Warning: Permanently added '[localhost]:59902' (ED25519) to the list of known hosts. [ 187.142134][ T29] audit: type=1400 audit(185.510:58): avc: denied { name_bind } for pid=3176 comm="sshd" src=30001 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 187.471258][ T29] audit: type=1400 audit(185.840:59): avc: denied { execute } for pid=3178 comm="sh" name="syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 187.478301][ T29] audit: type=1400 audit(185.850:60): avc: denied { execute_no_trans } for pid=3178 comm="sh" path="/syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:03:07 fuzzer started [ 192.456036][ T29] audit: type=1400 audit(190.810:61): avc: denied { node_bind } for pid=3178 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 192.484378][ T29] audit: type=1400 audit(190.850:62): avc: denied { name_bind } for pid=3178 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 1970/01/01 00:03:10 dialing manager at localhost:30001 [ 206.666269][ T29] audit: type=1400 audit(205.030:63): avc: denied { mounton } for pid=3186 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 206.674297][ T29] audit: type=1400 audit(205.040:64): avc: denied { mount } for pid=3186 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 206.697341][ T3186] cgroup: Unknown subsys name 'net' [ 206.728622][ T29] audit: type=1400 audit(205.100:65): avc: denied { unmount } for pid=3186 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 207.162075][ T3186] cgroup: Unknown subsys name 'rlimit' [ 207.467247][ T29] audit: type=1400 audit(205.830:66): avc: denied { mounton } for pid=3186 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 207.468227][ T29] audit: type=1400 audit(205.840:67): avc: denied { mount } for pid=3186 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 207.479300][ T29] audit: type=1400 audit(205.850:68): avc: denied { setattr } for pid=3186 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 207.790184][ T3190] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 207.794018][ T29] audit: type=1400 audit(206.160:69): avc: denied { relabelto } for pid=3190 comm="mkswap" name="swap-file" dev="vda" ino=1740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 207.799945][ T29] audit: type=1400 audit(206.170:70): avc: denied { write } for pid=3190 comm="mkswap" path="/swap-file" dev="vda" ino=1740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 207.864726][ T29] audit: type=1400 audit(206.230:71): avc: denied { read } for pid=3186 comm="syz-executor" name="swap-file" dev="vda" ino=1740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 207.870005][ T29] audit: type=1400 audit(206.240:72): avc: denied { open } for pid=3186 comm="syz-executor" path="/swap-file" dev="vda" ino=1740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 207.884215][ T3186] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:03:26 code coverage: CONFIG_KCOV is not enabled 1970/01/01 00:03:26 comparison tracing: CONFIG_KCOV is not enabled 1970/01/01 00:03:26 extra coverage: CONFIG_KCOV is not enabled 1970/01/01 00:03:26 delay kcov mmap: CONFIG_KCOV is not enabled 1970/01/01 00:03:26 setuid sandbox: enabled 1970/01/01 00:03:26 namespace sandbox: enabled 1970/01/01 00:03:26 Android sandbox: enabled 1970/01/01 00:03:26 fault injection: enabled 1970/01/01 00:03:26 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 1970/01/01 00:03:26 net packet injection: enabled 1970/01/01 00:03:26 net device setup: enabled 1970/01/01 00:03:26 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 1970/01/01 00:03:26 devlink PCI setup: PCI device 0000:00:10.0 is not available 1970/01/01 00:03:26 NIC VF setup: PCI device 0000:00:11.0 is not available 1970/01/01 00:03:26 USB emulation: enabled 1970/01/01 00:03:26 hci packet injection: /dev/vhci does not exist 1970/01/01 00:03:26 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 1970/01/01 00:03:26 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 1970/01/01 00:03:26 swap file: enabled 1970/01/01 00:03:26 starting 2 executor processes [ 211.834904][ T3193] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.859819][ T3193] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.118180][ T3194] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.138081][ T3194] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 213.598004][ T3193] hsr_slave_0: entered promiscuous mode [ 213.639479][ T3193] hsr_slave_1: entered promiscuous mode [ 213.961294][ T3194] hsr_slave_0: entered promiscuous mode [ 213.987279][ T3194] hsr_slave_1: entered promiscuous mode [ 214.056741][ T3194] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 214.058005][ T3194] Cannot create hsr debugfs directory [ 214.936576][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 214.936662][ T29] audit: type=1400 audit(213.290:82): avc: denied { create } for pid=3193 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 214.937943][ T29] audit: type=1400 audit(213.300:83): avc: denied { write } for pid=3193 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 