4}) fallocate(r3, 0x20, 0x0, 0x10000) [ 1129.563371] audit: type=1400 audit(1556851673.399:445735): avc: denied { net_admin } for pid=5652 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1129.565399] audit: type=1400 audit(1556851673.399:445736): avc: denied { net_raw } for pid=9315 comm="syz-executor.4" capability=13 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1129.565829] audit: type=1400 audit(1556851673.409:445737): avc: denied { net_admin } for pid=5627 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1129.591076] audit: type=1400 audit(1556851673.429:445738): avc: denied { net_admin } for pid=9355 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1129.678918] audit: type=1400 audit(1556851673.519:445739): avc: denied { net_admin } for pid=8291 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1129.680917] audit: type=1400 audit(1556851673.519:445740): avc: denied { net_admin } for pid=8291 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1134.594580] audit_printk_skb: 6963 callbacks suppressed [ 1134.594588] audit: type=1400 audit(1556851678.429:448069): avc: denied { net_admin } for pid=10038 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1134.597723] audit: type=1400 audit(1556851678.439:448070): avc: denied { net_admin } for pid=10039 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1134.655488] audit: type=1400 audit(1556851678.499:448071): avc: denied { sys_admin } for pid=2105 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1134.697007] audit: type=1400 audit(1556851678.539:448073): avc: denied { net_admin } for pid=10040 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1134.698744] audit: type=1400 audit(1556851678.539:448074): avc: denied { net_admin } for pid=10040 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1134.714760] audit: type=1400 audit(1556851678.549:448075): avc: denied { net_admin } for pid=10039 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1134.717468] audit: type=1400 audit(1556851678.559:448076): avc: denied { net_admin } for pid=10038 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1134.722811] audit: type=1400 audit(1556851678.559:448077): avc: denied { net_admin } for pid=10041 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1134.724542] audit: type=1400 audit(1556851678.559:448078): avc: denied { net_admin } for pid=10041 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1134.743969] audit: type=1400 audit(1556851678.579:448079): avc: denied { net_admin } for pid=10036 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1139.596246] audit_printk_skb: 9827 callbacks suppressed [ 1139.596254] audit: type=1400 audit(1556851683.439:451379): avc: denied { net_admin } for pid=10666 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1139.598092] audit: type=1400 audit(1556851683.439:451380): avc: denied { net_admin } for pid=10666 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1139.598944] audit: type=1400 audit(1556851683.439:451381): avc: denied { net_admin } for pid=9827 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1139.600729] audit: type=1400 audit(1556851683.439:451382): avc: denied { net_admin } for pid=9827 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1139.602029] audit: type=1400 audit(1556851683.439:451383): avc: denied { net_admin } for pid=10277 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1139.604580] audit: type=1400 audit(1556851683.439:451384): avc: denied { net_admin } for pid=10112 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1139.607050] audit: type=1400 audit(1556851683.449:451385): avc: denied { net_admin } for pid=10385 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1139.607165] audit: type=1400 audit(1556851683.449:451386): avc: denied { net_admin } for pid=11064 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1139.608977] audit: type=1400 audit(1556851683.449:451387): avc: denied { net_admin } for pid=10385 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1139.609072] audit: type=1400 audit(1556851683.449:451388): avc: denied { net_admin } for pid=11064 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1144.606872] audit_printk_skb: 10967 callbacks suppressed [ 1144.606880] audit: type=1400 audit(1556851688.449:455045): avc: denied { net_admin } for pid=11732 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1144.608816] audit: type=1400 audit(1556851688.449:455046): avc: denied { net_admin } for pid=11732 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1144.608915] audit: type=1400 audit(1556851688.449:455047): avc: denied { net_admin } for pid=10137 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1144.610775] audit: type=1400 audit(1556851688.449:455048): avc: denied { net_admin } for pid=11744 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1144.610864] audit: type=1400 audit(1556851688.449:455049): avc: denied { net_admin } for pid=10137 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1144.612499] audit: type=1400 audit(1556851688.449:455050): avc: denied { net_admin } for pid=11744 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1144.614478] audit: type=1400 audit(1556851688.449:455051): avc: denied { net_admin } for pid=11747 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1144.614675] audit: type=1400 audit(1556851688.449:455052): avc: denied { net_admin } for pid=9655 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1144.616859] audit: type=1400 audit(1556851688.459:455053): avc: denied { net_admin } for pid=11749 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1144.618806] audit: type=1400 audit(1556851688.459:455054): avc: denied { net_admin } for pid=11749 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1149.618455] audit_printk_skb: 11583 callbacks suppressed [ 1149.618464] audit: type=1400 audit(1556851693.459:458933): avc: denied { net_admin } for pid=10906 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1149.620108] audit: type=1400 audit(1556851693.459:458934): avc: denied { net_admin } for pid=9134 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1149.620412] audit: type=1400 audit(1556851693.459:458935): avc: denied { net_admin } for pid=10906 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1149.621896] audit: type=1400 audit(1556851693.459:458936): avc: denied { net_admin } for pid=9134 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1149.623866] audit: type=1400 audit(1556851693.459:458937): avc: denied { net_admin } for pid=9628 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1149.632123] audit: type=1400 audit(1556851693.469:458938): avc: denied { net_admin } for pid=11189 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1149.632129] audit: type=1400 audit(1556851693.469:458939): avc: denied { net_admin } for pid=9652 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1149.634069] audit: type=1400 audit(1556851693.469:458940): avc: denied { net_admin } for pid=11189 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1149.634102] audit: type=1400 audit(1556851693.469:458941): avc: denied { net_admin } for pid=9652 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1149.636041] audit: type=1400 audit(1556851693.479:458942): avc: denied { net_admin } for pid=12734 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1154.626735] audit_printk_skb: 10091 callbacks suppressed [ 1154.626743] audit: type=1400 audit(1556851698.469:462322): avc: denied { net_admin } for pid=13595 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1154.628426] audit: type=1400 audit(1556851698.469:462323): avc: denied { net_admin } for pid=13595 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1154.629199] audit: type=1400 audit(1556851698.469:462324): avc: denied { net_admin } for pid=9631 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1154.631018] audit: type=1400 audit(1556851698.469:462325): avc: denied { net_admin } for pid=10874 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1154.631149] audit: type=1400 audit(1556851698.469:462326): avc: denied { net_admin } for pid=9631 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1154.631753] audit: type=1400 audit(1556851698.469:462327): avc: denied { net_admin } for pid=13560 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1154.632924] audit: type=1400 audit(1556851698.469:462328): avc: denied { net_admin } for pid=10874 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1154.639046] audit: type=1400 audit(1556851698.479:462330): avc: denied { net_admin } for pid=10275 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1154.640353] audit: type=1400 audit(1556851698.479:462331): avc: denied { net_admin } for pid=11460 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1154.640536] audit: type=1400 audit(1556851698.479:462332): avc: denied { net_admin } for pid=10275 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1159.641478] audit_printk_skb: 9948 callbacks suppressed [ 1159.641487] audit: type=1400 audit(1556851703.479:465674): avc: denied { net_admin } for pid=10129 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1159.641532] audit: type=1400 audit(1556851703.479:465675): avc: denied { net_admin } for pid=9458 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1159.643460] audit: type=1400 audit(1556851703.479:465676): avc: denied { net_admin } for pid=9458 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1159.643499] audit: type=1400 audit(1556851703.479:465677): avc: denied { net_admin } for pid=10129 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1159.643575] audit: type=1400 audit(1556851703.329:465579): avc: denied { net_admin } for pid=14409 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1159.646560] audit: type=1400 audit(1556851703.489:465679): avc: denied { net_admin } for pid=14402 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1159.649027] audit: type=1400 audit(1556851703.489:465680): avc: denied { net_admin } for pid=9726 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1159.649033] audit: type=1400 audit(1556851703.489:465681): avc: denied { net_admin } for pid=14406 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:49:18 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f00000001c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)=0x101) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x12000000013, &(0x7f0000d06000)=0x1, 0x4) setsockopt$sock_int(r1, 0x1, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r1, 0x6, 0x4000000000014, &(0x7f0000000180)=0x80000000002, 0x2c) connect$inet(r1, &(0x7f0000000040)={0x2, 0x4e22, @empty}, 0x10) recvmmsg(r1, &(0x7f0000000000), 0x488, 0xea225aec34b1dd0e, 0x0) 02:49:18 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x300, 0x0) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) r4 = gettid() preadv(r3, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/125, 0x7d}], 0x1, 0x0) wait4(0x0, 0x0, 0x40000008, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') getpriority(0x0, r4) ioctl$int_out(r0, 0x2, &(0x7f0000000080)) poll(&(0x7f0000000280)=[{r1, 0x8000}, {r1, 0x400}, {r1, 0x8000}, {r2}], 0x4, 0x9818) ptrace$setopts(0x4206, r4, 0x0, 0x0) tkill(r4, 0x32) ptrace$cont(0x18, r4, 0x0, 0x0) setsockopt$inet_udp_encap(r2, 0x11, 0x64, &(0x7f00000002c0)=0x5, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3, 0x33}) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r4, 0x0, 0x0) 02:49:18 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") ioctl(r0, 0x7a, &(0x7f00000000c0)="f6f2a556f216d1509fafe2ece4467abbe55c4b0abe1570f100439639bb6966c288496e6f7efe95742f23ba2f5898cf7e51da2c08bcc58c4729e3cedc7ba418d75d28eb906f8d99aaea9e0b8808edddb8e57dc8774eb8f15a78b70512c722f7ca3a2f5351548748c200e8a34ce4941651d67b07d6122024bbacc5e2a1b91c4c3c1032b7d4c1f9b5167873fc15afe2adec574a67c033c50db2ecf53cf7f763") r1 = syz_open_procfs(0x0, &(0x7f0000000180)='oom_score_adj\x00') writev(r1, &(0x7f0000000080)=[{&(0x7f0000000340)='-0', 0x2}], 0x1) [ 1159.650977] audit: type=1400 audit(1556851703.489:465682): avc: denied { net_admin } for pid=9726 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:49:18 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f000002c000)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='mountinfo\x00') ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000040)) preadv(r0, &(0x7f0000000000)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) prctl$PR_SET_DUMPABLE(0x4, 0x1) 02:49:18 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='attr/exec\x00') ioctl$KDGETLED(r1, 0x4b31, &(0x7f0000000100)) setsockopt$inet6_int(r0, 0x29, 0x800000018, &(0x7f0000001300), 0xffffffffffffff19) syz_execute_func(&(0x7f0000000280)="be0c0e0e9598dd801b69e4f56962f5696200d9d9d0c441395bf9c4e1ad620f8fe9589b26c7e4c753fbc4e101edfec4427d822a2a00c4da7676f2168f4808eebce00000802000c4c3dd6d6807480b298fe9509b9b9bfc0000c1ea01eff265dc5f00c35b44dea6e89f000045363ef80f9966030faee42cbb0f5e5bf447000026400f0d18c401fe5ff6e3df45dc75000f05c36666450f17720d14111d50111d00") openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x220000, 0x0) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) openat$ion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ion\x00', 0x40000, 0x0) flistxattr(r2, &(0x7f0000000040)=""/75, 0x4b) 02:49:18 executing program 5: r0 = socket$inet(0x2, 0x2, 0x2200000088) write$binfmt_elf64(r0, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x3, 0xd1, 0x2, 0x100000001, 0x3, 0x3, 0xfffffffffffffa90, 0x2bb, 0x40, 0x16e, 0x3, 0x7, 0x38, 0x2, 0x5, 0x3, 0x5}, [{0x0, 0x5, 0x101, 0x11c, 0x4d, 0xcd, 0x3, 0x8}], "06873e6236dcadc6473bc151276b1adbdf59033e53132fd20659", [[], [], [], []]}, 0x492) bind$inet(r0, &(0x7f0000000000)={0x2, 0x1004e20}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @empty}, 0x10) setsockopt$inet_udp_int(r0, 0x11, 0xa, &(0x7f0000000c00)=0x2, 0x4) r1 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) setitimer(0x0, &(0x7f0000000200)={{0x77359400}, {0x77359400}}, &(0x7f0000000240)) write$evdev(r1, &(0x7f0000000100)=[{{0x0, 0x7530}, 0x17, 0x2}, {{}, 0x0, 0x24b, 0x6}, {{0x77359400}, 0x12, 0x9, 0x9}, {{r2, r3/1000+30000}, 0x1, 0x7f, 0x1f}, {{0x0, 0x7530}, 0x4, 0x101, 0x1}, {{0x0, 0x7530}, 0x1, 0x1, 0x3}, {{0x77359400}, 0x0, 0xffff, 0x7}, {{}, 0x7, 0x0, 0x67}, {{}, 0x0, 0x7, 0xff}, {{}, 0x16, 0x9, 0xe4e4}], 0xf0) sendto$inet(r0, &(0x7f0000000280)="dd", 0x1, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000003c80), 0x38e, 0x62, 0x0) [ 1159.651026] audit: type=1400 audit(1556851703.489:465683): avc: denied { net_admin } for pid=14428 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1165.183372] audit_printk_skb: 3594 callbacks suppressed [ 1165.183381] audit: type=1400 audit(1556851709.019:466880): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1165.402043] audit: type=1400 audit(1556851709.139:466881): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1165.486644] audit: type=1400 audit(1556851709.329:466882): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1165.540577] audit: type=1400 audit(1556851709.379:466883): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1165.638573] audit: type=1400 audit(1556851709.479:466884): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1165.650324] audit: type=1400 audit(1556851709.489:466885): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1165.707261] audit: type=1400 audit(1556851709.549:466886): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1165.733262] audit: type=1400 audit(1556851709.569:466887): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1165.800357] audit: type=1400 audit(1556851709.639:466888): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1165.814411] audit: type=1400 audit(1556851709.649:466889): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1170.302399] audit_printk_skb: 1228 callbacks suppressed [ 1170.302407] audit: type=1400 audit(1556851714.139:467300): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1170.304306] audit: type=1400 audit(1556851714.139:467301): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1170.372146] audit: type=1400 audit(1556851714.209:467302): avc: denied { net_admin } for pid=10835 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1170.374053] audit: type=1400 audit(1556851714.209:467303): avc: denied { net_admin } for pid=10835 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1170.395012] audit: type=1400 audit(1556851714.229:467304): avc: denied { net_admin } for pid=13705 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1170.691140] audit: type=1400 audit(1556851714.529:467305): avc: denied { net_admin } for pid=10188 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1170.693005] audit: type=1400 audit(1556851714.529:467306): avc: denied { net_admin } for pid=10188 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1170.698493] audit: type=1400 audit(1556851714.539:467307): avc: denied { net_admin } for pid=9766 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1170.700360] audit: type=1400 audit(1556851714.539:467308): avc: denied { net_admin } for pid=9766 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1170.788340] audit: type=1400 audit(1556851714.629:467309): avc: denied { net_admin } for pid=13705 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1175.461952] audit_printk_skb: 159 callbacks suppressed [ 1175.461961] audit: type=1400 audit(1556851719.299:467363): avc: denied { sys_admin } for pid=2106 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1175.617122] audit: type=1400 audit(1556851719.459:467364): avc: denied { sys_admin } for pid=2110 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1175.699816] audit: type=1400 