last executing test programs: 26.612590037s ago: executing program 1 (id=6641): openat$nullb(0xffffffffffffff9c, 0x0, 0x84042, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x44, 0x0, 0x0) ioctl$KVM_SET_FPU(r2, 0x41a0ae8d, &(0x7f00000004c0)={'\x00', 0x8, 0x9, 0x99, 0x0, 0x0, 0x10000, 0x2, '\x00', 0x10}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 26.496771588s ago: executing program 1 (id=6642): bind$packet(0xffffffffffffffff, 0x0, 0x426e59fc9dad529e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000280)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000200), 0x82002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) socket$inet6_mptcp(0xa, 0x1, 0x106) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) r2 = syz_open_dev$sndctrl(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000480)=ANY=[]) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000240)={[&(0x7f00000000c0)='=\x8d5\x10\xe4\x00\bj\xfb', &(0x7f0000000080)='=\x8d5\x10\xe4\x00\bj\xfb']}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg2\x00'}) getpid() r3 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x20) preadv(r3, &(0x7f0000001b00)=[{&(0x7f00000009c0)=""/239, 0xef}], 0x1, 0x2, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="4000000066001fff0000000000000000"], 0x40}}, 0x4000800) syz_usb_connect(0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0xff08, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c0000001800ffffffff7bfbfcdbdf250a148000ff01fd07"], 0x1c}}, 0x0) sendmmsg$alg(r6, &(0x7f00000000c0), 0x492492492492627, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@dellink={0x20, 0x11, 0x1, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, 0x1480, 0x2104}}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x80) 23.432883492s ago: executing program 1 (id=6677): mkdir(&(0x7f0000000000)='./file0\x00', 0x2) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000006840)={0x2020, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(r0, &(0x7f00000042c0)="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", 0x2000, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1}, 0x50) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006780)={0x90}, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006780)={0x90, 0x0, 0x0, {0x5, 0x0, 0xa53, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x0, 0x10b}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = open(&(0x7f00000001c0)='./file0/file0\x00', 0x2, 0x0) lseek(r2, 0x0, 0x3) 23.168507722s ago: executing program 1 (id=6681): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1/file4\x00', 0x1c0) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file4\x00', 0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x4) capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000340)={0x200000, 0x200000, 0x0, 0x0, 0x5989}) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./bus\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file1/file0\x00', 0x0) mount$bind(&(0x7f0000000100)='.\x00', &(0x7f0000000280)='./file1/file0\x00', 0x0, 0x1085408, 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f00000003c0), 0x0, &(0x7f00000004c0)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file1/file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) chdir(&(0x7f00000001c0)='./bus\x00') unlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0) 23.061128775s ago: executing program 1 (id=6683): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000500)={'syzkaller0\x00', 0x7101}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000001c0)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_mq={0x7}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000380)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70b923, 0x80000, {0x0, 0x0, 0x0, r6, {}, {0x2, 0xb}, {0x9, 0xb}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004075}, 0x4008000) 21.882279807s ago: executing program 1 (id=6696): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ff0000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x1195, &(0x7f0000000040)={0x0, 0xc8a2, 0xc000, 0x3, 0xc4}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000100)=[@in={0x2, 0x4e20, @rand_addr=0x64010102}]}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='*'], 0x50) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=@updsa={0xf0, 0x1a, 0x1, 0x70bd28, 0x25dfdbff, {{@in=@multicast1, @in6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3e}}, 0x4e21, 0x9, 0x4e23, 0x32d5, 0x2, 0x20, 0x20, 0x5c}, {@in6=@loopback, 0x4d3, 0x32}, @in=@empty, {0x3, 0x7, 0x7, 0x6, 0x6b7d, 0x5, 0x8000000000000000, 0x6}, {0x101, 0x1, 0x2f, 0x3}, {0x7f, 0x694a, 0x7}, 0x70bd2c, 0x3507, 0xa, 0x0, 0x0, 0x15}}, 0xf0}, 0x1, 0x0, 0x0, 0x8090}, 0x0) io_uring_enter(r1, 0x2219, 0xcf74, 0x16, 0x0, 0x0) 21.666780416s ago: executing program 32 (id=6696): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ff0000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x1195, &(0x7f0000000040)={0x0, 0xc8a2, 0xc000, 0x3, 0xc4}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={0xffffffffffffffff, 0x2000000, 0x0, 0x0, &(0x7f00000004c0), 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000100)=[@in={0x2, 0x4e20, @rand_addr=0x64010102}]}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='*'], 0x50) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000440)=@updsa={0xf0, 0x1a, 0x1, 0x70bd28, 0x25dfdbff, {{@in=@multicast1, @in6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3e}}, 0x4e21, 0x9, 0x4e23, 0x32d5, 0x2, 0x20, 0x20, 0x5c}, {@in6=@loopback, 0x4d3, 0x32}, @in=@empty, {0x3, 0x7, 0x7, 0x6, 0x6b7d, 0x5, 0x8000000000000000, 0x6}, {0x101, 0x1, 0x2f, 0x3}, {0x7f, 0x694a, 0x7}, 0x70bd2c, 0x3507, 0xa, 0x0, 0x0, 0x15}}, 0xf0}, 0x1, 0x0, 0x0, 0x8090}, 0x0) io_uring_enter(r1, 0x2219, 0xcf74, 0x16, 0x0, 0x0) 12.153920241s ago: executing program 0 (id=6728): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002000)={0x18, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000002c0)='contention_begin\x00', r1, 0x0, 0xd}, 0x18) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) r2 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000000b40)='source', &(0x7f0000000040)='c:::\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) syz_open_procfs(0x0, 0x0) readv(r2, &(0x7f0000000080)=[{&(0x7f0000000100)=""/161, 0xa1}], 0x1) syz_usb_connect(0x0, 0x36, 0x0, 0x0) 12.100132949s ago: executing program 3 (id=6730): bind$packet(0xffffffffffffffff, 0x0, 0x426e59fc9dad529e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000280)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000200), 0x82002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) socket$inet6_mptcp(0xa, 0x1, 0x106) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) r2 = syz_open_dev$sndctrl(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000480)=ANY=[]) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000240)={[&(0x7f00000000c0)='=\x8d5\x10\xe4\x00\bj\xfb', &(0x7f0000000080)='=\x8d5\x10\xe4\x00\bj\xfb']}) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x20) preadv(r5, &(0x7f0000001b00)=[{&(0x7f00000009c0)=""/239, 0xef}], 0x1, 0x2, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="4000000066001fff0000000000000000"], 0x40}}, 0x4000800) syz_usb_connect(0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r4, 0xff08, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c0000001800ffffffff7bfbfcdbdf250a148000ff01fd07"], 0x1c}}, 0x0) sendmmsg$alg(r8, &(0x7f00000000c0), 0x492492492492627, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@dellink={0x20, 0x11, 0x1, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, r9, 0x1480, 0x2104}}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x80) 9.163449233s ago: executing program 2 (id=6734): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) futex_waitv(&(0x7f0000001080), 0x0, 0x0, 0x0, 0x1) prlimit64(0x0, 0xe, &(0x7f0000000080)={0x5, 0x1000086}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000300)={0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000680)=""/77}, 0x20) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x1f, 0x13, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000000000000000001809000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000a40800008500000006000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 9.162082954s ago: executing program 4 (id=6735): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000600)=@newqdisc={0x64, 0x24, 0x4ee4e6a52ff56541, 0x1, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2, 0x3}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x34, 0x2, {{0x3, 0x3, 0x6361, 0x7, 0xffffffff, 0x3}, [@TCA_NETEM_CORR={0x10, 0x1, {0x9, 0x4, 0x9}}, @TCA_NETEM_DELAY_DIST={0x6, 0x2, "1879"}]}}}]}, 0x64}, 0x1, 0x0, 0x0, 0x40088c1}, 0x0) r4 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r4, &(0x7f00000005c0)="bad330fbc9b55400040000ea0756", 0xe, 0x40, &(0x7f00000001c0)={0x11, 0x8100, r3, 0x1, 0xd8, 0x6, @multicast}, 0x14) 7.541223873s ago: executing program 0 (id=6736): socket$can_raw(0x1d, 0x3, 0x1) socket$nl_route(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = dup(r0) ioctl$TIOCL_SETVESABLANK(r1, 0x560e, &(0x7f0000000140)) ioctl$TIOCL_BLANKSCREEN(r1, 0x541c, &(0x7f0000000040)) 7.540800798s ago: executing program 2 (id=6737): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x40801, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_io_uring_setup(0x10e, &(0x7f0000000280)={0x0, 0x334e, 0x10, 0x2004, 0x1000030e}, &(0x7f0000000200)=0x0, &(0x7f0000000300)=0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x1, 0x7}) write$UHID_CREATE2(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="06"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r4, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x60, 0x185100}) io_uring_enter(r1, 0x7277, 0x0, 0x28, 0x0, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x5437, 0x0) 7.539602906s ago: executing program 3 (id=6738): socketpair$unix(0x1, 0x1, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000040)=0x2800, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) r1 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@newqdisc={0x60, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r3, {0x0, 0xa}, {0xffff, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xea, 0x0, 0xfffd, 0x0, 0x9, 0x5}, {0x12, 0x2, 0x0, 0x401, 0x8001, 0x1400}, 0xa5, 0x5, 0x10000000}}, @TCA_TBF_BURST={0x8, 0x6, 0x8057}]}}]}, 0x60}}, 0x44080) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000100)=@newqdisc={0x40, 0x24, 0xd0f, 0x70bd2c, 0x25dfdbfb, {0x60, 0x0, 0x0, r3, {}, {0xffe0, 0xa}, {0x1, 0x10}}, [@qdisc_kind_options=@q_pfifo_head_drop={{0x14}, {0x8, 0x2, 0x4}}]}, 0x40}, 0x1, 0x0, 0x0, 0x55}, 0xc010) sendmsg$inet(r0, &(0x7f00000015c0)={0x0, 0x14, &(0x7f0000001600)=[{&(0x7f0000000240)=' ', 0xffffff1f}], 0x1}, 0x0) 7.539311131s ago: executing program 4 (id=6739): syz_open_dev$dri(0x0, 0x1, 0x0) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8b34, &(0x7f0000000000)={'wlan1\x00', @random="000500000020"}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000032680)=""/102400, 0x19000) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000002300010324bd70f6f9dbdf2501"], 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0xc004) 5.777341525s ago: executing program 0 (id=6740): bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x9, 0x8, 0x0, 0x3}, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="020300090a0000000000000004000000030006000000000002000000ac1414000000000000000000020001000000000000000002fffffffb0300050000000000"], 0x50}}, 0x8804) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000180)={{{@in=@loopback, @in6=@dev, 0x0, 0x800, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x8, 0x9}, {0x9}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x6c}, 0x0, @in=@rand_addr=0x64010102, 0x0, 0x0, 0x0, 0x2, 0x0, 0x400}}, 0xe8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) r4 = socket$key(0xf, 0x3, 0x2) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0xbe) sendmsg$key(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x10}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0xba01}, 0x0) r6 = socket(0x10, 0x3, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f00000004c0), 0x0) r8 = accept4(r7, 0x0, 0x0, 0x800) sendmmsg$alg(r8, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x40800) recvmsg(r8, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x51}], 0x1}, 0x0) write(r6, &(0x7f0000000000)="2400000011005f0414f9f40700090400810000000d0000000000000008000f0001000000", 0x24) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 5.776923392s ago: executing program 2 (id=6741): r0 = syz_usb_connect(0x0, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="1201000083667d1040206402d14e0102030109021b000100000000090400000190f19c00090584"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_open_dev$I2C(&(0x7f0000000100), 0x2, 0x1) 5.775714571s ago: executing program 3 (id=6742): gettid() socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) mremap(&(0x7f000054e000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000022c000/0x3000)=nil) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x161642, 0x0) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='new default user:syz 000000000000040'], 0x2a, 0xfffffffffffffff9) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180), &(0x7f0000000100), 0xca, 0xfffffffffffffffe) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000150001fb26bd7000000000250f2cca84a6378036c2ed00"/40], 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x40010) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="60000000020601046c0001000000000000000000050005000a000000050001000600000005000400000000000900020073797a300000000014000300686173683a69702c706f72742c697000140007800800084000002f5408000640"], 0x60}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24008050}, 0x80) ioctl$EXT4_IOC_SETFSUUID(r3, 0x4008662c, &(0x7f0000000000)={0x10, 0x0, "8970ba71ca25a8f01b6e3d16be49d843"}) socket$inet_udplite(0x2, 0x2, 0x88) prlimit64(0x0, 0xb, &(0x7f0000000240)={0x8, 0x4}, 0x0) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) r5 = openat$rdma_cm(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x400000001, &(0x7f0000000300)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r5, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000004c0), r6, 0x1}}, 0x18) mount(&(0x7f0000000240)=@nullb, &(0x7f00000000c0)='./cgroup\x00', &(0x7f0000000280)='hfsplus\x00', 0x4080, 0x0) 5.774950809s ago: executing program 4 (id=6743): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000380)={'pimreg\x00', 0x5005}) socket$nl_route(0x10, 0x3, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x15) fallocate(0xffffffffffffffff, 0x10, 0x800, 0x8000) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="040e04000f08"], 0x7) setsockopt$packet_int(r0, 0x107, 0xf, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendto$packet(r0, &(0x7f0000000180), 0x0, 0x0, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r1}, 0x18) 3.954655414s ago: executing program 0 (id=6744): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff7000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff1000/0x3000)=nil, &(0x7f0000ff0000/0x2000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r2 = io_uring_setup(0x1195, &(0x7f0000000040)={0x0, 0x2150, 0xc000, 0x3, 0xc4}) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000001480)}], 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='*'], 0x50) io_uring_enter(r2, 0x2219, 0xcf74, 0x16, 0x0, 0x0) 3.953850724s ago: executing program 2 (id=6745): openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x18, 0x5, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000090f04000000000000000000850000000f000000850000007d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000500)='sys_exit\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef096ec866400fe2de0fae4e0afaf24e6ff00fc01ebbf3470fa7c063df", 0xdc000006, 0x0, {[0x39a]}}, 0x0, 0x8, &(0x7f0000000300)) poll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x80cd}], 0x1, 0x7) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000040)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x12, r2, 0x0) ioctl$KVM_X86_SETUP_MCE(r2, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0xcf4e74310708dfc2, 0xc}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 3.953305989s ago: executing program 3 (id=6746): r0 = openat$adsp1(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000100)={0x6, 0x1f, 0x6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000000)={0x7f7c, 0x6, 0x100}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000240)={0x2, 0x5, 0x6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000200)={0x200, 0x1fb, 0xc38, 0x0, 0x0}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f00000001c0)={0x4, 0x1, 0xb}) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(r2, 0xc00464b4, &(0x7f0000000380)={r3}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x49, 0x7fff, 0x4}) close_range(r0, 0xffffffffffffffff, 0x0) 3.952799506s ago: executing program 4 (id=6747): setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x7}, 0x8) openat$audio(0xffffffffffffff9c, &(0x7f0000000000), 0x480040, 0x0) ioctl(0xffffffffffffffff, 0xb8, &(0x7f0000000000)="15e0185428227964d1") r0 = openat$kvm(0xffffff9c, &(0x7f00000000c0), 0x40300, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000340)={0x1fe, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) landlock_create_ruleset(0x0, 0x0, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000200)={[0x2, 0x9, 0xfffffffffffffffd, 0x85, 0x2, 0x0, 0x4002004c8, 0x1004, 0x45c5, 0xc595, 0x7, 0x2, 0x4, 0x0, 0x80000004000000, 0x200000000c], 0x100000, 0x2010d3}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 2.030314328s ago: executing program 0 (id=6748): bind$packet(0xffffffffffffffff, 0x0, 0x426e59fc9dad529e) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000280)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$dsp1(0xffffffffffffff9c, &(0x7f0000000200), 0x82002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) socket$inet6_mptcp(0xa, 0x1, 0x106) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)) r2 = syz_open_dev$sndctrl(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r2, 0xc008551a, &(0x7f0000000480)=ANY=[]) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000240)={[&(0x7f00000000c0)='=\x8d5\x10\xe4\x00\bj\xfb', &(0x7f0000000080)='=\x8d5\x10\xe4\x00\bj\xfb']}) r3 = getpid() r4 = syz_pidfd_open(r3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x20) preadv(r5, &(0x7f0000001b00)=[{&(0x7f00000009c0)=""/239, 0xef}], 0x1, 0x2, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000780)=ANY=[@ANYBLOB="4000000066001fff0000000000000000"], 0x40}}, 0x4000800) syz_usb_connect(0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r4, 0xff08, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=ANY=[@ANYBLOB="1c0000001800ffffffff7bfbfcdbdf250a148000ff01fd07"], 0x1c}}, 0x0) sendmmsg$alg(r8, &(0x7f00000000c0), 0x492492492492627, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r7, 0x8933, &(0x7f0000000000)={'batadv0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=@dellink={0x20, 0x11, 0x1, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, r9, 0x1480, 0x2104}}, 0x20}, 0x1, 0x0, 0x0, 0x40}, 0x80) 2.028938091s ago: executing program 2 (id=6749): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_io_uring_setup(0x4f6, &(0x7f0000000380)={0x0, 0x80fd, 0x10, 0x1, 0x179}, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000040)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r1, 0x80, &(0x7f00000000c0)=@x25, 0x0, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0x40a85323, &(0x7f0000000080)={{0xd4, 0x18}, 'port0\x00', 0x81, 0xfdc874427faa9445, 0x800400, 0x2, 0x1, 0x0, 0x5, 0x0, 0x4, 0x4}) io_uring_enter(r2, 0x47bc, 0xf5, 0x0, 0x0, 0x0) 2.028002207s ago: executing program 3 (id=6750): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x100008b}, 0x0) sched_setaffinity(0x0, 0x11, &(0x7f0000000180)=0x1400200bce) sched_setscheduler(0x0, 0x1, &(0x7f0000002200)=0x1) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f000001b700)=""/102392, 0x18ff8) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r1 = socket$isdn(0x22, 0x2, 0x10) r2 = socket$isdn(0x22, 0x2, 0x2) r3 = dup3(r2, r1, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r3, 0x6, 0x1, 0x0, 0x0) 2.02772647s ago: executing program 4 (id=6751): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x738, 0x1705, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0xb0, 0x0, [{{0x9, 0x4, 0x0, 0xfc, 0x3, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x3}}, {{{0x9, 0x5, 0x81, 0x3, 0x200}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000180)={0x24, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x22, 0x3, {[@global=@item_012={0x0, 0x1, 0x1}, @local=@item_012={0x1, 0x2, 0x8, '\b'}]}}, 0x0}, 0x0) pipe2(0x0, 0x0) pipe(0x0) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) r1 = openat$vcs(0xffffffffffffff9c, 0x0, 0x80001, 0x0) sendmsg$TIPC_NL_NET_GET(r1, 0x0, 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getresgid(0x0, 0x0, 0x0) 5.778623ms ago: executing program 0 (id=6752): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) pselect6(0x40, &(0x7f0000000080)={0x0, 0x3, 0x1, 0x0, 0x8000, 0x0, 0x0, 0x7}, &(0x7f00000000c0)={0x2, 0x0, 0x8, 0x1, 0xfffffffffffffff8, 0x0, 0x4000000000}, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xe) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd, 0x0, 0x0}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a01, 0x0) ioctl$EVIOCGPROP(r1, 0x40047438, &(0x7f0000000180)=""/246) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{}, 0x0, 0x0}, 0x20) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r2, 0x890c, &(0x7f00000000c0)={0x0, @l2tp={0x2, 0x0, @remote}, @l2tp={0x2, 0x0, @private=0xa010100, 0xfffffffe}, @nl=@unspec, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2}) ioctl$PPPIOCSFLAGS1(r1, 0x40047459, &(0x7f0000000000)=0x40b5aa3) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0xfce1) 5.132652ms ago: executing program 2 (id=6753): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x61, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r4, 0x4080aebf, &(0x7f0000005700)={{0x0, 0x0, 0x80, {0x100000, 0x2, 0x2}}, "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", "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"}) ioctl$KVM_RUN(r4, 0xae80, 0x0) 458.77µs ago: executing program 3 (id=6754): bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(r1, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x0, 0x0, 0xb49, 0x9, 0x8, 0x0, 0x3}, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) r3 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r3, &(0x7f0000000000)={0x500, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="020300090a0000000000000004000000030006000000000002000000ac1414000000000000000000020001000000000000000002fffffffb0300050000000000"], 0x50}}, 0x8804) setsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000180)={{{@in=@loopback, @in6=@dev, 0x0, 0x800, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x8, 0x9}, {0x9}, 0x0, 0x0, 0x1}, {{@in=@local, 0x0, 0x6c}, 0x0, @in=@rand_addr=0x64010102, 0x0, 0x0, 0x0, 0x2, 0x0, 0x400}}, 0xe8) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) r4 = socket$key(0xf, 0x3, 0x2) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0xbe) sendmsg$key(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB], 0x10}}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0xba01}, 0x0) r6 = socket(0x10, 0x3, 0x0) r7 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f0000000380)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-blowfish-asm\x00'}, 0x58) setsockopt$ALG_SET_KEY(r7, 0x117, 0x1, &(0x7f00000004c0), 0x0) r8 = accept4(r7, 0x0, 0x0, 0x800) sendmmsg$alg(r8, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x40800) recvmsg(r8, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x51}], 0x1}, 0x0) write(r6, &(0x7f0000000000)="2400000011005f0414f9f40700090400810000000d0000000000000008000f0001000000", 0x24) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) 0s ago: executing program 4 (id=6755): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x5}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000004400)=@newtfilter={0x38, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r3, {0x0, 0x4}, {}, {0x8}}, [@filter_kind_options=@f_matchall={{0xd}, {0x4}}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r6 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000006100)=@delchain={0x24, 0x66, 0x1, 0x70bd2b, 0x25dfdbff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff3}, {}, {0xf}}}, 0x24}, 0x1, 0x0, 0x0, 0x8848}, 0x20004804) kernel console output (not intermixed with test programs): z.4.4706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1357.367410][ T30] audit: type=1400 audit(2000000036.890:27490): avc: denied { create } for pid=27677 comm="syz.4.4706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1357.511577][ T30] audit: type=1400 audit(2000000036.890:27491): avc: denied { create } for pid=27677 comm="syz.4.4706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1357.619126][ T30] audit: type=1400 audit(2000000036.890:27492): avc: denied { create } for pid=27677 comm="syz.4.4706" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1357.699694][ T30] audit: type=1400 audit(2000000036.900:27493): avc: denied { mounton } for pid=27677 comm="syz.4.4706" path="/965/file0" dev="tmpfs" ino=5137 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1359.290292][T27747] geneve2: entered promiscuous mode [ 1361.122337][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1361.128744][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1361.214608][ T30] kauditd_printk_skb: 176 callbacks suppressed [ 1361.214625][ T30] audit: type=1400 audit(2000000041.570:27670): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1361.317670][ T30] audit: type=1400 audit(2000000041.610:27671): avc: denied { create } for pid=27806 comm="syz.0.4755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1361.521816][ T30] audit: type=1400 audit(2000000041.630:27672): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1361.796214][ T30] audit: type=1400 audit(2000000041.650:27673): avc: denied { allowed } for pid=27811 comm="syz.0.4758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1361.878828][T27823] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4760'. [ 1361.916808][ T30] audit: type=1400 audit(2000000041.660:27674): avc: denied { create } for pid=27809 comm="syz.3.4757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 1362.066719][ T30] audit: type=1400 audit(2000000041.670:27675): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1362.259225][ T30] audit: type=1400 audit(2000000041.740:27676): avc: denied { create } for pid=27807 comm="syz.4.4756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1362.409381][T27828] batadv2: entered promiscuous mode [ 1362.631637][ T30] audit: type=1400 audit(2000000041.740:27677): avc: denied { prog_load } for pid=27807 comm="syz.4.4756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1362.816862][ T30] audit: type=1400 audit(2000000041.780:27678): avc: denied { read } for pid=27807 comm="syz.4.4756" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1362.869954][ T30] audit: type=1400 audit(2000000041.780:27679): avc: denied { create } for pid=27807 comm="syz.4.4756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1365.163197][T27899] batadv0: entered promiscuous mode [ 1366.228109][ T30] kauditd_printk_skb: 136 callbacks suppressed [ 1366.228125][ T30] audit: type=1400 audit(2000000046.580:27816): avc: denied { create } for pid=27935 comm="syz.3.4799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 1366.304828][ T30] audit: type=1400 audit(2000000046.610:27817): avc: denied { read } for pid=27934 comm="syz.2.4798" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1366.423107][ T30] audit: type=1400 audit(2000000046.610:27818): avc: denied { read write } for pid=27934 comm="syz.2.4798" name="sg0" dev="devtmpfs" ino=758 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 1366.478751][ T30] audit: type=1400 audit(2000000046.610:27819): avc: denied { map_create } for pid=27934 comm="syz.2.4798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1366.549286][ T30] audit: type=1400 audit(2000000046.610:27820): avc: denied { create } for pid=27934 comm="syz.2.4798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1366.734668][ T30] audit: type=1400 audit(2000000046.610:27821): avc: denied { create } for pid=27934 comm="syz.2.4798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1366.943395][ T30] audit: type=1400 audit(2000000046.610:27822): avc: denied { create } for pid=27934 comm="syz.2.4798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1367.002289][ T30] audit: type=1400 audit(2000000046.610:27823): avc: denied { create } for pid=27934 comm="syz.2.4798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1367.051228][ T30] audit: type=1400 audit(2000000046.650:27824): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1367.360749][ T30] audit: type=1400 audit(2000000046.650:27825): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1369.919203][T28062] batadv0: entered promiscuous mode [ 1370.510289][T28072] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4849'. [ 1371.248311][ T30] kauditd_printk_skb: 220 callbacks suppressed [ 1371.248324][ T30] audit: type=1400 audit(2000000051.500:28043): avc: denied { write } for pid=28076 comm="syz.3.4851" name="vlan0" dev="proc" ino=4026533824 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 1371.349725][ T30] audit: type=1400 audit(2000000051.680:28044): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1371.408499][ T30] audit: type=1400 audit(2000000051.690:28045): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1371.485208][ T30] audit: type=1400 audit(2000000051.820:28046): avc: denied { read write } for pid=28079 comm="syz.2.4853" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1371.559846][ T30] audit: type=1400 audit(2000000051.840:28047): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1371.592599][ T30] audit: type=1400 audit(2000000051.840:28048): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1371.618455][ T30] audit: type=1400 audit(2000000051.890:28049): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1371.660918][ T30] audit: type=1400 audit(2000000051.900:28050): avc: denied { read write } for pid=28083 comm="syz.4.4854" name="rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 1371.766422][ T30] audit: type=1400 audit(2000000052.000:28051): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1371.917320][T28093] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4856'. [ 1371.944728][T28097] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4855'. [ 1371.974872][ T30] audit: type=1400 audit(2000000052.050:28052): avc: denied { read } for pid=28089 comm="syz.4.4857" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1372.301359][T28108] batadv0: entered promiscuous