last executing test programs: 1h34m39.501602944s ago: executing program 1 (id=918): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) dup3(r0, r1, 0x0) write$FUSE_STATX(r1, 0x0, 0x0) 1h34m39.423025359s ago: executing program 1 (id=920): io_setup(0x8, &(0x7f0000000000)=0x0) r1 = eventfd2(0x0, 0x0) io_submit(r0, 0x3, &(0x7f00000002c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000040)="d1f7624a6b0e53c3", 0x8}]) io_destroy(r0) 1h34m36.811198661s ago: executing program 1 (id=930): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$AUTOFS_IOC_FAIL(r2, 0x5451, 0x0) 1h34m36.742265525s ago: executing program 1 (id=931): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x230) 1h34m36.661027219s ago: executing program 1 (id=932): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000040), 0x8) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000380)={0x14, 0x0, 0x8, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0xbeee01e0b691916a}, 0x800) 1h34m36.417267091s ago: executing program 1 (id=933): r0 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r0, 0xc01064c5, 0x0) 1h34m36.417139591s ago: executing program 32 (id=933): r0 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) ioctl$DRM_IOCTL_SYNCOBJ_CREATE(r0, 0xc00864bf, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_SIGNAL(r0, 0xc01064c5, 0x0) 1h16m50.121652251s ago: executing program 0 (id=6400): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) openat$selinux_mls(0xffffff9c, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_ABORT_ATOMIC_WRITE(r0, 0x5450, 0x0) 1h16m49.762971963s ago: executing program 0 (id=6402): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) dup3(r0, r2, 0x0) sendmsg$NL80211_CMD_SET_KEY(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}, 0x1, 0x0, 0x0, 0x4000001}, 0x0) 1h16m49.571994836s ago: executing program 0 (id=6403): r0 = openat$full(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) close(r0) socket$netlink(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_VENDOR(r0, 0x0, 0x40) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, 0x4, 0xa, 0x201, 0x0, 0x0, {0x3}}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x20008080) 1h16m49.422439195s ago: executing program 0 (id=6404): mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, 0x0, 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x205) 1h16m49.173820911s ago: executing program 0 (id=6405): r0 = memfd_create(&(0x7f0000000100)='),\x00', 0x0) r1 = getpgid(0x0) r2 = syz_pidfd_open(r1, 0x0) r3 = pidfd_getfd(r2, r0, 0x0) mmap$binder(&(0x7f00006ed000/0x1000)=nil, 0x1000, 0x1, 0x11, r3, 0xd) 1h16m48.694557771s ago: executing program 0 (id=6406): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.state\x00', 0x275a, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) write$P9_RATTACH(r2, 0x0, 0x0) 1h16m48.694407011s ago: executing program 33 (id=6406): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.state\x00', 0x275a, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) dup3(r1, r0, 0x0) r2 = openat$cgroup_freezer_state(r0, &(0x7f0000000000), 0x2, 0x0) write$P9_RATTACH(r2, 0x0, 0x0) 33m6.690413372s ago: executing program 2 (id=14085): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept4(r1, 0x0, 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r2, 0x0, 0x0) 33m6.231073216s ago: executing program 2 (id=14087): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000380)={0x1d, r1, 0x4, {0x2, 0x0, 0x2}, 0xfe}, 0x11) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)={0x14, 0x0, 0x8, 0x70bd2a, 0x25dfdbfe, {{}, {@void, @void}}}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x8000) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={0x0}, 0x1, 0x0, 0x0, 0x805}, 0x10) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x0) sendmsg$NL80211_CMD_DEL_PMKSA(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000003c0)={0x3c, 0x0, 0x800, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x80000001, 0x4c}}}}, [@NL80211_ATTR_PMKID={0x14, 0x55, "7410876f110eeee83616f0ca2bf75f19"}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040}, 0x4000004) 33m4.941198892s ago: executing program 2 (id=14090): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000000700)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r1, 0x0) connect$unix(r0, &(0x7f0000932000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = accept$unix(r1, 0x0, 0x0) write$P9_RSETATTR(r2, 0x0, 0x0) 33m4.551457122s ago: executing program 2 (id=14092): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = syz_pidfd_open(r0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = fsopen(&(0x7f0000000300)='ramfs\x00', 0x0) r5 = pidfd_getfd(r3, r4, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) 33m4.330482093s ago: executing program 2 (id=14095): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0xffffffff, @loopback}, 0x1c) 33m4.017640849s ago: executing program 2 (id=14096): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window, @sack_perm, @sack_perm, @timestamp, @timestamp, @timestamp, @timestamp], 0x20000149) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@rand_addr=0x64010102, @in=@dev={0xac, 0x14, 0x14, 0x30}, 0x4e23, 0xb, 0x4e21, 0x0, 0x0, 0x30, 0x0, 0x67}, {0x4, 0x5, 0x7, 0x10001, 0x25c6, 0x7, 0x4, 0x5}, {0x1, 0xe, 0xcadb, 0x3ff}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x2}, {{@in6=@mcast1, 0x4d6, 0xff}, 0xa, @in6=@local, 0x0, 0x0, 0x3, 0x0, 0x0, 0x64, 0x7fff}}, 0xe8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r1, 0x0) 32m18.410785034s ago: executing program 34 (id=14096): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @window, @sack_perm, @sack_perm, @timestamp, @timestamp, @timestamp, @timestamp], 0x20000149) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@rand_addr=0x64010102, @in=@dev={0xac, 0x14, 0x14, 0x30}, 0x4e23, 0xb, 0x4e21, 0x0, 0x0, 0x30, 0x0, 0x67}, {0x4, 0x5, 0x7, 0x10001, 0x25c6, 0x7, 0x4, 0x5}, {0x1, 0xe, 0xcadb, 0x3ff}, 0x3, 0x0, 0x0, 0x0, 0x2, 0x2}, {{@in6=@mcast1, 0x4d6, 0xff}, 0xa, @in6=@local, 0x0, 0x0, 0x3, 0x0, 0x0, 0x64, 0x7fff}}, 0xe8) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x0, 0x10012, r1, 0x0) 4.755857813s ago: executing program 3 (id=20157): r0 = syz_open_procfs(0x0, &(0x7f0000001100)='pagemap\x00') ioctl$BLKIOOPT(r0, 0x1279, 0x0) r1 = msgget$private(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000700)={0xffffffffffffffff}) ioctl$sock_SIOCSPGRP(r2, 0xc020660b, 0x0) r3 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) r4 = dup2(r3, r3) ioctl$RTC_EPOCH_SET(r4, 0x4004700e, 0xffffffff) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r5) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) sendmsg$nl_crypto(r5, &(0x7f0000001f00)={0x0, 0x0, &(0x7f0000001ec0)={0x0}}, 0x0) msgsnd(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="02a0ba783c092f46861731ee5fbed72f98b7f3130b2dda16d8f1956df94cbd91c7528d7f1ebec93792a22089763477c900d9a4aa2e8808d97d142e50"], 0x8, 0x0) msgrcv(r1, &(0x7f0000000080)={0x0, ""/112}, 0x78, 0x1, 0x2800) 3.998095262s ago: executing program 3 (id=20159): r0 = openat$dlm_control(0xffffff9c, &(0x7f0000000740), 0x200000, 0x0) close$binfmt(r0) socket$nl_audit(0x10, 0x3, 0x9) pipe2(&(0x7f00000001c0), 0x0) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x40, 0x0, 0x4, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "dab2962789"}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x40}, 0x1, 0x0, 0x0, 0x8011}, 0x20008004) 3.899469857s ago: executing program 3 (id=20160): r0 = socket$unix(0x1, 0x5, 0x0) r1 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder-control\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x5451, 