214.938790][ T29] audit: type=1400 audit(213.300:84): avc: denied { read } for pid=3193 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 214.942781][ T3193] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 215.002819][ T3193] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 215.042181][ T3193] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 215.119573][ T3193] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 215.302233][ T3194] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 215.322936][ T3194] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 215.359241][ T3194] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 215.381025][ T3194] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 216.778932][ T3194] 8021q: adding VLAN 0 to HW filter on device bond0 [ 216.937156][ T3193] 8021q: adding VLAN 0 to HW filter on device bond0 [ 222.264781][ T3193] veth0_vlan: entered promiscuous mode [ 222.332614][ T3193] veth1_vlan: entered promiscuous mode [ 222.473953][ T3194] veth0_vlan: entered promiscuous mode [ 222.599284][ T3194] veth1_vlan: entered promiscuous mode [ 222.661057][ T3193] veth0_macvtap: entered promiscuous mode [ 222.702326][ T3193] veth1_macvtap: entered promiscuous mode [ 222.924712][ T3193] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 222.930840][ T3193] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 222.931221][ T3193] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 222.931557][ T3193] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 222.999466][ T3194] veth0_macvtap: entered promiscuous mode [ 223.095190][ T3194] veth1_macvtap: entered promiscuous mode [ 223.234352][ T29] audit: type=1400 audit(221.600:85): avc: denied { mounton } for pid=3193 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 223.268988][ T29] audit: type=1400 audit(221.640:86): avc: denied { mount } for pid=3193 comm="syz-executor.1" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 223.449818][ T3194] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.450310][ T3194] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.450660][ T3194] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.451002][ T3194] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 00:03:42 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r3, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000500)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000080)) write$P9_RUNLINKAT(r1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 00:03:42 executing program 1: r0 = openat$nullb(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$null(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000080)) [ 223.825239][ T29] audit: type=1400 audit(222.190:87): avc: denied { read write } for pid=3194 comm="syz-executor.0" name="loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 223.843392][ T29] audit: type=1400 audit(222.190:88): avc: denied { open } for pid=3194 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 223.844729][ T29] audit: type=1400 audit(222.200:89): avc: denied { ioctl } for pid=3194 comm="syz-executor.0" path="/dev/loop0" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 224.172056][ T29] audit: type=1400 audit(222.540:90): avc: denied { read } for pid=3328 comm="syz-executor.1" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 224.172985][ T29] audit: type=1400 audit(222.540:91): avc: denied { open } for pid=3328 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 224.209968][ T29] audit: type=1400 audit(222.580:92): avc: denied { ioctl } for pid=3328 comm="syz-executor.1" path="/dev/nullb0" dev="devtmpfs" ino=673 ioctlcmd=0x1267 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 00:03:42 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ip6erspan0\x00', 0x1}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) 00:03:42 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 00:03:43 executing program 1: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000300), &(0x7f0000000340)=0x8) 00:03:43 executing program 0: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000300), &(0x7f0000000340)=0x8) [ 225.439171][ T29] audit: type=1400 audit(223.800:93): avc: denied { create } for pid=3338 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 225.456566][ T29] audit: type=1400 audit(223.820:94): avc: denied { getopt } for pid=3337 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 00:03:43 executing program 1: pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x0) close(r0) socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000000), 0x4) 00:03:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000001980)) 00:03:44 executing program 0: pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x0) close(r0) socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000000), 0x4) 00:03:44 executing program 1: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000300), &(0x7f0000000340)=0x8) 00:03:44 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000001980)) 