mode [ 1373.369642][T28137] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4869'. [ 1375.240978][T28195] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4895'. [ 1376.272934][ T30] kauditd_printk_skb: 185 callbacks suppressed [ 1376.272945][ T30] audit: type=1400 audit(2000000056.630:28238): avc: denied { create } for pid=28221 comm="syz.1.4906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1376.383176][ T30] audit: type=1400 audit(2000000056.630:28239): avc: denied { create } for pid=28221 comm="syz.1.4906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 1376.393575][T28236] netlink: 28 bytes leftover after parsing attributes in process `syz.4.4908'. [ 1376.553564][ T30] audit: type=1400 audit(2000000056.630:28240): avc: denied { read } for pid=28221 comm="syz.1.4906" name="usbmon8" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=0 [ 1376.602915][ T30] audit: type=1400 audit(2000000056.690:28241): avc: denied { read write } for pid=28231 comm="syz.3.4910" name="vhost-vsock" dev="devtmpfs" ino=1275 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 1376.640654][ T30] audit: type=1400 audit(2000000056.710:28242): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1376.674245][ T30] audit: type=1400 audit(2000000056.730:28243): avc: denied { bpf } for pid=28221 comm="syz.1.4906" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 1376.851515][T28249] netlink: 'syz.2.4915': attribute type 3 has an invalid length. [ 1376.884595][ T30] audit: type=1400 audit(2000000056.730:28244): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1376.916113][ T30] audit: type=1400 audit(2000000056.740:28245): avc: denied { read } for pid=28228 comm="syz.4.4908" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1377.004969][ T30] audit: type=1400 audit(2000000056.780:28246): avc: denied { read open } for pid=28228 comm="syz.4.4908" path="time:[4026531834]" dev="nsfs" ino=4026531834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1377.078099][ T30] audit: type=1400 audit(2000000056.790:28247): avc: denied { module_request } for pid=28228 comm="syz.4.4908" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1379.084319][T28312] netlink: 28 bytes leftover after parsing attributes in process `syz.3.4938'. [ 1379.744926][T28334] netlink: 28 bytes leftover after parsing attributes in process `syz.0.4945'. [ 1381.204066][T28374] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4961'. [ 1381.213477][T28374] netem: invalid attributes len -17 [ 1381.218809][T28374] netem: change failed [ 1381.300580][ T30] kauditd_printk_skb: 167 callbacks suppressed [ 1381.300601][ T30] audit: type=1400 audit(2000000061.660:28415): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1381.518667][ T30] audit: type=1400 audit(2000000061.730:28416): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1381.830027][ T30] audit: type=1400 audit(2000000061.740:28417): avc: denied { create } for pid=28379 comm="syz.4.4964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1381.851139][ T30] audit: type=1400 audit(2000000061.750:28418): avc: denied { create } for pid=28379 comm="syz.4.4964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1381.881760][ T30] audit: type=1400 audit(2000000061.770:28419): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1381.971441][T28390] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4966'. [ 1382.190929][ T30] audit: type=1400 audit(2000000061.840:28420): avc: denied { create } for pid=28381 comm="syz.4.4965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=0 [ 1382.238491][ T30] audit: type=1400 audit(2000000061.860:28421): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1382.297504][ T30] audit: type=1400 audit(2000000062.170:28422): avc: denied { create } for pid=28384 comm="syz.4.4966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 1382.349582][ T30] audit: type=1400 audit(2000000062.270:28423): avc: denied { allowed } for pid=28377 comm="syz.1.4963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1382.389630][ T30] audit: type=1400 audit(2000000062.270:28424): avc: denied { create } for pid=28377 comm="syz.1.4963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1383.153540][T28425] batadv2: entered promiscuous mode [ 1384.306704][T28464] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4993'. [ 1384.763710][T28479] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5002'. [ 1386.624161][ T30] kauditd_printk_skb: 195 callbacks suppressed [ 1386.624177][ T30] audit: type=1400 audit(2000000066.970:28620): avc: denied { create } for pid=28517 comm="syz.4.5020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1386.678501][ T30] audit: type=1400 audit(2000000066.970:28621): avc: denied { create } for pid=28517 comm="syz.4.5020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1386.721386][ T30] audit: type=1400 audit(2000000066.970:28622): avc: denied { create } for pid=28517 comm="syz.4.5020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1386.779871][ T30] audit: type=1400 audit(2000000066.970:28623): avc: denied { mounton } for pid=28517 comm="syz.4.5020" path="/1041/file0" dev="tmpfs" ino=5521 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1386.837461][ T30] audit: type=1326 audit(2000000067.060:28624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28512 comm="syz.2.5019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f2daa18f6c9 code=0x7ffc0000 [ 1386.887448][T28528] batadv3: entered promiscuous mode [ 1386.919947][ T30] audit: type=1400 audit(2000000067.060:28625): avc: denied { read write } for pid=28512 comm="syz.2.5019" name="rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 1386.978158][ T30] audit: type=1326 audit(2000000067.060:28626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28512 comm="syz.2.5019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2daa18f6c9 code=0x7ffc0000 [ 1387.074957][ T30] audit: type=1326 audit(2000000067.060:28627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28512 comm="syz.2.5019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f2daa18f6c9 code=0x7ffc0000 [ 1387.138224][ T30] audit: type=1326 audit(2000000067.060:28628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28512 comm="syz.2.5019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2daa18f6c9 code=0x7ffc0000 [ 1387.186426][ T30] audit: type=1326 audit(2000000067.060:28629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28512 comm="syz.2.5019" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f2daa18f6c9 code=0x7ffc0000 [ 1388.814306][T28589] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5036'. [ 1390.753980][T28630] batadv0: entered promiscuous mode [ 1391.655577][ T30] kauditd_printk_skb: 144 callbacks suppressed [ 1391.655593][ T30] audit: type=1400 audit(2000000072.010:28774): avc: denied { create } for pid=28652 comm="syz.2.5062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1391.742063][ T30] audit: type=1400 audit(2000000072.010:28775): avc: denied { create } for pid=28652 comm="syz.2.5062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1391.789344][ T30] audit: type=1400 audit(2000000072.010:28776): avc: denied { create } for pid=28652 comm="syz.2.5062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1391.852888][ T30] audit: type=1400 audit(2000000072.070:28777): avc: denied { read write } for pid=28646 comm="syz.3.5060" name="rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=0 [ 1391.881224][ T30] audit: type=1400 audit(2000000072.130:28778): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1392.024352][ T30] audit: type=1400 audit(2000000072.140:28779): avc: denied { map_create } for pid=28659 comm="syz.0.5063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1392.085429][ T30] audit: type=1400 audit(2000000072.170:28780): avc: denied { prog_load } for pid=28659 comm="syz.0.5063" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1392.158319][ T30] audit: type=1400 audit(2000000072.180:28781): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1392.210538][ T30] audit: type=1400 audit(2000000072.340:28782): avc: denied { create } for pid=28661 comm="syz.0.5064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1392.248554][ T30] audit: type=1400 audit(2000000072.340:28783): avc: denied { create } for pid=28661 comm="syz.0.5064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1394.274585][T28722] netlink: 28 bytes leftover after parsing attributes in process `syz.3.5085'. [ 1395.103008][T28741] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5091'. [ 1396.768048][T28781] netlink: 28 bytes leftover after parsing attributes in process `syz.2.5105'. [ 1396.873285][ T30] kauditd_printk_skb: 113 callbacks suppressed [ 1396.873301][ T30] audit: type=1400 audit(2000000077.120:28897): avc: denied { read } for pid=28778 comm="syz.2.5105" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1397.020362][ T30] audit: type=1400 audit(2000000077.130:28898): avc: denied { read open } for pid=28778 comm="syz.2.5105" path="time:[4026531834]" dev="nsfs" ino=4026531834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1397.046782][ T30] audit: type=1400 audit(2000000077.130:28899): avc: denied { module_request } for pid=28778 comm="syz.2.5105" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1397.070234][ T30] audit: type=1400 audit(2000000077.140:28900): avc: denied { sys_module } for pid=28778 comm="syz.2.5105" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1397.134142][ T30] audit: type=1400 audit(2000000077.270:28901): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1397.170093][ T30] audit: type=1400 audit(2000000077.290:28902): avc: denied { create } for pid=28783 comm="syz.4.5106" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 1397.250826][ T30] audit: type=1400 audit(2000000077.310:28903): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1397.309907][ T30] audit: type=1400 audit(2000000077.330:28904): avc: denied { create } for pid=28785 comm="syz.4.5107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1397.377163][ T30] audit: type=1400 audit(2000000077.350:28905): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1397.412592][ T30] audit: type=1400 audit(2000000077.360:28906): avc: denied { prog_load } for pid=28787 comm="syz.4.5108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1397.570397][T28807] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5114'. [ 1397.583329][T28807] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1397.651997][T28807] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1398.357379][T28822] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5121'. [ 1398.908486][T28829] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5122'. [ 1400.463901][T28871] batadv0: entered promiscuous mode [ 1401.892620][ T30] kauditd_printk_skb: 216 callbacks suppressed [ 1401.892636][ T30] audit: type=1400 audit(2000000082.250:29123): avc: denied { map_create } for pid=28935 comm="syz.4.5167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1401.967776][ T30] audit: type=1400 audit(2000000082.280:29124): avc: denied { create } for pid=28935 comm="syz.4.5167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1401.985102][T28943] batadv0: entered promiscuous mode [ 1402.024128][ T30] audit: type=1400 audit(2000000082.300:29125): avc: denied { create } for pid=28934 comm="syz.0.5166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1402.069276][ T30] audit: type=1400 audit(2000000082.300:29126): avc: denied { prog_load } for pid=28934 comm="syz.0.5166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1402.139007][ T30] audit: type=1400 audit(2000000082.310:29127): avc: denied { read } for pid=28934 comm="syz.0.5166" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1402.423535][T28950] batadv3: entered promiscuous mode [ 1402.435110][ T30] audit: type=1400 audit(2000000082.310:29128): avc: denied { create } for pid=28934 comm="syz.0.5166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1402.492254][ T30] audit: type=1400 audit(2000000082.310:29129): avc: denied { map_create } for pid=28934 comm="syz.0.5166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1402.584083][ T30] audit: type=1400 audit(2000000082.630:29130): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1402.729493][ T30] audit: type=1400 audit(2000000082.670:29131): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1403.076013][ T30] audit: type=1400 audit(2000000082.680:29132): avc: denied { mounton } for pid=28945 comm="syz.1.5168" path="/1072" dev="tmpfs" ino=5704 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1403.755427][T28982] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5181'. [ 1403.927647][T28988] netlink: 27 bytes leftover after parsing attributes in process `syz.3.5184'. [ 1405.405944][T29016] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5190'. [ 1406.913469][ T30] kauditd_printk_skb: 213 callbacks suppressed [ 1406.913485][ T30] audit: type=1400 audit(2000000087.270:29346): avc: denied { create } for pid=29062 comm="syz.2.5214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 1406.956475][ T30] audit: type=1400 audit(2000000087.270:29347): avc: denied { create } for pid=29062 comm="syz.2.5214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1407.017069][ T30] audit: type=1400 audit(2000000087.300:29348): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1407.214333][ T30] audit: type=1400 audit(2000000087.340:29349): avc: denied { create } for pid=29066 comm="syz.4.5215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1407.276221][ T30] audit: type=1400 audit(2000000087.360:29350): avc: denied { create } for pid=29056 comm="syz.0.5212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1407.358484][ T30] audit: type=1400 audit(2000000087.360:29351): avc: denied { create } for pid=29056 comm="syz.0.5212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1407.403427][ T30] audit: type=1400 audit(2000000087.360:29352): avc: denied { create } for pid=29056 comm="syz.0.5212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1407.464868][ T30] audit: type=1400 audit(2000000087.410:29353): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1407.613716][ T30] audit: type=1400 audit(2000000087.420:29354): avc: denied { read } for pid=29072 comm="syz.4.5216" name="usbmon0" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=0 [ 1407.784988][ T30] audit: type=1400 audit(2000000087.420:29355): avc: denied { create } for pid=29057 comm="syz.3.5211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1410.487624][T29153] batadv0: entered promiscuous mode [ 1410.516538][T29144] cgroup: fork rejected by pids controller in /syz4 [ 1411.074234][T29277] netlink: 28 bytes leftover after parsing attributes in process `syz.2.5246'. [ 1411.835842][T29297] batadv3: entered promiscuous mode [ 1412.009134][ T30] kauditd_printk_skb: 157 callbacks suppressed [ 1412.009144][ T30] audit: type=1400 audit(2000000092.360:29513): avc: denied { read } for pid=29301 comm="syz.4.5260" dev="nsfs" ino=4026532801 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1412.052315][ T30] audit: type=1400 audit(2000000092.410:29514): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1412.232461][ T30] audit: type=1400 audit(2000000092.560:29515): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1412.371049][ T30] audit: type=1400 audit(2000000092.620:29516): avc: denied { map_create } for pid=29303 comm="syz.4.5261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1412.534001][ T30] audit: type=1400 audit(2000000092.620:29517): avc: denied { prog_load } for pid=29303 comm="syz.4.5261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1412.719255][ T30] audit: type=1400 audit(2000000092.620:29518): avc: denied { read write } for pid=29306 comm="syz.3.5262" name="sg0" dev="devtmpfs" ino=758 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 1412.824189][ T30] audit: type=1400 audit(2000000092.630:29519): avc: denied { map_create } for pid=29303 comm="syz.4.5261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1412.874498][ T30] audit: type=1400 audit(2000000092.640:29520): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1412.946550][ T30] audit: type=1400 audit(2000000092.680:29521): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1413.178657][ T30] audit: type=1400 audit(2000000092.700:29522): avc: denied { create } for pid=29308 comm="syz.1.5263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1413.251088][T29337] batadv3: entered promiscuous mode [ 1414.354569][T29374] batadv3: entered promiscuous mode [ 1415.524457][T29417] netlink: 28 bytes leftover after parsing attributes in process `syz.3.5303'. [ 1416.651211][T29438] batadv3: entered promiscuous mode [ 1416.754324][T29437] lo speed is unknown, defaulting to 1000 [ 1416.760962][T29437] lo speed is unknown, defaulting to 1000 [ 1417.015432][ T30] kauditd_printk_skb: 146 callbacks suppressed [ 1417.015443][ T30] audit: type=1400 audit(2000000097.370:29669): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1417.289835][ T30] audit: type=1400 audit(2000000097.580:29670): avc: denied { execmem } for pid=29446 comm="syz.2.5314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1417.314637][ T30] audit: type=1400 audit(2000000097.630:29671): avc: denied { map_create } for pid=29446 comm="syz.2.5314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1417.354961][ T30] audit: type=1400 audit(2000000097.630:29672): avc: denied { prog_load } for pid=29446 comm="syz.2.5314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1417.412521][ T30] audit: type=1400 audit(2000000097.630:29673): avc: denied { read } for pid=29446 comm="syz.2.5314" dev="nsfs" ino=4026532954 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1417.437348][ T30] audit: type=1400 audit(2000000097.630:29674): avc: denied { prog_load } for pid=29446 comm="syz.2.5314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1417.457699][ T30] audit: type=1400 audit(2000000097.630:29675): avc: denied { write } for pid=29446 comm="syz.2.5314" name="vlan0" dev="proc" ino=4026533792 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=0 [ 1417.481306][T29454] bridge0: entered allmulticast mode [ 1417.514563][T29454] bond1: (slave bridge0): Releasing active interface [ 1417.855092][ T30] audit: type=1400 audit(2000000097.670:29676): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1417.917530][T29465] audit: audit_backlog=65 > audit_backlog_limit=64 [ 1417.925189][T29465] audit: audit_lost=14 audit_rate_limit=0 audit_backlog_limit=64 [ 1418.038206][T29467] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5319'. [ 1418.049332][T29467] batman_adv: batadv0: Interface deactivated: gretap2 [ 1418.056200][T29467] batman_adv: batadv0: Removing interface: gretap2 [ 1418.235338][T29467] batman_adv: batadv0: Interface deactivated: gretap0 [ 1418.243261][T29467] batman_adv: batadv0: Removing interface: gretap0 [ 1418.254155][T29467] batman_adv: batadv0: Interface deactivated: team0 [ 1418.261151][T29467] batman_adv: batadv0: Removing interface: team0 [ 1419.457553][T29480] cgroup: fork rejected by pids controller in /syz0 [ 1419.621044][T29593] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5328'. [ 1419.940344][T29598] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5329'. [ 1420.182567][T29600] batadv0: entered promiscuous mode [ 1421.726529][T29634] sctp: [Deprecated]: syz.3.5342 (pid 29634) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1421.726529][T29634] Use struct sctp_sack_info instead [ 1422.138791][ T30] kauditd_printk_skb: 182 callbacks suppressed [ 1422.138804][ T30] audit: type=1400 audit(2000000102.490:29846): avc: denied { create } for pid=29637 comm="syz.3.5344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1422.251018][ T30] audit: type=1326 audit(2000000102.490:29847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29637 comm="syz.3.5344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd73b18f6c9 code=0x7ffc0000 [ 1422.366082][ T30] audit: type=1326 audit(2000000102.490:29848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29637 comm="syz.3.5344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd73b18f6c9 code=0x7ffc0000 [ 1422.488674][ T30] audit: type=1326 audit(2000000102.530:29849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29637 comm="syz.3.5344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7fd73b18f6c9 code=0x7ffc0000 [ 1422.513874][ T30] audit: type=1326 audit(2000000102.530:29850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29637 comm="syz.3.5344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd73b18f6c9 code=0x7ffc0000 [ 1422.542300][ T30] audit: type=1326 audit(2000000102.530:29851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29637 comm="syz.3.5344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd73b18f6c9 code=0x7ffc0000 [ 1422.567100][ T30] audit: type=1326 audit(2000000102.530:29852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29637 comm="syz.3.5344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd73b18f6c9 code=0x7ffc0000 [ 1422.591268][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1422.598019][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1422.607414][ T30] audit: type=1400 audit(2000000102.530:29853): avc: denied { create } for pid=29637 comm="syz.3.5344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1422.639997][ T30] audit: type=1326 audit(2000000102.530:29854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29637 comm="syz.3.5344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd73b18f6c9 code=0x7ffc0000 [ 1422.674031][ T30] audit: type=1326 audit(2000000102.530:29855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29637 comm="syz.3.5344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd73b18f6c9 code=0x7ffc0000 [ 1422.859044][T29761] batadv0: entered promiscuous mode [ 1422.962678][T29764] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5349'. [ 1423.361783][T29774] batadv0: entered promiscuous mode [ 1425.419087][T30150] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5374'. [ 1427.002517][T30391] netlink: 'syz.3.5395': attribute type 5 has an invalid length. [ 1427.157679][ T30] kauditd_printk_skb: 339 callbacks suppressed [ 1427.157693][ T30] audit: type=1400 audit(2000000107.510:30195): avc: denied { read write } for pid=30394 comm="syz.3.5397" name="cachefiles" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cachefiles_device_t tclass=chr_file permissive=0 [ 1427.214899][ T30] audit: type=1400 audit(2000000107.570:30196): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1427.294999][ T30] audit: type=1400 audit(2000000107.630:30197): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1427.324541][ T30] audit: type=1400 audit(2000000107.640:30198): avc: denied { create } for pid=30396 comm="syz.3.5398" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1427.357351][ T30] audit: type=1400 audit(2000000107.640:30199): avc: denied { read } for pid=30396 comm="syz.3.5398" dev="nsfs" ino=4026533052 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1427.392682][ T30] audit: type=1400 audit(2000000107.640:30200): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1427.419943][ T30] audit: type=1400 audit(2000000107.680:30201): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1427.494985][ T30] audit: type=1400 audit(2000000107.740:30202): avc: denied { map_create } for pid=30400 comm="syz.0.5399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1427.632218][ T30] audit: type=1400 audit(2000000107.740:30203): avc: denied { prog_load } for pid=30400 comm="syz.0.5399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1427.767209][ T30] audit: type=1400 audit(2000000107.800:30204): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1429.988905][T30679] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5429'. [ 1430.447095][T30795] batadv0: entered promiscuous mode [ 1432.194451][ T30] kauditd_printk_skb: 261 callbacks suppressed [ 1432.194462][ T30] audit: type=1400 audit(2000000112.550:30466): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1432.304683][ T30] audit: type=1400 audit(2000000112.590:30467): avc: denied { read } for pid=30936 comm="syz.1.5449" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1432.382216][ T30] audit: type=1400 audit(2000000112.590:30468): avc: denied { read write } for pid=30936 comm="syz.1.5449" name="sg0" dev="devtmpfs" ino=758 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 1432.452997][ T30] audit: type=1400 audit(2000000112.590:30469): avc: denied { map_create } for pid=30936 comm="syz.1.5449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1432.517958][ T30] audit: type=1400 audit(2000000112.590:30470): avc: denied { create } for pid=30936 comm="syz.1.5449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1432.701829][ T30] audit: type=1400 audit(2000000112.590:30471): avc: denied { create } for pid=30936 comm="syz.1.5449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1432.773688][ T30] audit: type=1400 audit(2000000112.590:30472): avc: denied { create } for pid=30936 comm="syz.1.5449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1432.815822][ T30] audit: type=1400 audit(2000000112.590:30473): avc: denied { create } for pid=30936 comm="syz.1.5449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1432.886406][ T30] audit: type=1400 audit(2000000112.600:30474): avc: denied { create } for pid=30930 comm="syz.3.5446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1432.908733][ T30] audit: type=1400 audit(2000000112.600:30475): avc: denied { create } for pid=30930 comm="syz.3.5446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1434.461427][T31122] batadv0: entered promiscuous mode [ 1435.124416][T31145] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5489'. [ 1437.201998][ T30] kauditd_printk_skb: 315 callbacks suppressed [ 1437.202009][ T30] audit: type=1400 audit(2000000117.560:30791): avc: denied { prog_load } for pid=31511 comm="syz.0.5517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1437.264798][ T30] audit: type=1400 audit(2000000117.590:30792): avc: denied { create } for pid=31511 comm="syz.0.5517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1437.290378][ T30] audit: type=1400 audit(2000000117.600:30793): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1437.325100][ T30] audit: type=1400 audit(2000000117.680:30794): avc: denied { create } for pid=31507 comm="syz.4.5515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1437.411361][ T30] audit: type=1400 audit(2000000117.680:30795): avc: denied { create } for pid=31507 comm="syz.4.5515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1437.457852][ T30] audit: type=1400 audit(2000000117.680:30796): avc: denied { create } for pid=31507 comm="syz.4.5515" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1437.487901][ T30] audit: type=1400 audit(2000000117.790:30797): avc: denied { create } for pid=31514 comm="syz.0.5518" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1437.526294][ T30] audit: type=1326 audit(2000000117.790:30798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31514 comm="syz.0.5518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2f3d78f6c9 code=0x7ffc0000 [ 1437.637640][ T30] audit: type=1326 audit(2000000117.790:30799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31514 comm="syz.0.5518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7f2f3d78f6c9 code=0x7ffc0000 [ 1437.716948][ T30] audit: type=1326 audit(2000000117.790:30800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31514 comm="syz.0.5518" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2f3d78f6c9 code=0x7ffc0000 [ 1437.972037][T31629] batadv0: entered promiscuous mode [ 1438.203217][T31552] cgroup: fork rejected by pids controller in /syz3 [ 1438.324584][T31630] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5520'. [ 1438.625003][T31759] netlink: 28 bytes leftover after parsing attributes in process `syz.2.5532'. [ 1440.397104][T31996] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5547'. [ 1441.112197][T32019] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5554'. [ 1441.552365][T32027] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5559'. [ 1442.291130][T32143] netlink: 28 bytes leftover after parsing attributes in process `syz.3.5565'. [ 1442.321134][ T30] kauditd_printk_skb: 252 callbacks suppressed [ 1442.321156][ T30] audit: type=1400 audit(2000000122.640:31053): avc: denied { read } for pid=32040 comm="syz.3.5565" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1442.439131][ T30] audit: type=1400 audit(2000000122.660:31054): avc: denied { read open } for pid=32040 comm="syz.3.5565" path="time:[4026531834]" dev="nsfs" ino=4026531834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1442.592217][ T30] audit: type=1400 audit(2000000122.670:31055): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1442.656987][ T30] audit: type=1400 audit(2000000122.950:31056): avc: denied { create } for pid=32144 comm="syz.2.5566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1442.686132][ T30] audit: type=1400 audit(2000000123.010:31057): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1442.754763][ T30] audit: type=1400 audit(2000000123.080:31058): avc: denied { prog_load } for pid=32147 comm="syz.2.5567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1442.780548][ T30] audit: type=1400 audit(2000000123.090:31059): avc: denied { create } for pid=32147 comm="syz.2.5567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 1442.802312][ T30] audit: type=1400 audit(2000000123.110:31060): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1442.828438][ T30] audit: type=1400 audit(2000000123.160:31061): avc: denied { read } for pid=32149 comm="syz.2.5568" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1442.877386][ T30] audit: type=1400 audit(2000000123.230:31062): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1443.080793][T32157] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5571'. [ 1444.265714][T32178] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5576'. [ 1445.332894][T32207] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5590'. [ 1445.894287][T32232] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5600'. [ 1446.096533][T32236] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5602'. [ 1446.457762][T32261] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5612'. [ 1446.811358][T32280] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5618'. [ 1447.571877][T32290] netlink: 28 bytes leftover after parsing attributes in process `syz.3.5625'. [ 1447.581244][ T30] kauditd_printk_skb: 170 callbacks suppressed [ 1447.581259][ T30] audit: type=1400 audit(2000000127.920:31233): avc: denied { read } for pid=32285 comm="syz.3.5625" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1447.801950][ T30] audit: type=1400 audit(2000000127.970:31234): avc: denied { read open } for pid=32285 comm="syz.3.5625" path="time:[4026531834]" dev="nsfs" ino=4026531834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1447.900446][ T30] audit: type=1400 