0x0) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) creat(&(0x7f0000000000)='./file0\x00', 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) openat$iommufd(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) 3.599697773s ago: executing program 3 (id=20161): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x48, 0x48, 0x4, [@union={0x2, 0x3, 0x0, 0x5, 0x0, 0x4, [{0x9, 0x1, 0x12d2}, {0xa, 0x4, 0x9}, {0x6, 0x1, 0x1}]}, @union={0xd, 0x1, 0x0, 0x5, 0x0, 0x5, [{0x0, 0x5, 0x8}]}]}, {0x0, [0x0, 0x5f]}}, &(0x7f0000000080)=""/178, 0x64, 0xb2, 0x1, 0xca, 0x10000}, 0x28) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, &(0x7f0000000180)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000001c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000440)={0x0, 0x1, 0x0, [0x5, 0x4, 0x0, 0x8001, 0x9], [0x9, 0x9, 0x7, 0x4, 0x1, 0xc5b4, 0x1, 0xffff, 0x0, 0x2, 0x54db, 0xfffffffffffffffc, 0x6, 0x8, 0x7, 0x7, 0x1, 0xe, 0x7, 0x5, 0xf, 0x6, 0x8000000000000001, 0x8, 0x1d, 0x400, 0x5, 0x3, 0x8, 0x8000000000000000, 0x0, 0x4, 0x8000, 0x9, 0x2, 0xefc5, 0x8000000000000000, 0xac, 0x9, 0x5403, 0x0, 0x8000, 0xdd, 0x40, 0x9, 0x7, 0xb3cb, 0x8, 0x5, 0x7fffffff, 0x5, 0xff, 0xb13, 0x6bf, 0x1, 0xff, 0x2, 0xf7, 0x1e, 0x2, 0x1, 0x2, 0x7, 0xd4, 0x9, 0x3, 0xfffffffffffffff7, 0xd, 0x2, 0x81, 0x6, 0x9, 0xf9c2, 0x3, 0x7fffffffffffffff, 0x3, 0x1, 0x3, 0xf1bb, 0x0, 0x4164, 0x4, 0x0, 0x2a, 0x6, 0xfffffffffffffa6e, 0xfffffffffffffffc, 0xffffffff, 0x401, 0x8, 0x3f, 0x632, 0x8, 0x8, 0x43, 0x8000000000000000, 0x7, 0x8000000000000000, 0x101, 0x5, 0x7626, 0x8000, 0x6, 0x8000000000000001, 0xcd, 0x7, 0x7fffffffffffffff, 0x9, 0xfffffffffffffffa, 0x6, 0x3, 0x100, 0x6, 0x8, 0x9, 0x4715, 0x2, 0xd88, 0x1, 0x3, 0x9]}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f0000000880)={{}, r1, 0x12, @inherit={0x48, &(0x7f00000003c0)={0x0, 0x0, 0x7, 0xafce, {0x20, 0x6, 0x2, 0x7fff, 0x40}}}, @devid=r2}) r3 = openat$vcs(0xffffff9c, &(0x7f0000001880), 0x200, 0x0) r4 = openat$cgroup_freezer_state(r3, &(0x7f00000018c0), 0x2, 0x0) r5 = openat$null(0xffffff9c, &(0x7f0000001940), 0x90000, 0x0) syz_genetlink_get_family_id$gtp(&(0x7f0000001900), r5) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000001b40)={'vxcan1\x00', 0x0}) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001c40)={0x6, 0x2c, &(0x7f0000001980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x62b, 0x0, 0x0, 0x0, 0x9}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@btf_id={0x18, 0x3, 0x3, 0x0, 0x2}, @ldst={0x1, 0x2, 0x6, 0x2, 0x7, 0x8, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0xa}, @func, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}, @generic={0x2, 0x5, 0x8, 0x0, 0xfffffbc4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xc3}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x300}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x3}, {0x85, 0x0, 0x0, 0x6d0116019f619b7a}}}, &(0x7f0000001b00)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x10, '\x00', r6, 0x25, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000001b80)={0x3, 0x4, 0x8, 0x4e}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001bc0)=[r5, r5], &(0x7f0000001c00)=[{0x5, 0x2, 0x7, 0x6}, {0x1, 0x4, 0x6, 0x9}], 0x10, 0xff}, 0x94) write$selinux_attr(0xffffffffffffffff, &(0x7f0000001d00)='system_u:object_r:system_dbusd_var_run_t:s0\x00', 0x2c) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001d80), r5) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r5, 0x8933, &(0x7f0000001dc0)={'batadv_slave_1\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000020c0)={r7, 0xe0, &(0x7f0000001fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000001e00)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x7, &(0x7f0000001e40)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000001e80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x38, &(0x7f0000001ec0)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000001f00), &(0x7f0000001f40), 0x8, 0x8a, 0x8, 0x8, &(0x7f0000001f80)}}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r5, 0x8933, &(0x7f0000002100)={'wg2\x00', 0x0}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002400)={r7, 0xe0, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000002140)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, &(0x7f0000002180)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000021c0)=[0x0], 0x0, 0x64, &(0x7f0000002200)=[{}], 0x8, 0x10, &(0x7f0000002240), &(0x7f0000002280), 0x8, 0x9a, 0x8, 0x8, &(0x7f00000022c0)}}, 0x10) getsockname$packet(r3, &(0x7f0000002440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002480)=0x14) sendmsg$ETHTOOL_MSG_EEE_GET(r5, &(0x7f0000002740)={&(0x7f0000001d40)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000002700)={&(0x7f00000024c0)={0x220, r8, 0x800, 0x70bd28, 0x25dfdbfc, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gre0\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x220}, 0x1, 0x0, 0x0, 0x4004040}, 0x1) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000002780)={r10, 0x1, 0x6, @local}, 0x10) ioctl$ifreq_SIOCGIFINDEX_wireguard(r3, 0x8933, &(0x7f0000002800)={'wg2\x00', 0x0}) sendmsg$ETHTOOL_MSG_WOL_GET(r0, &(0x7f0000002980)={&(0x7f00000027c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000002940)={&(0x7f0000002840)={0xd0, r8, 0x200, 0x70bd2b, 0x25dfdbfe, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r12}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}]}, @HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syzkaller1\x00'}]}, @HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}]}, 0xd0}}, 0x4040) close_range(r7, r0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000002b00)={'ip6_vti0\x00', &(0x7f0000002a80)={'ip6gre0\x00', r9, 0x29, 0x0, 0x40, 0x0, 0x0, @mcast1, @loopback, 0x8067, 0x8000, 0xca64, 0x38}}) recvfrom$packet(r3, &(0x7f00000029c0)=""/176, 0xb0, 0x40000000, &(0x7f0000002b40)={0x11, 0x3, r15, 0x1, 0x5, 0x6, @random="ae32d2924944"}, 0x14) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r3, 0x28, 0x0, &(0x7f0000002b80)=0x1ff, 0x8) bind$packet(r3, &(0x7f0000002bc0)={0x11, 0x18, r12, 0x1, 0x7f, 0x6, @local}, 0x14) r16 = syz_genetlink_get_family_id$tipc2(&(0x7f0000002c40), r3) sendmsg$TIPC_NL_NODE_GET(r3, &(0x7f0000003000)={&(0x7f0000002c00)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000002fc0)={&(0x7f0000002c80)={0x32c, r16, 0x300, 0x70bd2d, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x1b8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "4508942ca234089b56083fafc121567892b4a9e9f13267778544042806754234d02918"}}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_KEY={0x4b, 0x4, {'gcm(aes)\x00', 0x23, "0ccbbea4521e2339cf0e19e662ac9e15954ab43be334ab1740d50b4bdd7d8323839761"}}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffff}, @TIPC_NLA_NODE_KEY_MASTER={0x4}, @TIPC_NLA_NODE_ID={0x101, 0x3, "e6444f418641dd9345378526ede7c25b46a70e6246edbc18ecd5df8b7c3aec20d559667e7aa3b952a9f999699f5eec8c00fd2cb60d4d4738b2f1a222f49be6774eb59ec0619be21e538e308aef799adb09e868e579362a71d6e0c0c0addd97b9a9a042f8c155347fa347e9fe24211bbb7b6af9a48271752ca6e967e1df43773babcace8b815bf0098488b6d4e68ed4d79331c7a35a1a5573069468c5a30a8d4fbb65580ac9b83d88144b5f7b071dcb24804a78dff9b8195c4a08dd678224c59f80d59fb9ba18a3fe2ff8dc7517f1166a991913e9600f98507283ead68ad150fb9d6cb308b1d2706f7d13d44974b1f3f5324c6c6eaca369ba171c6f7897"}, @TIPC_NLA_NODE_KEY_MASTER={0x4}]}, @TIPC_NLA_NET={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}, @TIPC_NLA_MON={0xc, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK={0x6c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_SOCK_CON={0x54, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x189}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x80000000}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x7}]}]}, @TIPC_NLA_NET={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x4}]}, @TIPC_NLA_NET={0x58, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xf00}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x77bc}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x76d5}]}, @TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fff}]}, @TIPC_NLA_PUBL={0x34, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x5a34}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}, @TIPC_NLA_PUBL_UPPER={0x8}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x81}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x7}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfffffffc}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}]}]}, 