audit(1556851719.539:467365): avc: denied { sys_admin } for pid=2105 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1175.703727] audit: type=1400 audit(1556851719.539:467366): avc: denied { sys_admin } for pid=2105 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1175.784761] audit: type=1400 audit(1556851719.619:467367): avc: denied { sys_admin } for pid=2106 comm="syz-executor.4" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1175.790427] audit: type=1400 audit(1556851719.629:467368): avc: denied { sys_admin } for pid=2110 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1175.797993] audit: type=1400 audit(1556851719.639:467369): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1175.803290] audit: type=1400 audit(1556851719.639:467370): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1175.879332] audit: type=1400 audit(1556851719.719:467371): avc: denied { sys_admin } for pid=2105 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1175.884672] audit: type=1400 audit(1556851719.719:467372): avc: denied { sys_admin } for pid=2105 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1180.469066] audit_printk_skb: 4965 callbacks suppressed [ 1180.469075] audit: type=1400 audit(1556851724.309:469034): avc: denied { net_admin } for pid=14832 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1180.470990] audit: type=1400 audit(1556851724.309:469035): avc: denied { net_admin } for pid=10188 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1180.471020] audit: type=1400 audit(1556851724.309:469036): avc: denied { net_admin } for pid=14832 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1180.473272] audit: type=1400 audit(1556851724.309:469037): avc: denied { net_admin } for pid=15788 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1180.475781] audit: type=1400 audit(1556851724.319:469038): avc: denied { net_admin } for pid=15794 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1180.477568] audit: type=1400 audit(1556851724.319:469039): avc: denied { net_admin } for pid=15794 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1180.478695] audit: type=1400 audit(1556851724.319:469040): avc: denied { net_admin } for pid=15676 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1180.480578] audit: type=1400 audit(1556851724.319:469041): avc: denied { net_admin } for pid=15676 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1180.485979] audit: type=1400 audit(1556851724.229:468988): avc: denied { net_admin } for pid=15804 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1180.487799] audit: type=1400 audit(1556851724.329:469042): avc: denied { net_admin } for pid=15804 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1185.477043] audit_printk_skb: 11267 callbacks suppressed [ 1185.477053] audit: type=1400 audit(1556851729.319:472820): avc: denied { net_admin } for pid=16912 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1185.477059] audit: type=1400 audit(1556851729.319:472821): avc: denied { net_admin } for pid=16496 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1185.478982] audit: type=1400 audit(1556851729.319:472822): avc: denied { net_admin } for pid=16912 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1185.478991] audit: type=1400 audit(1556851729.319:472823): avc: denied { net_admin } for pid=16496 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1185.480947] audit: type=1400 audit(1556851729.319:472824): avc: denied { net_admin } for pid=16914 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1185.480985] audit: type=1400 audit(1556851729.319:472825): avc: denied { net_admin } for pid=16465 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1185.482867] audit: type=1400 audit(1556851729.319:472826): avc: denied { net_admin } for pid=16914 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1185.482922] audit: type=1400 audit(1556851729.319:472827): avc: denied { net_admin } for pid=16465 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1185.484705] audit: type=1400 audit(1556851729.319:472828): avc: denied { net_admin } for pid=16295 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1185.484851] audit: type=1400 audit(1556851729.319:472829): avc: denied { net_admin } for pid=16915 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1190.486870] audit_printk_skb: 9600 callbacks suppressed [ 1190.486878] audit: type=1400 audit(1556851734.329:476050): avc: denied { net_admin } for pid=17678 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1190.488629] audit: type=1400 audit(1556851734.329:476051): avc: denied { net_admin } for pid=16596 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1190.488790] audit: type=1400 audit(1556851734.329:476052): avc: denied { net_admin } for pid=17678 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1190.490521] audit: type=1400 audit(1556851734.329:476053): avc: denied { net_admin } for pid=16596 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1190.490736] audit: type=1400 audit(1556851734.329:476054): avc: denied { net_admin } for pid=17688 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1190.492470] audit: type=1400 audit(1556851734.329:476055): avc: denied { net_admin } for pid=17688 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1190.494392] audit: type=1400 audit(1556851734.329:476056): avc: denied { net_admin } for pid=16358 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1190.494429] audit: type=1400 audit(1556851734.329:476057): avc: denied { net_admin } for pid=17672 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1190.506808] audit: type=1400 audit(1556851734.349:476058): avc: denied { net_admin } for pid=16613 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1190.508751] audit: type=1400 audit(1556851734.349:476059): avc: denied { net_admin } for pid=16613 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1195.496683] audit_printk_skb: 9415 callbacks suppressed [ 1195.496691] audit: type=1400 audit(1556851739.339:479221): avc: denied { net_admin } for pid=18503 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1195.498390] audit: type=1400 audit(1556851739.339:479222): avc: denied { net_admin } for pid=18503 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1195.500341] audit: type=1400 audit(1556851739.339:479223): avc: denied { net_admin } for pid=18504 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1195.500460] audit: type=1400 audit(1556851739.339:479224): avc: denied { net_admin } for pid=16202 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1195.502260] audit: type=1400 audit(1556851739.339:479225): avc: denied { net_admin } for pid=18504 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1195.502386] audit: type=1400 audit(1556851739.339:479226): avc: denied { net_admin } for pid=16202 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:49:22 executing program 5: r0 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0xade, 0x400000000) fcntl$setstatus(r0, 0x4, 0x400) fcntl$setstatus(r0, 0x4, 0x42800) [ 1195.503213] audit: type=1400 audit(1556851739.339:479227): avc: denied { net_admin } for pid=16133 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1195.504950] audit: type=1400 audit(1556851739.339:479228): avc: denied { net_admin } for pid=18475 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1195.505133] audit: type=1400 audit(1556851739.339:479229): avc: denied { net_admin } for pid=16133 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1195.506117] audit: type=1400 audit(1556851739.349:479230): avc: denied { net_admin } for pid=16281 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1200.506333] audit_printk_skb: 9684 callbacks suppressed [ 1200.506341] audit: type=1400 audit(1556851744.349:482474): avc: denied { net_admin } for pid=19304 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1200.506592] audit: type=1400 audit(1556851744.349:482475): avc: denied { net_admin } for pid=19308 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:49:22 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x1, 0x100) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000100)={{{@in=@dev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f0000000200)=0xe8) fstat(0xffffffffffffff9c, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000240)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000003c0)='./file1\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000000480)=0x0, &(0x7f00000004c0), &(0x7f0000000500)) mount$fuse(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080)='fuse\x00', 0x800000, &(0x7f0000000540)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0xb353174441fd7c1b}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@default_permissions='default_permissions'}], [{@smackfshat={'smackfshat', 0x3d, './cgroup.cpu\x00'}}, {@obj_user={'obj_user'}}, {@uid_eq={'uid', 