00:03:44 executing program 1: pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x0) close(r0) socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000000000), 0x4) 00:03:45 executing program 0: r0 = openat$nullb(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$null(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000080)) 00:03:45 executing program 1: r0 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000300), &(0x7f0000000340)=0x8) 00:03:45 executing program 0: r0 = openat$nullb(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$null(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000080)) 00:03:45 executing program 1: timerfd_create(0x9, 0x800) 00:03:45 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r3, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000500)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000080)) write$P9_RUNLINKAT(r1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 00:03:46 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r3, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000500)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000080)) write$P9_RUNLINKAT(r1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 00:03:46 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r3, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000500)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000080)) write$P9_RUNLINKAT(r1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 00:03:46 executing program 1: r0 = openat$nullb(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$null(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) dup3(r0, r1, 0x0) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f0000000080)) 00:03:46 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 00:03:46 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r3, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000500)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000080)) write$P9_RUNLINKAT(r1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) [ 228.731142][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 228.731233][ T29] audit: type=1400 audit(227.090:98): avc: denied { create } for pid=3370 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 228.764428][ T29] audit: type=1400 audit(227.130:99): avc: denied { write } for pid=3370 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 00:03:47 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r3, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000500)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000080)) write$P9_RUNLINKAT(r1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 00:03:47 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r3, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000500)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000080)) write$P9_RUNLINKAT(r1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 00:03:47 executing program 0: r0 = socket$can_j1939(0x1d, 0x2, 0x7) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$L2TP_CMD_NOOP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) 00:03:47 executing program 1: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r3, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000500)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000080)) write$P9_RUNLINKAT(r1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 00:03:48 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x10, 0x0, 0x1080) 00:03:48 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x141842, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 00:03:48 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r3, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000500)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000080)) write$P9_RUNLINKAT(r1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 00:03:48 executing program 1: r0 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000200)) 00:03:49 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x141842, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0x0, 0x0) 00:03:49 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet6(0xa, 0x80801, 0x0) dup3(r1, r0, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x22, 0x0, &(0x7f0000000040)) 00:03:49 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x1e, 0x0, &(0x7f0000002780)) 00:03:49 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup(r0) ioctl$TIOCGSID(r1, 0x5429, 0x0) [ 231.408044][ T29] audit: type=1400 audit(229.760:100): avc: denied { create } for pid=3394 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 231.418161][ T29] audit: type=1400 audit(229.790:101): avc: denied { getopt } for pid=3394 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 231.456996][ T29] audit: type=1400 audit(229.830:102): avc: denied { read } for pid=3395 comm="syz-executor.1" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 231.459344][ T29] audit: type=1400 audit(229.830:103): avc: denied { open } for pid=3395 