last executing test programs: 53m43.197175661s ago: executing program 0 (id=673): r0 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f00000000c0)="ff", 0x1, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, r1, 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) gettid() keyctl$KEYCTL_MOVE(0x1e, r0, 0xffffffffffffffff, r1, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000080), &(0x7f0000000140)={'syz', 0x1}, &(0x7f00000001c0)={0x3, 0x0, @auto=[0x1c, 0x3e]}, 0xa, r1) 53m39.565494346s ago: executing program 0 (id=676): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$SO_TIMESTAMP(r1, 0x1, 0x23, 0x0, &(0x7f0000003880)) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @broadcast}, 0x10) r2 = syz_open_dev$dri(&(0x7f0000000000), 0xd21, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r2, 0x40046411, &(0x7f0000000180)=0x5) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x100) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r3, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) ioctl$AUTOFS_IOC_SETTIMEOUT(r2, 0x80049367, &(0x7f0000000040)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x3) sendto$inet(r0, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) 53m36.596356009s ago: executing program 0 (id=679): socket$can_j1939(0x1d, 0x2, 0x7) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x30b542, 0x0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[], 0x33fe0}, 0x1, 0x0, 0x0, 0x44081}, 0x20000000) sendmsg$NL80211_CMD_FLUSH_PMKSA(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={0x0}, 0x1, 0x0, 0x0, 0x20008084}, 0x4000) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x7, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000080)={{0x0, 0x8}, {0x0, 0x3938700}}, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) close(0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) 53m34.236301274s ago: executing program 0 (id=681): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00'}) creat(&(0x7f0000000040)='./file0\x00', 0x109) r1 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) close(r1) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r1, &(0x7f00000005c0)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x37d04f0c928c7e3c}, 0xc, &(0x7f0000000580)={&(0x7f0000000500)={0x4c, 0x0, 0x2, 0x70bd2d, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x83, 0x1}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x8000}, 0x8080) 53m32.049076796s ago: executing program 0 (id=682): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = syz_socket_connect_nvme_tcp() r2 = dup3(r0, r1, 0x0) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x84, 0x6, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x84}, 0x1, 0x0, 0x0, 0x8000}, 0x30000000) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x12) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x3000004) setsockopt$inet_int(r0, 0x0, 0xe, &(0x7f00000001c0)=0xee, 0x4) r3 = openat$sndseq(0xffffff9c, &(0x7f0000000200), 0xa00) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000240)) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000300)=0x3) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r2, 0xc01864c6, &(0x7f0000000380)={&(0x7f0000000340)=[0x0, 0x0], 0x2, 0x0, 0x0, 0xffffffffffffffff}) close_range(r0, r4, 0x2) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_DEV(r5, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r6, 0x2, 0x70bd29, 0x25dfdbfb, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000010}, 0x4041) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000540), r4) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r2, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x2c, r7, 0x10, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x4}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x8009) r8 = openat$dlm_plock(0xffffff9c, &(0x7f0000000640), 0x2002, 0x0) timer_create(0x0, &(0x7f0000000800)={0x0, 0x5, 0x4, @thr={&(0x7f0000000680)="995e33658bea8e753370bbb6f0f74fb8cd20e4676982ef84be9b15d648496efe7d7e5d3fe6196d9e45e8532fe542cf58833f5793c08b51b9a99d27dc8cd96a8b74ee773328f7c401117e203abadc9baaeea67b2c764e817605dd1f49f8cf6ea3c8134af54dde4a9bfd99a954378d4aeafa7c05436944c3e643498e403173c2240d0f64148c68d2293fcb884c0a190de62d9834463e2563bad90d26034c3a45525c12a9b4a183f9c9d1aa97de5469557b6ecf997673950280617df8d2886be13bf7", &(0x7f0000000780)="1d0b4f83a5a39ff57fe44ca78780d8ae96642644c5b44817e74e0c6329daacebf53326a9534f2f15d4745cb817172b7e4d36eeca22a34ef59f88cd083cda3dfe61909252a40d8b1b409c1095c91bfbf4d07c370b9dfbbcf4049864"}}, &(0x7f0000000840)=0x0) timer_settime(r9, 0x0, &(0x7f0000000880)={{0x0, 0x3938700}}, &(0x7f00000008c0)) r10 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000940), r5) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000980)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f00000009c0)={'wpan4\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000a00)={'wpan4\x00', 0x0}) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r5, &(0x7f0000000b00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x64, r10, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@NL802154_ATTR_MIN_BE={0x5, 0x11, 0x45}, @NL802154_ATTR_MIN_BE={0x5, 0x11, 0xd1}, @NL802154_ATTR_MAX_BE={0x5, 0x10, 0xa}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r11}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r12}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r13}, @NL802154_ATTR_MAX_BE={0x5, 0x10, 0x6}]}, 0x64}, 0x1, 0x0, 0x0, 0x4}, 0x4000) getsockopt$EBT_SO_GET_INIT_INFO(r4, 0x0, 0x82, &(0x7f0000000b40)={'filter\x00', 0x0, 0x0, 0x0, [0x537e, 0x6, 0x3, 0x5, 0x7, 0x3]}, &(0x7f0000000bc0)=0x50) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r8, &(0x7f0000000dc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000c40)={0x128, 0x0, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [{@pci={{0x8}, {0x11}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}}, {@pci={{0x8}, {0x11}}, {0xd}}]}, 0x128}, 0x1, 0x0, 0x0, 0x4090}, 0x4000040) ioctl$SYNC_IOC_FILE_INFO(r0, 0xc0383e04, &(0x7f0000001000)={""/32, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000e00)=[{}, {}, {}, {}, {}, {}]}) ioctl$TUNSETSNDBUF(r2, 0x400454d4, &(0x7f0000001040)=0xfffffe00) ioctl$DRM_IOCTL_AGP_ENABLE(r2, 0x40046432, &(0x7f0000001080)=0x7f) 53m30.480137399s ago: executing program 0 (id=684): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x20084010, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x164, 0x1, 0x1, 0x401, 0x0, 0x0, {0x3, 0x0, 0x7}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0xffffffff}, @CTA_LABELS_MASK={0x24, 0x17, [0x8, 0x4, 0xfde, 0x8, 0x459, 0xfffffffb, 0x8, 0xc9f]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x5}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x7, 0x44}}]}}, @CTA_TUPLE_ORIG={0xa8, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_SCTP={0x24, 0x3, 0x0, 0x1, [@CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x8}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x5}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0xfd}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x5}]}}, @CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0x4}, @CTA_SEQ_ADJ_ORIG={0xc, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x400}]}, @CTA_TUPLE_REPLY={0x28, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x20000000}, 0x40040c0) recvmmsg$unix(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) dup3(r0, r3, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f0000000040)={0x0, 0xfffffd8c, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x90}, 0x4004884) 53m30.47855623s ago: executing program 32 (id=684): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x20084010, 0x0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x164, 0x1, 0x1, 0x401, 0x0, 0x0, {0x3, 0x0, 0x7}, [@CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0xffffffff}, @CTA_LABELS_MASK={0x24, 0x17, [0x8, 0x4, 0xfde, 0x8, 0x459, 0xfffffffb, 0x8, 0xc9f]}, @CTA_MARK={0x8, 0x8, 0x1, 0x0, 0x5}, @CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_TCP={0xc, 0x1, 0x0, 0x1, [@CTA_PROTOINFO_TCP_FLAGS_REPLY={0x6, 0x5, {0x7, 0x44}}]}}, @CTA_TUPLE_ORIG={0xa8, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x14, 0x4, @rand_addr=' \x01\x00'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @multicast2}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6}]}, @CTA_PROTOINFO={0x28, 0x4, 0x0, 0x1, @CTA_PROTOINFO_SCTP={0x24, 0x3, 0x0, 0x1, [@CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x8}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x5}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0xfd}, @CTA_PROTOINFO_SCTP_STATE={0x5, 0x1, 0x5}]}}, @CTA_STATUS_MASK={0x8, 0x1a, 0x1, 0x0, 0x4}, @CTA_SEQ_ADJ_ORIG={0xc, 0xf, 0x0, 0x1, [@CTA_SEQADJ_OFFSET_BEFORE={0x8, 0x2, 0x1, 0x0, 0x400}]}, @CTA_TUPLE_REPLY={0x28, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_ZONE={0x6}]}]}, 0x164}, 0x1, 0x0, 0x0, 0x20000000}, 0x40040c0) recvmmsg$unix(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) dup3(r0, r3, 0x0) sendmsg$NFNL_MSG_ACCT_NEW(r3, &(0x7f0000000040)={0x0, 0xfffffd8c, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x90}, 0x4004884) 36m56.145020431s ago: executing program 2 (id=1628): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f00000000c0)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r0, 0x4018620d, &(0x7f0000000100)) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000180)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) r2 = dup3(r1, r0, 0x80000) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f00000002c0)={0x73622a85, 0x10a}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000000)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x18, 0x0, &(0x7f0000000240)=[@decrefs, @request_death], 0x0, 0x0, 0x0}) 36m55.90844975s ago: executing program 2 (id=1629): bind$inet(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1000000000) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x210000000013, 0x0, 0x0) sysinfo(&(0x7f0000000000)=""/196) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCSETD(r3, 0x5423, 0x0) ioctl$TCSETS(r3, 0x404c4701, 0x0) 36m40.997645915s ago: executing program 2 (id=1634): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000480)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x40001e0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket(0x40000000015, 0x5, 0x0) connect$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r3, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f00000001c0)={0x0, 0x3d, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[], 0x1a000}}, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r4, 0xffffffffffffffff, 0x0) 36m20.052344575s ago: executing program 2 (id=1643): sched_setscheduler(0x0, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x800) recvmmsg$unix(r1, &(0x7f0000003700)=[{{0x0, 0x700, 0x0, 0x0, 0x0, 0x500}}], 0x600, 0x0, 0x0) syz_open_dev$sndctrl(&(0x7f0000001080), 0x3454, 0xd1a1e6b71d36d5c5) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, 0x0, 0x2400d800) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x4800) 36m19.323087163s ago: executing program 2 (id=1644): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(twofish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x800) sendmmsg$alg(r1, &(0x7f0000000b80)=[{0x0, 0x0, &(0x7f0000000ac0)=[{&(0x7f0000000600)="d387c80c62b0bd39aa0dc37b5db9bbc430", 0x11}], 0x1, 0x0, 0x0, 0x80}], 0x1, 0x851) recvmsg(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000300)=""/54, 0x36}], 0x1}, 0x40) 36m18.166110514s ago: executing program 2 (id=1647): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$USBDEVFS_SUBMITURB(r5, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x13, 0x0, 0x0, 0x7995}, 0x10022, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURB(r5, 0x4004550c, &(0x7f0000000380)) 35m32.457736976s ago: executing program 33 (id=1647): bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r0}, 0x10) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$USBDEVFS_SUBMITURB(r5, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x13, 0x0, 0x0, 0x7995}, 0x10022, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURB(r5, 0x4004550c, &(0x7f0000000380)) 23m20.238179234s ago: executing program 1 (id=2159): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 23m19.624492302s ago: executing program 1 (id=2161): mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) syslog(0x4, &(0x7f0000000000)=""/19, 0xb12288e90d7c8384) 23m18.646096889s ago: executing program 1 (id=2163): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x1f, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000490000000000000000000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0x60, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000004c0)='kfree\x00', r2}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000008c0)="89", 0x0, 0x1000000}, 0x32) 23m17.677687515s ago: executing program 1 (id=2165): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 23m17.179411975s ago: executing program 1 (id=2166): socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000142020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000e02800850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x56, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='mem_disconnect\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x8000002, 0x2000}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x22004001, &(0x7f0000b63fe4)={0xa, 0x2, 0x0, @loopback}, 0x1c) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) shutdown(r3, 0x1) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r5, 0x541c, &(0x7f0000000000)={0x2, {0xc, 0xa00, 0x6, 0x101, 0x100}}) 23m15.321614191s ago: executing program 1 (id=2168): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffe}, 0x18) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f00000005c0), 0x10) sendmsg$can_raw(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000380)={&(0x7f000000a000)=@canfd={{0x5}, 0x2, 0x2, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000094e2f9663a918fa1efd9b0b"}, 0x48}, 0x2}, 0x24000895) 22m30.118480513s ago: executing program 34 (id=2168): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffe}, 0x18) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f00000005c0), 0x10) sendmsg$can_raw(r1, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000380)={&(0x7f000000a000)=@canfd={{0x5}, 0x2, 0x2, 0x0, 0x0, "0327e1b22b5fcef7739c699f5ff986ca08990039576a7d5cb2bdac3fa80acf584ecb5fee496e6866856b76b5ee00000000000000094e2f9663a918fa1efd9b0b"}, 0x48}, 0x2}, 0x24000895) 12m26.68659371s ago: executing program 3 (id=2749): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x924}, 0x18) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000008c80)=ANY=[@ANYBLOB="2c00000026000506"], 0x2c}}, 0x800) recvmmsg(r0, &(0x7f0000007700), 0x4000267, 0xfc0, 0x0) 12m25.798345509s ago: executing program 3 (id=2750): socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d1"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a00000014000780050015000000000008001240"], 0x60}}, 0x0) 12m24.602131923s ago: executing program 3 (id=2751): r0 = socket$xdp(0x2c, 0x3, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x51886000) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={0x0, 0x101000, 0x800, 0x3, 0x1}, 0x20) 12m23.051463805s ago: executing program 3 (id=2752): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000340), &(0x7f0000000000)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0) 12m22.027104726s ago: executing program 3 (id=2753): symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mount(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x80, 0x0) 12m21.453311911s ago: executing program 3 (id=2754): r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r3, 0x0, 0xfffffffffffffffd}, 0x18) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=ANY=[@ANYBLOB="4c000000100003052cbd7000fedbdf2500000020", @ANYRES32=0x0, @ANYBLOB="0000000000080400240012800b0001006d61637365630000140002800500060000000000050007000000000008000500", @ANYRES32=r1], 