audit(2000000127.980:31235): avc: denied { prog_load } for pid=32291 comm="syz.2.5627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1447.970642][ T30] audit: type=1400 audit(2000000128.020:31236): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1448.040820][ T30] audit: type=1400 audit(2000000128.130:31237): avc: denied { read write } for pid=32293 comm="syz.2.5628" name="video2" dev="devtmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 1448.165955][ T30] audit: type=1400 audit(2000000128.140:31238): avc: denied { mounton } for pid=32293 comm="syz.2.5628" path="/1124" dev="tmpfs" ino=5906 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1448.269260][ T30] audit: type=1400 audit(2000000128.150:31239): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1448.386885][ T30] audit: type=1400 audit(2000000128.440:31240): avc: denied { read } for pid=32295 comm="syz.2.5629" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1448.412884][ T30] audit: type=1400 audit(2000000128.470:31241): avc: denied { read write } for pid=32295 comm="syz.2.5629" name="sg0" dev="devtmpfs" ino=758 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=0 [ 1448.442081][ T30] audit: type=1400 audit(2000000128.470:31242): avc: denied { map_create } for pid=32295 comm="syz.2.5629" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1449.477547][T32333] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5645'. [ 1449.824790][T32340] netlink: 52 bytes leftover after parsing attributes in process `syz.0.5649'. [ 1450.626295][T32365] batadv0: entered promiscuous mode [ 1452.473261][T32624] tap0: tun_chr_ioctl cmd 1074025675 [ 1452.479009][T32624] tap0: persist disabled [ 1452.595062][ T30] kauditd_printk_skb: 164 callbacks suppressed [ 1452.595077][ T30] audit: type=1400 audit(2000000132.950:31407): avc: denied { read write } for pid=32631 comm="syz.4.5683" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 1452.625887][ T30] audit: type=1400 audit(2000000132.950:31408): avc: denied { mounton } for pid=32631 comm="syz.4.5683" path="/1193/file0" dev="tmpfs" ino=6299 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1452.649327][ T30] audit: type=1400 audit(2000000132.960:31409): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1452.680893][ T30] audit: type=1400 audit(2000000133.040:31410): avc: denied { create } for pid=32632 comm="syz.3.5682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1452.707539][ T30] audit: type=1400 audit(2000000133.060:31411): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1452.765638][ T30] audit: type=1400 audit(2000000133.100:31412): avc: denied { prog_load } for pid=32634 comm="syz.4.5684" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1452.791617][ T30] audit: type=1400 audit(2000000133.110:31413): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1452.857661][ T30] audit: type=1400 audit(2000000133.150:31414): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1452.883028][ T30] audit: type=1400 audit(2000000133.160:31415): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1452.937275][ T30] audit: type=1400 audit(2000000133.220:31416): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1452.966248][T32649] netlink: 28 bytes leftover after parsing attributes in process `syz.3.5685'. [ 1453.415032][T32663] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5694'. [ 1453.705369][T32678] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5701'. [ 1457.640542][ T30] kauditd_printk_skb: 232 callbacks suppressed [ 1457.640552][ T30] audit: type=1400 audit(2000000138.000:31649): avc: denied { create } for pid=732 comm="syz.1.5754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 1457.671260][ T30] audit: type=1400 audit(2000000138.030:31650): avc: denied { read } for pid=732 comm="syz.1.5754" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1457.696970][ T742] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5754'. [ 1457.775453][ T30] audit: type=1400 audit(2000000138.050:31651): avc: denied { create } for pid=732 comm="syz.1.5754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 1457.830866][ T30] audit: type=1400 audit(2000000138.070:31652): avc: denied { prog_load } for pid=732 comm="syz.1.5754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1457.889856][ T30] audit: type=1400 audit(2000000138.070:31653): avc: denied { create } for pid=732 comm="syz.1.5754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1457.910514][ T30] audit: type=1400 audit(2000000138.100:31654): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1457.937406][ T30] audit: type=1400 audit(2000000138.160:31655): avc: denied { create } for pid=743 comm="syz.0.5758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1458.090865][ T30] audit: type=1400 audit(2000000138.450:31656): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1458.145322][ T30] audit: type=1400 audit(2000000138.490:31657): avc: denied { read write } for pid=746 comm="syz.4.5759" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1458.194319][ T30] audit: type=1400 audit(2000000138.500:31658): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1458.756851][ T864] netlink: 28 bytes leftover after parsing attributes in process `syz.2.5762'. [ 1459.357936][ T989] batadv0: entered promiscuous mode [ 1460.010593][ T1008] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5772'. [ 1460.995912][ T1243] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5778'. [ 1462.393722][ T1380] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5789'. [ 1462.658163][ T30] kauditd_printk_skb: 106 callbacks suppressed [ 1462.658177][ T30] audit: type=1400 audit(2000000143.010:31765): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1462.717812][ T30] audit: type=1400 audit(2000000143.070:31766): avc: denied { create } for pid=1393 comm="syz.3.5798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1462.756856][ T30] audit: type=1400 audit(2000000143.070:31767): avc: denied { name_bind } for pid=1394 comm="syz.0.5797" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 1462.823543][ T30] audit: type=1400 audit(2000000143.110:31768): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1462.868268][ T30] audit: type=1400 audit(2000000143.130:31769): avc: denied { create } for pid=1397 comm="syz.4.5799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1462.895526][ T30] audit: type=1400 audit(2000000143.140:31770): avc: denied { prog_load } for pid=1399 comm="syz.3.5800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1462.991018][ T30] audit: type=1400 audit(2000000143.160:31771): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1463.053486][ T30] audit: type=1400 audit(2000000143.290:31772): avc: denied { create } for pid=1402 comm="syz.3.5801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1463.149597][ T30] audit: type=1326 audit(2000000143.290:31773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1402 comm="syz.3.5801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd73b18f6c9 code=0x7ffc0000 [ 1463.206778][ T30] audit: type=1326 audit(2000000143.290:31774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1402 comm="syz.3.5801" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd73b18f6c9 code=0x7ffc0000 [ 1463.932360][ T1442] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5816'. [ 1464.217328][ T1444] batadv0: entered promiscuous mode [ 1465.055677][ T1581] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5827'. [ 1465.410606][ T1595] batadv0: entered promiscuous mode [ 1466.416667][ T1621] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5842'. [ 1467.111559][ T1734] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5850'. [ 1467.258315][ T1737] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5851'. [ 1468.072682][ T30] kauditd_printk_skb: 226 callbacks suppressed [ 1468.072693][ T30] audit: type=1400 audit(2000000148.430:32001): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1468.287179][ T30] audit: type=1400 audit(2000000148.640:32002): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1468.402417][ T30] audit: type=1400 audit(2000000148.710:32003): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1468.786620][ T30] audit: type=1400 audit(2000000148.790:32004): avc: denied { read } for pid=1849 comm="syz.2.5854" name="cec2" dev="devtmpfs" ino=961 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1468.901286][ T30] audit: type=1400 audit(2000000148.800:32005): avc: denied { read } for pid=1849 comm="syz.2.5854" name="cec2" dev="devtmpfs" ino=961 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1468.958515][ T30] audit: type=1400 audit(2000000148.850:32006): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1469.006206][ T30] audit: type=1400 audit(2000000148.910:32007): avc: denied { name_bind } for pid=1851 comm="syz.0.5855" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 1469.034103][ T30] audit: type=1400 audit(2000000149.170:32008): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1469.062196][ T30] audit: type=1400 audit(2000000149.200:32009): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1469.106144][ T30] audit: type=1400 audit(2000000149.200:32010): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1469.886679][ T2235] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5863'. [ 1470.840487][ T2414] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5870'. [ 1470.883081][ T2406] cgroup: fork rejected by pids controller in /syz2 [ 1471.649801][ T2583] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5881'. [ 1471.822416][ T2592] netlink: 'syz.0.5886': attribute type 21 has an invalid length. [ 1471.838049][ T2592] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5886'. [ 1471.851872][ T2592] netlink: 'syz.0.5886': attribute type 21 has an invalid length. [ 1471.873152][ T2592] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5886'. [ 1473.193123][ T30] kauditd_printk_skb: 128 callbacks suppressed [ 1473.193154][ T30] audit: type=1400 audit(2000000153.550:32139): avc: denied { create } for pid=2770 comm="syz.1.5904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1473.221368][ T30] audit: type=1400 audit(2000000153.580:32140): avc: denied { create } for pid=2770 comm="syz.1.5904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1473.251068][ T30] audit: type=1400 audit(2000000153.600:32141): avc: denied { create } for pid=2770 comm="syz.1.5904" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1473.282942][ T30] audit: type=1400 audit(2000000153.640:32142): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1473.331606][ T30] audit: type=1400 audit(2000000153.680:32143): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1473.373629][ T30] audit: type=1400 audit(2000000153.730:32144): avc: denied { map_create } for pid=2777 comm="syz.0.5905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1473.397074][ T30] audit: type=1400 audit(2000000153.730:32145): avc: denied { prog_load } for pid=2777 comm="syz.0.5905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1473.417175][ T30] audit: type=1400 audit(2000000153.730:32146): avc: denied { prog_load } for pid=2777 comm="syz.0.5905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1473.441615][ T30] audit: type=1400 audit(2000000153.730:32147): avc: denied { create } for pid=2777 comm="syz.0.5905" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 1473.462238][ T30] audit: type=1400 audit(2000000153.800:32148): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1473.885510][ T2787] netlink: 'syz.2.5909': attribute type 1 has an invalid length. [ 1473.894749][ T2787] netlink: 'syz.2.5909': attribute type 2 has an invalid length. [ 1477.548201][ T3533] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3533 comm=syz.2.5951 [ 1477.584262][ T3533] netlink: 'syz.2.5951': attribute type 1 has an invalid length. [ 1477.696480][ T3533] bond9: (slave bridge7): making interface the new active one [ 1477.696938][ T3533] bond9: (slave bridge7): Enslaving as an active interface with an up link [ 1478.210578][ T30] kauditd_printk_skb: 213 callbacks suppressed [ 1478.210590][ T30] audit: type=1400 audit(2000000158.570:32362): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1478.223016][ T30] audit: type=1400 audit(2000000158.580:32363): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1478.236618][ T3654] GUP no longer grows the stack in syz.1.5959 (3654): 200000011000-200000018000 (20000000e000) [ 1478.293513][ T30] audit: type=1400 audit(2000000158.650:32364): avc: denied { create } for pid=3651 comm="syz.0.5958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1478.293555][ T30] audit: type=1400 audit(2000000158.650:32365): avc: denied { create } for pid=3651 comm="syz.0.5958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1478.293586][ T30] audit: type=1400 audit(2000000158.650:32366): avc: denied { create } for pid=3651 comm="syz.0.5958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1478.295660][ T30] audit: type=1400 audit(2000000158.650:32367): avc: denied { read } for pid=3655 comm="syz.2.5960" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1478.378091][ T3654] CPU: 0 UID: 0 PID: 3654 Comm: syz.1.5959 Not tainted syzkaller #0 PREEMPT(full) [ 1478.378105][ T3654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1478.378111][ T3654] Call Trace: [ 1478.378115][ T3654] [ 1478.378119][ T3654] dump_stack_lvl+0x16c/0x1f0 [ 1478.378142][ T3654] gup_vma_lookup+0x1d2/0x220 [ 1478.378156][ T3654] __get_user_pages+0x241/0x3530 [ 1478.378173][ T3654] ? find_held_lock+0x2b/0x80 [ 1478.378187][ T3654] ? __pfx___get_user_pages+0x10/0x10 [ 1478.378203][ T3654] get_user_pages_remote+0x243/0xab0 [ 1478.378215][ T3654] ? mast_spanning_rebalance.isra.0+0x2060/0x2060 [ 1478.378235][ T3654] ? __pfx_get_user_pages_remote+0x10/0x10 [ 1478.378249][ T3654] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 1478.378267][ T3654] __access_remote_vm+0x250/0xaa0 [ 1478.378281][ T3654] ? do_raw_spin_lock+0x12c/0x2b0 [ 1478.378292][ T3654] ? __pfx___access_remote_vm+0x10/0x10 [ 1478.378307][ T3654] proc_pid_cmdline_read+0x4de/0x8e0 [ 1478.378322][ T3654] ? __pfx_proc_pid_cmdline_read+0x10/0x10 [ 1478.378335][ T3654] ? rw_verify_area+0xcf/0x6c0 [ 1478.378352][ T3654] ? __pfx_proc_pid_cmdline_read+0x10/0x10 [ 1478.378363][ T3654] vfs_readv+0x5c1/0x8b0 [ 1478.378381][ T3654] ? __pfx_vfs_readv+0x10/0x10 [ 1478.378407][ T3654] ? __fget_files+0x20e/0x3c0 [ 1478.378421][ T3654] ? do_preadv+0x1a6/0x270 [ 1478.378436][ T3654] do_preadv+0x1a6/0x270 [ 1478.378451][ T3654] ? __pfx_do_preadv+0x10/0x10 [ 1478.378471][ T3654] do_syscall_64+0xcd/0xfa0 [ 1478.378481][ T3654] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1478.378492][ T3654] RIP: 0033:0x7fe52778f6c9 [ 1478.378501][ T3654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1478.378511][ T3654] RSP: 002b:00007fe5285ed038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 1478.378521][ T3654] RAX: ffffffffffffffda RBX: 00007fe5279e5fa0 RCX: 00007fe52778f6c9 [ 1478.378528][ T3654] RDX: 0000000000000001 RSI: 0000200000001200 RDI: 0000000000000003 [ 1478.378534][ T3654] RBP: 00007fe527811f91 R08: 0000000000006a76 R09: 0000000000000000 [ 1478.378540][ T3654] R10: 0000000000000009 R11: 0000000000000246 R12: 0000000000000000 [ 1478.378546][ T3654] R13: 00007fe5279e6038 R14: 00007fe5279e5fa0 R15: 00007ffed6d08748 [ 1478.378560][ T3654] [ 1478.494217][ T30] audit: type=1400 audit(2000000158.730:32368): avc: denied { create } for pid=3651 comm="syz.0.5958" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1478.494260][ T30] audit: type=1400 