0x32c}, 0x1, 0x0, 0x0, 0x8800}, 0x4040) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x80049363, &(0x7f0000003040)) 2.71123086s ago: executing program 3 (id=20164): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/power/pm_wakeup_irq', 0x0, 0x4) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000040)={0x0, @local, @empty}, &(0x7f0000000080)=0xc) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000000c0)={r1, @remote, @empty}, 0xc) r2 = gettid() r3 = accept4$unix(r0, &(0x7f0000000100), &(0x7f0000000180)=0x6e, 0x80800) r4 = openat$pidfd(0xffffff9c, &(0x7f00000004c0), 0x300, 0x0) sendmmsg$unix(r3, &(0x7f0000000540)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000001c0)="be26a2c145bf33db63b92f1cf4fcb2d0794316dc84aa4ad29ac03d2fc9c9fbf3456a04e5a5ff8395523911d0af3b24d938b1c8e30b6ba4f407f6c210091a654cdc1c6645060c16bb122b98c933f66b7ccdab2aab12f1f9bdbc8bfe00bc12bcb4ffd96edf9669377a6d0a167ea883222632ba043c5358a80a652e69e73abb6776ca4ad1ef8738df5e128e971f44e94d0645557f5a362b3f708c85bef0c4659abca1496f3a84a88a0d54ede25349eb33af95accbda55a4901fc83bbf62d3218232c00caa4c451380fb2fe9d35d5b4a535faa7add8ae406a5ba37e07839bbf90e8b3b3b0888fe2338b33ce7f49c9946131a3e3995", 0xf3}, {&(0x7f00000002c0)="0de220c19bc21030051e52bbec2609c708e39a5d9f0f7741e230b0e29718a02068b8e243f61ff4ead73b6ae571c0b55e2fe7fbaf65dbce204b72148760457ec20016b6c6abb1ed29f4b4589056a0d9be98c2f129a3", 0x55}, {&(0x7f0000000340)="d6c59dcb2aec636cf3c55cff26cfeb185a2ffa54869eae83c8b3d2f55cebe0175ac5bab039895eeef6d086b6b155466b905f0038e357371be7f8298a46bbeb45e7b333c85a932e9167948df551f46d8f50b0177419adb186db0c00b30882dc4822ce6c332ddd06dc75f55761eba15ad7ad8f3b0457bdc2be8f345b95b32c52d4885c62eefbd438857def1a170be4d796faaf37d831f71e2917f955675355f4a0c09fb197ad697ae556f2b0714c376a51a200e5b9ed93d3340bf946fd88463bafe15a814b42731c89a81502e587fd4fe3e211e4a5c01d7f6a6f71d21872789ef52485d543a3f8636ee250d83f7c", 0xed}, {&(0x7f0000000440)="1fad0fd2c954a4fcee1659eccf3a778afd3d76857ddb6952e7b49a7ffd962537e194eb3f8d70ac9747577e8c1c1acb9de9d47211300b49f95663740f2426b5", 0x3f}], 0x4, &(0x7f0000000500)=[@rights={{0x24, 0x1, 0x1, [r0, r0, r0, r0, r0, r4]}}], 0x24, 0x20000841}}], 0x1, 0x40000) bind$unix(0xffffffffffffffff, &(0x7f0000000580)=@abs={0x1, 0x0, 0x4e24}, 0x6e) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000640), r0) sendmsg$TIPC_NL_LINK_RESET_STATS(r5, &(0x7f0000000740)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000700)={&(0x7f0000000680)={0x64, r6, 0x20, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_MEDIA={0x8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x4}]}, @TIPC_NLA_MEDIA={0x48, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7ff}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}]}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x8c1}, 0x4000000) sendmsg$nl_generic(r5, &(0x7f0000000d40)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000d00)={&(0x7f00000007c0)={0x518, 0x13, 0x1, 0x70bd2a, 0x25dfdbfc, {0xe}, [@typed={0x8, 0x12f, 0x0, 0x0, @ipv4=@remote}, @nested={0xf8, 0x93, 0x0, 0x1, [@nested={0x4, 0x6a}, @generic="5eb7d2e16471b23d0fdd99b1c326ffb5dcfe172d9778c5fd64f27faa806833d06d7e1b00c70c1474ac7185cfa5a4df1fd4b4b51f64e4eefe6a9a5787963460dc5cc99516fed90e87fa490dca341f6dd02d3c3b036e5701c798af69e733b230f01944906200d00d058c9eef0ab91a7942527b64bdb94ece3b1f7b0da4a046ce324c32f66e474686728ed2918404466730273f17d43829a4b5aa250c603be98f4cd82a9b3bd5c9104b8737679a37df58b9194c3736a0d798008522420ded49072a28af965ddd35544cc9b8908f22ff3366ae5df1f2e5a811909f5125dff0c1fd87c29524d742d247950f398116281d1e1f"]}, @nested={0x323, 0xc8, 0x0, 0x1, [@generic="2bc706cbd325b21ba070e6908f7668c1ed53368618751f115492457eedc7331c5a54d5ed52dd1bfa57bac6943c182961665161ee6c974454917eeb3d2ff7d54b038f3296039a0b4d2ccd5dfe04a3a8db4517656afab7ed5e599d6baf767c7dad84c2cabcfc74e6d51b6c7b43c0786ee50ce8f1950b50275a883e168358329725dcac68de9e8f65bc5ad42b933453c8a0594a791e6e65561927e46868d4efab17708df889df2b6cbca2a671ef3f5633c35d669424860caa7c7f819c45a50e68dbc4fcbda6d76d943c5ef68789ea8d62fff9d2776c00856ca5b0278cc4940248629059f0a07746d4bf5b3fa6d7bb", @nested={0x4, 0x22}, @typed={0x8, 0xa3, 0x0, 0x0, @str='udp\x00'}, @nested={0x4, 0x24}, @nested={0x4, 0x94}, @generic="217a7c63774b7095cebe939bd8b1e3d7543028cab5f3d605e4d6013804d0f52337a09b2ff85c0968528ceff1d686f1b011d8a4fb6aee4824f8859f291c2c15d1e6081a8d83264204ab7b145e0f7a69c7a414f5738226bc3ca6f44f08ebd9fa5fc13f7bfa8194621bdaf6cc3aa712ca3877977b13db1703362625991d3731f4284b51a2afe145c32b389a7687f711a5a4d85e03193826a7f3c65e1eed92c0b680a15703d162f3331491c6c4f6c2d318aa62c8b7a9001c38b4", @generic="0a9042ba8058d5a8866c6149fd8489b30de14fcbdc693b7207450415acd882bd4fa817d073f7ce9a6e31cbb47fbbabf0e3b93fd2e9ed269de2fdcd7a8191eb29af308cd170313c20dda46d61e86dcf11d9c94f1bf8aa07228df4179d9574be8091229b4707ae96027060c52c581c0df41f5844d26440a2d3a343e2e53eff544e3777f1010954ff036c0135c16ed613250f10adbc8b39a7f56ec4093fb724bccfa6a38d6730fac06e4a486f799a57a14c09ce7f16138823a5cc5b6f00fa602f874a25e542c10dc39a0b45721a9d417351677a363598d02696b915", @generic="1997f413f2a688212186e2c6e4f4221cda9c7a8a68d6802eee8764ebc2f7fe843bec4e030c452b4a4287a46412dfbbc7193868af3624770d49f92ff3ff8acfaf539eb097764924bb8780acff00cfe34118942564c1975627a7bb2b00035551c12a382a7280ffe5e152c9ea9a9fa4a4e715cd4a2037ba765ed23136", @generic="6ee655137f38668ee41e400d977c7d948e"]}, @typed={0x14, 0xd, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @nested={0x30, 0xcb, 0x0, 0x1, [@nested={0x4, 0xac}, @nested={0x4, 0x53}, @nested={0x4}, @typed={0x8, 0xb1, 0x0, 0x0, @u32=0x6}, @nested={0x4, 0x122}, @typed={0x14, 0xea, 0x0, 0x0, @ipv6=@mcast1}]}, @generic="90071ca0ebb419e05750ebf62ef5038e5c6d2c3617fa64eda030c91029a566646335416d6a82e5802513d97b0726f616d67da3e2be9b807b1515e1edb3559fe02b4cc35eeba91038c2b60849c926a7a81beefc198b9ae426a8c2aaa03782b7247718f87eaa8c8df43669e288ef2fec4698aa48a90972ebb7d75820f5f0d8da63f13bcf337ab7a2539e0ef37008216187326a4d", @typed={0x8, 0x20, 0x0, 0x0, @pid=r2}]}, 0x518}, 0x1, 0x0, 0x0, 0x124adc11b86ac226}, 0xc040) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r3, 0xc00c642d, &(0x7f0000000d80)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000e00)={&(0x7f0000000dc0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x7, 0x0, 0x0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000e80)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000ec0)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r0, 0xc00c642e, &(0x7f0000000f00)={0x0, 0x0, r0}) ioctl$DRM_IOCTL_MODE_GETFB2(r0, 0xc06864ce, &(0x7f0000000f40)={0x0, 0x9, 0xbe, 0x7ff, 0x2, [0x0], [0x8, 0xfffffffe, 0x4], [0x1000, 0x3, 0x4], [0x2, 0x1, 0x40, 0x9]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r7, 0xc06864b8, &(0x7f0000000fc0)={r8, 0x2, 0x100, 0x0, 0x2, [r9, r10, r11, r12], [0x2, 0x6, 0xbb, 0x2], [0x6, 0x8, 0xffff9ffc, 0x17], [0x200, 0x2, 0x0, 0xbd60]}) r13 