0x4c}}, 0x0) 11m35.42836452s ago: executing program 35 (id=2754): r0 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r3, 0x0, 0xfffffffffffffffd}, 0x18) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000040)=ANY=[@ANYBLOB="4c000000100003052cbd7000fedbdf2500000020", @ANYRES32=0x0, @ANYBLOB="0000000000080400240012800b0001006d61637365630000140002800500060000000000050007000000000008000500", @ANYRES32=r1], 0x4c}}, 0x0) 10m31.700743301s ago: executing program 5 (id=2822): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000840), 0x81, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, &(0x7f0000000140)=[{{0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{}, {0x0, 0x0, 0x1, 0x1}}], 0x10) setsockopt$CAN_RAW_FILTER(r2, 0x65, 0x1, &(0x7f0000000100)=[{{0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}], 0x8) 10m29.786487051s ago: executing program 5 (id=2824): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r2) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r4) r5 = socket$unix(0x1, 0x5, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000007c0)=@newqdisc={0x60, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0xb}, {0xffff, 0xffff}, {0x0, 0xfff1}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_BURST={0x8, 0x6, 0xda8}, @TCA_TBF_PARMS={0x28, 0x1, {{0x40, 0x1, 0xfff8, 0x7, 0x8, 0x200}, {0x22, 0x1, 0xb, 0x9, 0x9}, 0x3, 0xfffffffb, 0x67}}]}}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=@newqdisc={0x3c, 0x24, 0x4ee4e6a52ff56541, 0x70b923, 0x80000, {0x0, 0x0, 0x0, r7, {}, {0x2, 0xb}, {0xa, 0xfff3}}, [@qdisc_kind_options=@q_cake={{0x9}, {0xc, 0x2, [@TCA_CAKE_FLOW_MODE={0x8}]}}]}, 0x3c}}, 0x4008000) ioctl$SIOCSIFHWADDR(r4, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 10m27.836865715s ago: executing program 5 (id=2826): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r0}, &(0x7f00000002c0), &(0x7f00000005c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) fcntl$lock(r2, 0x24, &(0x7f00000000c0)={0x6, 0x0, 0x9, 0xfffffffffffffffe}) 10m26.864736261s ago: executing program 5 (id=2828): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)={0x38, r1, 0x7, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_OURS={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x4}]}, @ETHTOOL_A_LINKMODES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x24004800}, 0x0) 10m25.777970667s ago: executing program 5 (id=2830): r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB="7f454c4604070003070000000000000002000300030000000903000038000000fcffffff0e000000000020000100050000000000000000000300000008000000f30000007f00000004"], 0x58) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[], 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'ip6gre0\x00'}) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000680)="db35925f55f6606eba507f00080000d0beef2d7e73e41e6c78cd2728275b0f88de2ccf96f49cad985a3e3df9fcf2b404cd4fcc5ffaacc09391f0f259f3bced0727bbcdc9d6b8b3fcc0f3b296b4fa08de3c9ac27aa75133df21de1c432648f28cf74ba0817b462ad3fb87bd2d26ca14e728295a299ee7b52aa7", &(0x7f0000000840), 0x7e}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000800)={{{@in=@dev, @in6=@mcast2}}, {{@in6=@private2}, 0x0, @in6=@private2}}, &(0x7f0000000700)=0xe8) sendmsg$IPSET_CMD_ADD(r0, &(0x7f0000000640)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000600)={&(0x7f0000001440)=ANY=[@ANYBLOB], 0x50}, 0x1, 0x0, 0x0, 0x840}, 0x1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000850}, 0x40) socket$nl_netfilter(0x10, 0x3, 0xc) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x200000000000000) close(r0) execve(&(0x7f0000000400)='./file0\x00', 0x0, 0x0) 10m25.007379557s ago: executing program 5 (id=2832): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r1, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 9m39.837421049s ago: executing program 36 (id=2832): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r1, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) 9m14.346831803s ago: executing program 4 (id=2885): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) r3 = socket$igmp(0x2, 0x3, 0x2) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'bond0\x00', 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=@newsa={0x154, 0x10, 0x713, 0x0, 0x25dfdbfc, {{@in=@multicast1, @in6=@mcast2, 0x4, 0x0, 0x4e21, 0x2, 0x0, 0x0, 0x0, 0x21, 0x0, 0xee00}, {@in6=@private1, 0x4d6, 0x32}, @in=@multicast2, {0x0, 0x0, 0x0, 0x9, 0xffffffff00000001, 0x0, 0x80000001, 0x543}, {0x4, 0x7fffffffffffffff, 0x0, 0x1}, {}, 0x70bd2c, 0x3500, 0x2, 0x0, 0x0, 0x50}, [@algo_aead={0x56, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x50, 0x60, "210466d38547aa140db9"}}, @offload={0xc, 0x1c, {r4, 0x3}}]}, 0x154}, 0x1, 0x0, 0x0, 0x880}, 0x2014) 9m11.33798384s ago: executing program 4 (id=2886): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000180)='kfree\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x6, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=@newqdisc={0x58, 0x24, 0xf0b, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}, {0xe, 0xfff1}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0x2, 0x101, 0x9, 0x1, 0x5, 0x8, 0x3b5, 0x0, 0x908a}}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000010) 9m9.998809815s ago: executing program 4 (id=2887): mremap(&(0x7f0000000000/0x9000)=nil, 0x9000, 0x3000, 0x3, &(0x7f0000ffb000/0x3000)=nil) bpf$PROG_LOAD(0x5, 0x0, 0x0) listen(0xffffffffffffffff, 0x5) r0 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r0, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0x3c, &(0x7f00000000c0)={0x1, 0x79e}, 0x8) 9m9.29632658s ago: executing program 4 (id=2888): prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x58, 0x2, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0xffff}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,port\x00'}]}, 0x58}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) 9m3.819358861s ago: executing program 4 (id=2889): r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200130002000000da16c167d803f1f805000600200000000a00060000000000ff0000000000000000001ffeff0001000003f1dc7f7c6e7c02000100000000000040000280ffffff05000500000000000a"], 0x80}}, 0x0) 9m3.158021143s ago: executing program 4 (id=2890): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffe}, 0x18) lsetxattr$security_selinux(&(0x7f0000000900)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:netutils_exec_t:s0\x00', 0x25, 0x0) 8m17.837844246s ago: executing program 37 (id=2890): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffe}, 0x18) lsetxattr$security_selinux(&(0x7f0000000900)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000000), &(0x7f0000000040)='system_u:object_r:netutils_exec_t:s0\x00', 0x25, 0x0) 5m42.110834871s ago: executing program 7 (id=3020): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0900000004000000080000000c"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18010000000000000000000000080021850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0xd) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) r3 = openat$selinux_policy(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r3, 0x0) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000ac0), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_REMOVE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40005}, 0x8000) write$selinux_load(r2, &(0x7f0000000000)=ANY=[], 0x190da) 5m40.578322691s ago: executing program 7 (id=3021): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfd, {0x0, 0x0, 0x0, r6, {0x0, 0x8}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x42}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000940)=@newtfilter={0x34, 0x2c, 0xd27, 0x70bd28, 0xfffff000, {0x0, 0x0, 0x0, r3, {0xf000, 0xffff}, {}, {0x7, 0xa}}, [@filter_kind_options=@f_route={{0xa}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x80}, 0x800) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff8000}]}) close_range(r7, 0xffffffffffffffff, 0x0) 5m39.638284015s ago: executing program 7 (id=3022): bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x17, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002080)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='stack\x00') pread64(r1, &(0x7f0000000400)=""/15, 0xf, 0x2) 5m37.882054583s ago: executing program 7 (id=3023): r0 = socket$kcm(0xa, 0x5, 0x0) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, &(0x7f0000000040), 0x4) sendmsg$kcm(r0, &(0x7f00000002c0)={&(0x7f0000000240)=@l2tp={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}, 0x3}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000540)="19", 0x1}], 0x1}, 0x0) bpf$BPF_PROG_DETACH(0x8, 0x0, 0x10) setsockopt$sock_attach_bpf(r0, 0x29, 0x6, 0x0, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000004, 0x3b071, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) 5m31.845811298s ago: executing program 7 (id=3024): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x1) fallocate(r0, 0x0, 0x0, 0x2000402) 5m30.659217341s ago: executing program 7 (id=3026): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r2, 0x1) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000001c0)={0x4, 0x0, 0x3, 0x0, 0x8}) 4m44.842794224s ago: executing program 38 (id=3026): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r2, 0x1) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@newlink={0x34, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000001c0)={0x4, 0x0, 0x3, 0x0, 0x8}) 34.517765157s ago: executing program 8 (id=3270): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x12, 0x4, 0x4, 0x12}, 0x50) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000048c0)={r1, &(0x7f0000000840), &(0x7f0000004880)=@udp=r0}, 0x20) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x22) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) write$cgroup_type(r2, &(0x7f0000000040), 0x9) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x9, @private2, 0x400}, 0x1c) 32.983271647s ago: executing program 8 (id=3271): sched_setscheduler(0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x6726) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r5, @ANYBLOB="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"], 0x1c8}}, 0x0) 31.877670604s ago: executing program 8 (id=3274): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000a00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r2, 0x0, 0xffffffffffff8001}, 0x18) r3 = socket$netlink(0x10, 0x3, 0x0) writev(r3, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000540)=@framed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r4}, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000300)="2e0000001000818807b62aa73f72cc9f0ba1f8483a0000005e120602000300000e000a0010000000028000001294", 0x2e}], 0x1}, 0x20008800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000780)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000008c0)={'ip6tnl0\x00', &(0x7f0000000800)={'syztnl1\x00', 0x0, 0x29, 0x4, 0xf3, 0x6bee, 0x20, @dev={0xfe, 0x80, '\x00', 0xb}, @local, 0x7856, 0x8, 0x5, 0xfc48}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000ac0)={&(0x7f0000000700)={0x10, 0x0, 0x0, 0x20000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x40000) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r5, 0x0, 0x40008003}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000000c0)={'bridge0\x00'}) sendmsg$nl_route(r6, 0x0, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x81, 0xd7, &(0x7f00000004c0)=""/215, 0x5b19700a0177be73, 0x2e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000100)={0x2, 0x5, 0x4, 0x5}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x18) r8 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r8, &(0x7f0000000380)=[{{&(0x7f00000002c0)={0x2, 0x4e21, @remote}, 0x10, &(0x7f0000000340)}}], 0x1, 0x10) 28.610521372s ago: executing program 8 (id=3276): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000bb00551a00000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000140)='ramfs\x00', 0x0, r1) 27.897628319s ago: executing program 8 (id=3279): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0xff, 0x7ffc1ffd}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) mlock(&(0x7f0000bff000/0x400000)=nil, 0x400000) 25.148106375s ago: executing program 8 (id=3280): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a03000000000000000000010000000900010073797a30000000000900020073797a30000000002c0003800800014000000000180003801400020000007468305f746f5f68737200000000080002"], 0xe8}}, 0x0) 10.358426452s ago: executing program 6 (id=3288): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f00000001c0)='w\xde\xa3\x05\xff\a\x00\x00\x00\x00\x00\x00\x8f\xc0\x9b\x86\xef\\\xc0\x89\av\x9f\xd6\xd1\x98,\xc8\x18E/\x8c\x1a\xe3\xbd') r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x20044010) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a3f0400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc200011800e0001"], 0x84}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) 7.111324979s ago: executing program 6 (id=3289): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000bb00551a00000000000000001812", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000140)='ramfs\x00', 0x0, r1) 5.797201322s ago: executing program 6 (id=3290): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x12, 0x4, 0x4, 0x12}, 0x50) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000048c0)={r1, &(0x7f0000000840), &(0x7f0000004880)=@udp=r0}, 0x20) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000480)=""/149, 0x95}], 0x1}, 0x22) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_type(r2, &(0x7f0000000040), 0x9) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r2, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e20, 0x9, @private2, 0x400}, 0x1c) 1.712642394s ago: executing program 6 (id=3291): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000a00)=ANY=[@ANYBLOB="180100000700002c0000000000000004850000002a00000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x2}, 0x18) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000001100)=ANY=[@ANYBLOB="ec000000210001000000000000000000fc020000000000000000000000000001fe80000000000000000000000000003a00000000000000000a0000a02e000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000000009c0011"], 0xec}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 671.057486ms ago: executing program 6 (id=3292): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0014000004000000000000000000000000000000000000000000b13a7b511c"], 0x50) 0s ago: executing program 6 (id=3293): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x13, 0x0, &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x40f00, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0x3}, 0x18) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400080000000900020073797a3100000000050005000a00000012000300686173683a6e65742c706f7274"], 0x4c}}, 0x2) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000c80)={0x5c, 0x9, 0x6, 0x801, 0x0, 0x0, {0x7}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x34, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0x18, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV6={0x14, 0x2, 0x1, 0x0, @remote}}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0xe1f}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x88}, @IPSET_ATTR_PORT_TO={0x6, 0x5, 0x1, 0x0, 0x4e22}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x10000042}, 0x90) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000002000010029687dd932751fede36e38000a0000000700000000050000000000000000", @ANYBLOB="1c7794063ccab3d6f1ca7683d6113fd3f50abd6188755286e0a4e474adc91b40fc0aa5c929ed53"], 0x2c}}, 0x2000) sendmsg$nl_route(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)=ANY=[@ANYBLOB='\\\x00\x00\x00!'], 0x5c}}, 0x0) kernel console output (not intermixed with test programs): enied { search } for pid=16799 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3741.359529][ T29] audit: type=1400 audit(3741.243:55476): avc: denied { search } for pid=16799 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3741.359552][ T29] audit: type=1400 audit(3741.243:55477): avc: denied { remove_name search } for pid=16799 comm="rm" name="resolv.conf.eth15.link" dev="tmpfs" ino=77 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3746.493992][ T29] kauditd_printk_skb: 81 callbacks suppressed [ 3746.494404][ T29] audit: type=1400 audit(3746.393:55559): avc: denied { write } for pid=16815 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3746.515504][ T29] audit: type=1400 audit(3746.413:55560): avc: denied { write open } for pid=16815 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3746.546838][ T29] audit: type=1400 audit(3746.443:55561): avc: denied { search } for pid=16815 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3746.550832][ T29] audit: type=1400 audit(3746.453:55562): avc: denied { module_request } for pid=16412 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3746.558950][ T29] audit: type=1400 audit(3746.453:55563): avc: denied { search } for pid=16815 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3746.559501][ T29] audit: type=1400 audit(3746.453:55564): avc: denied { search } for pid=16815 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3746.559585][ T29] audit: type=1400 audit(3746.453:55565): avc: denied { search } for pid=16815 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3746.766480][ T29] audit: type=1400 audit(3746.663:55566): avc: denied { read } for pid=16813 comm="syz.6.3059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3746.851656][ T29] audit: type=1400 audit(3746.753:55567): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3746.860437][ T29] audit: type=1400 audit(3746.753:55568): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3751.546086][ T29] kauditd_printk_skb: 310 callbacks suppressed [ 3751.546459][ T29] audit: type=1400 audit(3751.443:55879): avc: denied { module_request } for pid=16412 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3751.552400][ T29] audit: type=1400 audit(3751.453:55880): avc: denied { create } for pid=16850 comm="syz.6.3061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3751.554638][ T29] audit: type=1400 audit(3751.453:55881): avc: denied { write } for pid=16850 comm="syz.6.3061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3751.560087][ T29] audit: type=1400 audit(3751.463:55882): avc: denied { module_request } for pid=16850 comm="syz.6.3061" kmod="net-pf-16-proto-16-family-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3752.118865][ T29] audit: type=1400 audit(3752.013:55883): avc: denied { search } for pid=16852 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3752.128595][ T29] audit: type=1400 audit(3752.013:55884): avc: denied { search } for pid=16852 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3752.132178][ T29] audit: type=1400 audit(3752.023:55885): avc: denied { search } for pid=16852 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3752.135741][ T29] audit: type=1400 audit(3752.033:55886): avc: denied { getattr } for pid=16852 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth16.link" dev="tmpfs" ino=78 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3752.142432][ T29] audit: type=1400 audit(3752.043:55887): avc: denied { search } for pid=16852 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3752.155495][ T29] audit: type=1400 audit(3752.043:55888): avc: denied { search } for pid=16852 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3755.560132][T16863] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 3755.560658][T16863] SELinux: failed to load policy [ 3756.798633][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 3756.799034][ T29] audit: type=1400 audit(3756.673:55956): avc: denied { read } for pid=16866 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3756.922313][ T29] audit: type=1400 audit(3756.823:55957): avc: denied { prog_load } for pid=16866 comm="syz.6.3064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3756.954528][ T29] audit: type=1400 audit(3756.843:55958): avc: denied { bpf } for pid=16866 comm="syz.6.3064" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3756.979406][ T29] audit: type=1400 audit(3756.873:55959): avc: denied { create } for pid=16866 comm="syz.6.3064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3756.991762][ T29] audit: type=1400 audit(3756.893:55960): avc: denied { create } for pid=16866 comm="syz.6.3064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3757.013366][ T29] audit: type=1400 audit(3756.913:55961): avc: denied { connect } for pid=16866 comm="syz.6.3064" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3757.030716][ T29] audit: type=1400 audit(3756.933:55962): avc: denied { ioctl } for pid=16866 comm="syz.6.3064" path="socket:[34290]" dev="sockfs" ino=34290 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3757.040913][ T29] audit: type=1400 audit(3756.943:55963): avc: denied { ioctl } for pid=16866 comm="syz.6.3064" path="socket:[34292]" dev="sockfs" ino=34292 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 3757.178896][ T29] audit: type=1400 audit(3757.053:55964): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3757.179391][ T29] audit: type=1400 audit(3757.053:55965): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3762.154336][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 3762.154725][ T29] audit: type=1400 audit(3762.053:56031): avc: denied { read } for pid=16881 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3762.328092][ T29] audit: type=1400 audit(3762.223:56032): avc: denied { create } for pid=16881 comm="syz.6.3067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3762.346295][ T29] audit: type=1400 audit(3762.243:56033): avc: denied { write } for pid=16881 comm="syz.6.3067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3762.366876][ T29] audit: type=1400 audit(3762.263:56034): avc: denied { read } for pid=16881 comm="syz.6.3067" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3762.373308][ T29] audit: type=1400 audit(3762.273:56035): avc: denied { load_policy } for pid=16881 comm="syz.6.3067" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 3762.381533][T16882] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 3762.381849][T16882] SELinux: failed to load policy [ 3762.396297][ T29] audit: type=1400 audit(3762.293:56036): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3762.396587][ T29] audit: type=1400 audit(3762.293:56037): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3762.539064][ T29] audit: type=1400 audit(3762.413:56038): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3762.539677][ T29] audit: type=1400 audit(3762.423:56039): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3762.550403][ T29] audit: type=1400 audit(3762.443:56040): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3767.308884][ T29] kauditd_printk_skb: 55 callbacks suppressed [ 3767.309201][ T29] audit: type=1400 audit(3767.203:56096): avc: denied { read } for pid=16899 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3767.411993][ T29] audit: type=1400 audit(3767.313:56097): avc: denied { create } for pid=16899 comm="syz.6.3071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3767.440727][ T29] audit: type=1400 audit(3767.343:56098): avc: denied { ioctl } for pid=16899 comm="syz.6.3071" path="socket:[33340]" dev="sockfs" ino=33340 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3767.464618][ T29] audit: type=1400 audit(3767.353:56099): avc: denied { write } for pid=16899 comm="syz.6.3071" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3767.517568][ T29] audit: type=1400 audit(3767.413:56100): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3767.519502][ T29] audit: type=1400 audit(3767.413:56101): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3767.545341][ T29] audit: type=1400 audit(3767.423:56102): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3767.550840][ T29] audit: type=1400 audit(3767.453:56103): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3767.568869][ T29] audit: type=1400 audit(3767.453:56104): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3767.585365][ T29] audit: type=1400 audit(3767.483:56105): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3771.481895][T16913] sch_tbf: burst 22 is lower than device lo mtu (65550) ! [ 3772.339292][ T29] kauditd_printk_skb: 268 callbacks suppressed [ 3772.339629][ T29] audit: type=1400 audit(3772.233:56374): avc: denied { search } for pid=16910 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3772.339889][ T29] audit: type=1400 audit(3772.243:56375): avc: denied { search } for pid=16910 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3772.340100][ T29] audit: type=1400 audit(3772.243:56376): avc: denied { search } for pid=16910 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3772.340302][ T29] audit: type=1400 audit(3772.243:56377): avc: denied { search } for pid=16910 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3772.346675][ T29] audit: type=1400 audit(3772.243:56378): avc: denied { search } for pid=16910 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3772.351262][ T29] audit: type=1400 audit(3772.243:56379): avc: denied { search } for pid=16910 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3772.359724][ T29] audit: type=1400 audit(3772.243:56380): avc: denied { search } for pid=16910 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3772.381408][ T29] audit: type=1400 audit(3772.283:56381): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3772.385046][ T29] audit: type=1400 audit(3772.283:56382): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3772.399209][ T29] audit: type=1400 audit(3772.293:56383): avc: denied { recv } for pid=16915 comm="modprobe" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3776.262898][T16412] veth0_vlan: entered promiscuous mode [ 3776.440251][T16412] veth1_vlan: entered promiscuous mode [ 3777.549208][T16412] veth0_macvtap: entered promiscuous mode [ 3777.609788][ T29] kauditd_printk_skb: 195 callbacks suppressed [ 3777.610213][ T29] audit: type=1400 audit(3777.493:56579): avc: denied { read } for pid=16933 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3777.747072][T16412] veth1_macvtap: entered promiscuous mode [ 3777.786202][ T29] audit: type=1400 audit(3777.673:56580): avc: denied { search } for pid=16906 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3777.858686][ T29] audit: type=1400 audit(3777.703:56581): avc: denied { read } for pid=16933 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3778.008900][ T29] audit: type=1400 audit(3777.783:56582): avc: denied { read } for pid=16933 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3778.113377][ T29] audit: type=1400 audit(3777.873:56583): avc: denied { read } for pid=16933 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3778.431401][ T29] audit: type=1400 audit(3778.333:56584): avc: denied { prog_load } for pid=16933 comm="syz.6.3080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3778.461833][ T29] audit: type=1400 audit(3778.353:56585): avc: denied { bpf } for pid=16933 comm="syz.6.3080" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3778.493467][T11971] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3778.493903][T11971] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3778.494136][T11971] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3778.494336][T11971] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3778.558741][ T29] audit: type=1400 audit(3778.453:56586): avc: denied { create } for pid=16933 comm="syz.6.3080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3778.605485][ T29] audit: type=1400 audit(3778.503:56587): avc: denied { create } for pid=16933 comm="syz.6.3080" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3778.684845][ T29] audit: type=1400 audit(3778.583:56588): avc: denied { connect } for pid=16933 comm="syz.6.3080" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3782.618946][ T29] kauditd_printk_skb: 312 callbacks suppressed [ 3782.619543][ T29] audit: type=1400 audit(3782.513:56901): avc: denied { search } for pid=16940 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3782.619726][ T29] audit: type=1400 audit(3782.513:56902): avc: denied { search } for pid=16940 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3782.619843][ T29] audit: type=1400 audit(3782.513:56903): avc: denied { search } for pid=16940 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3782.619928][ T29] audit: type=1400 audit(3782.513:56904): avc: denied { search } for pid=16940 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3782.671449][ T29] audit: type=1400 audit(3782.573:56905): avc: denied { search } for pid=16940 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3782.717890][ T29] audit: type=1400 audit(3782.593:56906): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3782.719264][ T29] audit: type=1400 audit(3782.603:56907): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3782.719543][ T29] audit: type=1400 audit(3782.613:56908): avc: denied { search } for pid=16940 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3782.719767][ T29] audit: type=1400 audit(3782.613:56909): avc: denied { search } for pid=16940 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3782.720018][ T29] audit: type=1400 audit(3782.613:56910): avc: denied { read open } for pid=16940 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3786.062125][T16958] bond0: (slave bond_slave_0): Releasing backup interface [ 3786.163040][T16958] bond0: (slave bond_slave_1): Releasing backup interface [ 3786.246422][T16958] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 3787.653812][ T29] kauditd_printk_skb: 227 callbacks suppressed [ 3787.654454][ T29] audit: type=1400 audit(3787.553:57138): avc: denied { connect } for pid=16960 comm="syz.6.3089" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3787.691015][ T29] audit: type=1400 audit(3787.563:57139): avc: denied { create } for pid=16961 comm="syz.8.3090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3787.749241][ T29] audit: type=1400 audit(3787.633:57140): avc: denied { create } for pid=16961 comm="syz.8.3090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3787.813265][ T29] audit: type=1400 audit(3787.643:57141): avc: denied { write } for pid=16961 comm="syz.8.3090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3787.859319][ T29] audit: type=1400 audit(3787.653:57142): avc: denied { module_request } for pid=16961 comm="syz.8.3090" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3787.859936][ T29] audit: type=1400 audit(3787.723:57143): avc: denied { ioctl } for pid=16960 comm="syz.6.3089" path="socket:[33474]" dev="sockfs" ino=33474 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3787.860164][ T29] audit: type=1400 audit(3787.733:57144): avc: denied { ioctl } for pid=16960 comm="syz.6.3089" path="socket:[33479]" dev="sockfs" ino=33479 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1 [ 3787.941636][ T29] audit: type=1400 audit(3787.823:57145): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3787.942015][ T29] audit: type=1400 audit(3787.833:57146): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3788.001122][ T29] audit: type=1400 audit(3787.893:57147): avc: denied { recv } for pid=16962 comm="rm" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3792.662938][ T29] kauditd_printk_skb: 150 callbacks suppressed [ 3792.663307][ T29] audit: type=1400 audit(3792.563:57298): avc: denied { bpf } for pid=16981 comm="syz.8.3096" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3792.665680][ T29] audit: type=1400 audit(3792.563:57299): avc: denied { bpf } for pid=16980 comm="syz.6.3097" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3792.667831][ T29] audit: type=1400 audit(3792.563:57300): avc: denied { perfmon } for pid=16980 comm="syz.6.3097" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3792.671604][ T29] audit: type=1400 audit(3792.573:57301): avc: denied { bpf } for