audit(2000000158.730:32369): avc: denied { mounton } for pid=3651 comm="syz.0.5958" path="/1141/file0" dev="tmpfs" ino=6049 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1478.494298][ T30] audit: type=1400 audit(2000000158.810:32370): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1478.494338][ T30] audit: type=1400 audit(2000000158.820:32371): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1480.547353][ T3934] netlink: 24 bytes leftover after parsing attributes in process `syz.3.5990'. [ 1481.581342][ T4062] syz.3.6003 (4062): drop_caches: 2 [ 1481.847466][ T4176] netlink: 'syz.2.6009': attribute type 1 has an invalid length. [ 1481.983014][ T4182] bond10: (slave geneve4): making interface the new active one [ 1482.009958][ T4182] bond10: (slave geneve4): Enslaving as an active interface with an up link [ 1482.049499][T22111] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 20004 - 0 [ 1482.117626][T22111] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 20004 - 0 [ 1482.230293][T22111] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 20004 - 0 [ 1482.238628][T22111] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 20004 - 0 [ 1483.279954][ T30] kauditd_printk_skb: 140 callbacks suppressed [ 1483.279988][ T30] audit: type=1400 audit(2000000163.630:32512): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1483.328186][ T30] audit: type=1400 audit(2000000163.670:32513): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1483.363598][ T30] audit: type=1400 audit(2000000163.690:32514): avc: denied { read write } for pid=4319 comm="syz.0.6027" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1483.393424][ T30] audit: type=1400 audit(2000000163.720:32515): avc: denied { mounton } for pid=4318 comm="syz.4.6025" path="/1273/bus" dev="tmpfs" ino=6713 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1483.448988][ T30] audit: type=1400 audit(2000000163.800:32516): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1483.498788][ T30] audit: type=1400 audit(2000000163.850:32517): avc: denied { create } for pid=4322 comm="syz.3.6026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1483.526650][ T30] audit: type=1400 audit(2000000163.880:32518): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1483.724418][ T30] audit: type=1400 audit(2000000163.960:32519): avc: denied { create } for pid=4322 comm="syz.3.6026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=0 [ 1483.764888][ T30] audit: type=1400 audit(2000000164.030:32520): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1483.849723][ T4433] netlink: 'syz.4.6030': attribute type 4 has an invalid length. [ 1483.909900][ T30] audit: type=1400 audit(2000000164.150:32521): avc: denied { create } for pid=4432 comm="syz.4.6030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1484.003890][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1484.010251][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1488.378173][ T30] kauditd_printk_skb: 192 callbacks suppressed [ 1488.378190][ T30] audit: type=1400 audit(2000000168.720:32714): avc: denied { create } for pid=5262 comm="syz.0.6077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1488.571883][ T30] audit: type=1400 audit(2000000168.720:32715): avc: denied { create } for pid=5262 comm="syz.0.6077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1488.600843][ T30] audit: type=1400 audit(2000000168.720:32716): avc: denied { create } for pid=5262 comm="syz.0.6077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1488.623366][ T30] audit: type=1400 audit(2000000168.720:32717): avc: denied { create } for pid=5262 comm="syz.0.6077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1488.644469][ T30] audit: type=1400 audit(2000000168.720:32718): avc: denied { mounton } for pid=5262 comm="syz.0.6077" path="/1162/file0" dev="tmpfs" ino=6159 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1488.696734][ T30] audit: type=1400 audit(2000000168.780:32719): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1488.744623][ T30] audit: type=1400 audit(2000000168.840:32720): avc: denied { read } for pid=5268 comm="syz.2.6079" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1488.794267][ T30] audit: type=1400 audit(2000000168.850:32721): avc: denied { bpf } for pid=5268 comm="syz.2.6079" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 1488.838606][ T30] audit: type=1400 audit(2000000169.020:32722): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1488.903723][ T30] audit: type=1400 audit(2000000169.030:32723): avc: denied { mounton } for pid=5270 comm="syz.4.6080" path="/proc/7152" dev="proc" ino=75443 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=0 [ 1489.636468][ T5297] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6088'. [ 1492.793659][ T5937] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6125'. [ 1493.464609][ T30] kauditd_printk_skb: 137 callbacks suppressed [ 1493.464624][ T30] audit: type=1400 audit(2000000173.820:32861): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1493.667526][ T30] audit: type=1400 audit(2000000173.880:32862): avc: denied { read } for pid=6041 comm="syz.2.6127" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1493.845847][ T30] audit: type=1400 audit(2000000173.890:32863): avc: denied { read open } for pid=6041 comm="syz.2.6127" path="time:[4026531834]" dev="nsfs" ino=4026531834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1493.925403][ T30] audit: type=1400 audit(2000000173.900:32864): avc: denied { module_request } for pid=6041 comm="syz.2.6127" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1494.073033][ T30] audit: type=1400 audit(2000000173.900:32865): avc: denied { sys_module } for pid=6041 comm="syz.2.6127" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1494.167280][ T30] audit: type=1400 audit(2000000174.020:32866): avc: denied { execmem } for pid=6045 comm="syz.4.6128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1494.309054][ T30] audit: type=1400 audit(2000000174.240:32867): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1494.476544][ T30] audit: type=1400 audit(2000000174.270:32868): avc: denied { create } for pid=6048 comm="syz.4.6129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1494.590853][ T30] audit: type=1400 audit(2000000174.280:32869): avc: denied { create } for pid=6048 comm="syz.4.6129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1494.669157][ T30] audit: type=1400 audit(2000000174.310:32870): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1497.384868][ T6642] netlink: 24 bytes leftover after parsing attributes in process `syz.3.6167'. [ 1497.496341][ T6643] sch_tbf: burst 88 is lower than device veth9 mtu (1514) ! [ 1497.619215][ T6645] lo speed is unknown, defaulting to 1000 [ 1497.630996][ T6645] lo speed is unknown, defaulting to 1000 [ 1498.486852][ T30] kauditd_printk_skb: 151 callbacks suppressed [ 1498.486899][ T30] audit: type=1400 audit(2000000178.840:33021): avc: denied { create } for pid=6876 comm="syz.0.6181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1498.785269][ T30] audit: type=1400 audit(2000000178.840:33022): avc: denied { create } for pid=6876 comm="syz.0.6181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1498.809700][ T30] audit: type=1400 audit(2000000178.840:33023): avc: denied { create } for pid=6876 comm="syz.0.6181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1498.829924][ T30] audit: type=1400 audit(2000000179.030:33024): avc: denied { create } for pid=6984 comm="syz.2.6182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1498.850921][ T30] audit: type=1400 audit(2000000179.050:33025): avc: denied { map_create } for pid=6984 comm="syz.2.6182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1498.958595][ T30] audit: type=1400 audit(2000000179.050:33026): avc: denied { read } for pid=6984 comm="syz.2.6182" dev="nsfs" ino=4026532954 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1499.242130][ T30] audit: type=1400 audit(2000000179.060:33027): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1499.388289][ T30] audit: type=1400 audit(2000000179.240:33028): avc: denied { create } for pid=7063 comm="syz.2.6183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1499.430885][ T30] audit: type=1400 audit(2000000179.240:33029): avc: denied { create } for pid=7063 comm="syz.2.6183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1499.505647][ T30] audit: type=1400 audit(2000000179.250:33030): avc: denied { read write } for pid=7063 comm="syz.2.6183" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1503.517384][ T30] kauditd_printk_skb: 200 callbacks suppressed [ 1503.517398][ T30] audit: type=1400 audit(2000000183.870:33231): avc: denied { create } for pid=8256 comm="syz.0.6250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 1503.641475][ T30] audit: type=1400 audit(2000000183.870:33232): avc: denied { create } for pid=8256 comm="syz.0.6250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1503.862063][ T30] audit: type=1400 audit(2000000184.040:33233): avc: denied { map_create } for pid=8256 comm="syz.0.6250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1504.149733][ T30] audit: type=1400 audit(2000000184.040:33234): avc: denied { create } for pid=8256 comm="syz.0.6250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1504.225148][ T30] audit: type=1400 audit(2000000184.070:33235): avc: denied { bpf } for pid=8047 comm="syz.1.6249" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 1504.259192][ T30] audit: type=1400 audit(2000000184.130:33236): avc: denied { prog_load } for pid=8047 comm="syz.1.6249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1504.394094][ T30] audit: type=1400 audit(2000000184.190:33237): avc: denied { read } for pid=8047 comm="syz.1.6249" dev="nsfs" ino=4026533173 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1504.486772][ T30] audit: type=1400 audit(2000000184.240:33238): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1504.547032][ T30] audit: type=1400 audit(2000000184.270:33239): avc: denied { write } for pid=8360 comm="syz.3.6251" name="ptp0" dev="devtmpfs" ino=1265 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 1504.599498][ T30] audit: type=1400 audit(2000000184.270:33240): avc: denied { read write } for pid=8360 comm="syz.3.6251" name="uhid" dev="devtmpfs" ino=1273 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=0 [ 1506.070903][ T8891] syzkaller0: entered promiscuous mode [ 1506.076646][ T8891] syzkaller0: entered allmulticast mode [ 1506.085567][ T8891] PF_CAN: dropped non conform CAN FD skbuff: dev type 280, len 65487 [ 1507.304517][ T9046] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6285'. [ 1507.590980][ T9163] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6290'. [ 1507.683188][ T9166] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6294'. [ 1508.035700][ T9172] batadv0: entered promiscuous mode [ 1508.510104][ T6272] batman_adv: batadv0: adding TT local entry 33:33:00:00:00:01 to non-existent VLAN -1 [ 1508.596258][ T30] kauditd_printk_skb: 184 callbacks suppressed [ 1508.596273][ T30] audit: type=1400 audit(2000000188.950:33425): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1508.678263][ T30] audit: type=1400 audit(2000000189.030:33426): avc: denied { read } for pid=9276 comm="syz.4.6296" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1508.867959][ T30] audit: type=1400 audit(2000000189.190:33427): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1508.910215][ T30] audit: type=1400 audit(2000000189.210:33428): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1509.019777][ T30] audit: type=1400 audit(2000000189.220:33429): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1509.261888][ T30] audit: type=1400 audit(2000000189.320:33430): avc: denied { create } for pid=9278 comm="syz.1.6298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=0 [ 1509.564698][ T30] audit: type=1400 audit(2000000189.320:33431): avc: denied { create } for pid=9278 comm="syz.1.6298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=0 [ 1509.644168][ T30] audit: type=1400 audit(2000000189.320:33432): avc: denied { create } for pid=9278 comm="syz.1.6298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1509.683460][ T30] audit: type=1400 audit(2000000189.410:33433): avc: denied { read write } for pid=9279 comm="syz.0.6297" name="vmci" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1509.708038][ T30] audit: type=1400 audit(2000000189.420:33434): avc: denied { map_create } for pid=9282 comm="syz.4.6299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1510.903274][ T9653] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6329'. [ 1511.365469][ T9670] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6331'. [ 1512.645747][ T9786] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6340'. [ 1512.988226][ T9795] veth4: entered promiscuous mode [ 1513.001949][ T9795] veth4: entered allmulticast mode [ 1513.405288][ T9814] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6343'. [ 1513.610472][ T30] kauditd_printk_skb: 154 callbacks suppressed [ 1513.610485][ T30] audit: type=1400 audit(2000000193.970:33589): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1513.658364][ T30] audit: type=1400 audit(2000000194.010:33590): avc: denied { read write } for pid=9900 comm="syz.4.6345" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 1513.811953][ T30] audit: type=1400 audit(2000000194.060:33591): avc: denied { mounton } for pid=9900 comm="syz.4.6345" path="/1370/file0" dev="tmpfs" ino=7216 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1513.895445][ T30] audit: type=1400 audit(2000000194.100:33592): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1513.937681][ T30] audit: type=1400 audit(2000000194.230:33593): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1514.617364][ T30] audit: type=1400 audit(2000000194.970:33594): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1514.703758][ T30] audit: type=1400 audit(2000000195.020:33595): avc: denied { create } for pid=10110 comm="syz.2.6348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 1514.945208][ T30] audit: type=1400 audit(2000000195.030:33596): avc: denied { create } for pid=10110 comm="syz.2.6348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1515.199947][ T30] audit: type=1400 audit(2000000195.050:33597): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1515.244808][ T30] audit: type=1400 audit(2000000195.150:33598): avc: denied { create } for pid=10112 comm="syz.4.6349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 1518.648255][ T30] kauditd_printk_skb: 174 callbacks suppressed [ 1518.648270][ T30] audit: type=1400 audit(2000000198.960:33773): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1518.702650][ T30] audit: type=1400 audit(2000000198.990:33774): avc: denied { read } for pid=11017 comm="syz.2.6391" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1518.752819][ T30] audit: type=1400 audit(2000000199.050:33775): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1518.878609][ T30] audit: type=1400 audit(2000000199.190:33776): avc: denied { read } for pid=11019 comm="syz.2.6392" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1518.937177][ T30] audit: type=1400 audit(2000000199.200:33777): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1519.390611][ T30] audit: type=1400 audit(2000000199.200:33778): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1519.422699][ T30] audit: type=1400 audit(2000000199.220:33779): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1519.448931][ T30] audit: type=1400 audit(2000000199.230:33780): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1519.490557][ T30] audit: type=1400 audit(2000000199.230:33781): avc: denied { map_create } for pid=11021 comm="syz.4.6393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1519.525938][ T30] audit: type=1400 audit(2000000199.230:33782): avc: denied { read } for pid=11021 comm="syz.4.6393" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1520.685043][T11466] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6408'. [ 1521.923099][T11591] netlink: 'syz.4.6417': attribute type 1 has an invalid length. [ 1523.659768][ T30] kauditd_printk_skb: 167 callbacks suppressed [ 1523.659783][ T30] audit: type=1400 audit(2000000204.020:33950): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1523.748153][ T30] audit: type=1400 audit(2000000204.090:33951): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1523.779929][ T30] audit: type=1400 audit(2000000204.100:33952): avc: denied { create } for pid=11944 comm="syz.2.6438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 1523.801841][ T30] audit: type=1400 audit(2000000204.130:33953): avc: denied { create } for pid=11944 comm="syz.2.6438" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1523.876030][ T30] audit: type=1400 audit(2000000204.220:33954): avc: denied { execmem } for pid=11946 comm="syz.1.6439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1523.914464][ T30] audit: type=1400 audit(2000000204.260:33955): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1524.129468][ T30] audit: type=1400 audit(2000000204.290:33956): avc: denied { mounton } for pid=12052 comm="syz.1.6441" path="/1262/bus" dev="tmpfs" ino=6695 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1524.323820][T12264] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6443'. [ 1524.335861][ T30] audit: type=1400 audit(2000000204.370:33957): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1524.419188][ T30] audit: type=1400 audit(2000000204.460:33958): avc: denied { read } for pid=12056 comm="syz.1.6442" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 1524.475032][ T30] audit: type=1400 audit(2000000204.460:33959): avc: denied { read append } for pid=12056 comm="syz.1.6442" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 1527.844058][T12830] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6483'. [ 1528.683171][ T30] kauditd_printk_skb: 298 callbacks suppressed [ 1528.683188][ T30] audit: type=1400 audit(2000000209.040:34258): avc: denied { map_create } for pid=12868 comm="syz.4.6500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1528.741486][ T30] audit: type=1400 audit(2000000209.040:34259): avc: denied { allowed } for pid=12869 comm="syz.0.6501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1528.859734][ T30] audit: type=1400 audit(2000000209.040:34260): avc: denied { execmem } for pid=12869 comm="syz.0.6501" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1528.879354][ T30] audit: type=1400 audit(2000000209.070:34261): avc: denied { read } for pid=12868 comm="syz.4.6500" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1528.903029][ T30] audit: type=1400 audit(2000000209.100:34262): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1528.973588][ T30] audit: type=1400 audit(2000000209.330:34263): avc: denied { execmem } for pid=12872 comm="syz.0.6502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1529.052056][ T30] audit: type=1400 audit(2000000209.410:34264): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1529.129179][ T30] audit: type=1400 audit(2000000209.480:34265): avc: denied { prog_load } for pid=12975 comm="syz.0.6503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1529.191597][ T30] audit: type=1400 audit(2000000209.530:34266): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1529.216998][ T30] audit: type=1400 audit(2000000209.550:34267): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1529.313236][T12982] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6506'. [ 1533.515253][T14250] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6568'. [ 1533.724429][ T30] kauditd_printk_skb: 246 callbacks suppressed [ 1533.724440][ T30] audit: type=1400 audit(2000000214.080:34514): avc: denied { map } for pid=14251 comm="syz.1.6571" path="socket:[79985]" dev="sockfs" ino=79985 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=0 [ 1533.889804][ T30] audit: type=1400 audit(2000000214.110:34515): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1534.051087][ T30] audit: type=1400 audit(2000000214.130:34516): avc: denied { read } for pid=14254 comm="syz.0.6573" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1534.144613][ T30] audit: type=1400 audit(2000000214.150:34517): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1534.224250][ T30] audit: type=1400 audit(2000000214.160:34518): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1534.342543][ T30] audit: type=1400 audit(2000000214.170:34519): avc: denied { create } for pid=14256 comm="syz.0.6574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1534.458476][ T30] audit: type=1400 audit(2000000214.170:34520): avc: denied { create } for pid=14256 comm="syz.0.6574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1534.506134][ T30] audit: type=1400 audit(2000000214.180:34521): avc: denied { prog_load } for pid=14256 comm="syz.0.6574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1534.556185][ T30] audit: type=1400 audit(2000000214.180:34522): avc: denied { create } for pid=14256 comm="syz.0.6574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1534.607680][ T30] audit: type=1400 audit(2000000214.180:34523): avc: denied { create } for pid=14256 comm="syz.0.6574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1537.901301][T15049] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6622'. [ 1538.344691][T15094] bridge0: entered promiscuous mode [ 1538.350111][T15094] bridge0: entered allmulticast mode [ 1538.357341][T15094] team0: Port device bridge0 added [ 1538.801889][ T30] kauditd_printk_skb: 176 callbacks suppressed [ 1538.801900][ T30] audit: type=1400 audit(2000000219.160:34700): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1538.953994][ T30] audit: type=1400 audit(2000000219.310:34701): avc: denied { map_create } for pid=15201 comm="syz.2.6628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1539.009361][ T30] audit: type=1400 audit(2000000219.310:34702): avc: denied { prog_load } for pid=15201 comm="syz.2.6628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1539.048237][ T30] audit: type=1400 audit(2000000219.310:34703): avc: denied { prog_load } for pid=15201 comm="syz.2.6628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1539.068007][ T30] audit: type=1400 audit(2000000219.310:34704): avc: denied { map_create } for pid=15201 comm="syz.2.6628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1539.087596][ T30] audit: type=1400 audit(2000000219.310:34705): avc: denied { prog_load } for pid=15201 comm="syz.2.6628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1539.107893][ T30] audit: type=1400 audit(2000000219.310:34706): avc: denied { prog_load } for pid=15201 comm="syz.2.6628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1539.127577][ T30] audit: type=1400 audit(2000000219.330:34707): avc: denied { prog_load } for pid=15201 comm="syz.2.6628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1539.158286][ T30] audit: type=1400 audit(2000000219.360:34708): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1539.233430][ T30] audit: type=1400 audit(2000000219.550:34709): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1539.852680][T15320] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6633'. [ 1540.788645][T15437] netlink: 40 bytes leftover after parsing attributes in process `syz.1.6640'. [ 1540.806228][T15437] ip6gre2: entered promiscuous mode [ 1540.811884][T15437] ip6gre2: entered allmulticast mode [ 1541.082935][T15443] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6642'. [ 1544.014290][ T30] kauditd_printk_skb: 153 callbacks suppressed [ 1544.014307][ T30] audit: type=1400 audit(2000000224.360:34863): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1544.062437][ T30] audit: type=1400 audit(2000000224.420:34864): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1544.094666][ T30] audit: type=1400 audit(2000000224.450:34865): avc: denied { read write } for pid=15927 comm="syz.1.6677" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 1544.119521][ T30] audit: type=1400 audit(2000000224.480:34866): avc: denied { mounton } for pid=15927 comm="syz.1.6677" path="/1301/file0" dev="tmpfs" ino=6899 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1544.226173][ T30] audit: type=1400 audit(2000000224.570:34867): avc: denied { mounton } for pid=16030 comm="syz.2.6678" path="/1327/file0" dev="tmpfs" ino=6969 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1544.279574][ T30] audit: type=1400 audit(2000000224.580:34868): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1544.361989][ T30] audit: type=1400 audit(2000000224.610:34869): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1544.449533][ T30] audit: type=1400 audit(2000000224.630:34870): avc: denied { read write } for pid=5809 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1544.582062][ T30] audit: type=1400 audit(2000000224.640:34871): avc: denied { read write } for pid=16032 comm="syz.0.6679" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 1544.738638][ T30] audit: type=1400 audit(2000000224.640:34872): avc: denied { mounton } for pid=16032 comm="syz.0.6679" path="/1289/file0" dev="tmpfs" ino=6833 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1544.831448][T16051] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6688'. [ 1545.443378][ T1302] ieee802154 phy0 wpan0: encryption failed: -22 [ 1545.449819][ T1302] ieee802154 phy1 wpan1: encryption failed: -22 [ 1545.718693][ T6268] netdevsim netdevsim1 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1545.751148][ T6268] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1545.914856][ T6268] netdevsim netdevsim1 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1545.926179][ T6268] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1546.028785][ T6268] netdevsim netdevsim1 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1546.046430][ T6268] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1546.230576][ T6268] netdevsim netdevsim1 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1546.281102][ T6268] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1547.290924][ T6268] bond1 (unregistering): (slave gretap1): Releasing active interface [ 1548.062969][ T6268] bond1 (unregistering): Released all slaves [ 1548.158232][ T6268] bond0 (unregistering): Released all slaves [ 1548.387391][ T6268] tipc: Left network mode [ 1548.679475][ T6268] hsr_slave_0: left promiscuous mode [ 1548.685474][ T6268] hsr_slave_1: left promiscuous mode [ 1548.701412][ T6268] veth1_vlan: left allmulticast mode [ 1548.706990][ T6268] veth1_macvtap: left promiscuous mode [ 1548.713222][ T6268] veth0_macvtap: left promiscuous mode [ 1548.718718][ T6268] veth1_vlan: left promiscuous mode [ 1549.635096][ T30] kauditd_printk_skb: 109 callbacks suppressed [ 1549.635111][ T30] audit: type=1400 audit(2000000229.990:34982): avc: denied { execmem } for pid=16965 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1549.679250][ T30] audit: type=1400 audit(2000000230.030:34983): avc: denied { map_create } for pid=16966 comm="syz.4.6714" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1549.690801][ T6268] IPVS: stop unused estimator thread 0... [ 1549.704780][ T30] audit: type=1400 audit(2000000230.030:34984): avc: denied { read write } for pid=16967 comm="syz.3.6713" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 1549.704822][ T30] audit: type=1400 audit(2000000230.030:34985): avc: denied { mounton } for pid=16967 comm="syz.3.6713" path="/1321/file0" dev="tmpfs" ino=6977 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1549.704857][ T30] audit: type=1400 audit(2000000230.030:34986): avc: denied { mounton } for pid=16967 comm="syz.3.6713" path="/1321/bus" dev="tmpfs" ino=6979 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1549.835658][T16989] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6711'. [ 1549.869674][ T30] audit: type=1400 audit(2000000230.030:34987): avc: denied { read } for pid=16966 comm="syz.4.6714" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1549.893252][ T30] audit: type=1400 audit(2000000230.090:34988): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1549.919675][ T30] audit: type=1400 audit(2000000230.130:34989): avc: denied { create } for pid=16972 comm="syz.2.6712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1550.003519][ T30] audit: type=1400 audit(2000000230.140:34990): avc: denied { create } for pid=16972 comm="syz.2.6712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1550.083397][ T30] audit: type=1400 audit(2000000230.140:34991): avc: denied { create } for pid=16972 comm="syz.2.6712" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1554.654875][ T30] kauditd_printk_skb: 36 callbacks suppressed [ 1554.654886][ T30] audit: type=1400 audit(2000000235.010:35028): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1554.917217][ T30] audit: type=1400 audit(2000000235.270:35029): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1555.349521][ T30] audit: type=1400 audit(2000000235.700:35030): avc: denied { execmem } for pid=17516 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1555.391400][ T30] audit: type=1400 audit(2000000235.730:35031): avc: denied { prog_load } for pid=17517 comm="syz.0.6728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1555.404804][T21684] libceph: connect (1)[c::]:6789 error -101 [ 1555.416885][T21684] libceph: mon0 (1)[c::]:6789 connect error [ 1555.425966][ T30] audit: type=1400 audit(2000000235.740:35032): avc: denied { prog_load } for pid=17517 comm="syz.0.6728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1555.509766][T17531] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6730'. [ 1555.546055][ T30] audit: type=1400 audit(2000000235.860:35033): avc: denied { read } for pid=17521 comm="syz.3.6730" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1555.583216][ T30] audit: type=1400 audit(2000000235.880:35034): avc: denied { read open } for pid=17521 comm="syz.3.6730" path="time:[4026531834]" dev="nsfs" ino=4026531834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1555.622922][ T30] audit: type=1400 audit(2000000235.880:35035): avc: denied { module_request } for pid=17521 comm="syz.3.6730" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1555.650748][ T30] audit: type=1400 audit(2000000235.880:35036): avc: denied { sys_module } for pid=17521 comm="syz.3.6730" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1555.709733][T21684] libceph: connect (1)[c::]:6789 error -101 [ 1555.715857][ T30] audit: type=1400 audit(2000000235.900:35037): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1555.740399][T21684] libceph: mon0 (1)[c::]:6789 connect error [ 1556.250816][T21684] libceph: connect (1)[c::]:6789 error -101 [ 1556.256840][T21684] libceph: mon0 (1)[c::]:6789 connect error [ 1557.360004][T21684] libceph: connect (1)[c::]:6789 error -101 [ 1557.366141][T21684] libceph: mon0 (1)[c::]:6789 connect error [ 1558.331148][ T5824] libceph: connect (1)[c::]:6789 error -101 [ 1558.345145][ T5824] libceph: mon0 (1)[c::]:6789 connect