comm="syz-executor.1" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 231.465125][ T29] audit: type=1400 audit(229.830:104): avc: denied { ioctl } for pid=3395 comm="syz-executor.1" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4591 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 00:03:49 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/devices/virtual', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) dup3(r2, r3, 0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f0000000500)) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$TIOCGRS485(0xffffffffffffffff, 0x542e, &(0x7f0000000080)) write$P9_RUNLINKAT(r1, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) 00:03:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syncfs(r0) 00:03:50 executing program 0: openat$fb0(0xffffffffffffff9c, &(0x7f0000003900), 0x220040, 0x0) 00:03:50 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) getsockopt$IP_SET_OP_GET_BYNAME(r0, 0x1, 0x1e, 0x0, &(0x7f0000002780)) 00:03:50 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_secret(0x0) close_range(r1, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000000)={0x0, 0xea60}, 0x10) sendmsg$nl_xfrm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[], 0x33fe0}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 00:03:50 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_secret(0x0) close_range(r1, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000000)={0x0, 0xea60}, 0x10) sendmsg$nl_xfrm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[], 0x33fe0}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) [ 232.636684][ T29] audit: type=1400 audit(231.000:105): avc: denied { create } for pid=3406 comm="syz-executor.0" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 00:03:51 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup(r0) ioctl$TIOCGSID(r1, 0x5429, 0x0) 00:03:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ip6erspan0\x00', 0x1}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) 00:03:51 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'ip6erspan0\x00', 0x1}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, 0x0) 00:03:51 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_secret(0x0) close_range(r1, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000000)={0x0, 0xea60}, 0x10) sendmsg$nl_xfrm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[], 0x33fe0}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 00:03:52 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) ioctl$EVIOCREVOKE(r0, 0x40044591, 0x0) r1 = dup(r0) ioctl$TIOCGSID(r1, 0x5429, 0x0) 00:03:52 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x5451, 0x0) [ 234.217074][ T29] audit: type=1400 audit(232.580:106): avc: denied { read } for pid=3418 comm="syz-executor.0" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 234.218314][ T29] audit: type=1400 audit(232.580:107): avc: denied { open } for pid=3418 comm="syz-executor.0" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 234.240436][ T29] audit: type=1400 audit(232.590:108): avc: denied { ioctl } for pid=3418 comm="syz-executor.0" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 00:03:52 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000000)=0x2) mmap$dsp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000f, 0xa4052, r0, 0x0) 00:03:52 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x34, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x12, 0x0, @opaque='\x00'/10}}}}}, 0x0) recvfrom(r0, &(0x7f00000000c0)=""/10, 0xa, 0x0, 0x0, 0x0) [ 234.679392][ T29] audit: type=1400 audit(233.050:109): avc: denied { execute } for pid=3422 comm="syz-executor.0" path="/dev/audio" dev="devtmpfs" ino=725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1 00:03:53 executing program 0: r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = pidfd_getfd(r1, r2, 0x0) sendmsg$inet6(r3, &(0x7f0000002100)={0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000000000)='q', 0x1}], 0x1}, 0x0) [ 234.969099][ T29] audit: type=1400 audit(233.340:110): avc: denied { name_bind } for pid=3424 comm="syz-executor.1" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 00:03:53 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_secret(0x0) close_range(r1, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000000)={0x0, 0xea60}, 0x10) sendmsg$nl_xfrm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[], 0x33fe0}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) [ 235.136542][ T29] audit: type=1400 audit(233.490:111): avc: denied { create } for pid=3425 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 235.137338][ T29] audit: type=1400 audit(233.500:112): avc: denied { read write } for pid=3425 comm="syz-executor.0" path="socket:[5126]" dev="sockfs" ino=5126 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 00:03:53 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = memfd_secret(0x0) close_range(r1, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) setsockopt$sock_timeval(r2, 0x1, 0x15, &(0x7f0000000000)={0x0, 0xea60}, 