pid=16980 comm="syz.6.3097" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3792.674068][ T29] audit: type=1400 audit(3792.573:57302): avc: denied { prog_run } for pid=16980 comm="syz.6.3097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3792.679425][ T29] audit: type=1400 audit(3792.573:57303): avc: denied { prog_run } for pid=16981 comm="syz.8.3096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3792.713477][ T29] audit: type=1400 audit(3792.603:57304): avc: denied { map_create } for pid=16980 comm="syz.6.3097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3792.729197][ T29] audit: type=1400 audit(3792.623:57305): avc: denied { perfmon } for pid=16980 comm="syz.6.3097" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3792.742670][ T29] audit: type=1400 audit(3792.643:57306): avc: denied { map_read map_write } for pid=16980 comm="syz.6.3097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3792.804361][ T29] audit: type=1400 audit(3792.693:57307): avc: denied { map_create } for pid=16980 comm="syz.6.3097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3797.705142][ T29] kauditd_printk_skb: 417 callbacks suppressed [ 3797.706776][ T29] audit: type=1400 audit(3797.603:57725): avc: denied { create } for pid=17000 comm="syz.8.3104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3797.758554][ T29] audit: type=1400 audit(3797.643:57726): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3797.758848][ T29] audit: type=1400 audit(3797.653:57727): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3797.810935][ T29] audit: type=1400 audit(3797.693:57728): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3797.811475][ T29] audit: type=1400 audit(3797.693:57729): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3797.822155][ T29] audit: type=1400 audit(3797.723:57730): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3797.870966][ T29] audit: type=1400 audit(3797.773:57731): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3797.873476][ T29] audit: type=1400 audit(3797.773:57732): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3797.898580][ T29] audit: type=1400 audit(3797.793:57733): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3797.905637][ T29] audit: type=1400 audit(3797.803:57734): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3802.021886][T17021] wireguard0: entered promiscuous mode [ 3802.023214][T17021] wireguard0: entered allmulticast mode [ 3802.729047][ T29] kauditd_printk_skb: 234 callbacks suppressed [ 3802.729349][ T29] audit: type=1400 audit(3802.583:57969): avc: denied { getattr } for pid=17031 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3802.729512][ T29] audit: type=1400 audit(3802.623:57970): avc: denied { search } for pid=17031 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3802.729556][ T29] audit: type=1400 audit(3802.623:57971): avc: denied { search } for pid=17031 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3802.729583][ T29] audit: type=1400 audit(3802.623:57972): avc: denied { search } for pid=17031 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3802.729608][ T29] audit: type=1400 audit(3802.623:57973): avc: denied { search } for pid=17031 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3802.729631][ T29] audit: type=1400 audit(3802.623:57974): avc: denied { search } for pid=17031 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3802.729655][ T29] audit: type=1400 audit(3802.623:57975): avc: denied { search } for pid=17031 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3802.729678][ T29] audit: type=1400 audit(3802.623:57976): avc: denied { search } for pid=17031 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3802.749514][ T29] audit: type=1400 audit(3802.643:57977): avc: denied { read open } for pid=17031 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3802.749641][ T29] audit: type=1400 audit(3802.643:57978): avc: denied { getattr } for pid=17031 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3808.148051][T17045] SELinux: failed to load policy [ 3808.500911][ T29] kauditd_printk_skb: 321 callbacks suppressed [ 3808.501330][ T29] audit: type=1400 audit(3808.393:58300): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3808.501682][ T29] audit: type=1400 audit(3808.403:58301): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3808.546214][ T29] audit: type=1400 audit(3808.443:58302): avc: denied { search } for pid=17044 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3808.556023][ T29] audit: type=1400 audit(3808.443:58303): avc: denied { search } for pid=17044 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3808.561472][ T29] audit: type=1400 audit(3808.443:58304): avc: denied { search } for pid=17044 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3808.589239][ T29] audit: type=1400 audit(3808.443:58305): avc: denied { getattr } for pid=17044 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth16.ipv4ll" dev="tmpfs" ino=82 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3808.590845][ T29] audit: type=1400 audit(3808.473:58306): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3808.660239][ T29] audit: type=1400 audit(3808.503:58307): avc: denied { search } for pid=17044 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3808.760485][ T29] audit: type=1400 audit(3808.503:58308): avc: denied { search } for pid=17044 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3808.761124][ T29] audit: type=1400 audit(3808.503:58309): avc: denied { search } for pid=17044 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3813.528847][ T29] kauditd_printk_skb: 94 callbacks suppressed [ 3813.529254][ T29] audit: type=1400 audit(3813.423:58404): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3813.548577][ T29] audit: type=1400 audit(3813.443:58405): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3813.548845][ T29] audit: type=1400 audit(3813.443:58406): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3813.580770][ T29] audit: type=1400 audit(3813.473:58407): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3813.581086][ T29] audit: type=1400 audit(3813.473:58408): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3813.838652][ T29] audit: type=1400 audit(3813.733:58409): avc: denied { read } for pid=17062 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3813.929737][ T29] audit: type=1400 audit(3813.823:58410): avc: denied { append } for pid=17062 comm="syz.6.3119" name="001" dev="devtmpfs" ino=688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3813.945279][ T29] audit: type=1400 audit(3813.843:58411): avc: denied { append open } for pid=17062 comm="syz.6.3119" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=688 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3813.976705][ T29] audit: type=1400 audit(3813.873:58412): avc: denied { ioctl } for pid=17062 comm="syz.6.3119" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=688 ioctlcmd=0x551e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3814.036292][ T29] audit: type=1400 audit(3813.933:58413): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3818.584425][ T29] kauditd_printk_skb: 128 callbacks suppressed [ 3818.584705][ T29] audit: type=1400 audit(3818.483:58542): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3818.584871][ T29] audit: type=1400 audit(3818.483:58543): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3818.620294][ T29] audit: type=1400 audit(3818.523:58544): avc: denied { recv } for pid=16360 comm="syz.7.3026" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3818.625741][ T29] audit: type=1400 audit(3818.523:58545): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3818.728909][ T29] audit: type=1400 audit(3818.623:58546): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3818.837135][ T29] audit: type=1400 audit(3818.733:58547): avc: denied { recv } for pid=11986 comm="kworker/u8:11" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3818.837586][ T29] audit: type=1400 audit(3818.733:58548): avc: denied { recv } for pid=11986 comm="kworker/u8:11" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3818.888876][ T29] audit: type=1400 audit(3818.763:58549): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3818.889298][ T29] audit: type=1400 audit(3818.763:58550): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3819.760035][ T29] audit: type=1400 audit(3819.653:58551): avc: denied { map_create } for pid=17083 comm="syz.8.3128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3822.645439][T17088] netlink: 'syz.8.3130': attribute type 10 has an invalid length. [ 3822.662803][T17088] macvtap0: entered allmulticast mode [ 3822.665060][T17088] veth0_macvtap: entered allmulticast mode [ 3823.644381][ T29] kauditd_printk_skb: 94 callbacks suppressed [ 3823.644755][ T29] audit: type=1400 audit(3823.533:58646): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3823.645029][ T29] audit: type=1400 audit(3823.543:58647): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3823.675250][ T29] audit: type=1400 audit(3823.573:58648): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3823.704629][ T29] audit: type=1400 audit(3823.593:58649): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3823.713623][ T29] audit: type=1400 audit(3823.613:58650): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3823.788908][ T29] audit: type=1400 audit(3823.673:58651): avc: denied { recv } for pid=13975 comm="kworker/0:129" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3823.791229][ T29] audit: type=1400 audit(3823.683:58652): avc: denied { recv } for pid=13975 comm="kworker/0:129" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3823.889025][ T29] audit: type=1400 audit(3823.733:58653): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3823.889482][ T29] audit: type=1400 audit(3823.753:58654): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3824.096597][ T29] audit: type=1400 audit(3823.993:58655): avc: denied { create } for pid=17091 comm="syz.8.3132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3826.802967][T17097] netlink: 20 bytes leftover after parsing attributes in process `syz.8.3133'. [ 3826.803605][T17097] netlink: 20 bytes leftover after parsing attributes in process `syz.8.3133'. [ 3827.679431][T17097] netlink: 20 bytes leftover after parsing attributes in process `syz.8.3133'. [ 3827.679915][T17097] netlink: 20 bytes leftover after parsing attributes in process `syz.8.3133'. [ 3828.774726][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 3828.775378][ T29] audit: type=1400 audit(3828.663:58690): avc: denied { module_request } for pid=17096 comm="syz.8.3133" kmod="nft-expr-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3829.198979][ T29] audit: type=1400 audit(3829.063:58691): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3829.199505][ T29] audit: type=1400 audit(3829.063:58692): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3829.199845][ T29] audit: type=1400 audit(3829.093:58693): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3829.209467][ T29] audit: type=1400 audit(3829.103:58694): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3829.244967][ T29] audit: type=1400 audit(3829.143:58695): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3829.283444][ T29] audit: type=1400 audit(3829.183:58696): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3829.284057][ T29] audit: type=1400 audit(3829.183:58697): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3829.321810][ T29] audit: type=1400 audit(3829.223:58698): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3829.322345][ T29] audit: type=1400 audit(3829.223:58699): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.129936][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 3835.130327][ T29] audit: type=1400 audit(3835.023:58736): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.133407][ T29] audit: type=1400 audit(3835.033:58737): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.167662][ T29] audit: type=1400 audit(3835.063:58738): avc: denied { recv } for pid=11995 comm="kworker/u8:15" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.206459][ T29] audit: type=1400 audit(3835.103:58739): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.240015][ T29] audit: type=1400 audit(3835.123:58740): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.299383][ T29] audit: type=1400 audit(3835.183:58741): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.299846][ T29] audit: type=1400 audit(3835.183:58742): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.403187][ T29] audit: type=1400 audit(3835.303:58743): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.407988][ T29] audit: type=1400 audit(3835.303:58744): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3835.701935][ T29] audit: type=1400 audit(3835.603:58745): avc: denied { read } for pid=17108 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3838.744596][T17114] SELinux: policydb table sizes (512,0) do not match mine (8,7) [ 3838.745439][T17114] SELinux: failed to load policy [ 3840.141309][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 3840.141601][ T29] audit: type=1400 audit(3840.043:58811): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3840.169141][ T29] audit: type=1400 audit(3840.063:58812): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3840.282714][ T29] audit: type=1400 audit(3840.123:58813): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3840.283228][ T29] audit: type=1400 audit(3840.153:58814): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3840.283324][ T29] audit: type=1400 audit(3840.183:58815): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3840.317111][ T29] audit: type=1400 audit(3840.213:58816): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3840.350962][ T29] audit: type=1400 audit(3840.253:58817): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3840.373765][ T29] audit: type=1400 audit(3840.273:58818): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3840.455620][ T29] audit: type=1400 audit(3840.353:58819): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3840.456110][ T29] audit: type=1400 audit(3840.353:58820): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3841.672226][T17124] netlink: 10 bytes leftover after parsing attributes in process `syz.6.3141'. [ 3843.842572][T17128] netlink: 12 bytes leftover after parsing attributes in process `syz.8.3144'. [ 3845.155234][ T29] kauditd_printk_skb: 124 callbacks suppressed [ 3845.156444][ T29] audit: type=1400 audit(3845.053:58945): avc: denied { setopt } for pid=17137 comm="syz.8.3149" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3845.184295][ T29] audit: type=1400 audit(3845.083:58946): avc: denied { connect } for pid=17137 comm="syz.8.3149" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3845.186513][ T29] audit: type=1400 audit(3845.083:58947): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3845.190792][ T29] audit: type=1400 audit(3845.083:58948): avc: denied { setopt } for pid=17137 comm="syz.8.3149" laddr=fe80::11 lport=58 faddr=ff02::1 fport=65534 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3845.206902][ T29] audit: type=1400 audit(3845.103:58949): avc: denied { write } for pid=17137 comm="syz.8.3149" path="socket:[33758]" dev="sockfs" ino=33758 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3845.207476][ T29] audit: type=1400 audit(3845.103:58950): avc: denied { write } for pid=17137 comm="syz.8.3149" laddr=fe80::11 lport=58 faddr=ff02::1 fport=65534 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3845.212685][ T29] audit: type=1400 audit(3845.103:58951): avc: denied { recv } for pid=17137 comm="syz.8.3149" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3845.213111][ T29] audit: type=1400 audit(3845.113:58952): avc: denied { recv } for pid=17137 comm="syz.8.3149" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3845.248827][ T29] audit: type=1400 audit(3845.143:58953): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3845.252899][ T29] audit: type=1400 audit(3845.153:58954): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3849.339359][T17150] netlink: 24 bytes leftover after parsing attributes in process `syz.8.3155'. [ 3850.221703][ T29] kauditd_printk_skb: 172 callbacks suppressed [ 3850.225270][ T29] audit: type=1400 audit(3850.123:59127): avc: denied { read } for pid=17154 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3850.253381][ T29] audit: type=1400 audit(3850.153:59128): avc: denied { map_create } for pid=17154 comm="syz.6.3158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3850.261019][ T29] audit: type=1400 audit(3850.163:59129): avc: denied { bpf } for pid=17154 comm="syz.6.3158" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3850.267308][ T29] audit: type=1400 audit(3850.163:59130): avc: denied { map_read map_write } for pid=17154 comm="syz.6.3158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3850.283888][ T29] audit: type=1400 audit(3850.183:59131): avc: denied { prog_load } for pid=17154 comm="syz.6.3158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3850.289058][ T29] audit: type=1400 audit(3850.183:59132): avc: denied { bpf } for pid=17154 comm="syz.6.3158" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3850.295490][ T29] audit: type=1400 audit(3850.193:59133): avc: denied { perfmon } for pid=17154 comm="syz.6.3158" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3850.305550][ T29] audit: type=1400 audit(3850.203:59134): avc: denied { perfmon } for pid=17154 comm="syz.6.3158" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3850.308718][ T29] audit: type=1400 audit(3850.203:59135): avc: denied { perfmon } for pid=17154 comm="syz.6.3158" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3850.316838][ T29] audit: type=1400 audit(3850.213:59136): avc: denied { perfmon } for pid=17154 comm="syz.6.3158" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3851.446389][T17158] netlink: 8 bytes leftover after parsing attributes in process `syz.6.3159'. [ 3854.375385][T12177] hid_parser_main: 8 callbacks suppressed [ 3854.375728][T12177] hid-generic 0000:0000:10001.0005: unknown main item tag 0x0 [ 3854.375971][T12177] hid-generic 0000:0000:10001.0005: unknown main item tag 0x0 [ 3854.376071][T12177] hid-generic 0000:0000:10001.0005: unknown main item tag 0x0 [ 3854.376148][T12177] hid-generic 0000:0000:10001.0005: unknown main item tag 0x0 [ 3854.376223][T12177] hid-generic 0000:0000:10001.0005: unknown main item tag 0x0 [ 3854.376308][T12177] hid-generic 0000:0000:10001.0005: unknown main item tag 0x0 [ 3854.376384][T12177] hid-generic 0000:0000:10001.0005: unknown main item tag 0x0 [ 3854.376460][T12177] hid-generic 0000:0000:10001.0005: unknown main item tag 0x0 [ 3854.376533][T12177] hid-generic 0000:0000:10001.0005: unknown main item tag 0x0 [ 3854.376609][T12177] hid-generic 0000:0000:10001.0005: unknown main item tag 0x0 [ 3854.419669][T12177] hid-generic 0000:0000:10001.0005: hidraw0: HID v0.00 Device [syz0] on syz1 [ 3855.236767][ T29] kauditd_printk_skb: 233 callbacks suppressed [ 3855.237199][ T29] audit: type=1400 audit(3855.133:59370): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3855.251694][ T29] audit: type=1400 audit(3855.153:59371): avc: denied { map_create } for pid=17179 comm="syz.8.3167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3855.257925][ T29] audit: type=1400 audit(3855.153:59372): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3855.295660][ T29] audit: type=1400 audit(3855.183:59373): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3855.296180][ T29] audit: type=1400 audit(3855.193:59374): avc: denied { map_read map_write } for pid=17179 comm="syz.8.3167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3855.312617][ T29] audit: type=1400 audit(3855.213:59375): avc: denied { recv } for pid=15 comm="rcu_preempt" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3855.312963][ T29] audit: type=1400 audit(3855.213:59376): avc: denied { recv } for pid=15 comm="rcu_preempt" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3855.322638][ T29] audit: type=1400 audit(3855.223:59377): avc: denied { prog_load } for pid=17179 comm="syz.8.3167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3855.343702][ T29] audit: type=1400 audit(3855.243:59378): avc: denied { bpf } for pid=17179 comm="syz.8.3167" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3855.356042][ T29] audit: type=1400 audit(3855.253:59379): avc: denied { perfmon } for pid=17179 comm="syz.8.3167" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3860.905145][ T29] kauditd_printk_skb: 380 callbacks suppressed [ 3860.905437][ T29] audit: type=1400 audit(3860.773:59760): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3860.905629][ T29] audit: type=1400 audit(3860.783:59761): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3860.908591][ T29] audit: type=1400 audit(3860.803:59762): avc: denied { recv } for pid=17199 comm="syz.6.3173" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3860.952674][ T29] audit: type=1400 audit(3860.833:59763): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3860.988651][ T29] audit: type=1400 audit(3860.883:59764): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3861.068709][ T29] audit: type=1400 audit(3860.963:59765): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3861.068993][ T29] audit: type=1400 audit(3860.963:59766): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3861.120271][ T29] audit: type=1400 audit(3861.023:59767): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3861.124869][ T29] audit: type=1400 audit(3861.023:59768): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3861.404938][ T29] audit: type=1400 audit(3861.303:59769): avc: denied { prog_load } for pid=17205 comm="syz.8.3174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3863.536145][T17212] netlink: 3 bytes leftover after parsing attributes in process `syz.8.3176'. [ 3863.537168][T17212] 0ªX¹¦À: renamed from veth0 (while UP) [ 3863.584554][T17212] 0ªX¹¦À: entered allmulticast mode [ 3863.586366][T17212] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 3865.106578][T11995] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3865.382362][T11995] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3865.533657][T11995] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3865.671165][T11995] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3865.925675][ T29] kauditd_printk_skb: 110 callbacks suppressed [ 3865.926063][ T29] audit: type=1400 audit(3865.823:59880): avc: denied { map_read map_write } for pid=17217 comm="syz.8.3178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3865.952405][ T29] audit: type=1400 audit(3865.853:59881): avc: denied { prog_load } for pid=17217 comm="syz.8.3178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3865.956198][ T29] audit: type=1400 audit(3865.853:59882): avc: denied { bpf } for pid=17217 comm="syz.8.3178" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3866.002994][ T29] audit: type=1400 audit(3865.903:59883): avc: denied { perfmon } for pid=17217 comm="syz.8.3178" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3866.015912][ T29] audit: type=1400 audit(3865.913:59884): avc: denied { perfmon } for pid=17217 comm="syz.8.3178" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3866.059198][ T29] audit: type=1400 audit(3865.943:59885): avc: denied { perfmon } for pid=17217 comm="syz.8.3178" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3866.059658][ T29] audit: type=1400 audit(3865.943:59886): avc: denied { perfmon } for pid=17217 comm="syz.8.3178" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3866.085569][ T29] audit: type=1400 audit(3865.983:59887): avc: denied { perfmon } for pid=17217 comm="syz.8.3178" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3866.206035][ T29] audit: type=1400 audit(3866.103:59888): avc: denied { bpf } for pid=17217 comm="syz.8.3178" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3866.375908][ T29] audit: type=1400 audit(3866.273:59889): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3866.623581][T11995] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3866.682951][T11995] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3866.694539][T11995] bond0 (unregistering): Released all slaves [ 3866.879760][T11995] hsr_slave_0: left promiscuous mode [ 3866.882087][T11995] hsr_slave_1: left promiscuous mode [ 3866.910791][T11995] veth1_macvtap: left promiscuous mode [ 3866.911365][T11995] veth0_macvtap: left promiscuous mode [ 3866.911798][T11995] veth1_vlan: left promiscuous mode [ 3866.911981][T11995] veth0_vlan: left promiscuous mode [ 3870.938449][ T29] kauditd_printk_skb: 121 callbacks suppressed [ 3870.938625][ T29] audit: type=1400 audit(3870.833:60011): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3871.088680][ T29] audit: type=1400 audit(3870.983:60012): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3871.089849][ T29] audit: type=1400 audit(3870.993:60013): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3871.135360][ T29] audit: type=1400 audit(3871.033:60014): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3871.159446][ T29] audit: type=1400 audit(3871.053:60015): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3871.201152][ T29] audit: type=1326 audit(3871.103:60016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17244 comm="syz.8.3183" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132970 code=0x7ffc0000 [ 3871.204441][ T29] audit: type=1326 audit(3871.103:60017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17244 comm="syz.8.3183" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132970 code=0x7ffc0000 [ 3871.210413][ T29] audit: type=1400 audit(3871.113:60018): avc: denied { map_create } for pid=17244 comm="syz.8.3183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3871.212923][ T29] audit: type=1400 audit(3871.113:60019): avc: denied { perfmon } for pid=17244 comm="syz.8.3183" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3871.221408][ T29] audit: type=1400 audit(3871.123:60020): avc: denied { map_read map_write } for pid=17244 comm="syz.8.3183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3876.083721][ T29] kauditd_printk_skb: 382 callbacks suppressed [ 3876.084964][ T29] audit: type=1400 audit(3875.983:60403): avc: denied { read } for pid=17257 comm="syz.8.3186" name="seq" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3876.088624][ T29] audit: type=1400 audit(3875.983:60404): avc: denied { read open } for pid=17257 comm="syz.8.3186" path="/dev/snd/seq" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3876.136075][ T29] audit: type=1400 audit(3876.003:60405): avc: denied { ioctl } for pid=17257 comm="syz.8.3186" path="/dev/snd/seq" dev="devtmpfs" ino=721 ioctlcmd=0x5320 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3876.163263][ T29] audit: type=1400 audit(3876.013:60406): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3876.219817][ T29] audit: type=1400 audit(3876.013:60407): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3876.220296][ T29] audit: type=1400 audit(3876.033:60408): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3876.220573][ T29] audit: type=1400 audit(3876.043:60409): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3876.220787][ T29] audit: type=1400 audit(3876.073:60410): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3876.220979][ T29] audit: type=1400 audit(3876.113:60411): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3876.221168][ T29] audit: type=1400 audit(3876.113:60412): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3881.167624][ T29] kauditd_printk_skb: 111 callbacks suppressed [ 3881.169572][ T29] audit: type=1400 audit(3881.063:60524): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3881.170005][ T29] audit: type=1400 audit(3881.063:60525): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3881.189696][ T29] audit: type=1400 audit(3881.083:60526): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3881.221919][ T29] audit: type=1400 audit(3881.123:60527): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3881.234237][ T29] audit: type=1400 audit(3881.133:60528): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3881.307977][ T29] audit: type=1400 audit(3881.203:60529): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3881.310083][ T29] audit: type=1400 audit(3881.203:60530): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3881.397574][ T29] audit: type=1400 audit(3881.283:60531): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3881.399007][ T29] audit: type=1400 audit(3881.293:60532): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3881.981558][ T29] audit: type=1400 audit(3881.883:60533): avc: denied { mac_admin } for pid=17272 comm="syz.8.3191" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3882.001140][T17274] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 3886.172644][ T29] kauditd_printk_skb: 384 callbacks suppressed [ 3886.173248][ T29] audit: type=1400 audit(3886.073:60918): avc: denied { search } for pid=17285 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3886.189514][ T29] audit: type=1400 audit(3886.083:60919): avc: denied { search } for pid=17285 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3886.190332][ T29] audit: type=1400 audit(3886.083:60920): avc: denied { search } for pid=17285 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3886.190897][ T29] audit: type=1400 audit(3886.083:60921): avc: denied { search } for pid=17285 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3886.191260][ T29] audit: type=1400 audit(3886.083:60922): avc: denied { search } for pid=17285 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3886.191519][ T29] audit: type=1400 audit(3886.083:60923): avc: denied { search } for pid=17285 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3886.224507][ T29] audit: type=1400 audit(3886.123:60924): avc: denied { search } for pid=17285 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3886.224756][ T29] audit: type=1400 audit(3886.123:60925): avc: denied { read open } for pid=17285 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3886.231680][ T29] audit: type=1400 audit(3886.133:60926): avc: denied { getattr } for pid=17285 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3886.317348][ T29] audit: type=1400 audit(3886.203:60927): avc: denied { search } for pid=17285 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3888.273707][T17301] netlink: 388 bytes leftover after parsing attributes in process `syz.6.3201'. [ 3891.222478][ T29] kauditd_printk_skb: 247 callbacks suppressed [ 3891.222918][ T29] audit: type=1400 audit(3891.113:61175): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3891.223208][ T29] audit: type=1400 audit(3891.123:61176): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3891.888962][ T29] audit: type=1400 audit(3891.773:61177): avc: denied { bpf } for pid=17319 comm="syz.8.3207" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3891.896160][ T29] audit: type=1400 audit(3891.793:61178): avc: denied { prog_load } for pid=17319 comm="syz.8.3207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3891.901718][ T29] audit: type=1400 audit(3891.803:61179): avc: denied { bpf } for pid=17319 comm="syz.8.3207" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3892.005517][ T29] audit: type=1400 audit(3891.903:61180): avc: denied { create } for pid=17319 comm="syz.8.3207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 3892.054604][ T29] audit: type=1400 audit(3891.953:61181): avc: denied { sys_admin } for pid=17319 comm="syz.8.3207" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 3892.075723][ T29] audit: type=1400 audit(3891.973:61182): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3892.080602][ T29] audit: type=1400 audit(3891.983:61183): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3892.103674][ T29] audit: type=1400 