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001080), r0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000001140)={&(0x7f0000001040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000001100)={&(0x7f00000010c0)={0x24, r13, 0x2, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x4}, @SEG6_ATTR_ALGID={0x5, 0x6, 0xf}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) r14 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r15 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000011c0), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_VERSION(r14, &(0x7f0000001280)={&(0x7f0000001180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x1c, r15, 0x41, 0x70bd2a, 0x3ff, {}, [@NLBL_MGMT_A_FAMILY={0x6, 0xb, 0x11}]}, 0x1c}}, 0x40804) r16 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001300), r14) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000001340)={0x0, 0x0}) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r14, &(0x7f0000001440)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000001400)={&(0x7f00000013c0)={0x2c, r16, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}, @NL802154_ATTR_PID={0x8, 0x1c, r2}, @NL802154_ATTR_PID={0x8, 0x1c, r17}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4008000}, 0x40) r18 = accept$inet(r0, &(0x7f0000001480), &(0x7f00000014c0)=0x10) recvfrom$inet(r18, &(0x7f0000001500)=""/4096, 0x1000, 0x22, &(0x7f0000002500)={0x2, 0x4e24, @rand_addr=0x64010102}, 0x10) socket$nl_sock_diag(0x10, 0x3, 0x4) 2.150929228s ago: executing program 3 (id=20166): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='freezer.state\x00', 0x275a, 0x0) ioctl$PAGEMAP_SCAN(r1, 0x5450, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000680)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r2, 0x0) accept4$inet(r2, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000000100)={0x0, 0x11, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000000)) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) r4 = dup(r3) sendmsg$IPSET_CMD_GET_BYINDEX(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x44}, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x26e1, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) quotactl$Q_QUOTAOFF(0x0, &(0x7f000000c500)=@filename='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) write$evdev(r5, 0x0, 0x0) sendmsg$inet6(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x24000890) r6 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) openat$incfs(r6, &(0x7f0000000040)='.pending_reads\x00', 0x416c0, 0x0) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) 1.220572067s ago: executing program 4 (id=20170): r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x3}, 0x8, 0x0) msgrcv(r0, &(0x7f00000017c0)={0x0, ""/11}, 0x13, 0x1, 0x3800) r1 = epoll_create1(0x0) ioctl$FS_IOC_SETVERSION(r1, 0x5452, &(0x7f0000000040)=0x6) 865.573575ms ago: executing program 4 (id=20171): r0 = openat$rdma_cm(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000180)={0xffffffffffffffff}, 0x2, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000200)={0xb, 0x10, 0xfa00, {&(0x7f00000000c0), r1, 0x5}}, 0x18) r2 = openat$sequencer(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) eventfd2(0x7ff, 0x100001) ioctl$BTRFS_IOC_QGROUP_CREATE(r2, 0x4010942a, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) write$nci(0xffffffffffffffff, 0x0, 0x0) capset(&(0x7f00000020c0)={0x20080522}, &(0x7f0000002100)={0x0, 0x0, 0xc0, 0x0, 0x0, 0x40001}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r5 = dup(r4) sendmsg$NL80211_CMD_JOIN_IBSS(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000240)={0x0}, 0x1, 0x0, 0x0, 0x4040000}, 0x40080) ioctl$VHOST_SET_OWNER(r5, 0xaf01, 0x0) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) ioctl$sock_SIOCGIFVLAN_DEL_VLAN_CMD(r6, 0x5452, &(0x7f0000000000)={0x1, 'ip6gre0\x00'}) openat$comedi(0xffffffffffffff9c, &(0x7f0000000000)='/dev/comedi3\x00', 0x40081, 0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0xc) openat$full(0xffffff9c, &(0x7f0000000000), 0xc0802, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r3, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={0x0}, 0x1, 0x0, 0x0, 0x4004}, 0x901) 501.402354ms ago: executing program 4 (id=20172): r0 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000280), 0x80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) recvmmsg$unix(r3, &(0x7f0000004980)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000024c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) write$tcp_mem(r4, 0x0, 0x0) close(r0) socket$nl_route(0x10, 0x3, 0x0) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18, 0x0, 0x0, {0x401}}, 0x18) 341.073643ms ago: executing program 4 (id=20173): r0 = openat$dlm_control(0xffffff9c, &(0x7f0000000740), 0x200000, 0x0) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_GET_KEY(r0, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000200)={&(0x7f00000000c0)={0x40, 0x0, 0x4, 0x70bd29, 0x25dfdbff, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_KEY_DATA_WEP40={0x9, 0x7, "dab2962789"}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x40}, 0x1, 0x0, 0x0, 0x8011}, 0x20008004) 165.201492ms ago: executing program 4 (id=20174): r0 = openat$procfs(0xffffff9c, 0x0, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x14, 0xe, 0x6, 0x0, 0x0, 0x0, {0x5, 0x0, 0x1}}, 0x14}, 0x1, 0x0, 0x0, 0x8c880}, 0x0) 0s ago: executing program 4 (id=20175): r0 = openat$fuse(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cuse(0xffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$FUSE_DEV_IOC_BACKING_OPEN(r0, 0x4010e501, &(0x7f0000000080)={r1}) r2 = openat$procfs(0xffffff9c, &(0x7f00000000c0)='/proc/mdstat\x00', 0x0, 0x0) r3 = getpgid(0x0) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, &(0x7f0000000380)={0x6, 0xf, {0xffffffffffffffff}, {0xee00}, 0x7, 0xaee7}) sendmmsg$unix(r2, &(0x7f0000000400)=[{{&(0x7f0000000100)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000000340)=[{&(0x7f0000000180)="fa749a51f4126198eefe229a3754446823640732d53eeea23a1c90376710afad13204aadef435f0214ee6e20fc15e72c0e498fdfd9261bcf3f56143b0c3a1eb70810a9c79d50cad71a854fca471e9d5d96b73a6821715e1ee888c9bdcc2f5167dbb8800b0715943ddadd604ddf6053fcd9856fb76b62ccd6969ea7583455f04ecf54e621494e0299f9467bc3b6caca0b", 0x90}, {&(0x7f0000000240)="b877fc5f1b288f9b776953dde46dd5751e3c6f980595b0ae0729c0c45d1abdecb18b51d895d2d7e78d444252b8afebaf5e6519157d5d5078bb2fa69fbb95c071be4ab184950eade4f9f0f68224307344eee8bc6b945e3c06ee6c96d9de2b0301c393476c", 0x64}, {&(0x7f00000002c0)="f185b034454f2068443b6b5fb0d55d65b7030ad81536c8182de20fc8bd74b077239115823508bfcd66a02216069c0eb26db31a60e1b746182fc5ff84b2b37806619eafb750fbb09513048ca75cbfbdffe76c66048cfcee1369adca00cce56133a8bdbdaea900f84c7ea943cc79777ce975a5ba4bd6c72a088b", 0x79}], 0x3, &(0x7f00000003c0)=[@cred={{0x18, 0x1, 0x2, {r3, r4}}}], 0x18}}], 0x1, 0x40) read$FUSE(r0, &(0x7f00000004c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) mount$fuse(0x0, &(0x7f0000000440)='./file0\x00', &(0x7f0000000480), 0x2040000, &(0x7f0000002500)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r5}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x100000000}}, {@default_permissions}, {@default_permissions}, {@max_read={'max_read', 0x3d, 0x4}}, {@default_permissions}, {@default_permissions}], [{@dont_hash}, {@subj_user={'subj_user', 0x3d, '!\r'}}, {@appraise_type}, {@dont_hash}, {@context={'context', 0x3d, 'staff_u'}}, {@smackfshat={'smackfshat', 0x3d, '!