error [ 1558.357445][T17520] ceph: No mds server is up or the cluster is laggy [ 1559.966769][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 1559.966784][ T30] audit: type=1400 audit(2000000240.310:35060): avc: denied { execmem } for pid=17643 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1560.000660][ T30] audit: type=1400 audit(2000000240.320:35061): avc: denied { name_bind } for pid=17646 comm="syz.3.6738" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 1560.026129][ T30] audit: type=1400 audit(2000000240.350:35062): avc: denied { prog_load } for pid=17648 comm="syz.2.6737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1560.045887][ T30] audit: type=1400 audit(2000000240.350:35063): avc: denied { allowed } for pid=17648 comm="syz.2.6737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1560.066448][ T30] audit: type=1400 audit(2000000240.360:35064): avc: denied { create } for pid=17644 comm="syz.0.6736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1560.088331][ T30] audit: type=1400 audit(2000000240.380:35065): avc: denied { execmem } for pid=17644 comm="syz.0.6736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1560.109503][ T30] audit: type=1400 audit(2000000240.380:35066): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1560.134105][ T30] audit: type=1400 audit(2000000240.400:35067): avc: denied { read } for pid=17651 comm="syz.4.6739" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1560.157313][ T30] audit: type=1400 audit(2000000240.430:35068): avc: denied { create } for pid=17651 comm="syz.4.6739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1560.178176][ T30] audit: type=1400 audit(2000000240.470:35069): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1561.911675][T17665] trusted_key: encrypted_key: keyword 'new' not allowed when called from .update method [ 1565.470986][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 1565.471002][ T30] audit: type=1400 audit(2000000245.820:35099): avc: denied { execmem } for pid=17779 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1565.512969][ T30] audit: type=1400 audit(2000000245.860:35100): avc: denied { read write } for pid=17782 comm="syz.4.6751" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1565.537858][ T30] audit: type=1400 audit(2000000245.890:35101): avc: denied { read } for pid=17784 comm="syz.3.6750" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1565.561142][ T30] audit: type=1400 audit(2000000245.910:35102): avc: denied { create } for pid=17784 comm="syz.3.6750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=0 [ 1565.609438][ T30] audit: type=1400 audit(2000000245.910:35103): avc: denied { create } for pid=17784 comm="syz.3.6750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=0 [ 1565.629673][ T30] audit: type=1400 audit(2000000245.960:35104): avc: denied { read write } for pid=5808 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1566.023327][ T30] audit: type=1400 audit(2000000246.380:35105): avc: denied { read write } for pid=5823 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1566.059239][ T30] audit: type=1400 audit(2000000246.410:35106): avc: denied { read write } for pid=5816 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1566.083861][ T30] audit: type=1400 audit(2000000246.420:35107): avc: denied { read write } for pid=5810 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1567.521705][ T30] audit: type=1400 audit(2000000247.880:35108): avc: denied { execmem } for pid=17992 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1570.247807][ T62] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 1570.390299][ T62] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 1570.485623][ T62] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 1570.534954][ T62] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 20004 - 0 [ 1570.728426][ T62] bond2 (unregistering): (slave gretap1): Releasing active interface [ 1570.761659][ T62] bond10 (unregistering): (slave geneve4): Releasing active interface [ 1570.802729][ T62] bond2 (unregistering): (slave bridge1): Releasing active interface [ 1571.016784][ T62] bond0 (unregistering): (slave bridge5): Releasing active interface [ 1571.076066][ T62] bond6 (unregistering): (slave bridge6): Releasing active interface [ 1571.148855][ T62] team0: Port device bridge0 removed [ 1571.216326][ T62] bond9 (unregistering): (slave bridge7): Releasing active interface [ 1571.362412][ T62] bond1 (unregistering): Released all slaves [ 1571.373058][ T62] bond2 (unregistering): Released all slaves [ 1571.383385][ T62] bond3 (unregistering): Released all slaves [ 1571.393690][ T62] bond0 (unregistering): Released all slaves [ 1571.405420][ T62] bond4 (unregistering): Released all slaves [ 1571.417029][ T62] bond5 (unregistering): Released all slaves [ 1571.428564][ T62] bond6 (unregistering): Released all slaves [ 1571.441647][ T62] bond7 (unregistering): Released all slaves [ 1571.453356][ T62] bond8 (unregistering): Released all slaves [ 1571.465020][ T62] bond9 (unregistering): Released all slaves [ 1571.476716][ T62] bond10 (unregistering): Released all slaves [ 1573.064206][ T62] dummy0: left promiscuous mode [ 1573.072118][ T62] hsr_slave_0: left promiscuous mode [ 1573.077737][ T62] hsr_slave_1: left promiscuous mode [ 1573.115874][ T62] team0 (unregistering): Port device batadv1 removed [ 1573.319611][ T62] team0 (unregistering): Port device team_slave_1 removed [ 1573.346244][ T62] team0 (unregistering): Port device team_slave_0 removed [ 1575.161422][ T62] netdevsim netdevsim4 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1575.172491][ T62] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1575.234846][ T62] netdevsim netdevsim4 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1575.245151][ T62] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1575.311119][ T62] netdevsim netdevsim4 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 1575.321406][ T62] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1575.491897][ T62] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 20001 - 0 [ 1575.550056][ T62] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 20001 - 0 [ 1575.628089][ T62] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 20001 - 0 [ 1575.948555][ T62] bond0 (unregistering): (slave erspan0): Releasing active interface [ 1576.187481][ T62] team0: Port device bridge0 removed [ 1576.251536][ T62] bond1 (unregistering): Released all slaves [ 1576.261846][ T62] bond2 (unregistering): Released all slaves [ 1576.272083][ T62] bond3 (unregistering): Released all slaves [ 1576.282314][ T62] bond4 (unregistering): Released all slaves [ 1576.355913][ T62] bond0 (unregistering): Released all slaves [ 1576.446463][ T62] bond1 (unregistering): (slave gretap1): Releasing active interface [ 1576.642165][ T62] bond0 (unregistering): Released all slaves [ 1576.652856][ T62] bond1 (unregistering): Released all slaves [ 1576.663097][ T62] bond2 (unregistering): Released all slaves [ 1576.734931][ T62] bond3 (unregistering): (slave veth5): Releasing active interface [ 1576.744018][ T62] bond3 (unregistering): Released all slaves [ 1576.836948][ T62] tipc: Disabling bearer [ 1576.845825][ T62] tipc: Left network mode [ 1576.863041][ T62] tipc: Disabling bearer [ 1576.868159][ T62] tipc: Left network mode [ 1576.949126][ T62] ------------[ cut here ]------------ [ 1576.954759][ T62] wlan1: Failed check-sdata-in-driver check, flags: 0x0 [ 1576.962192][ T62] WARNING: CPU: 0 PID: 62 at net/mac80211/driver-ops.c:366 drv_unassign_vif_chanctx+0x247/0x850 [ 1576.972621][ T62] Modules linked in: [ 1576.976625][ T62] CPU: 0 UID: 0 PID: 62 Comm: kworker/u8:4 Not tainted syzkaller #0 PREEMPT(full) [ 1576.985922][ T62] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1576.996060][ T62] Workqueue: netns cleanup_net [ 1577.001439][ T62] RIP: 0010:drv_unassign_vif_chanctx+0x247/0x850 [ 1577.007768][ T62] Code: 74 24 10 48 81 c6 20 01 00 00 48 89 74 24 10 e8 8f 3f ef f6 8b 54 24 04 48 8b 74 24 10 48 c7 c7 a0 ae e2 8c e8 2a 6f ad f6 90 <0f> 0b 90 90 e8 70 3f ef f6 4c 89 f2 48 b8 00 00 00 00 00 fc ff df [ 1577.027419][ T62] RSP: 0018:ffffc9000213f5a8 EFLAGS: 00010282 [ 1577.033496][ T62] RAX: 0000000000000000 RBX: ffff888075af4d80 RCX: ffffffff817b3ee8 [ 1577.041493][ T62] RDX: ffff88801db8a480 RSI: ffffffff817b3ef5 RDI: 0000000000000001 [ 1577.049473][ T62] RBP: ffff888032968e80 R08: 0000000000000001 R09: 0000000000000000 [ 1577.057417][ T62] R10: 0000000000000000 R11: fffffffffffc40c0 R12: ffff888075af6ad8 [ 1577.065406][ T62] R13: 0000000000000000 R14: ffff888075af57b8 R15: ffff888075af6a80 [ 1577.073398][ T62] FS: 0000000000000000(0000) GS:ffff888124a08000(0000) knlGS:0000000000000000 [ 1577.082335][ T62] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1577.088907][ T62] CR2: 00007f44d86d1140 CR3: 000000000e182000 CR4: 00000000003526f0 [ 1577.096877][ T62] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1577.104850][ T62] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1577.112828][ T62] Call Trace: [ 1577.116110][ T62] [ 1577.119018][ T62] ieee80211_assign_link_chanctx+0x3f1/0xf00 [ 1577.125019][ T62] __ieee80211_link_release_channel+0x273/0x4b0 [ 1577.131264][ T62] ieee80211_link_release_channel+0x128/0x200 [ 1577.137305][ T62] ? __pfx_ieee80211_uninit+0x10/0x10 [ 1577.142715][ T62] unregister_netdevice_many_notify+0x1402/0x25c0 [ 1577.149142][ T62] ? __pfx_unregister_netdevice_many_notify+0x10/0x10 [ 1577.155938][ T62] ? wake_up_q+0xae/0x130 [ 1577.160296][ T62] ? __pfx_rwsem_wake.isra.0+0x10/0x10 [ 1577.165753][ T62] ? find_held_lock+0x2b/0x80 [ 1577.170446][ T62] unregister_netdevice_queue+0x305/0x3f0 [ 1577.176163][ T62] ? __pfx_unregister_netdevice_queue+0x10/0x10 [ 1577.182422][ T62] _cfg80211_unregister_wdev+0x64b/0x830 [ 1577.188051][ T62] ieee80211_remove_interfaces+0x34e/0x740 [ 1577.193861][ T62] ? __pfx_ieee80211_remove_interfaces+0x10/0x10 [ 1577.200225][ T62] ieee80211_unregister_hw+0x55/0x3a0 [ 1577.205573][ T62] hwsim_exit_net+0x788/0x1590 [ 1577.210356][ T62] ? __pfx_hwsim_exit_net+0x10/0x10 [ 1577.215549][ T62] ? ip_vs_sync_net_cleanup+0x72/0xb0 [ 1577.220938][ T62] ? __ip_vs_dev_cleanup_batch+0xb1/0x290 [ 1577.226650][ T62] ? __pfx_hwsim_exit_net+0x10/0x10 [ 1577.231851][ T62] ops_undo_list+0x2ee/0xab0 [ 1577.236440][ T62] ? __pfx_ops_undo_list+0x10/0x10 [ 1577.241564][ T62] ? cleanup_net+0x347/0x8b0 [ 1577.246159][ T62] ? idr_destroy+0x62/0x2e0 [ 1577.250677][ T62] cleanup_net+0x41b/0x8b0 [ 1577.255110][ T62] ? __pfx_cleanup_net+0x10/0x10 [ 1577.260069][ T62] ? rcu_is_watching+0x12/0xc0 [ 1577.264844][ T62] process_one_work+0x9cf/0x1b70 [ 1577.269826][ T62] ? __pfx_cleanup_net+0x10/0x10 [ 1577.274770][ T62] ? __pfx_process_one_work+0x10/0x10 [ 1577.280194][ T62] ? assign_work+0x1a0/0x250 [ 1577.284779][ T62] worker_thread+0x6c8/0xf10 [ 1577.289351][ T62] ? __kthread_parkme+0x19e/0x250 [ 1577.294419][ T62] ? __pfx_worker_thread+0x10/0x10 [ 1577.299529][ T62] kthread+0x3c5/0x780 [ 1577.303587][ T62] ? __pfx_kthread+0x10/0x10 [ 1577.308150][ T62] ? rcu_is_watching+0x12/0xc0 [ 1577.312912][ T62] ? __pfx_kthread+0x10/0x10 [ 1577.317492][ T62] ret_from_fork+0x675/0x7d0 [ 1577.322092][ T62] ? __pfx_kthread+0x10/0x10 [ 1577.326670][ T62] ret_from_fork_asm+0x1a/0x30 [ 1577.331470][ T62] [ 1577.334478][ T62] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1577.341730][ T62] CPU: 0 UID: 0 PID: 62 Comm: kworker/u8:4 Not tainted syzkaller #0 PREEMPT(full) [ 1577.350983][ T62] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 1577.361023][ T62] Workqueue: netns cleanup_net [ 1577.365769][ T62] Call Trace: [ 1577.369035][ T62] [ 1577.371942][ T62] dump_stack_lvl+0x3d/0x1f0 [ 1577.376523][ T62] vpanic+0x640/0x6f0 [ 1577.380484][ T62] ? drv_unassign_vif_chanctx+0x247/0x850 [ 1577.386180][ T62] panic+0xca/0xd0 [ 1577.389881][ T62] ? __pfx_panic+0x10/0x10 [ 1577.394295][ T62] ? check_panic_on_warn+0x1f/0xb0 [ 1577.399403][ T62] check_panic_on_warn+0xab/0xb0 [ 1577.404334][ T62] __warn+0xf6/0x3c0 [ 1577.408206][ T62] ? drv_unassign_vif_chanctx+0x247/0x850 [ 1577.413909][ T62] report_bug+0x3c3/0x580 [ 1577.418225][ T62] ? drv_unassign_vif_chanctx+0x247/0x850 [ 1577.423930][ T62] handle_bug+0x184/0x210 [ 1577.428241][ T62] exc_invalid_op+0x17/0x50 [ 1577.432724][ T62] asm_exc_invalid_op+0x1a/0x20 [ 1577.437555][ T62] RIP: 0010:drv_unassign_vif_chanctx+0x247/0x850 [ 1577.443868][ T62] Code: 74 24 10 48 81 c6 20 01 00 00 48 89 74 24 10 e8 8f 3f ef f6 8b 54 24 04 48 8b 74 24 10 48 c7 c7 a0 ae e2 8c e8 2a 6f ad f6 90 <0f> 0b 90 90 e8 70 3f ef f6 4c 89 f2 48 b8 00 00 00 00 00 fc ff df [ 1577.463455][ T62] RSP: 0018:ffffc9000213f5a8 EFLAGS: 00010282 [ 1577.469501][ T62] RAX: 0000000000000000 RBX: ffff888075af4d80 RCX: ffffffff817b3ee8 [ 1577.477450][ T62] RDX: ffff88801db8a480 RSI: ffffffff817b3ef5 RDI: 0000000000000001 [ 1577.485401][ T62] RBP: ffff888032968e80 R08: 0000000000000001 R09: 0000000000000000 [ 1577.493350][ T62] R10: 0000000000000000 R11: fffffffffffc40c0 R12: ffff888075af6ad8 [ 1577.501313][ T62] R13: 0000000000000000 R14: ffff888075af57b8 R15: ffff888075af6a80 [ 1577.509271][ T62] ? __warn_printk+0x198/0x350 [ 1577.514020][ T62] ? __warn_printk+0x1a5/0x350 [ 1577.518774][ T62] ? drv_unassign_vif_chanctx+0x246/0x850 [ 1577.524482][ T62] ieee80211_assign_link_chanctx+0x3f1/0xf00 [ 1577.530457][ T62] __ieee80211_link_release_channel+0x273/0x4b0 [ 1577.536679][ T62] ieee80211_link_release_channel+0x128/0x200 [ 1577.542724][ T62] ? __pfx_ieee80211_uninit+0x10/0x10 [ 1577.548082][ T62] unregister_netdevice_many_notify+0x1402/0x25c0 [ 1577.554489][ T62] ? __pfx_unregister_netdevice_many_notify+0x10/0x10 [ 1577.561238][ T62] ? wake_up_q+0xae/0x130 [ 1577.565555][ T62] ? __pfx_rwsem_wake.isra.0+0x10/0x10 [ 1577.571004][ T62] ? find_held_lock+0x2b/0x80 [ 1577.575686][ T62] unregister_netdevice_queue+0x305/0x3f0 [ 1577.581417][ T62] ? __pfx_unregister_netdevice_queue+0x10/0x10 [ 1577.587661][ T62] _cfg80211_unregister_wdev+0x64b/0x830 [ 1577.593286][ T62] ieee80211_remove_interfaces+0x34e/0x740 [ 1577.599083][ T62] ? __pfx_ieee80211_remove_interfaces+0x10/0x10 [ 1577.605404][ T62] ieee80211_unregister_hw+0x55/0x3a0 [ 1577.610760][ T62] hwsim_exit_net+0x788/0x1590 [ 1577.615511][ T62] ? __pfx_hwsim_exit_net+0x10/0x10 [ 1577.620694][ T62] ? ip_vs_sync_net_cleanup+0x72/0xb0 [ 1577.626055][ T62] ? __ip_vs_dev_cleanup_batch+0xb1/0x290 [ 1577.631837][ T62] ? __pfx_hwsim_exit_net+0x10/0x10 [ 1577.637032][ T62] ops_undo_list+0x2ee/0xab0 [ 1577.641622][ T62] ? __pfx_ops_undo_list+0x10/0x10 [ 1577.646723][ T62] ? cleanup_net+0x347/0x8b0 [ 1577.651303][ T62] ? idr_destroy+0x62/0x2e0 [ 1577.655798][ T62] cleanup_net+0x41b/0x8b0 [ 1577.660207][ T62] ? __pfx_cleanup_net+0x10/0x10 [ 1577.665137][ T62] ? rcu_is_watching+0x12/0xc0 [ 1577.669893][ T62] process_one_work+0x9cf/0x1b70 [ 1577.674818][ T62] ? __pfx_cleanup_net+0x10/0x10 [ 1577.679745][ T62] ? __pfx_process_one_work+0x10/0x10 [ 1577.685105][ T62] ? assign_work+0x1a0/0x250 [ 1577.689676][ T62] worker_thread+0x6c8/0xf10 [ 1577.694255][ T62] ? __kthread_parkme+0x19e/0x250 [ 1577.699263][ T62] ? __pfx_worker_thread+0x10/0x10 [ 1577.704354][ T62] kthread+0x3c5/0x780 [ 1577.708406][ T62] ? __pfx_kthread+0x10/0x10 [ 1577.713012][ T62] ? rcu_is_watching+0x12/0xc0 [ 1577.717771][ T62] ? __pfx_kthread+0x10/0x10 [ 1577.722341][ T62] ret_from_fork+0x675/0x7d0 [ 1577.726916][ T62] ? __pfx_kthread+0x10/0x10 [ 1577.731497][ T62] ret_from_fork_asm+0x1a/0x30 [ 1577.736256][ T62] [ 1577.739442][ T62] Kernel Offset: disabled [ 1577.743740][ T62] Rebooting in 86400 seconds..