audit(3892.003:61184): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3896.235500][ T29] kauditd_printk_skb: 133 callbacks suppressed [ 3896.235881][ T29] audit: type=1400 audit(3896.133:61318): avc: denied { search } for pid=17353 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3896.240460][ T29] audit: type=1400 audit(3896.143:61319): avc: denied { search } for pid=17353 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3896.244792][ T29] audit: type=1400 audit(3896.143:61320): avc: denied { search } for pid=17353 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3896.247185][ T29] audit: type=1400 audit(3896.143:61321): avc: denied { search } for pid=17353 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3896.251004][ T29] audit: type=1400 audit(3896.143:61322): avc: denied { relabelto } for pid=17352 comm="syz.6.3211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 3896.277634][ T29] audit: type=1400 audit(3896.173:61323): avc: denied { search } for pid=17353 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3896.305571][ T29] audit: type=1400 audit(3896.193:61324): avc: denied { search } for pid=17353 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3896.307806][ T29] audit: type=1400 audit(3896.193:61325): avc: denied { search } for pid=17353 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3896.310439][ T29] audit: type=1400 audit(3896.203:61326): avc: denied { read open } for pid=17353 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3896.324323][ T29] audit: type=1400 audit(3896.223:61327): avc: denied { getattr } for pid=17353 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3898.088006][T17368] netlink: 224 bytes leftover after parsing attributes in process `syz.8.3214'. [ 3901.247148][ T29] kauditd_printk_skb: 409 callbacks suppressed [ 3901.247387][ T29] audit: type=1400 audit(3901.143:61737): avc: denied { recv } for pid=17403 comm="dhcpcd-run-hook" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3901.252028][ T29] audit: type=1400 audit(3901.153:61738): avc: denied { recv } for pid=17403 comm="dhcpcd-run-hook" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3901.281523][ T29] audit: type=1400 audit(3901.183:61739): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3901.285787][ T29] audit: type=1400 audit(3901.183:61740): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3901.369429][ T29] audit: type=1400 audit(3901.263:61741): avc: denied { read } for pid=17404 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3901.442012][ T29] audit: type=1400 audit(3901.343:61742): avc: denied { prog_load } for pid=17404 comm="syz.6.3216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3901.447425][ T29] audit: type=1400 audit(3901.343:61743): avc: denied { bpf } for pid=17404 comm="syz.6.3216" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3901.450552][ T29] audit: type=1400 audit(3901.353:61744): avc: denied { perfmon } for pid=17404 comm="syz.6.3216" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3901.459783][ T29] audit: type=1400 audit(3901.363:61745): avc: denied { perfmon } for pid=17404 comm="syz.6.3216" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3901.461639][ T29] audit: type=1400 audit(3901.363:61746): avc: denied { perfmon } for pid=17404 comm="syz.6.3216" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3906.249174][ T29] kauditd_printk_skb: 146 callbacks suppressed [ 3906.259937][ T29] audit: type=1400 audit(3906.143:61893): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3906.264823][ T29] audit: type=1400 audit(3906.143:61894): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3906.274844][ T29] audit: type=1400 audit(3906.163:61895): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3906.292091][ T29] audit: type=1400 audit(3906.173:61896): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3906.569882][ T29] audit: type=1400 audit(3906.423:61897): avc: denied { write } for pid=17428 comm="syz.6.3224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3906.570347][ T29] audit: type=1400 audit(3906.453:61898): avc: denied { module_request } for pid=17428 comm="syz.6.3224" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3906.689959][ T29] audit: type=1400 audit(3906.583:61899): avc: denied { prog_load } for pid=17432 comm="syz.8.3225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3906.742710][ T29] audit: type=1400 audit(3906.633:61900): avc: denied { bpf } for pid=17432 comm="syz.8.3225" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3906.747810][ T29] audit: type=1400 audit(3906.643:61901): avc: denied { perfmon } for pid=17432 comm="syz.8.3225" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3906.772906][ T29] audit: type=1400 audit(3906.673:61902): avc: denied { create } for pid=17432 comm="syz.8.3225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3911.268049][ T29] kauditd_printk_skb: 467 callbacks suppressed [ 3911.268642][ T29] audit: type=1400 audit(3911.163:62370): avc: denied { map_create } for pid=17451 comm="syz.6.3230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3911.287573][ T29] audit: type=1400 audit(3911.183:62371): avc: denied { prog_load } for pid=17451 comm="syz.6.3230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3911.290779][ T29] audit: type=1400 audit(3911.183:62372): avc: denied { bpf } for pid=17451 comm="syz.6.3230" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3911.293940][ T29] audit: type=1400 audit(3911.183:62373): avc: denied { perfmon } for pid=17451 comm="syz.6.3230" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3911.339056][ T29] audit: type=1400 audit(3911.233:62374): avc: denied { prog_load } for pid=17451 comm="syz.6.3230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3911.342867][ T29] audit: type=1400 audit(3911.233:62375): avc: denied { bpf } for pid=17451 comm="syz.6.3230" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3911.349082][ T29] audit: type=1400 audit(3911.233:62376): avc: denied { perfmon } for pid=17451 comm="syz.6.3230" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3911.373968][ T29] audit: type=1400 audit(3911.273:62377): avc: denied { perfmon } for pid=17451 comm="syz.6.3230" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3911.384326][ T29] audit: type=1400 audit(3911.283:62378): avc: denied { perfmon } for pid=17451 comm="syz.6.3230" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3911.398915][ T29] audit: type=1400 audit(3911.293:62379): avc: denied { perfmon } for pid=17451 comm="syz.6.3230" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3916.443498][ T29] kauditd_printk_skb: 93 callbacks suppressed [ 3916.444020][ T29] audit: type=1400 audit(3916.343:62473): avc: denied { read } for pid=17442 comm="syz.8.3227" name="seq" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3916.482780][ T29] audit: type=1400 audit(3916.383:62474): avc: denied { read open } for pid=17442 comm="syz.8.3227" path="/dev/snd/seq" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3916.523653][ T29] audit: type=1400 audit(3916.413:62475): avc: denied { map_create } for pid=17442 comm="syz.8.3227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3916.556667][ T29] audit: type=1400 audit(3916.453:62476): avc: denied { perfmon } for pid=17442 comm="syz.8.3227" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3916.557163][ T29] audit: type=1400 audit(3916.453:62477): avc: denied { map_read map_write } for pid=17442 comm="syz.8.3227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3916.773944][ T29] audit: type=1400 audit(3916.663:62478): avc: denied { read } for pid=17494 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3916.911954][ T29] audit: type=1400 audit(3916.803:62479): avc: denied { create } for pid=17494 comm="syz.6.3234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3916.940190][ T29] audit: type=1400 audit(3916.813:62480): avc: denied { connect } for pid=17494 comm="syz.6.3234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3917.038803][ T29] audit: type=1400 audit(3916.903:62481): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3917.039281][ T29] audit: type=1400 audit(3916.913:62482): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3921.581113][ T29] kauditd_printk_skb: 124 callbacks suppressed [ 3921.581467][ T29] audit: type=1400 audit(3921.483:62607): avc: denied { read } for pid=17513 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3921.634687][ T29] audit: type=1400 audit(3921.533:62608): avc: denied { prog_load } for pid=17513 comm="syz.6.3239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3921.642587][ T29] audit: type=1400 audit(3921.543:62609): avc: denied { bpf } for pid=17513 comm="syz.6.3239" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3921.651224][ T29] audit: type=1400 audit(3921.553:62610): avc: denied { perfmon } for pid=17513 comm="syz.6.3239" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3921.662128][ T29] audit: type=1400 audit(3921.563:62611): avc: denied { perfmon } for pid=17513 comm="syz.6.3239" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3921.664567][ T29] audit: type=1400 audit(3921.563:62612): avc: denied { perfmon } for pid=17513 comm="syz.6.3239" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3921.674961][ T29] audit: type=1400 audit(3921.573:62613): avc: denied { perfmon } for pid=17513 comm="syz.6.3239" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3921.675373][ T29] audit: type=1400 audit(3921.573:62614): avc: denied { perfmon } for pid=17513 comm="syz.6.3239" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3921.693379][ T29] audit: type=1400 audit(3921.593:62615): avc: denied { bpf } for pid=17513 comm="syz.6.3239" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3921.697404][ T29] audit: type=1400 audit(3921.593:62616): avc: denied { bpf } for pid=17513 comm="syz.6.3239" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3926.006499][T17531] sch_tbf: peakrate 7 is lower than or equals to rate 6829859379779001161 ! [ 3926.611923][ T29] kauditd_printk_skb: 148 callbacks suppressed [ 3926.612252][ T29] audit: type=1400 audit(3926.513:62765): avc: denied { search } for pid=17532 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3926.615796][ T29] audit: type=1400 audit(3926.513:62766): avc: denied { search } for pid=17532 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3926.639742][ T29] audit: type=1400 audit(3926.533:62767): avc: denied { search } for pid=17532 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3926.640245][ T29] audit: type=1400 audit(3926.533:62768): avc: denied { search } for pid=17532 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3926.640485][ T29] audit: type=1400 audit(3926.533:62769): avc: denied { search } for pid=17532 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3926.640567][ T29] audit: type=1400 audit(3926.533:62770): avc: denied { search } for pid=17532 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3926.640628][ T29] audit: type=1400 audit(3926.533:62771): avc: denied { search } for pid=17532 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3926.656911][ T29] audit: type=1400 audit(3926.553:62772): avc: denied { read open } for pid=17532 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3926.678803][ T29] audit: type=1400 audit(3926.573:62773): avc: denied { getattr } for pid=17532 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3926.709118][ T29] audit: type=1400 audit(3926.603:62774): avc: denied { search } for pid=17532 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3926.856932][T17536] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3244'. [ 3931.844811][ T29] kauditd_printk_skb: 374 callbacks suppressed [ 3931.845241][ T29] audit: type=1400 audit(3931.743:63149): avc: denied { load_policy } for pid=17551 comm="syz.6.3249" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 3933.498837][ T29] audit: type=1400 audit(3933.383:63150): avc: denied { search } for pid=17529 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3933.743648][T17552] SELinux: failed to load policy [ 3933.789863][ T29] audit: type=1400 audit(3933.693:63151): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3933.802669][ T29] audit: type=1400 audit(3933.703:63152): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3933.846106][ T29] audit: type=1400 audit(3933.743:63153): avc: denied { recv } for pid=2952 comm="dhcpcd" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3933.856280][ T29] audit: type=1400 audit(3933.753:63154): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3933.873314][ T29] audit: type=1400 audit(3933.773:63155): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3933.889298][ T29] audit: type=1400 audit(3933.783:63156): avc: denied { recv } for pid=15143 comm="syz-executor" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3933.889826][ T29] audit: type=1400 audit(3933.783:63157): avc: denied { recv } for pid=15143 comm="syz-executor" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3933.909608][ T29] audit: type=1400 audit(3933.803:63158): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3936.875836][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 3936.876325][ T29] audit: type=1400 audit(3936.773:63249): avc: denied { map_create } for pid=17564 comm="syz.6.3253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3936.894729][ T29] audit: type=1400 audit(3936.793:63250): avc: denied { map_read map_write } for pid=17564 comm="syz.6.3253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3936.944231][ T29] audit: type=1400 audit(3936.843:63251): avc: denied { search } for pid=17566 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3936.951687][ T29] audit: type=1400 audit(3936.853:63252): avc: denied { search } for pid=17566 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3936.952330][ T29] audit: type=1400 audit(3936.853:63253): avc: denied { search } for pid=17566 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3936.956326][ T29] audit: type=1400 audit(3936.853:63254): avc: denied { read open } for pid=17566 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3936.984388][ T29] audit: type=1400 audit(3936.873:63255): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3936.984824][ T29] audit: type=1400 audit(3936.873:63256): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3936.984962][ T29] audit: type=1400 audit(3936.883:63257): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3937.001841][ T29] audit: type=1400 audit(3936.903:63258): avc: denied { getattr } for pid=17566 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3938.064163][T17568] syzkaller0: entered promiscuous mode [ 3938.071391][T17568] syzkaller0: entered allmulticast mode [ 3942.477069][ T29] kauditd_printk_skb: 471 callbacks suppressed [ 3942.477423][ T29] audit: type=1400 audit(3942.373:63730): avc: denied { read } for pid=17586 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3942.526414][ T29] audit: type=1400 audit(3942.423:63731): avc: denied { read } for pid=17586 comm="syz.6.3260" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3942.534469][ T29] audit: type=1400 audit(3942.433:63732): avc: denied { read open } for pid=17586 comm="syz.6.3260" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3942.621746][ T29] audit: type=1400 audit(3942.493:63733): avc: denied { ioctl } for pid=17586 comm="syz.6.3260" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3942.667846][ T29] audit: type=1400 audit(3942.563:63734): avc: denied { prog_load } for pid=17586 comm="syz.6.3260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3942.761843][ T29] audit: type=1400 audit(3942.663:63735): avc: denied { bpf } for pid=17586 comm="syz.6.3260" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3942.774466][ T29] audit: type=1400 audit(3942.663:63736): avc: denied { prog_load } for pid=17586 comm="syz.6.3260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3942.799077][ T29] audit: type=1400 audit(3942.693:63737): avc: denied { bpf } for pid=17586 comm="syz.6.3260" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3942.999997][T17590] pim6reg1: entered promiscuous mode [ 3943.000450][T17590] pim6reg1: entered allmulticast mode [ 3943.014063][ T29] audit: type=1400 audit(3942.913:63738): avc: denied { prog_load } for pid=17586 comm="syz.6.3260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3943.028643][ T29] audit: type=1400 audit(3942.923:63739): avc: denied { bpf } for pid=17586 comm="syz.6.3260" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3943.166784][T17594] netlink: 87 bytes leftover after parsing attributes in process `syz.8.3261'. [ 3947.416022][T17614] netlink: 36 bytes leftover after parsing attributes in process `syz.6.3267'. [ 3947.509718][ T29] kauditd_printk_skb: 437 callbacks suppressed [ 3947.510116][ T29] audit: type=1400 audit(3947.383:64177): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3947.510467][ T29] audit: type=1400 audit(3947.393:64178): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3947.534922][ T29] audit: type=1400 audit(3947.433:64179): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3947.543566][ T29] audit: type=1400 audit(3947.443:64180): avc: denied { search } for pid=17601 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3947.544108][ T29] audit: type=1400 audit(3947.443:64181): avc: denied { search } for pid=17601 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3947.544362][ T29] audit: type=1400 audit(3947.443:64182): avc: denied { search } for pid=17601 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3947.566481][ T29] audit: type=1400 audit(3947.463:64183): avc: denied { search } for pid=17601 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3947.567064][ T29] audit: type=1400 audit(3947.463:64184): avc: denied { search } for pid=17601 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3947.567186][ T29] audit: type=1400 audit(3947.463:64185): avc: denied { search } for pid=17601 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3947.584198][ T29] audit: type=1400 audit(3947.483:64186): avc: denied { getattr } for pid=17601 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3949.534921][T17621] syzkaller0: entered promiscuous mode [ 3949.558688][T17621] syzkaller0: entered allmulticast mode [ 3949.856797][T17621] netlink: 4 bytes leftover after parsing attributes in process `syz.6.3268'. [ 3952.524042][ T29] kauditd_printk_skb: 255 callbacks suppressed [ 3952.524511][ T29] audit: type=1400 audit(3952.423:64442): avc: denied { read } for pid=17644 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3952.619381][ T29] audit: type=1400 audit(3952.513:64443): avc: denied { prog_load } for pid=17644 comm="syz.6.3273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3952.635831][ T29] audit: type=1400 audit(3952.533:64444): avc: denied { bpf } for pid=17644 comm="syz.6.3273" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3952.647062][ T29] audit: type=1400 audit(3952.543:64445): avc: denied { perfmon } for pid=17644 comm="syz.6.3273" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3952.647626][ T29] audit: type=1400 audit(3952.543:64446): avc: denied { search } for pid=17642 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3952.647876][ T29] audit: type=1400 audit(3952.543:64447): avc: denied { search } for pid=17642 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3952.665693][ T29] audit: type=1400 audit(3952.543:64448): avc: denied { search } for pid=17642 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3952.670106][ T29] audit: type=1400 audit(3952.563:64449): avc: denied { perfmon } for pid=17644 comm="syz.6.3273" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3952.699587][ T29] audit: type=1400 audit(3952.593:64450): avc: denied { perfmon } for pid=17644 comm="syz.6.3273" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3952.700020][ T29] audit: type=1400 audit(3952.593:64451): avc: denied { perfmon } for pid=17644 comm="syz.6.3273" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3952.854853][T17648] netlink: 'syz.8.3274': attribute type 10 has an invalid length. [ 3957.530311][ T29] kauditd_printk_skb: 199 callbacks suppressed [ 3957.531929][ T29] audit: type=1400 audit(3957.433:64651): avc: denied { search } for pid=17673 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3957.536317][ T29] audit: type=1400 audit(3957.433:64652): avc: denied { search } for pid=17673 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3957.548556][ T29] audit: type=1400 audit(3957.443:64653): avc: denied { search } for pid=17673 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3957.548838][ T29] audit: type=1400 audit(3957.443:64654): avc: denied { read open } for pid=17673 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3957.549023][ T29] audit: type=1400 audit(3957.443:64655): avc: denied { getattr } for pid=17673 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3957.549139][ T29] audit: type=1400 audit(3957.443:64656): avc: denied { search } for pid=17673 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3957.549248][ T29] audit: type=1400 audit(3957.443:64657): avc: denied { search } for pid=17673 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3957.549363][ T29] audit: type=1400 audit(3957.443:64658): avc: denied { search } for pid=17673 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3957.549534][ T29] audit: type=1400 audit(3957.443:64659): avc: denied { search } for pid=17673 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3957.568709][ T29] audit: type=1400 audit(3957.463:64660): avc: denied { search } for pid=17673 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3962.578088][ T29] kauditd_printk_skb: 367 callbacks suppressed [ 3962.579030][ T29] audit: type=1400 audit(3962.463:65028): avc: denied { perfmon } for pid=17685 comm="syz.6.3283" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3962.675112][ T29] audit: type=1400 audit(3962.523:65029): avc: denied { perfmon } for pid=17685 comm="syz.6.3283" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3962.698955][ T29] audit: type=1400 audit(3962.553:65030): avc: denied { perfmon } for pid=17685 comm="syz.6.3283" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3962.707129][ T29] audit: type=1400 audit(3962.553:65031): avc: denied { perfmon } for pid=17685 comm="syz.6.3283" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3962.969375][ T29] audit: type=1400 audit(3962.793:65032): avc: denied { bpf } for pid=17685 comm="syz.6.3283" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3963.084677][ T29] audit: type=1400 audit(3962.983:65033): avc: denied { search } for pid=17666 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3963.193806][ T29] audit: type=1400 audit(3963.083:65034): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3963.201805][ T29] audit: type=1400 audit(3963.093:65035): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3963.229558][ T29] audit: type=1400 audit(3963.123:65036): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3963.273500][ T29] audit: type=1400 audit(3963.173:65037): avc: denied { recv } for pid=13748 comm="kworker/0:109" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3968.132861][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 3968.134142][ T29] audit: type=1400 audit(3967.993:65070): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3968.134509][ T29] audit: type=1400 audit(3968.003:65071): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3968.134743][ T29] audit: type=1400 audit(3968.033:65072): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3968.158853][ T29] audit: type=1400 audit(3968.053:65073): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3968.177550][ T29] audit: type=1400 audit(3968.073:65074): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3968.222105][ T29] audit: type=1400 audit(3968.113:65075): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3968.222598][ T29] audit: type=1400 audit(3968.123:65076): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3968.259006][ T29] audit: type=1400 audit(3968.143:65077): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3968.263724][ T29] audit: type=1400 audit(3968.153:65078): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3969.312874][ T29] audit: type=1400 audit(3969.213:65079): avc: denied { read } for pid=17698 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3973.304471][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 3973.304843][ T29] audit: type=1400 audit(3973.203:65100): avc: denied { prog_load } for pid=17700 comm="syz.6.3287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3973.338671][ T29] audit: type=1400 audit(3973.233:65101): avc: denied { bpf } for pid=17700 comm="syz.6.3287" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3973.341109][ T29] audit: type=1400 audit(3973.243:65102): avc: denied { perfmon } for pid=17700 comm="syz.6.3287" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3973.343831][ T29] audit: type=1400 audit(3973.243:65103): avc: denied { perfmon } for pid=17700 comm="syz.6.3287" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3973.355815][ T29] audit: type=1400 audit(3973.253:65104): avc: denied { perfmon } for pid=17700 comm="syz.6.3287" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3973.368590][ T29] audit: type=1400 audit(3973.263:65105): avc: denied { perfmon } for pid=17700 comm="syz.6.3287" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3973.371897][ T29] audit: type=1400 audit(3973.273:65106): avc: denied { perfmon } for pid=17700 comm="syz.6.3287" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3973.373433][ T29] audit: type=1400 audit(3973.273:65107): avc: denied { bpf } for pid=17700 comm="syz.6.3287" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3973.377775][ T29] audit: type=1400 audit(3973.273:65108): avc: denied { bpf } for pid=17700 comm="syz.6.3287" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3973.398990][ T29] audit: type=1400 audit(3973.293:65109): avc: denied { prog_run } for pid=17700 comm="syz.6.3287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3974.515249][T17703] netlink: 12 bytes leftover after parsing attributes in process `wÞ£ÿ'. [ 3974.793951][T17703] netlink: 12 bytes leftover after parsing attributes in process `wÞ£ÿ'. [ 3978.358607][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 3978.358874][ T29] audit: type=1400 audit(3978.243:65184): avc: denied { recv } for pid=15143 comm="syz-executor" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3978.402498][ T29] audit: type=1400 audit(3978.303:65185): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3978.697063][ T29] audit: type=1400 audit(3978.593:65186): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3978.697614][ T29] audit: type=1400 audit(3978.593:65187): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3979.528984][ T29] audit: type=1400 audit(3979.423:65188): avc: denied { read } for pid=17710 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3979.552851][ T29] audit: type=1400 audit(3979.453:65189): avc: denied { map_create } for pid=17710 comm="syz.6.3290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3979.560968][ T29] audit: type=1400 audit(3979.463:65190): avc: denied { map_read map_write } for pid=17710 comm="syz.6.3290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3982.240037][ T29] audit: type=1400 audit(3982.123:65191): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3982.240427][ T29] audit: type=1400 audit(3982.143:65192): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3982.299041][ T29] audit: type=1400 audit(3982.143:65193): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3983.376408][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 3983.376697][ T29] audit: type=1400 audit(3983.273:65214): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3983.376971][ T29] audit: type=1400 audit(3983.273:65215): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3983.399846][ T29] audit: type=1400 audit(3983.293:65216): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3983.400149][ T29] audit: type=1400 audit(3983.303:65217): avc: denied { recv } for pid=3092 comm="syz-executor" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3983.406469][ T29] audit: type=1400 audit(3983.303:65218): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3983.431299][ T29] audit: type=1400 audit(3983.323:65219): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3983.431849][ T29] audit: type=1400 audit(3983.333:65220): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=10.0.2.2 src=38874 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3983.484571][ T29] audit: type=1400 audit(3983.373:65221): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=44636 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3983.490666][ T29] audit: type=1400 audit(3983.373:65222): avc: denied { recv } for pid=3091 comm="sshd-session" saddr=127.0.0.1 src=44636 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3983.714412][ T29] audit: type=1400 audit(3983.613:65223): avc: denied { read } for pid=17715 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3985.577730][T17719] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1569 sclass=netlink_route_socket pid=17719 comm=syz.6.3293 [ 3985.880730][ T30] INFO: task kworker/1:83:13475 blocked for more than 430 seconds. [ 3985.881254][ T30] Not tainted syzkaller #0 [ 3985.881457][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3985.881812][ T30] task:kworker/1:83 state:D stack:0 pid:13475 tgid:13475 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3985.882459][ T30] Workqueue: events bpf_prog_free_deferred [ 3985.882883][ T30] Call trace: [ 3985.883212][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 3985.883458][ T30] r10:e8189d84 r9:00000002 r8:60010013 r7:829171a0 r6:e8189d8c r5:85d96000 [ 3985.883620][ T30] r4:85d96000 [ 3985.883759][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 3985.883980][ T30] r5:85d96000 r4:8291719c [ 3985.884114][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3985.884327][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 3985.884555][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:e8189e08 [ 3985.884689][ T30] r4:00000000 [ 3985.884815][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 3985.885006][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 3985.885209][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 3985.885431][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:877a5b00 [ 3985.885584][ T30] r4:00000000 [ 3985.885715][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 3985.885938][ T30] r9:83018605 r8:85d96000 r7:00000000 r6:83018600 r5:00001000 r4:7f282000 [ 3985.886073][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 3985.886281][ T30] r5:00001000 r4:e00b1000 [ 3985.886408][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 3985.886617][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 3985.886826][ T30] r5:86ca2b8c r4:84d44980 [ 3985.886962][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3985.887224][ T30] r7:ddde3d80 r6:83018600 r5:86ca2b8c r4:84d44980 [ 3985.887358][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3985.887599][ T30] r10:61c88647 r9:85d96000 r8:84d449ac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3985.887749][ T30] r4:84d44980 [ 3985.887880][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3985.945637][ T30] r10:00000000 r9:84d44980 r8:80278fec r7:ea865e60 r6:85731480 r5:85d96000 [ 3985.946028][ T30] r4:00000001 [ 3985.946170][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3985.946394][ T30] Exception stack(0xe8189fb0 to 0xe8189ff8) [ 3985.946588][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 3985.946751][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3985.946912][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3985.947082][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3985.947277][ T30] r4:86df4340 [ 3985.979630][ T30] INFO: task kworker/1:83:13475 is blocked on a mutex likely owned by task kworker/1:86:13493. [ 3985.980128][ T30] task:kworker/1:86 state:R running task stack:0 pid:13493 tgid:13493 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3985.980493][ T30] Workqueue: events bpf_prog_free_deferred [ 3985.980600][ T30] Call trace: [ 3985.980667][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 3985.980767][ T30] r10:8280c9b4 r9:86f1c800 r8:80200c04 r7:ea5d1d54 r6:ffffffff r5:86f1c800 [ 3985.980790][ T30] r4:00000000 [ 3985.980831][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3985.980950][ T30] Exception stack(0xea5d1d20 to 0xea5d1d68) [ 3985.981003][ T30] 1d20: 80a7f000 ff710000 00000001 80239bf8 7f278000 00000001 82acb1c4 82aca5a0 [ 3985.981138][ T30] 1d40: 7f278000 ff710000 8280c9b4 ea5d1d9c ea5d1da0 ea5d1d70 80230af0 80239c10 [ 3985.981507][ T30] 1d60: 80000113 ffffffff [ 3985.981544][ T30] r5:80000113 r4:80239c10 [ 3985.981564][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 3985.981656][ T30] r4:82acb1e4 [ 3985.981726][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 3985.981818][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea5d1dc0 r5:ea5d1e08 [ 3985.981841][ T30] r4:ea5d1dc0 [ 3985.981973][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 3985.982296][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60680 [ 3985.982418][ T30] r4:00000000 [ 3985.982511][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 3985.982593][ T30] r9:83018605 r8:86f1c800 r7:00000000 r6:83018600 r5:00001000 r4:7f27e000 [ 3985.982886][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 3985.983018][ T30] r5:00001000 r4:e0027000 [ 3985.983050][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 3985.983137][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 3985.983280][ T30] r5:86cbd38c r4:86f76d80 [ 3985.983399][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3985.983483][ T30] r7:ddde3d80 r6:83018600 r5:86cbd38c r4:86f76d80 [ 3985.983505][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3985.983605][ T30] r10:61c88647 r9:86f1c800 r8:86f76dac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3985.983632][ T30] r4:86f76d80 [ 3985.983693][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3985.983777][ T30] r10:00000000 r9:86f76d80 r8:80278fec r7:ea865e60 r6:84d44380 r5:86f1c800 [ 3985.983801][ T30] r4:00000001 [ 3985.983818][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3985.983872][ T30] Exception stack(0xea5d1fb0 to 0xea5d1ff8) [ 3985.983905][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3985.983943][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3985.984043][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3985.984091][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3985.984132][ T30] r4:85ec9a40 [ 3985.984348][ T30] INFO: task kworker/0:107:13707 blocked for more than 430 seconds. [ 3985.984562][ T30] Not tainted syzkaller #0 [ 3985.984595][ T30] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 3985.984793][ T30] task:kworker/0:107 state:D stack:0 pid:13707 tgid:13707 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3985.984873][ T30] Workqueue: events bpf_prog_free_deferred [ 3985.985199][ T30] Call trace: [ 3985.985692][ T30] [<81a63414>] (__schedule) from [<81a643a8>] (schedule+0x2c/0x130) [ 3985.985828][ T30] r10:ea3b1d84 r9:00000002 r8:60000113 r7:829171a0 r6:ea3b1d8c r5:86f1a400 [ 3985.985855][ T30] r4:86f1a400 [ 3985.985873][ T30] [<81a6437c>] (schedule) from [<81a64790>] (schedule_preempt_disabled+0x18/0x24) [ 3985.985940][ T30] r5:86f1a400 r4:8291719c [ 3985.985957][ T30] [<81a64778>] (schedule_preempt_disabled) from [<81a67340>] (__mutex_lock.constprop.0+0x350/0xa24) [ 3985.986177][ T30] [<81a66ff0>] (__mutex_lock.constprop.0) from [<81a67ae8>] (__mutex_lock_slowpath+0x14/0x18) [ 3985.986279][ T30] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:ea3b1e08 [ 3985.986305][ T30] r4:00000000 [ 3985.986322][ T30] [<81a67ad4>] (__mutex_lock_slowpath) from [<81a67b28>] (mutex_lock+0x3c/0x40) [ 3985.986376][ T30] [<81a67aec>] (mutex_lock) from [<804ea014>] (_vm_unmap_aliases+0x68/0x240) [ 3985.986433][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 3985.986733][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:877a00c0 [ 3985.986766][ T30] r4:00000000 [ 3985.986829][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 3985.986917][ T30] r9:83018405 r8:86f1a400 r7:00000000 r6:83018400 r5:00001000 r4:7f280000 [ 3985.986937][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 3985.987001][ T30] r5:00001000 r4:e006d000 [ 3985.987017][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 3985.987115][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 3985.987281][ T30] r5:86cbf78c r4:86df9700 [ 3985.987307][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3985.987386][ T30] r7:dddcfd80 r6:83018400 r5:86cbf78c r4:86df9700 [ 3985.987638][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3985.987724][ T30] r10:61c88647 r9:86f1a400 r8:86df972c r7:82804d40 r6:dddcfd80 r5:dddcfda0 [ 3985.987747][ T30] r4:86df9700 [ 3985.987765][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3985.987843][ T30] r10:00000000 r9:86df9700 r8:80278fec r7:ea7e1e60 r6:86df9d00 r5:86f1a400 [ 3985.987865][ T30] r4:00000001 [ 3985.987882][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3985.987934][ T30] Exception stack(0xea3b1fb0 to 0xea3b1ff8) [ 3985.987971][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3985.988151][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3986.009387][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3986.009492][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3986.009516][ T30] r4:86c11cc0 [ 3986.009986][ T30] INFO: task kworker/0:107:13707 is blocked on a mutex likely owned by task kworker/1:86:13493. [ 3986.010031][ T30] task:kworker/1:86 state:R running task stack:0 pid:13493 tgid:13493 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 3986.010135][ T30] Workqueue: events bpf_prog_free_deferred [ 3986.010227][ T30] Call trace: [ 3986.010260][ T30] [<81a63414>] (__schedule) from [<81a647dc>] (preempt_schedule_irq+0x40/0xa8) [ 3986.010371][ T30] r10:8280c9b4 r9:86f1c800 r8:80200c04 r7:ea5d1d54 r6:ffffffff r5:86f1c800 [ 3986.010395][ T30] r4:00000000 [ 3986.010412][ T30] [<81a6479c>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 3986.010472][ T30] Exception stack(0xea5d1d20 to 0xea5d1d68) [ 3986.010541][ T30] 1d20: 80a7f000 ff710000 00000001 80239bf8 7f278000 00000001 82acb1c4 82aca5a0 [ 3986.010588][ T30] 1d40: 7f278000 ff710000 8280c9b4 ea5d1d9c ea5d1da0 ea5d1d70 80230af0 80239c10 [ 3986.010616][ T30] 1d60: 80000113 ffffffff [ 3986.010645][ T30] r5:80000113 r4:80239c10 [ 3986.010663][ T30] [<80230a8c>] (flush_tlb_kernel_range) from [<804e9dd8>] (__purge_vmap_area_lazy+0x284/0x458) [ 3986.010857][ T30] r4:82acb1e4 [ 3986.010882][ T30] [<804e9b54>] (__purge_vmap_area_lazy) from [<804ea190>] (_vm_unmap_aliases+0x1e4/0x240) [ 3986.010959][ T30] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:ea5d1dc0 r5:ea5d1e08 [ 3986.011004][ T30] r4:ea5d1dc0 [ 3986.011025][ T30] [<804e9fac>] (_vm_unmap_aliases) from [<804eddf4>] (vfree+0x16c/0x210) [ 3986.011144][ T30] r10:83016170 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84f60680 [ 3986.011172][ T30] r4:00000000 [ 3986.011190][ T30] [<804edc88>] (vfree) from [<80558b40>] (execmem_free+0x30/0x50) [ 3986.011266][ T30] r9:83018605 r8:86f1c800 r7:00000000 r6:83018600 r5:00001000 r4:7f27e000 [ 3986.011295][ T30] [<80558b10>] (execmem_free) from [<803c5fb0>] (bpf_jit_free_exec+0x10/0x14) [ 3986.011361][ T30] r5:00001000 r4:e0027000 [ 3986.011379][ T30] [<803c5fa0>] (bpf_jit_free_exec) from [<803c6390>] (bpf_jit_free+0x68/0xe4) [ 3986.011441][ T30] [<803c6328>] (bpf_jit_free) from [<803c7438>] (bpf_prog_free_deferred+0x140/0x158) [ 3986.011507][ T30] r5:86cbd38c r4:86f76d80 [ 3986.011527][ T30] [<803c72f8>] (bpf_prog_free_deferred) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 3986.011606][ T30] r7:ddde3d80 r6:83018600 r5:86cbd38c r4:86f76d80 [ 3986.011626][ T30] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 3986.011789][ T30] r10:61c88647 r9:86f1c800 r8:86f76dac r7:82804d40 r6:ddde3d80 r5:ddde3da0 [ 3986.011917][ T30] r4:86f76d80 [ 3986.011939][ T30] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 3986.012018][ T30] r10:00000000 r9:86f76d80 r8:80278fec r7:ea865e60 r6:84d44380 r5:86f1c800 [ 3986.012069][ T30] r4:00000001 [ 3986.012090][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3986.012145][ T30] Exception stack(0xea5d1fb0 to 0xea5d1ff8) [ 3986.012344][ T30] 1fa0: 00000000 00000000 00000000 00000000 [ 3986.012391][ T30] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3986.012427][ T30] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3986.012468][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3986.012490][ T30] r4:85ec9a40 [ 3986.023667][ T30] NMI backtrace for cpu 1 [ 3986.023825][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 3986.023881][ T30] Hardware name: ARM-Versatile Express [ 3986.023904][ T30] Call trace: [ 3986.023948][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3986.024067][ T30] r7:00000000 r6:00010013 r5:60010093 r4:82252424 [ 3986.024087][ T30] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 3986.024144][ T30] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 3986.024205][ T30] r5:00000001 r4:00000001 [ 3986.024249][ T30] [<8021f8bc>] (dump_stack) from [<81a4d02c>] (nmi_cpu_backtrace+0x160/0x17c) [ 3986.024327][ T30] [<81a4cecc>] (nmi_cpu_backtrace) from [<81a4d178>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 3986.024395][ T30] r7:00000001 r6:8280c690 r5:8281ae34 r4:ffffffff [ 3986.024411][ T30] [<81a4d048>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 3986.024493][ T30] r9:8281ba28 r8:8280c810 r7:00059fd0 r6:00007e3e r5:82abf7d4 r4:8334570c [ 3986.024511][ T30] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037fb08>] (watchdog+0x5d0/0x850) [ 3986.024580][ T30] [<8037f538>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 3986.024655][ T30] r10:00000000 r9:00000000 r8:8037f538 r7:830cfd80 r6:830cfd80 r5:8321c800 [ 3986.024675][ T30] r4:00000001 [ 3986.024722][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3986.024779][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 3986.024817][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 3986.024852][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3986.024884][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3986.024924][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3986.024945][ T30] r4:833cb7c0 [ 3986.025104][ T30] Sending NMI from CPU 1 to CPUs 0: [ 3986.025654][ C0] NMI backtrace for cpu 0 [ 3986.025887][ C0] CPU: 0 UID: 0 PID: 2817 Comm: pr/ttyAMA-1 Not tainted syzkaller #0 PREEMPT [ 3986.025943][ C0] Hardware name: ARM-Versatile Express [ 3986.025997][ C0] PC is at _raw_spin_unlock_irqrestore+0x28/0x54 [ 3986.026082][ C0] LR is at pl011_console_device_unlock+0x20/0x24 [ 3986.026145][ C0] pc : [<81a6d27c>] lr : [<80a8ee08>] psr: 60000113 [ 3986.026189][ C0] sp : eac1deb0 ip : eac1dec0 fp : eac1debc [ 3986.026230][ C0] r10: 82959554 r9 : 00000000 r8 : 00000000 [ 3986.026278][ C0] r7 : 00000117 r6 : 829594b8 r5 : 00000000 r4 : 00000001 [ 3986.026330][ C0] r3 : 00003e1f r2 : 00000000 r1 : 60000113 r0 : 84b31040 [ 3986.026457][ C0] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 3986.026544][ C0] Control: 30c5387d Table: 849d9480 DAC: fffffffd [ 3986.026612][ C0] Call trace: [ 3986.026655][ C0] [<81a6d254>] (_raw_spin_unlock_irqrestore) from [<80a8ee08>] (pl011_console_device_unlock+0x20/0x24) [ 3986.026721][ C0] [<80a8ede8>] (pl011_console_device_unlock) from [<802e3768>] (nbcon_emit_one+0x88/0x100) [ 3986.026789][ C0] [<802e36e0>] (nbcon_emit_one) from [<802e3988>] (nbcon_kthread_func+0x1a8/0x2a4) [ 3986.026855][ C0] r6:8280c690 r5:84b10c00 r4:829594b8 [ 3986.026874][ C0] [<802e37e0>] (nbcon_kthread_func) from [<8028020c>] (kthread+0x12c/0x280) [ 3986.026952][ C0] r10:00000000 r9:829594b8 r8:802e37e0 r7:8468cc80 r6:8468cc80 r5:84b10c00 [ 3986.026974][ C0] r4:00000001 [ 3986.026991][ C0] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3986.027040][ C0] Exception stack(0xeac1dfb0 to 0xeac1dff8) [ 3986.027078][ C0] dfa0: 00000000 00000000 00000000 00000000 [ 3986.027154][ C0] dfc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3986.027187][ C0] dfe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3986.027226][ C0] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3986.027249][ C0] r4:840a06c0 [ 3986.028168][ T30] Kernel panic - not syncing: hung_task: blocked tasks [ 3986.058269][ T30] CPU: 1 UID: 0 PID: 30 Comm: khungtaskd Not tainted syzkaller #0 PREEMPT [ 3986.058860][ T30] Hardware name: ARM-Versatile Express [ 3986.059129][ T30] Call trace: [ 3986.059428][ T30] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3986.059900][ T30] r7:82253148 r6:8321c800 r5:00000000 r4:82252424 [ 3986.060148][ T30] [<80201b08>] (show_stack) from [<8021f894>] (dump_stack_lvl+0x54/0x7c) [ 3986.060492][ T30] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 3986.060851][ T30] r5:00000000 r4:82a78d18 [ 3986.061041][ T30] [<8021f8bc>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 3986.061419][ T30] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 3986.061787][ T30] r7:00059fd0 [ 3986.061968][ T30] [<80202800>] (panic) from [<8037f948>] (watchdog+0x410/0x850) [ 3986.062309][ T30] r3:00000001 r2:00000000 r1:00000001 r0:82253148 [ 3986.062562][ T30] [<8037f538>] (watchdog) from [<8028020c>] (kthread+0x12c/0x280) [ 3986.062915][ T30] r10:00000000 r9:00000000 r8:8037f538 r7:830cfd80 r6:830cfd80 r5:8321c800 [ 3986.063259][ T30] r4:00000001 [ 3986.063465][ T30] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 3986.063808][ T30] Exception stack(0xdf8d9fb0 to 0xdf8d9ff8) [ 3986.064057][ T30] 9fa0: 00000000 00000000 00000000 00000000 [ 3986.064459][ T30] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 3986.064804][ T30] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 3986.065101][ T30] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 3986.065413][ T30] r4:833cb7c0 [ 3986.067886][ T30] Rebooting in 86400 seconds.. VM DIAGNOSIS: 15:33:17 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=00000000 R02=00000000 R03=84b10c00 R04=eac1df08 R05=eac1df08 R06=00000f01 R07=00000017 R08=80a8ed44 R09=00000036 R10=00002590 R11=eac1de44 R12=eac1dde0 R13=eac1de30 R14=81a60898 R15=802e2d94 PSR=60010193 -ZC- A S svc32 s00=0008ffff s01=00000000 d00=000000000008ffff s02=00000300 s03=ffde0000 d01=ffde000000000300 s04=2cca2877 s05=18502302 d02=185023022cca2877 s06=f1fd6101 s07=ec464873 d03=ec464873f1fd6101 s08=ed75da62 s09=0d5701b6 d04=0d5701b6ed75da62 s10=566a5966 s11=fe4e20ee d05=fe4e20ee566a5966 s12=00000005 s13=00000000 d06=0000000000000005 s14=00000000 s15=67190000 d07=6719000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=c879426b s33=d7188f52 d16=d7188f52c879426b s34=9bd28f4d s35=c0ffa0e5 d17=c0ffa0e59bd28f4d s36=cbad9f08 s37=de77df37 d18=de77df37cbad9f08 s38=30470568 s39=88af8365 d19=88af836530470568 s40=b46d1af4 s41=35d41132 d20=35d41132b46d1af4 s42=7937b3cd s43=3e8e511b d21=3e8e511b7937b3cd s44=81651fca s45=7adbe202 d22=7adbe20281651fca s46=85f5f104 s47=9b450c96 d23=9b450c9685f5f104 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=00680000 s53=00740000 d26=0074000000680000 s54=00200000 s55=004c0000 d27=004c000000200000 s56=00380000 s57=00240000 d28=0024000000380000 s58=00080000 s59=00000008 d29=0000000800080000 s60=00080004 s61=03e60000 d30=03e6000000080004 s62=ff9e0000 s63=0008ffff d31=0008ffffff9e0000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=800ed000 R01=ff710000 R02=00000001 R03=80239bf8 R04=7f278000 R05=00000001 R06=82acb1c4 R07=82aca5a0 R08=7f278000 R09=ff710000 R10=8280c9b4 R11=ea5d1d9c R12=ea5d1da0 R13=ea5d1d70 R14=80230af0 R15=80239c10 PSR=80000113 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000