0x10) sendmsg$nl_xfrm(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[], 0x33fe0}}, 0x0) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000680)={0x0}}, 0x0) 00:03:53 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x5451, 0x0) 00:03:54 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x34, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x12, 0x0, @opaque='\x00'/10}}}}}, 0x0) recvfrom(r0, &(0x7f00000000c0)=""/10, 0xa, 0x0, 0x0, 0x0) 00:03:54 executing program 0: r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = pidfd_getfd(r1, r2, 0x0) sendmsg$inet6(r3, &(0x7f0000002100)={0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000000000)='q', 0x1}], 0x1}, 0x0) 00:03:54 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x5451, 0x0) 00:03:54 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$SNDCTL_DSP_SETFMT(r0, 0xc0045005, &(0x7f0000000000)=0x2) mmap$dsp(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x100000f, 0xa4052, r0, 0x0) 00:03:54 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40286608, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) 00:03:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x34, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x12, 0x0, @opaque='\x00'/10}}}}}, 0x0) recvfrom(r0, &(0x7f00000000c0)=""/10, 0xa, 0x0, 0x0, 0x0) [ 236.807313][ T3443] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 236.830747][ T29] audit: type=1400 audit(235.200:113): avc: denied { getopt } for pid=3441 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 00:03:55 executing program 1: r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = pidfd_getfd(r1, r2, 0x0) sendmsg$inet6(r3, &(0x7f0000002100)={0x0, 0x0, &(0x7f00000020c0)=[{&(0x7f0000000000)='q', 0x1}], 0x1}, 0x0) 00:03:55 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r1, &(0x7f0000000080)='\x00'/10, 0xa, 0x0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) recvfrom(r0, &(0x7f0000000100)=""/10, 0xa, 0x0, 0x0, 0x0) 00:03:55 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x505}, 0x14}}, 0x0) 00:03:55 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), 0xffffffffffffffff) 00:03:57 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40286608, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) 00:03:57 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x34, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x26, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x12, 0x0, @opaque='\x00'/10}}}}}, 0x0) recvfrom(r0, &(0x7f00000000c0)=""/10, 0xa, 0x0, 0x0, 0x0) [ 241.526105][ C0] sched: RT throttling activated 00:04:00 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0x40286608, &(0x7f0000000080)={@desc={0x1, 0x0, @desc3}}) 00:04:01 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0), 0x163b01, 0x0) write$FUSE_NOTIFY_STORE(r0, 0x0, 0x0) 00:04:02 executing program 0: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write(r2, &(0x7f0000000040)='T', 0x1) [ 244.600991][ T29] audit: type=1400 audit(242.970:114): avc: denied { read } for pid=3466 comm="syz-executor.0" name="dlm-monitor" dev="devtmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 244.630247][ T29] audit: type=1400 audit(243.000:115): avc: denied { open } for pid=3466 comm="syz-executor.0" path="/dev/dlm-monitor" dev="devtmpfs" ino=88 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 244.701283][ T29] audit: type=1400 audit(243.060:116): avc: denied { write } for pid=3466 comm="syz-executor.0" path="socket:[4174]" dev="sockfs" ino=4174 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 00:04:03 executing program 0: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/debug/binder/transactions\x00', 0x0, 0x0) dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000000), 0x4) 00:04:03 executing program 1: r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = dup3(r0, r1, 0x0) write(r2, &(0x7f0000000040)='T', 0x1) [ 245.316220][ T29] audit: type=1400 audit(243.680:117): avc: denied { setopt } for pid=3468 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 245.358358][ T3469] sctp: [Deprecated]: syz-executor.0 (pid 3469) Use of int in maxseg socket option. [ 245.358358][ T3469] Use struct sctp_assoc_value instead 00:04:03 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1800) r2 = dup3(r0, r1, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={0x0}}, 0x24000094) 00:04:04 executing program 1: syz_read_part_table(0x5be, &(0x7f00000005c0)="$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") [ 245.786377][ T29] audit: type=1400 audit(244.150:118): avc: denied { create } for pid=3472 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 245.840637][ T29] audit: type=1400 audit(244.210:119): avc: denied { write } for pid=3472 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 00:04:04 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000bc0), 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x5452, &(0x7f00000001c0)={0x2, {0x2, 0x0, @loopback}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @empty}}) 