0x3d, r3}}, {@obj_type={'obj_type', 0x3d, '#@'}}, {@euid_eq={'euid', 0x3d, r4}}, {@uid_lt={'uid<', r5}}, {@context={'context', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role', 0x3d, './cgroup.cpu\x00'}}]}}) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r6) r7 = creat(&(0x7f0000000000)='./file1\x00', 0x0) fallocate(r7, 0x0, 0x0, 0x4005eed) 02:49:22 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x80000, 0x0, @mcast2, 0x800020000000}, 0x1c) prctl$PR_CAPBSET_READ(0x17, 0x1f) r1 = dup(r0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x21000}, 0xc, &(0x7f0000000540)={&(0x7f0000000300)=ANY=[@ANYBLOB="28020200", @ANYRES16=r2, @ANYBLOB="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"], 0x228}, 0x1, 0x0, 0x0, 0x24008000}, 0x8080) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000440), 0x132224) openat$ashmem(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ashmem\x00', 0x400, 0x0) r3 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000100)='/selinux/enforce\x00', 0x400000, 0x0) ioctl$KDGKBDIACR(r3, 0x4b4a, &(0x7f0000000200)=""/88) setsockopt$packet_buf(r3, 0x107, 0x5, &(0x7f0000000140)="18151f93f998776592f62ac04a89b6b512025dc3ccbfc842d7373bab1c207c996ef19d43ead6f6369e306484164f06cf01b01b6c83a873ff9856ec6506bed9618104642f0f6df0ee2ff96ec7a8a9fd61ff7d8e", 0x53) clone(0x8000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000880)='/proc/self/net/pfkey\x00', 0x201, 0x0) accept4(r4, &(0x7f0000000740)=@generic, &(0x7f00000007c0)=0x80, 0x0) ioctl$VT_WAITACTIVE(r4, 0x5607) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000700)) r5 = gettid() setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000006c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ptrace$setopts(0x4206, r5, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x1, 0x7ff, 0x3, 0x98}) wait4(0x0, 0x0, 0x0, 0x0) tkill(r5, 0x3c) wait4(r5, &(0x7f00000005c0), 0x8000000a, &(0x7f0000000600)) 02:49:22 executing program 2: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = open(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) mount$fuse(0x20000000, &(0x7f0000000180)='./file0\x00', 0x0, 0x2008007801, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x20024, &(0x7f00000001c0)=ANY=[@ANYBLOB="2c636f6e746578743dd0"]) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x11) wait4(r0, 0x0, 0x0, 0x0) 02:49:22 executing program 4: r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) fallocate(r0, 0x0, 0x8001, 0x5f7) lseek(r0, 0x0, 0x4) [ 1200.507998] audit: type=1400 audit(1556851744.349:482476): avc: denied { net_admin } for pid=19305 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1200.508211] audit: type=1400 audit(1556851744.029:482248): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1200.508231] audit: type=1400 audit(1556851744.349:482477): avc: denied { net_admin } for pid=19304 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1200.510191] audit: type=1400 audit(1556851744.349:482479): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1200.510197] audit: type=1400 audit(1556851744.349:482478): avc: denied { net_admin } for pid=19310 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1200.512069] audit: type=1400 audit(1556851744.349:482480): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1200.512121] audit: type=1400 audit(1556851744.349:482481): avc: denied { net_admin } for pid=19310 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1200.514001] audit: type=1400 audit(1556851744.349:482482): avc: denied { net_admin } for pid=2110 comm="syz-executor.0" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1205.522180] audit_printk_skb: 9662 callbacks suppressed [ 1205.522188] audit: type=1400 audit(1556851749.359:485727): avc: denied { net_admin } for pid=15977 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1205.524115] audit: type=1400 audit(1556851749.359:485729): avc: denied { net_admin } for pid=15977 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1205.524144] audit: type=1400 audit(1556851749.359:485730): avc: denied { net_admin } for pid=17766 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1205.531355] audit: type=1400 audit(1556851749.369:485731): avc: denied { net_admin } for pid=17768 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1205.531381] audit: type=1400 audit(1556851749.369:485732): avc: denied { net_admin } for pid=15644 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1205.533290] audit: type=1400 audit(1556851749.369:485733): avc: denied { net_admin } for pid=17768 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1205.533305] audit: type=1400 audit(1556851749.369:485734): avc: denied { net_admin } for pid=15644 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1205.539593] audit: type=1400 audit(1556851749.379:485735): avc: denied { net_admin } for pid=15647 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:49:26 executing program 0: capset(&(0x7f0000000100)={0x19980330}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}) r0 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000540)='/selinux/avc/cache_threshold\x00', 0x2, 0x0) write$P9_RLINK(r0, &(0x7f00000002c0)={0x7, 0x47, 0x1}, 0x7) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r1 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$KDSKBSENT(r1, 0x4b49, &(0x7f0000000180)="d822d9e0945c28b760a2bc4af37bb66aa11d42e45605a46dea2b63c4f97ebc640ea3cddbb31de3556fc462df9f1b13e1a58760689526ea2daba24e388b67bdb76d2b428a77a720e8ccb7c39bf49432af93d10acbd30aeedcbd5a0f8ca8aa8c78ffdc61712e1b6176a1ee9b60a26fd87769784bd0ac701db505a16eb889a78a76fbaeeee7d4c99e3db6a960bcc546c5dd0b2ff1b87cb2adb8d45e30e4f1e7fe611243a5691e55fb17b367c851f283926180136fb7832fa3f347e7f6b48a") syz_execute_func(&(0x7f00000005c0)="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") setxattr$security_smack_entry(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64MMAP\x00', &(0x7f0000000240)='/selinux/avc/hash_stats\x00', 0x18, 0x2) [ 1205.539623] audit: type=1400 audit(1556851749.379:485736): avc: denied { net_admin } for pid=17781 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:49:29 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup(r0) bind$inet6(r0, &(0x7f0000000180)={0xa, 0x4e20}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000140), 0x4) r2 = add_key$keyring(0x0, &(0x7f0000000200)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key(0x0, 0x0, 0x0, 0xfffffffffffffd30, r2) keyctl$update(0x2, r3, 0x0, 0x0) r4 = open(0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) r5 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = open(&(0x7f00000003c0)='./file0\x00', 0x20141042, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$KDSETKEYCODE(r4, 0x4b4d, &(0x7f00000002c0)={0x3, 0xfefffffffffffffe}) request_key(&(0x7f0000000240)='pkcs7_test\x00', 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, 0x0, 0x0) lstat(0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000100)) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) syslog(0x0, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x7) ftruncate(r6, 0x280080) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff}]}, 0x10) sendfile(r1, r6, &(0x7f0000d83ff8), 0x200800900000002) 02:49:29 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TCSETXF(r1, 0x5434, &(0x7f0000000800)={0x0, 0x1010000000000000, [0x20, 0x9, 0x5, 0x3, 0xbc2f], 0x886}) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000080)=@nat={'nat\x00', 0x1b, 0x5, 0x708, 0x0, 0x0, 0x508, 0x3a8, 0x0, 0x638, 0x638, 0x638, 0x638, 0x638, 0x5, &(0x7f0000000000), {[{{@ipv6={@mcast1, @remote, [0xffffff00, 0xffffff00, 0xff], [0xffffffff, 0x0, 0xffffffff, 0xff], 'tunl0\x00', 'lo\x00', {0xff}, {0xff}, 0x1d, 0x8, 0x4, 0x24}, 0x0, 0xf0, 0x138, 0x0, {}, [@common=@inet=@tos={0x28, 'tos\x00', 0x0, {0xffff, 0xffffffffffff0000, 0x1}}]}, @REDIRECT={0x48, 'REDIRECT\x00', 0x0, {0x5, @ipv6=@loopback, @ipv4=@multicast2, @port=0x4e21, @port=0x4e22}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev={0xfe, 0x80, [], 0x23}, [0x0, 0xffffff00, 0xffffffff, 0xffffffff], [0xff, 0x0, 0xffffff00, 0xffffff00], 'veth1_to_hsr\x00', 'syz_tun\x00', {}, {0xff}, 0x6f, 0x8000000000000, 0x3, 0x4c}, 0x0, 0x228, 0x270, 0x0, {}, [@common=@mh={0x28, 'mh\x00', 0x0, {0x80, 0x5, 0x1}}, @common=@rt={0x138, 'rt\x00', 0x0, {0x5d, 0x101, 0xfff, 0x5, 0x30, 0x1, [@empty, @rand_addr="3a3820e0b364c20a09ebedbdcd026e14", @mcast1, @mcast1, @loopback, @local, @remote, @mcast2, @remote, @local, @remote, @dev={0xfe, 0x80, [], 0xb}, @mcast1, @ipv4={[], [], @initdev={0xac, 0x1e, 0x0, 0x0}}, @remote, @rand_addr="92dbfb8c202d5634086c2cd558752b30"], 0x1}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x1, @ipv4=@multicast2, @ipv4=@loopback, @port=0x4e20, @port=0x4e24}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x1, 0x0}, @rand_addr="ae124de5b696d0ad2a3d688f6c3b7278", [0xff, 0xffffff00, 0x0, 0xff], [0x0, 0xff, 0xff000000, 0xff], 'veth0_to_team\x00', 'dummy0\x00', {0xff}, {0xff}, 0x62, 0x5840, 0x3, 0x2a}, 0x0, 0x118, 0x160, 0x0, {}, [@common=@hl={0x28, 'hl\x00', 0x0, {0x3, 0x9}}, @common=@ipv6header={0x28, 'ipv6header\x00', 0x0, {0x4, 0x64, 0x1}}]}, @unspec=@DNAT1={0x48, 'DNAT\x00', 0x1, {0x10, @ipv6=@local, @ipv6=@local, @port=0x4e24, @port=0x4e21}}}, {{@uncond, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xf, 0x9, 0x1, 0x1}}]}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00', 0x0, {[0x3, 0x9, 0x5, 0x81, 0xfffffffffffffffe, 0x7, 0xfffffffffffffff7, 0xffffffffffffff81]}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x768) 02:49:29 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000040)=0xfffffffc, 0x4) bind$inet6(r0, &(0x7f00001fefe4)={0xa, 0x4e22, 0x0, @ipv4={[], [], @local}}, 0x1c) creat(&(0x7f0000000000)='./file0\x00', 0x25) listen(r0, 0x0) connect(r0, &(0x7f0000000080)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x1c, {0xa, 0x4e22, 0x200, @empty, 0xffff}}, 0x80) r1 = socket$netlink(0x10, 0x3, 0xf) writev(r1, &(0x7f0000e11ff0)=[{&(0x7f0000000140)="580000001400add427323b470c458c5602067fffffff81004e220000ac1414aa0b4824ca945f64009400050028925aa80000000000000080000efffeffe809000000fff5dd00000010000100090a1000410400000000fcff", 0x58}], 0x1) 02:49:29 executing program 5: syz_execute_func(&(0x7f0000000080)="98cd8080000cf2450fad87000000218a2069d00fd1b02db5d9a4d000f8652609d5d1840568ea0000c483356f1d0a000000093c3bc401fe11298f69289bd19d67d861381d6a2f2f3acca1c3e50000000e0ed16766450f166d005cf0400fb074dabc61619688a07a980000c4a1fae6ae34f896dce1b1acbba22c6526450f16c8dff7d8490d") r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000200)={0x5, 0x8000, 0x1ff}) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040)='nbd\x00') getsockopt$inet_udp_int(r0, 0x11, 0x6f, &(0x7f0000000240), &(0x7f0000000280)=0x4) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="76002dbd7000ffdbdf25016a9d0285be7874a100000000000000"], 0x20}, 0x1, 0x0, 0x0, 0xc0}, 0x24000000) 02:49:29 executing program 4: clone(0x13102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = gettid() r2 = openat$keychord(0xffffffffffffff9c, &(0x7f0000000040)='/dev/keychord\x00', 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r1, 0x3d) r3 = syz_genetlink_get_family_id$tipc2(0xfffffffffffffffe) sendmsg$TIPC_NL_BEARER_DISABLE(r2, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c2c7d7c20e1b799f183dbf34df441da0dd1d3f822001ff43eaa417d", @ANYRES16=r3, @ANYBLOB="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"], 0x11c}}, 0x44084) ioctl$sock_ifreq(r2, 0x89bd, &(0x7f0000000380)={'hsr0\x00', @ifru_map={0x6, 0x7ff, 0x5, 0x9, 0x4, 0x7}}) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f00000002c0)=""/133) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x3}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r4 = request_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={'syz', 0x1}, &(0x7f0000000240)='hsr0\x00', 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, r4) ptrace$cont(0x1f, r1, 0x0, 0x0) [ 1205.541539] audit: type=1400 audit(1556851749.379:485737): avc: denied { net_admin } for pid=17781 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:49:40 executing program 0: clone(0x41fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() r1 = accept$unix(0xffffffffffffff9c, &(0x7f0000000080), &(0x7f0000000100)=0x6e) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000140)={0x3, 0xfffffffffffffff8, 0x4, 0x20, 0x2}) rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000000)) ptrace(0x10, r0) ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000200)={0xffffffffffffffff, 0xfffffffffffffe88}) write$selinux_validatetrans(r1, &(0x7f0000000240)={'system_u:object_r:locale_t:s0', 0x20, 'system_u:object_r:shadow_t:s0', 0x20, 0x3, 0x20, 'system_u:system_r:kernel_t:s0\x00'}, 0x6f) setsockopt(r1, 0xfffffffffffffffe, 0x0, &(0x7f0000000180)="d3468970a3aca7ad7639e169590706ca56780f", 0x13) shutdown(r1, 0x1) [ 1210.543697] audit_printk_skb: 3160 callbacks suppressed [ 1210.543706] audit: type=1400 audit(1556851754.379:486792): avc: denied { net_admin } for pid=20802 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:49:40 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = syz_open_procfs(0x0, &(0x7f0000000340)='clear_refs\x00\xb0Ix\xe6\fK\xa3/\xd7\xb9IqK\xcb\xe8\fW\xafYt|a\xa3\x16\x19\xcb\xaf\xea\x03O[k\xb1S2\x86\v\x9f\x14\xc6T\xd1!$\x84\xf5\xc9\xd8\xed\xca\xd2\xf0s\xe0\xcaPx\xfcd\xd3\x8d\x1e\xff\xff\xff\xff\xff\xff\xff\xfe,\xaegV\x96!n\b\xf2\x1e\x87\xb8\xb5M\xa0\xd1\xb5\xf3\xb4\xd6\xf8\xca\xf3J\x15\xed+,\x98\xfc\xbfX\x12\x97\xb3\x1b\xea\xfa\xff\xb7gx\xa1\x96\xad\x93\xaa=-z\x06r\b\'') r2 = gettid() r3 = syz_open_procfs(r2, &(0x7f0000000440)='syscall\x00') ioctl$LOOP_GET_STATUS(r3, 0x4c03, &(0x7f0000000040)) sendfile(r1, r3, 0x0, 0x1) 02:49:43 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000000)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) r1 = syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000012000)={0x8, 0x0, &(0x7f0000005fd4)=ANY=[@ANYBLOB="0563040100000000"], 0x0, 0x0, 0x0}) close(r0) dup(r1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000180)={0x8, 0x0, &(0x7f0000000100)=[@release], 0x0, 0x0, 0x0}) 02:49:44 executing program 5: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) munmap(&(0x7f00000e4000/0x3000)=nil, 0x3000) remap_file_pages(&(0x7f0000038000/0x400000)=nil, 0x400000, 0x0, 0x0, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffff9c, 0x80000) getsockname$unix(r0, &(0x7f0000000040), &(0x7f00000000c0)=0x6e) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req={0x100000001, 0x2ee1, 0x1, 0x6}, 0x10) mmap(&(0x7f00000e3000/0x3000)=nil, 0x3000, 0x2000000, 0x100010, r0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) 02:49:45 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = open(&(0x7f0000000040)='./file0\x00', 0x140, 0x4) r3 = openat$selinux_status(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/status\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000180)='./file0\x00', r3, &(0x7f0000000200)='./file0\x00') ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") connect$inet6(r0, &(0x7f0000000080), 0x1c) r4 = dup2(r1, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r5 = gettid() setsockopt$inet6_buf(r4, 0x29, 0x30, 0x0, 0x101) ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x10000000038) fcntl$setstatus(r4, 0x4, 0x42803) ioctl$FS_IOC_MEASURE_VERITY(r4, 0xc0046686, &(0x7f00000000c0)={0x3, 0x86, "030653c8f462d368f0ebe8a57574837462b0088ba183bb575c45dfa416f389d48cf0abb64f40f96b96fda2785cb7fc224dae4125bbaa7284aa228cd0792c518d0f5177770f75588170c8c4dd7623792bd79e927e3e74408cc706f03e77b5460a84cde6598233fd60fdee2350dadfd17adef040c4342aeb990450ba86d0ae3a7f018b9526931c"}) [ 1210.545004] audit: type=1400 audit(1556851754.379:486793): avc: denied { net_admin } for pid=20899 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:49:51 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r0, &(0x7f0000000000), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) r2 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000001c0), 0x10) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") clone(0x200bfc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@mcast1, @in=@broadcast}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setsockopt$sock_int(r1, 0x1, 0x9, &(0x7f0000000600)=0x2, 0x4) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, 0x0, &(0x7f0000000180)) [ 1210.729545] audit: type=1400 audit(1556851754.569:486794): avc: denied { net_admin } for pid=20840 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:49:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = syz_open_pts(0xffffffffffffff9c, 0x800) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='pids.current\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="29f4000003000000000000030000000000000008000000000000006367726f75706c6f00"], 0x29) ioctl$TCSETX(r1, 0x5433, &(0x7f0000000000)={0x100000000, 0x9, [0x8, 0x7, 0x6, 0x5, 0xffffffff], 0x4}) clone(0x7102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair(0x11, 0xa, 0x80000001, 0x0) [ 1210.730173] audit: type=1400 audit(1556851754.569:486795): avc: denied { net_admin } for pid=20953 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1210.731099] audit: type=1400 audit(1556851754.569:486796): avc: denied { net_admin } for pid=20892 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1210.769397] audit: type=1400 audit(1556851754.609:486797): avc: denied { net_admin } for pid=20947 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1210.769840] audit: type=1400 audit(1556851754.609:486798): avc: denied { net_admin } for pid=20942 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1210.770057] audit: type=1400 audit(1556851754.109:486769): avc: denied { net_admin } for pid=20945 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1214.545282] audit: type=1400 audit(1556851758.379:486799): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1214.548775] audit: type=1400 audit(1556851758.389:486800): avc: denied { sys_admin } for pid=2107 comm="syz-executor.1" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1215.547256] audit_printk_skb: 84 callbacks suppressed [ 1215.547265] audit: type=1400 audit(1556851759.389:486829): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1215.550735] audit: type=1400 audit(1556851759.389:486830): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1215.553962] audit: type=1400 audit(1556851759.389:486831): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1215.558384] audit: type=1400 audit(1556851759.399:486832): avc: denied { net_admin } for pid=2107 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1215.986044] audit: type=1400 audit(1556851759.819:486833): avc: denied { net_admin } for pid=21382 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1216.042762] audit: type=1400 audit(1556851759.879:486834): avc: denied { net_admin } for pid=21382 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1218.302827] audit: type=1400 audit(1556851762.139:486835): avc: denied { sys_admin } for pid=2105 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1218.354673] audit: type=1400 audit(1556851762.189:486836): avc: denied { sys_admin } for pid=2105 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1218.397344] audit: type=1400 audit(1556851762.239:486837): avc: denied { sys_admin } for pid=2105 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1218.486761] audit: type=1400 audit(1556851762.319:486838): avc: denied { sys_admin } for pid=2105 comm="syz-executor.5" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1220.555860] audit_printk_skb: 300 callbacks suppressed [ 1220.555868] audit: type=1400 audit(1556851764.399:486939): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1220.695106] audit: type=1400 audit(1556851764.529:486940): avc: denied { net_admin } for pid=21402 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1220.704407] audit: type=1400 audit(1556851764.539:486941): avc: denied { create } for pid=21402 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 1220.710049] audit: type=1400 audit(1556851764.549:486942): avc: denied { write } for pid=21402 comm="syz-executor.3" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 02:50:10 executing program 1: 02:50:10 executing program 4: preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000840)=""/148, 0x94}], 0x1, 0x0) getpid() getpgrp(0xffffffffffffffff) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000040)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/netlink\x00') preadv(r1, &(0x7f0000000700), 0x31f, 0x10400003) add_key(0x0, &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) 02:50:10 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x100fff, 0x0) rt_sigpending(&(0x7f0000000080), 0x8) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b3fdc)) write(r1, &(0x7f000054bfba)="4f7ad0c9edb302486f1748144523c0c253773e00d49ba39063e2432e8de58f5930fd07000000dcf50bbc54b70c0ea17b4728dde5f9eedfc811ff1f75642558334444c9fe3d13", 0x46) r2 = syz_open_pts(r1, 0x2) writev(r2, &(0x7f0000000040)=[{&(0x7f0000000180)="10", 0x1}], 0x1) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)) 02:50:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='stat\t\xc0\xd2\xfe\xbc\xf9\xdf-\xea\xc8\xc1w\xff\x17\x12H\xe9\x11\x93Q0I\xe81U\ro}\xe6l\xf6\xf6\xbd\xbf\x13\x11\x92\f\x8a&\xed\xa4\xdc\xc3x?\x9d\xb5\x11k4\xd3\x1b\x05\x12\xa5\f\xd6\xfd\x00'/75, 0x275a, 0x0) unshare(0x20600) getpeername$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local}, &(0x7f0000000040)=0x1c) fallocate(r0, 0x0, 0x0, 0x110005) 02:50:10 executing program 3: ioperm(0x0, 0x3f, 0x0) unshare(0x20000000) clone(0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x40000000, 0x0) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$RTC_EPOCH_READ(r0, 0x8008700d, &(0x7f0000000040)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@timestamp, @timestamp, @timestamp, @timestamp, @sack_perm, @sack_perm, @timestamp, @sack_perm, @window={0x3, 0x7ff, 0x5}], 0x9) ioctl$TIOCGLCKTRMIOS(r0, 0x5456, &(0x7f0000000100)={0x1, 0xffffffff, 0x1000, 0x1, 0x0, 0xfffffffffffffe71, 0xcc, 0x0, 0x5, 0x7ff, 0x8, 0x101}) 02:50:10 executing program 5: 02:50:12 executing program 2: [ 1220.891732] audit: type=1400 audit(1556851764.729:486943): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1221.894065] audit: type=1400 audit(1556851765.729:486944): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:50:13 executing program 5: 02:50:13 executing program 3: 02:50:15 executing program 4: 02:50:15 executing program 0: request_key(&(0x7f0000000180)='logon\x00', &(0x7f0000000240)={'syz'}, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x5, 0x0) close(r0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1221.900904] audit: type=1400 audit(1556851765.739:486945): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 02:50:16 executing program 2: r0 = socket$inet(0x2, 0x4000000000000003, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x100004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) read(r0, &(0x7f0000000080)=""/13, 0xffffffac) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) write$FUSE_NOTIFY_RETRIEVE(r1, &(0x7f0000000240)={0x30}, 0x30) write$FUSE_INTERRUPT(r0, &(0x7f0000000140)={0x10}, 0xfffffd2a) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) [ 1221.917190] audit: type=1400 audit(1556851765.749:486946): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1221.951088] audit: type=1400 audit(1556851765.779:486947): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1221.977205] audit: type=1400 audit(1556851765.819:486948): avc: denied { net_admin } for pid=2106 comm="syz-executor.4" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1225.565731] audit_printk_skb: 1988 callbacks suppressed [ 1225.565739] audit: type=1400 audit(1556851769.409:487614): avc: denied { net_admin } for pid=21594 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1225.574144] audit: type=1400 audit(1556851769.409:487615): avc: denied { net_admin } for pid=21554 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1225.581432] audit: type=1400 audit(1556851769.419:487616): avc: denied { net_admin } for pid=20953 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1225.583189] audit: type=1400 audit(1556851769.419:487617): avc: denied { net_admin } for pid=20953 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1225.593653] audit: type=1400 audit(1556851769.429:487618): avc: denied { net_admin } for pid=20899 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1225.601351] audit: type=1400 audit(1556851769.439:487619): avc: denied { net_admin } for pid=21554 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1225.641211] audit: type=1400 audit(1556851769.479:487620): avc: denied { net_admin } for pid=18226 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1225.643063] audit: type=1400 audit(1556851769.479:487621): avc: denied { net_admin } for pid=18226 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1225.647247] audit: type=1400 audit(1556851769.489:487623): avc: denied { net_admin } for pid=16908 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1225.650098] audit: type=1400 audit(1556851769.489:487624): avc: denied { net_admin } for pid=16908 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1230.578913] audit_printk_skb: 9252 callbacks suppressed [ 1230.578922] audit: type=1400 audit(1556851774.419:490722): avc: denied { net_admin } for pid=21558 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1230.579833] audit: type=1400 audit(1556851774.419:490723): avc: denied { net_admin } for pid=22229 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1230.580841] audit: type=1400 audit(1556851774.419:490724): avc: denied { net_admin } for pid=21558 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1230.581714] audit: type=1400 audit(1556851774.419:490725): avc: denied { net_admin } for pid=22229 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1230.588891] audit: type=1400 audit(1556851774.429:490726): avc: denied { net_admin } for pid=21600 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1230.589872] audit: type=1400 audit(1556851774.429:490727): avc: denied { net_admin } for pid=22154 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1230.590826] audit: type=1400 audit(1556851774.429:490728): avc: denied { net_admin } for pid=21600 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1230.591739] audit: type=1400 audit(1556851774.429:490729): avc: denied { net_admin } for pid=22154 