00:04:04 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x505}, 0x14}}, 0x0) [ 246.507848][ T3476] loop1: detected capacity change from 0 to 2048 [ 246.784730][ T3476] loop1: p1 p2 p3 00:04:05 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x505}, 0x14}}, 0x0) 00:04:20 executing program 1: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x505}, 0x14}}, 0x0) 00:04:21 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x1800) r2 = dup3(r0, r1, 0x0) sendmsg$SOCK_DIAG_BY_FAMILY(r2, &(0x7f0000001240)={0x0, 0x0, &(0x7f0000001200)={0x0}}, 0x24000094) 00:04:26 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, 0x0) [ 274.452321][ T29] audit: type=1400 audit(272.800:120): avc: denied { create } for pid=3497 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 274.648104][ T29] audit: type=1400 audit(272.970:121): avc: denied { ioctl } for pid=3497 comm="syz-executor.0" path="socket:[4211]" dev="sockfs" ino=4211 ioctlcmd=0x5334 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 00:04:34 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x505}, 0x14}}, 0x0) [ 297.837257][ T775] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 298.558714][ T3331] udevd[3331]: inotify_add_watch(7, /dev/loop1p2, 10) failed: No such file or directory [ 298.783838][ T3332] udevd[3332]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 298.998096][ T29] audit: type=1400 audit(297.240:122): avc: denied { mount } for pid=3505 comm="syz-executor.1" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 299.295426][ T775] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 299.351158][ T3481] udevd[3481]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 300.479951][ T775] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 301.829103][ T775] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 302.896762][ C0] BUG: workqueue lockup - pool cpus=0 node=0 flags=0x0 nice=0 stuck for 33s! [ 302.899973][ C0] Showing busy workqueues and worker pools: [ 302.900757][ C0] workqueue events: flags=0x0 [ 302.901661][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=4 refcnt=5 [ 302.913838][ C0] pending: nsim_dev_trap_report_work, psi_avgs_work, vmstat_shepherd, psi_avgs_work [ 302.918942][ C0] pwq 6: cpus=1 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 302.919202][ C0] in-flight: 23:nsim_dev_trap_report_work [ 302.919985][ C0] workqueue events_unbound: flags=0x2 [ 302.924476][ C0] pwq 8: cpus=0-1 flags=0x4 nice=0 active=5 refcnt=6 [ 302.924732][ C0] in-flight: 55:call_usermodehelper_exec_work ,1116:fsnotify_mark_destroy_workfn fsnotify_mark_destroy_workfn ,10:fsnotify_connector_destroy_workfn fsnotify_connector_destroy_workfn [ 302.925329][ C0] workqueue events_power_efficient: flags=0x82 [ 302.940502][ C0] pwq 8: cpus=0-1 flags=0x4 nice=0 active=2 refcnt=3 [ 302.940711][ C0] in-flight: 772:wg_ratelimiter_gc_entries ,1106:gc_worker [ 302.941004][ C0] workqueue rcu_gp: flags=0x8 [ 302.942182][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 302.942340][ C0] pending: srcu_invoke_callbacks [ 302.942517][ C0] workqueue netns: flags=0x6000a [ 302.943893][ C0] pwq 8: cpus=0-1 flags=0x4 nice=0 active=1 refcnt=4 [ 302.944046][ C0] in-flight: 775:cleanup_net [ 302.944240][ C0] workqueue mm_percpu_wq: flags=0x8 [ 302.946557][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 302.946731][ C0] pending: vmstat_update [ 302.947051][ C0] workqueue dm_bufio_cache: flags=0x8 [ 302.951613][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 302.951805][ C0] pending: work_fn [ 302.952088][ C0] workqueue wg-crypt-wg0: flags=0x28 [ 302.961170][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=4 refcnt=5 [ 302.961385][ C0] in-flight: 3188:wg_packet_tx_worker [ 302.961536][ C0] pending: wg_packet_encrypt_worker, wg_packet_tx_worker, wg_packet_decrypt_worker [ 302.961796][ C0] workqueue wg-kex-wg1: flags=0x24 [ 302.963285][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 302.963429][ C0] pending: wg_packet_handshake_receive_worker [ 302.963584][ C0] workqueue wg-crypt-wg1: flags=0x28 [ 302.964712][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=3 refcnt=4 [ 302.964851][ C0] pending: wg_packet_decrypt_worker, wg_packet_tx_worker, wg_packet_encrypt_worker [ 302.965060][ C0] workqueue wg-kex-wg2: flags=0x24 [ 302.972513][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=1 refcnt=2 [ 302.972758][ C0] pending: wg_packet_handshake_receive_worker [ 302.972940][ C0] workqueue wg-crypt-wg2: flags=0x28 [ 302.978973][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=3 refcnt=4 [ 302.979170][ C0] pending: wg_packet_decrypt_worker, wg_packet_encrypt_worker, wg_packet_tx_worker [ 302.979424][ C0] workqueue wg-crypt-wg0: flags=0x28 [ 302.988149][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=3 refcnt=4 [ 302.988404][ C0] pending: wg_packet_encrypt_worker, wg_packet_tx_worker, wg_packet_decrypt_worker [ 302.988687][ C0] workqueue wg-crypt-wg1: flags=0x28 [ 302.994662][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=3 refcnt=4 [ 302.994907][ C0] pending: wg_packet_decrypt_worker, wg_packet_encrypt_worker, wg_packet_tx_worker [ 302.995316][ C0] workqueue wg-crypt-wg2: flags=0x28 [ 303.003104][ C0] pwq 2: cpus=0 node=0 flags=0x0 nice=0 active=2 refcnt=3 [ 303.003356][ C0] pending: wg_packet_encrypt_worker, wg_packet_tx_worker [ 303.004056][ C0] pool 2: cpus=0 node=0 flags=0x0 nice=0 hung=33s workers=6 idle: 936 7 3325 9 3189 [ 303.004803][ C0] pool 6: cpus=1 node=0 flags=0x0 nice=0 hung=0s workers=5 idle: 3187 3489 28 2965 [ 303.005297][ C0] pool 8: cpus=0-1 flags=0x4 nice=0 hung=0s workers=9 idle: 40 100 25 [ 303.024529][ C0] Showing backtraces of running workers in stalled CPU-bound worker pools: [ 303.027190][ C0] pool 2: [ 303.027652][ C0] task:kworker/0:3 state:R running task stack:0 pid:3188 tgid:3188 ppid:2 flags:0x00000008 [ 303.028606][ C0] Workqueue: wg-crypt-wg0 wg_packet_tx_worker [ 303.029097][ C0] Call trace: [ 303.029180][ C0] __switch_to+0x1c8/0x2a0 [ 303.029374][ C0] __schedule+0xad8/0x2b30 [ 303.029447][ C0] preempt_schedule+0xf4/0x254 [ 303.029512][ C0] __local_bh_enable_ip+0x380/0x4a0 [ 303.029575][ C0] _raw_read_unlock_bh+0x44/0x54 [ 303.029663][ C0] wg_socket_send_skb_to_peer+0xf0/0x188 [ 303.029739][ C0] wg_packet_tx_worker+0x128/0x4e8 [ 303.029867][ C0] process_one_work+0x78c/0x1898 [ 303.029936][ C0] worker_thread+0x764/0xc24 [ 303.030005][ C0] kthread+0x27c/0x300 [ 303.030084][ C0] ret_from_fork+0x10/0x20 00:05:04 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = socket$xdp(0x2c, 0x3, 0x0) r3 = dup3(r2, r1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r3, 0xc08c5334, 0x0) [ 307.222772][ T29] audit: type=1400 audit(305.590:123): avc: denied { read } for pid=3031 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 00:05:06 executing program 0: r0 = syz_open_procfs$userns(0x0, &(0x7f0000000040)) ioctl$TIOCGPTPEER(r0, 0x5450, 0x0) [ 310.288936][ T29] audit: type=1400 audit(308.620:124): avc: denied { ioctl } for pid=3513 comm="syz-executor.0" path="user:[4026531837]" dev="nsfs" ino=4026531837 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 00:05:09 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x4, 0x6, 0x505}, 0x14}}, 0x0) [ 315.810115][ T775] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 316.018154][ T775] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 316.189610][ T775] bond0 (unregistering): Released all slaves [ 321.292485][ T775] hsr_slave_0: left promiscuous mode [ 321.518365][ T775] hsr_slave_1: left promiscuous mode [ 322.253370][ T775] veth1_macvtap: left promiscuous mode [ 322.404955][ T775] veth0_macvtap: left promiscuous mode [ 322.407689][ T775] veth1_vlan: left promiscuous mode [ 322.410693][ T775] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 17:41:59 Registers: info registers vcpu 0 CPU#0 PC=ffff8000801d5ba8 X00=fffffdffbf7d7e28 X01=000000000000003f X02=0000000000000000 X03=0000000000000000 X04=1fffe0000222a781 X05=fffffdffbf7d7e20 X06=ffff7fbff7efafc4 X07=0000000000000001 X08=fffffdffbf7d7e27 X09=dfff800000000000 X10=ffff7fbff7efafc4 X11=1fffffbff7efafc4 X12=ffff7fbff7efafc5 X13=353d746e63666572 X14=0000000000000000 X15=fffffffffffd2268 X16=0000000000000006 X17=0000000000000000 X18=ffff000011154670 X19=fffffdffbf7d7e20 X20=ffff00006a69bfa0 X21=1fffe0000d4d37f4 X22=ffff00000a080000 X23=dfff800000000000 X24=0000000000000040 X25=0000000000000005 X26=ffff8000867c7ea0 X27=0000000000000000 X28=ffff800084f073a0 X29=ffff8000800077e0 X30=ffff8000801d5bb4 SP=ffff8000800077e0 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000ffffca2d7600:0000000000000000 Q02=0000ffffca2d7600:0000ffffa6570000 Q03=0000000000000008:0000ffffa643328c Q04=0000ffffca2d75b0:0000ffffa6570408 Q05=0000aaaae2f22770:0000ffffa642aa48 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffca2d7840:0000ffffca2d7840 Q17=ffffff80ffffffd0:0000ffffca2d7810 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800084e67c2c X00=ffff800084e67c28 X01=ffff8000838a8600 X02=0000000000000000 X03=1fffe0000d4d55b9 X04=00000000f204f1f1 X05=ffff7000112bef96 X06=dfff800000000000 X07=00000000f1f1f1f1 X08=ffff000012c14698 X09=0000000000000040 X10=1ffff000111498c0 X11=1fffe000025828d2 X12=0000000000000007 X13=1fffe000025828ca X14=1fffe000025828d7 X15=1fffe000025828cd X16=0000000000000006 X17=ffff7fffe3fed000 X18=ffff000012c14670 X19=ffff80008693a300 X20=000000000000ca16 X21=000000000000ca16 X22=ffff8000803d9760 X23=dfff800000000000 X24=0000004614ff8200 X25=00000000000000c0 X26=ffff80008693a308 X27=1fffe0000d4d5e05 X28=1fffe0000d4d5dd5 X29=ffff8000895f7d20 X30=ffff8000838a8618 SP=ffff8000895f7d20 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=3a45000a756c253a:49000a69253a5700 Q02=c000000c00000000:0000000000000000 Q03=0000f0000000f000:000f0000f000000f Q04=f00ff00ff00ff00f:f00ff00ff00ff00f Q05=00f000f00f00f00f:00f000f00f00f00f Q06=c00c000000000000:c00c000000000000 Q07=0000aaaac75de790:000002da00000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000002000:0000000000000000 Q17=000000000000000b:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000