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1230.599333] audit: type=1400 audit(1556851774.439:490730): avc: denied { net_admin } for pid=22055 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1230.599374] audit: type=1400 audit(1556851774.439:490731): avc: denied { net_admin } for pid=22174 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1235.586826] audit_printk_skb: 11068 callbacks suppressed [ 1235.586835] audit: type=1400 audit(1556851779.429:494435): avc: denied { net_admin } for pid=23305 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1235.588752] audit: type=1400 audit(1556851779.429:494436): avc: denied { net_admin } for pid=23305 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1235.588938] audit: type=1400 audit(1556851779.429:494437): avc: denied { net_admin } for pid=18284 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1235.590727] audit: type=1400 audit(1556851779.429:494438): avc: denied { net_admin } for pid=22772 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1235.590852] audit: type=1400 audit(1556851779.429:494439): avc: denied { net_admin } for pid=18284 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1235.592403] audit: type=1400 audit(1556851779.429:494440): avc: denied { net_admin } for pid=22772 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1235.594343] audit: type=1400 audit(1556851779.429:494441): avc: denied { net_admin } for pid=23030 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1235.594395] audit: type=1400 audit(1556851779.429:494442): avc: denied { net_admin } for pid=22141 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1235.596275] audit: type=1400 audit(1556851779.439:494443): avc: denied { net_admin } for pid=22875 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1235.598123] audit: type=1400 audit(1556851779.439:494444): avc: denied { net_admin } for pid=22875 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1240.595756] audit_printk_skb: 10418 callbacks suppressed [ 1240.595764] audit: type=1400 audit(1556851784.439:497928): avc: denied { net_admin } for pid=24173 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1240.597518] audit: type=1400 audit(1556851784.439:497929): avc: denied { net_admin } for pid=24173 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1240.599007] audit: type=1400 audit(1556851784.439:497930): avc: denied { net_admin } for pid=22572 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1240.599278] audit: type=1400 audit(1556851784.439:497931): avc: denied { net_admin } for pid=24120 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1240.600923] audit: type=1400 audit(1556851784.439:497932): avc: denied { net_admin } for pid=22572 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1240.600977] audit: type=1400 audit(1556851784.439:497933): avc: denied { net_admin } for pid=24132 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1240.602307] audit: type=1400 audit(1556851784.439:497934): avc: denied { net_admin } for pid=24137 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1240.603909] audit: type=1400 audit(1556851784.439:497935): avc: denied { net_admin } for pid=24118 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1240.604071] audit: type=1400 audit(1556851784.439:497936): avc: denied { net_admin } for pid=22468 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1240.608926] audit: type=1400 audit(1556851784.449:497937): avc: denied { net_admin } for pid=22955 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1245.606682] audit_printk_skb: 9732 callbacks suppressed [ 1245.606689] audit: type=1400 audit(1556851789.449:501203): avc: denied { net_admin } for pid=25053 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1245.608264] audit: type=1400 audit(1556851789.449:501204): avc: denied { net_admin } for pid=25053 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1245.611225] audit: type=1400 audit(1556851789.449:501205): avc: denied { net_admin } for pid=25017 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1245.611325] audit: type=1400 audit(1556851789.449:501206): avc: denied { net_admin } for pid=23068 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1245.613149] audit: type=1400 audit(1556851789.449:501207): avc: denied { net_admin } for pid=25017 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1245.613246] audit: type=1400 audit(1556851789.449:501208): avc: denied { net_admin } for pid=23068 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1245.615024] audit: type=1400 audit(1556851789.449:501209): avc: denied { net_admin } for pid=21635 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1245.616752] audit: type=1400 audit(1556851789.459:501210): avc: denied { net_admin } for pid=25018 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1245.616846] audit: type=1400 audit(1556851789.459:501211): avc: denied { net_admin } for pid=23249 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1245.618690] audit: type=1400 audit(1556851789.459:501212): avc: denied { net_admin } for pid=25018 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1250.631973] audit_printk_skb: 9611 callbacks suppressed [ 1250.631982] audit: type=1400 audit(1556851794.469:504428): avc: denied { net_admin } for pid=23494 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1250.633342] audit: type=1400 audit(1556851794.469:504429): avc: denied { net_admin } for pid=23473 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1250.634705] audit: type=1400 audit(1556851794.469:504430): avc: denied { net_admin } for pid=23553 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1250.636352] audit: type=1400 audit(1556851794.479:504431): avc: denied { net_admin } for pid=23537 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1250.638340] audit: type=1400 audit(1556851794.479:504432): avc: denied { net_admin } for pid=23362 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1250.639761] audit: type=1400 audit(1556851794.479:504433): avc: denied { net_admin } for pid=23443 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1250.641420] audit: type=1400 audit(1556851794.479:504434): avc: denied { net_admin } for pid=23438 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1250.643048] audit: type=1400 audit(1556851794.479:504435): avc: denied { net_admin } for pid=23542 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1250.647238] audit: type=1400 audit(1556851794.489:504436): avc: denied { net_admin } for pid=23564 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1250.648873] audit: type=1400 audit(1556851794.489:504437): avc: denied { net_admin } for pid=22404 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1255.703990] audit_printk_skb: 6709 callbacks suppressed [ 1255.704003] audit: type=1400 audit(1556851799.229:506682): avc: denied { dac_override } for pid=26494 comm="syz-executor.3" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1255.719437] audit: type=1400 audit(1556851799.539:506684): avc: denied { net_admin } for pid=26400 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1255.970013] audit: type=1400 audit(1556851799.809:506685): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1255.972294] audit: type=1400 audit(1556851799.809:506686): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1256.089691] audit: type=1400 audit(1556851799.929:506688): avc: denied { net_admin } for pid=26400 comm="syz-executor.2" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1256.141170] audit: type=1400 audit(1556851799.929:506687): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1256.260024] audit: type=1400 audit(1556851800.099:506689): avc: denied { sys_admin } for pid=2108 comm="syz-executor.3" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1256.658271] audit: type=1400 audit(1556851800.499:506690): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1256.660237] audit: type=1400 audit(1556851800.499:506691): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1256.662369] audit: type=1400 audit(1556851800.499:506692): avc: denied { net_admin } for pid=2108 comm="syz-executor.3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1260.796907] audit_printk_skb: 771 callbacks suppressed [ 1260.796916] audit: type=1400 audit(1556851804.639:506954): avc: denied { net_admin } for pid=26964 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1260.862565] audit: type=1400 audit(1556851804.699:506956): avc: denied { net_admin } for pid=26933 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1260.863314] audit: type=1400 audit(1556851804.699:506957): avc: denied { net_admin } for pid=26959 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1260.901203] audit: type=1400 audit(1556851804.739:506958): avc: denied { net_admin } for pid=26993 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1260.903082] audit: type=1400 audit(1556851804.739:506959): avc: denied { net_admin } for pid=26993 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1260.905071] audit: type=1400 audit(1556851804.739:506960): avc: denied { net_admin } for pid=26995 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1260.907297] audit: type=1400 audit(1556851804.749:506961): avc: denied { net_admin } for pid=26997 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1260.909155] audit: type=1400 audit(1556851804.749:506962): avc: denied { net_admin } for pid=26997 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1260.911048] audit: type=1400 audit(1556851804.749:506963): avc: denied { net_admin } for pid=26999 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1260.912880] audit: type=1400 audit(1556851804.749:506964): avc: denied { net_admin } for pid=26999 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1265.808653] audit_printk_skb: 641 callbacks suppressed [ 1265.808662] audit: type=1400 audit(1556851809.649:507179): avc: denied { net_admin } for pid=21421 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1265.840222] audit: type=1400 audit(1556851809.679:507181): avc: denied { net_admin } for pid=21421 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1265.840288] audit: type=1400 audit(1556851809.649:507180): avc: denied { net_admin } for pid=23607 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1265.840452] audit: type=1400 audit(1556851809.619:507174): avc: denied { net_admin } for pid=22490 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1265.902305] audit: type=1400 audit(1556851809.739:507182): avc: denied { net_admin } for pid=27494 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1265.904269] audit: type=1400 audit(1556851809.739:507183): avc: denied { net_admin } for pid=27494 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1266.339544] audit: type=1400 audit(1556851810.179:507184): avc: denied { net_admin } for pid=27490 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1266.341523] audit: type=1400 audit(1556851810.179:507185): avc: denied { net_admin } for pid=27490 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1266.509976] audit: type=1400 audit(1556851810.349:507186): avc: denied { net_admin } for pid=27511 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1266.511865] audit: type=1400 audit(1556851810.349:507187): avc: denied { net_admin } for pid=27511 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1270.817226] audit_printk_skb: 426 callbacks suppressed [ 1270.817234] audit: type=1400 audit(1556851814.659:507330): avc: denied { net_admin } for pid=28009 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1270.819062] audit: type=1400 audit(1556851814.659:507331): avc: denied { net_admin } for pid=28009 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1270.824549] audit: type=1400 audit(1556851814.659:507332): avc: denied { net_admin } for pid=27402 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1270.843328] audit: type=1400 audit(1556851814.679:507333): avc: denied { net_admin } for pid=23024 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1270.849665] audit: type=1400 audit(1556851814.689:507335): avc: denied { net_admin } for pid=27453 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1270.851491] audit: type=1400 audit(1556851814.689:507336): avc: denied { net_admin } for pid=27453 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1270.853328] audit: type=1400 audit(1556851814.689:507337): avc: denied { net_admin } for pid=23011 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1270.861211] audit: type=1400 audit(1556851814.699:507339): avc: denied { net_admin } for pid=27456 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1270.862992] audit: type=1400 audit(1556851814.699:507340): avc: denied { net_admin } for pid=27456 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1270.867536] audit: type=1400 audit(1556851814.709:507341): avc: denied { net_admin } for pid=28010 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1275.825466] audit_printk_skb: 5397 callbacks suppressed [ 1275.825474] audit: type=1400 audit(1556851819.669:509146): avc: denied { net_admin } for pid=25513 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1275.828021] audit: type=1400 audit(1556851819.669:509147): avc: denied { net_admin } for pid=23536 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1275.828586] audit: type=1400 audit(1556851819.669:509148): avc: denied { net_admin } for pid=24809 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1275.829914] audit: type=1400 audit(1556851819.669:509149): avc: denied { net_admin } for pid=23536 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1275.830473] audit: type=1400 audit(1556851819.669:509150): avc: denied { net_admin } for pid=24809 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1275.837091] audit: type=1400 audit(1556851819.679:509152): avc: denied { net_admin } for pid=28319 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1275.837326] audit: type=1400 audit(1556851819.679:509153): avc: denied { net_admin } for pid=28043 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1275.839028] audit: type=1400 audit(1556851819.679:509154): avc: denied { net_admin } for pid=28319 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1275.839234] audit: type=1400 audit(1556851819.679:509155): avc: denied { net_admin } for pid=28043 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1275.841895] audit: type=1400 audit(1556851819.679:509156): avc: denied { net_admin } for pid=28487 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1280.838831] audit_printk_skb: 9394 callbacks suppressed [ 1280.838840] audit: type=1400 audit(1556851824.679:512311): avc: denied { net_admin } for pid=27062 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1280.839124] audit: type=1400 audit(1556851824.679:512312): avc: denied { net_admin } for pid=28326 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1280.840801] audit: type=1400 audit(1556851824.679:512313): avc: denied { net_admin } for pid=27062 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1280.841015] audit: type=1400 audit(1556851824.679:512314): avc: denied { net_admin } for pid=28326 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1280.841838] audit: type=1400 audit(1556851824.679:512315): avc: denied { net_admin } for pid=28579 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1280.843650] audit: type=1400 audit(1556851824.679:512316): avc: denied { net_admin } for pid=28579 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1280.844843] audit: type=1400 audit(1556851824.679:512317): avc: denied { net_admin } for pid=28543 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1280.844854] audit: type=1400 audit(1556851824.679:512318): avc: denied { net_admin } for pid=28187 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1280.846345] audit: type=1400 audit(1556851824.689:512319): avc: denied { net_admin } for pid=28525 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1280.847659] audit: type=1400 audit(1556851824.689:512320): avc: denied { net_admin } for pid=28653 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1285.850176] audit_printk_skb: 9712 callbacks suppressed [ 1285.850184] audit: type=1400 audit(1556851829.689:515568): avc: denied { net_admin } for pid=29797 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1285.851965] audit: type=1400 audit(1556851829.689:515569): avc: denied { net_admin } for pid=29797 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1285.853802] audit: type=1400 audit(1556851829.689:515570): avc: denied { net_admin } for pid=29800 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1285.856918] audit: type=1400 audit(1556851829.699:515571): avc: denied { net_admin } for pid=29788 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1285.858681] audit: type=1400 audit(1556851829.699:515572): avc: denied { net_admin } for pid=29788 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1285.860550] audit: type=1400 audit(1556851829.699:515573): avc: denied { net_admin } for pid=29790 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1285.862284] audit: type=1400 audit(1556851829.699:515574): avc: denied { net_admin } for pid=29790 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1285.864147] audit: type=1400 audit(1556851829.699:515575): avc: denied { net_admin } for pid=29792 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1285.869880] audit: type=1400 audit(1556851829.709:515576): avc: denied { net_admin } for pid=28679 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 1285.870667] audit: type=1400 audit(1556851829.709:515577): avc: denied { net_admin } for pid=28966 comm="syz-executor.1" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1