\x9c\x0f:n/&'}}, {@dont_measure}]}}) r6 = dup(r2) ioctl$BTRFS_IOC_QUOTA_RESCAN(r2, 0x4040942c, &(0x7f0000002680)={0x0, 0x74a, [0x7, 0xffffffffffffffff, 0x9, 0x3, 0x7, 0x3ff]}) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000027c0)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000002780)={&(0x7f0000002700)={0x64, 0x2, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x15, 0x3, 'hash:ip,port,net\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'bitmap:ip,mac\x00'}]}, 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x10) read$FUSE(r6, &(0x7f0000002800)={0x2020}, 0x2020) io_uring_register$IORING_UNREGISTER_IOWQ_AFF(r6, 0x12, 0x0, 0x0) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) ioctl$F2FS_IOC_MOVE_RANGE(r6, 0xc020f509, &(0x7f0000004840)={r6, 0x10000, 0x80, 0x7}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r6, 0x8933, &(0x7f00000048c0)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_VLAN(r7, &(0x7f00000049c0)={&(0x7f0000004880)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000004980)={&(0x7f0000004900)={0x48, 0x0, 0x20, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="8ad7c50fb04a"}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r8}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0xfa2}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}]}, 0x48}}, 0x4040) r9 = accept$inet(r6, 0x0, &(0x7f0000004a00)) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000004a40)={{{@in=@empty, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@private}}, &(0x7f0000004b40)=0xe8) msgget$private(0x0, 0x8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000004e40)={r2, 0xe0, &(0x7f0000004d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000004b80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, &(0x7f0000004bc0)=[0x0, 0x0], &(0x7f0000004c00)=[0x0], 0x0, 0xd5, &(0x7f0000004c40)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000004c80), &(0x7f0000004cc0), 0x8, 0xae, 0x8, 0x8, &(0x7f0000004d00)}}, 0x10) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r9, 0x89f2, &(0x7f0000004f80)={'syztnl1\x00', &(0x7f0000004e80)={'erspan0\x00', r10, 0x1, 0x8, 0xb8a, 0xffff7fff, {{0x34, 0x4, 0x1, 0x4, 0xd0, 0x65, 0x0, 0x99, 0x2f, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x1e, 0x1, 0xf, [{@broadcast}, {@private=0xa010101, 0x80000001}, {@private=0xa010102, 0x40}, {@private=0xa010102, 0x1}]}, @generic={0x88, 0x9, "86c96953e37ccc"}, @ra={0x94, 0x4, 0x1}, @generic={0x89, 0x7, "5c805bc07f"}, @cipso={0x86, 0x47, 0xffffffffffffffff, [{0x5, 0xa, "881cb47a0e332aad"}, {0x5, 0x3, "c3"}, {0x6, 0xb, "9c692f356ae0f32f25"}, {0x0, 0xe, "3ca83c2cae688a9aec5795c5"}, {0x7, 0x6, "19832852"}, {0x6, 0x2}, {0x2, 0x8, "3cd5f89e35df"}, {0x7, 0xb, "430c688066f6550e83"}]}, @generic={0x83, 0x11, "1575c5f81c962aba4de8833eeb7038"}, @ssrr={0x89, 0x7, 0x61, [@multicast2]}, @timestamp_addr={0x44, 0x24, 0xfd, 0x1, 0xd, [{@empty, 0x8000}, {@remote, 0xe}, {@dev={0xac, 0x14, 0x14, 0x41}, 0x200}, {@empty, 0x5}]}]}}}}}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r2, 0xc2c85512, &(0x7f0000004fc0)={{0x1, 0x0, 0x6, 0x80, 'syz1\x00', 0x7}, 0x1, [0x0, 0x7, 0x0, 0x2, 0x1, 0x3, 0x1, 0x3, 0x7, 0xe7f5, 0x80000001, 0x7, 0x3, 0x6, 0x3d9de214, 0x6, 0xd08, 0xfffffff9, 0x800, 0x323, 0xef, 0x7f, 0x4, 0xffffffff, 0x5b85, 0x80000001, 0x8, 0xc, 0x1, 0x5, 0x6, 0x0, 0x3, 0x4, 0xfffffeff, 0x3886d963, 0x101, 0x0, 0x6, 0x8c02, 0x10000, 0x2, 0x1000, 0x0, 0x400, 0x9d, 0x4, 0x6, 0x1ff, 0x100, 0x9, 0x8, 0xc000000, 0x2, 0x100, 0x8001, 0x2, 0x0, 0x4, 0x0, 0x10, 0x7fff, 0x5, 0x4, 0x8, 0x8, 0xfffffff8, 0xd, 0x7, 0x5, 0x6754, 0x40, 0x100, 0x6, 0x0, 0xfffffc66, 0xb9f, 0x101, 0x1, 0x5, 0x7, 0x6, 0x40, 0x6, 0x8, 0x8000, 0x8, 0x101, 0xfffffff9, 0x3, 0x800, 0xc, 0x5, 0x6, 0x1, 0x9, 0xffffffff, 0x3, 0x3, 0x0, 0x3, 0x6, 0xfabc, 0x5, 0x8, 0x4, 0xfffeffff, 0x9, 0x16, 0x7fffffff, 0x80, 0x8, 0x9, 0x4, 0x9, 0x5, 0x6894, 0x2, 0x1000, 0x76, 0x8, 0x0, 0x2, 0x5, 0x2, 0xffffffff, 0x3, 0x4]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000005300)={&(0x7f00000052c0)='mm_vmscan_lru_shrink_inactive\x00', r2, 0x0, 0x8}, 0x18) rt_sigreturn() ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r6, 0xc00c642e, &(0x7f0000005340)={0x0, 0x0, r7}) getsockname(r2, &(0x7f0000005380), &(0x7f0000005400)=0x80) setsockopt$ARPT_SO_SET_ADD_COUNTERS(r7, 0x0, 0x61, &(0x7f0000005440)={'filter\x00', 0x4}, 0x68) ioctl$TCSETSW2(r7, 0x402c542c, &(0x7f00000054c0)={0x1, 0xe, 0x3, 0x9, 0x1, "c163e1e01b820a88bf4ad0ee3af4cc0801cbfd", 0x8000, 0x9}) kernel console output (not intermixed with test programs): 9.739:625): avc: denied { create } for pid=19112 comm="syz.3.19315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5472.951917][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 5472.952316][ T31] audit: type=1400 audit(9823.859:630): avc: denied { create } for pid=19142 comm="syz.4.19328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5475.616659][ T31] audit: type=1400 audit(9826.529:631): avc: denied { read } for pid=19158 comm="syz.4.19334" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5476.643336][ T31] audit: type=1400 audit(9827.549:632): avc: denied { setattr } for pid=19165 comm="syz.4.19337" name="" dev="pipefs" ino=172156 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 5476.700793][ T31] audit: type=1400 audit(9827.559:633): avc: denied { create } for pid=19165 comm="syz.4.19337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5476.963475][ T31] audit: type=1400 audit(9827.849:634): avc: denied { create } for pid=19168 comm="syz.4.19338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5484.997638][ T31] audit: type=1400 audit(9835.909:635): avc: denied { execute } for pid=19186 comm="syz.3.19344" path=2F6D656D66643AC0873A2A18C16BA7875BA06F38AA4BA5D30B86CA3C7FFD368D7DD8F247B8EA65299086E39608E0FAB1D84EB257CB8D7D336C6D38A537C9202864656C6574656429 dev="tmpfs" ino=291 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 5486.459575][ T31] audit: type=1400 audit(9837.369:636): avc: denied { create } for pid=19195 comm="syz.3.19348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5486.533260][ T31] audit: type=1400 audit(9837.419:637): avc: denied { read } for pid=19178 comm="syz.4.19342" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5486.533668][ T31] audit: type=1400 audit(9837.419:638): avc: denied { create } for pid=19195 comm="syz.3.19348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5486.625113][ T31] audit: type=1400 audit(9837.539:639): avc: denied { create } for pid=19195 comm="syz.3.19348" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5486.878239][ T31] audit: type=1400 audit(9837.789:640): avc: denied { create } for pid=19197 comm="syz.3.19349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 5487.076147][ T31] audit: type=1400 audit(9837.989:641): avc: denied { create } for pid=19197 comm="syz.3.19349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5487.274287][ T31] audit: type=1400 audit(9838.189:642): avc: denied { create } for pid=19197 comm="syz.3.19349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5488.014207][ T31] audit: type=1400 audit(9838.919:643): avc: denied { module_request } for pid=19199 comm="syz.3.19350" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 5488.014573][ T31] audit: type=1400 audit(9838.919:644): avc: denied { sys_module } for pid=19199 comm="syz.3.19350" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 5490.394252][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 5490.394554][ T31] audit: type=1400 audit(9841.309:655): avc: denied { name_bind } for pid=19221 comm="syz.3.19360" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 5492.379809][ T31] audit: type=1400 audit(9843.259:656): avc: denied { create } for pid=19225 comm="syz.4.19361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5495.015872][ T31] audit: type=1400 audit(9845.929:657): avc: denied { name_bind } for pid=19230 comm="syz.4.19363" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 5499.804256][ T31] audit: type=1400 audit(9850.699:658): avc: denied { name_bind } for pid=19235 comm="syz.4.19365" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 5502.303894][ T31] audit: type=1400 audit(9853.219:659): avc: denied { read } for pid=19238 comm="syz.4.19366" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5502.407460][ T31] audit: type=1400 audit(9853.319:660): avc: denied { create } for pid=19238 comm="syz.4.19366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5502.454776][ T31] audit: type=1400 audit(9853.369:661): avc: denied { read } for pid=19238 comm="syz.4.19366" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5503.118638][ T31] audit: type=1400 audit(9853.999:662): avc: denied { create } for pid=19241 comm="syz.4.19367" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5505.176919][ T31] audit: type=1400 audit(9856.089:663): avc: denied { read append } for pid=19244 comm="syz.4.19368" name="midi2" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5505.201119][ T31] audit: type=1400 audit(9856.109:664): avc: denied { create } for pid=19244 comm="syz.4.19368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=0 [ 5505.347680][ T31] audit: type=1400 audit(9856.259:665): avc: denied { create } for pid=19246 comm="syz.4.19369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 5505.522313][ T31] audit: type=1400 audit(9856.429:666): avc: denied { accept } for pid=19248 comm="syz.4.19370" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=0 [ 5505.787077][ T31] audit: type=1400 audit(9856.699:667): avc: denied { read } for pid=19251 comm="syz.4.19371" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5505.791079][ T31] audit: type=1400 audit(9856.699:668): avc: denied { read } for pid=19251 comm="syz.4.19371" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5505.817428][ T31] audit: type=1400 audit(9856.729:669): avc: denied { read } for pid=19251 comm="syz.4.19371" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5505.901642][ T31] audit: type=1400 audit(9856.809:670): avc: denied { name_bind } for pid=19250 comm="syz.3.19372" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 5505.990931][ T31] audit: type=1400 audit(9856.899:671): avc: denied { read open } for pid=19250 comm="syz.3.19372" path="net:[4026532720]" dev="nsfs" ino=4026532720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5506.839480][ T31] audit: type=1400 audit(9857.749:672): avc: denied { read } for pid=19256 comm="syz.4.19374" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5510.487479][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 5510.490498][ T31] audit: type=1400 audit(9861.399:679): avc: denied { create } for pid=19274 comm="syz.3.19382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 5510.695273][ T31] audit: type=1400 audit(9861.609:680): avc: denied { create } for pid=19276 comm="syz.3.19383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5511.884014][ T31] audit: type=1400 audit(9862.799:681): avc: denied { name_bind } for pid=19280 comm="syz.3.19385" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 5512.483278][ T31] audit: type=1400 audit(9863.389:682): avc: denied { read write } for pid=19283 comm="syz.4.19386" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5512.487004][ T31] audit: type=1400 audit(9863.399:683): avc: denied { execute } for pid=19283 comm="syz.4.19386" path=2F6D656D66643A2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=292 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 5515.123261][ T31] audit: type=1400 audit(9866.029:684): avc: denied { create } for pid=19287 comm="syz.3.19388" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 5515.253839][ T31] audit: type=1400 audit(9866.149:685): avc: denied { create } for pid=19287 comm="syz.3.19388" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 5518.483722][ T31] audit: type=1400 audit(9869.389:686): avc: denied { name_bind } for pid=19294 comm="syz.4.19390" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 5518.534249][ T31] audit: type=1400 audit(9869.429:687): avc: denied { read } for pid=19294 comm="syz.4.19390" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5518.749129][ T31] audit: type=1400 audit(9869.659:688): avc: denied { mounton } for pid=19296 comm="syz.4.19391" path="/2843/file0" dev="tmpfs" ino=16412 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 5518.755464][ T31] audit: type=1400 audit(9869.669:689): avc: denied { read } for pid=19296 comm="syz.4.19391" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5519.135709][ T31] audit: type=1400 audit(9870.049:690): avc: denied { read } for pid=19300 comm="syz.4.19393" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5519.147793][ T31] audit: type=1400 audit(9870.059:691): avc: denied { read } for pid=19300 comm="syz.4.19393" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5519.193879][ T31] audit: type=1400 audit(9870.099:692): avc: denied { create } for pid=19300 comm="syz.4.19393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5519.691580][ T31] audit: type=1400 audit(9870.599:693): avc: denied { read } for pid=19304 comm="syz.4.19395" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 5522.321899][ T31] audit: type=1400 audit(9873.229:694): avc: denied { read } for pid=19307 comm="syz.4.19396" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5522.357185][ T31] audit: type=1400 audit(9873.269:695): avc: denied { create } for pid=19307 comm="syz.4.19396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5524.794981][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 5524.795996][ T31] audit: type=1400 audit(9875.709:700): avc: denied { execmem } for pid=19316 comm="syz.3.19400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 5526.654803][ T31] audit: type=1400 audit(9877.569:701): avc: denied { name_bind } for pid=19322 comm="syz.4.19402" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 5527.754748][ T31] audit: type=1400 audit(9878.669:702): avc: denied { create } for pid=19325 comm="syz.3.19403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 5528.101045][ T31] audit: type=1400 audit(9879.009:703): avc: denied { allowed } for pid=19327 comm="syz.3.19404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 5531.783807][ T31] audit: type=1400 audit(9882.669:704): avc: denied { create } for pid=19340 comm="syz.3.19409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 5531.965258][ T31] audit: type=1400 audit(9882.879:705): avc: denied { read } for pid=19344 comm="syz.4.19411" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5531.976829][ T31] audit: type=1400 audit(9882.879:706): avc: denied { read write } for pid=19344 comm="syz.4.19411" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5531.978619][ T31] audit: type=1400 audit(9882.889:707): avc: denied { read } for pid=19344 comm="syz.4.19411" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 5531.979989][ T31] audit: type=1400 audit(9882.889:708): avc: denied { read } for pid=19344 comm="syz.4.19411" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 5531.985543][ T31] audit: type=1400 audit(9882.899:709): avc: denied { read write } for pid=19344 comm="syz.4.19411" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5532.180484][ T31] audit: type=1400 audit(9883.089:710): avc: denied { write } for pid=19346 comm="syz.4.19412" name="random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5534.883602][ T31] audit: type=1400 audit(9885.789:711): avc: denied { create } for pid=19349 comm="syz.4.19413" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 5534.933560][ T31] audit: type=1400 audit(9885.839:712): avc: denied { read } for pid=19349 comm="syz.4.19413" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5534.943254][ T31] audit: type=1400 audit(9885.849:713): avc: denied { create } for pid=19349 comm="syz.4.19413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5536.812243][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 5536.812870][ T31] audit: type=1400 audit(9887.689:719): avc: denied { read } for pid=19360 comm="syz.4.19418" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5543.384935][ T31] audit: type=1400 audit(9894.299:720): avc: denied { create } for pid=19373 comm="syz.3.19424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5543.423516][ T31] audit: type=1400 audit(9894.329:721): avc: denied { create } for pid=19378 comm="syz.4.19426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 5543.473757][ T31] audit: type=1400 audit(9894.359:722): avc: denied { create } for pid=19378 comm="syz.4.19426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 5543.474287][ T31] audit: type=1400 audit(9894.359:723): avc: denied { create } for pid=19378 comm="syz.4.19426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5543.474593][ T31] audit: type=1400 audit(9894.369:724): avc: denied { create } for pid=19373 comm="syz.3.19424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5543.786806][ T31] audit: type=1400 audit(9894.699:725): avc: denied { create } for pid=19380 comm="syz.4.19427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5543.834000][ T31] audit: type=1400 audit(9894.729:726): avc: denied { execmem } for pid=19380 comm="syz.4.19427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 5545.203683][ T31] audit: type=1400 audit(9896.099:727): avc: denied { read } for pid=19384 comm="syz.4.19428" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 5545.204074][ T31] audit: type=1400 audit(9896.099:728): avc: denied { read } for pid=19384 comm="syz.4.19428" name="random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5545.553878][ T31] audit: type=1400 audit(9896.429:729): avc: denied { name_bind } for pid=19386 comm="syz.4.19429" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 5549.786916][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 5549.787139][ T31] audit: type=1400 audit(9900.629:738): avc: denied { mounton } for pid=19412 comm="syz.3.19441" path="/6234/file0" dev="tmpfs" ino=34073 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 5550.525973][ T31] audit: type=1400 audit(9901.439:739): avc: denied { create } for pid=19414 comm="syz.3.19442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5550.825380][ T31] audit: type=1400 audit(9901.729:740): avc: denied { create } for pid=19416 comm="syz.4.19444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5551.058594][ T31] audit: type=1400 audit(9901.969:741): avc: denied { create } for pid=19417 comm="syz.3.19443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 5551.177357][ T31] audit: type=1400 audit(9902.089:742): avc: denied { execute } for pid=19419 comm="syz.4.19445" path=2F6D656D66643A639C5CD4A42D4B982E55B423E129943A04FF9613AE831D2323E8410F4213B7C9CC8CAC6E28734EE4FB3FC5D022600A98E7FCFB8F59A8C8A6E797AC3327026DC1BF4252BEEFB136E537B913C4816A10AF95657C90F79956FAC026F2B84EB60123E28C6051569E41E4884381C50150D15E3D202864656C6574656429 dev="tmpfs" ino=297 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 5554.418196][ T31] audit: type=1400 audit(9905.329:743): avc: denied { create } for pid=19429 comm="syz.4.19448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 5555.558413][ T31] audit: type=1400 audit(9906.469:744): avc: denied { read } for pid=19429 comm="syz.4.19448" name="event0" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5555.628718][ T31] audit: type=1400 audit(9906.539:745): avc: denied { bpf } for pid=19429 comm="syz.4.19448" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 5555.631031][ T31] audit: type=1400 audit(9906.539:746): avc: denied { prog_load } for pid=19429 comm="syz.4.19448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5555.655109][ T31] audit: type=1400 audit(9906.559:747): avc: denied { map_create } for pid=19429 comm="syz.4.19448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5555.655665][ T31] audit: type=1400 audit(9906.559:748): avc: denied { prog_load } for pid=19429 comm="syz.4.19448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5556.074200][ T31] audit: type=1400 audit(9906.969:749): avc: denied { read } for pid=19438 comm="syz.4.19451" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5556.724502][ T31] audit: type=1400 audit(9907.609:750): avc: denied { read } for pid=19438 comm="syz.4.19451" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5559.094624][ T31] audit: type=1400 audit(9909.999:751): avc: denied { create } for pid=19449 comm="syz.3.19456" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 5562.843707][ T31] audit: type=1400 audit(9913.679:752): avc: denied { read } for pid=19456 comm="syz.4.19459" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5563.045857][ T31] audit: type=1400 audit(9913.959:753): avc: denied { create } for pid=19458 comm="syz.4.19460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5565.703621][ T31] audit: type=1400 audit(9916.599:754): avc: denied { name_bind } for pid=19460 comm="syz.3.19461" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 5565.704072][ T31] audit: type=1400 audit(9916.609:755): avc: denied { create } for pid=19461 comm="syz.4.19462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 5565.880345][ T31] audit: type=1400 audit(9916.789:756): avc: denied { read } for pid=19461 comm="syz.4.19462" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5568.375264][ T31] audit: type=1400 audit(9919.289:757): avc: denied { create } for pid=19467 comm="syz.4.19463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5571.083635][ T31] audit: type=1400 audit(9921.989:758): avc: denied { create } for pid=19472 comm="syz.4.19465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 5571.686579][ T31] audit: type=1400 audit(9922.599:759): avc: denied { read } for pid=19472 comm="syz.4.19465" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5573.733023][ T31] audit: type=1400 audit(9924.639:760): avc: denied { create } for pid=19475 comm="syz.4.19466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5573.751638][ T31] audit: type=1400 audit(9924.659:761): avc: denied { create } for pid=19475 comm="syz.4.19466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5573.807554][ T31] audit: type=1400 audit(9924.719:762): avc: denied { create } for pid=19475 comm="syz.4.19466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5573.814704][ T31] audit: type=1400 audit(9924.729:763): avc: denied { read } for pid=19475 comm="syz.4.19466" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5573.824700][ T31] audit: type=1400 audit(9924.739:764): avc: denied { create } for pid=19475 comm="syz.4.19466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5573.851260][ T31] audit: type=1400 audit(9924.759:765): avc: denied { create } for pid=19475 comm="syz.4.19466" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5573.876067][ T31] audit: type=1400 audit(9924.789:766): avc: denied { read } for pid=19475 comm="syz.4.19466" name="adsp1" dev="devtmpfs" ino=736 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5574.027432][ T31] audit: type=1400 audit(9924.939:767): avc: denied { read write } for pid=19477 comm="syz.4.19467" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5574.071353][ T31] audit: type=1400 audit(9924.979:768): avc: denied { read } for pid=19477 comm="syz.4.19467" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5574.093623][ T31] audit: type=1400 audit(9924.999:769): avc: denied { write } for pid=19477 comm="syz.4.19467" name="sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5576.338134][T19494] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1 sclass=netlink_audit_socket pid=19494 comm=syz.4.19475 [ 5580.346500][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 5580.346954][ T31] audit: type=1400 audit(9931.259:782): avc: denied { read } for pid=19529 comm="syz.4.19491" name="rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5580.704922][ T31] audit: type=1400 audit(9931.619:783): avc: denied { read write } for pid=19531 comm="syz.4.19492" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5580.876430][ T31] audit: type=1400 audit(9931.789:784): avc: denied { nlmsg_read } for pid=19533 comm="syz.3.19493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 5581.345496][ T31] audit: type=1400 audit(9932.259:785): avc: denied { create } for pid=19538 comm="syz.4.19496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5581.547902][ T31] audit: type=1400 audit(9932.459:786): avc: denied { read } for pid=19542 comm="syz.4.19498" name="full" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5581.756755][ T31] audit: type=1400 audit(9932.669:787): avc: denied { write } for pid=19545 comm="syz.4.19499" name="iommu" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5581.865350][ T31] audit: type=1400 audit(9932.779:788): avc: denied { create } for pid=19547 comm="syz.3.19500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 5581.950411][ T31] audit: type=1400 audit(9932.859:789): avc: denied { read } for pid=19549 comm="syz.4.19501" name="ttyS3" dev="devtmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5582.196440][ T31] audit: type=1400 audit(9933.099:790): avc: denied { create } for pid=19551 comm="syz.3.19502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5582.240613][ T31] audit: type=1400 audit(9933.149:791): avc: denied { read } for pid=19552 comm="syz.4.19503" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5585.764053][T19588] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=2052 sclass=netlink_tcpdiag_socket pid=19588 comm=syz.4.19519 [ 5586.005768][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 5586.006272][ T31] audit: type=1400 audit(9936.919:800): avc: denied { setattr } for pid=19589 comm="syz.4.19521" name="" dev="pipefs" ino=174106 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 5586.421818][T19597] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=19597 comm=syz.4.19524 [ 5586.426772][ T31] audit: type=1400 audit(9937.329:801): avc: denied { create } for pid=19592 comm="syz.3.19522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5586.604987][ T31] audit: type=1400 audit(9937.519:802): avc: denied { create } for pid=19592 comm="syz.3.19522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5587.337010][ T31] audit: type=1400 audit(9938.209:803): avc: denied { setattr } for pid=19606 comm="syz.4.19530" name="" dev="pipefs" ino=120994 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=0 [ 5587.541086][ T31] audit: type=1400 audit(9938.439:804): avc: denied { allowed } for pid=19610 comm="syz.4.19531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 5587.812270][ T31] audit: type=1400 audit(9938.719:805): avc: denied { audit_read } for pid=19613 comm="syz.4.19533" capability=37 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 5587.845724][T19615] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19615 comm=syz.3.19532 [ 5588.065637][T19618] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19618 comm=syz.4.19534 [ 5588.290574][ T31] audit: type=1400 audit(9939.199:806): avc: denied { read write } for pid=19622 comm="syz.4.19537" name="dlm-control" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5588.375164][ T31] audit: type=1400 audit(9939.289:807): avc: denied { create } for pid=19624 comm="syz.4.19538" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 5588.954745][ T31] audit: type=1400 audit(9939.869:808): avc: denied { watch } for pid=19628 comm="syz.3.19540" path="/6277/file0" dev="tmpfs" ino=34298 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 5589.274653][ T31] audit: type=1400 audit(9940.189:809): avc: denied { read write } for pid=19626 comm="syz.4.19539" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5590.104337][T19642] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=19642 comm=syz.3.19545 [ 5591.169582][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 5591.170023][ T31] audit: type=1400 audit(9942.079:811): avc: denied { create } for pid=19650 comm="syz.3.19551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5591.266058][ T31] audit: type=1400 audit(9942.179:812): avc: denied { create } for pid=19650 comm="syz.3.19551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5591.498960][T19658] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=19658 comm=syz.4.19554 [ 5591.879966][ T31] audit: type=1400 audit(9942.779:813): avc: denied { create } for pid=19663 comm="syz.4.19558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5592.054681][ T31] audit: type=1400 audit(9942.969:814): avc: denied { map } for pid=19662 comm="syz.3.19557" path="socket:[173305]" dev="sockfs" ino=173305 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=0 [ 5592.175242][ T31] audit: type=1400 audit(9943.089:815): avc: denied { accept } for pid=19666 comm="syz.4.19559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=0 [ 5592.729914][ T31] audit: type=1400 audit(9943.639:816): avc: denied { allowed } for pid=19673 comm="syz.3.19563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 5592.743761][ T31] audit: type=1400 audit(9943.659:817): avc: denied { create } for pid=19673 comm="syz.3.19563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5592.863010][ T31] audit: type=1400 audit(9943.759:818): avc: denied { create } for pid=19673 comm="syz.3.19563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5592.899671][ T31] audit: type=1400 audit(9943.809:819): avc: denied { read append } for pid=19676 comm="syz.4.19564" name="vcsu" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5592.938339][ T31] audit: type=1400 audit(9943.849:820): avc: denied { create } for pid=19676 comm="syz.4.19564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5597.679715][T19702] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19702 comm=syz.4.19575 [ 5598.350727][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 5598.351295][ T31] audit: type=1400 audit(9949.259:825): avc: denied { read } for pid=19710 comm="syz.4.19580" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5598.370046][ T31] audit: type=1400 audit(9949.279:826): avc: denied { create } for pid=19710 comm="syz.4.19580" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5598.377278][ T31] audit: type=1400 audit(9949.289:827): avc: denied { module_request } for pid=19710 comm="syz.4.19580" kmod="netdev-netpci0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 5598.377721][ T31] audit: type=1400 audit(9949.289:828): avc: denied { sys_module } for pid=19710 comm="syz.4.19580" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 5598.763382][ T31] audit: type=1400 audit(9949.669:829): avc: denied { allowed } for pid=19712 comm="syz.3.19581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 5598.954622][ T31] audit: type=1400 audit(9949.829:830): avc: denied { create } for pid=19712 comm="syz.3.19581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5599.395638][ T31] audit: type=1400 audit(9950.309:831): avc: denied { create } for pid=19723 comm="syz.3.19586" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 5603.516834][ T31] audit: type=1400 audit(9954.429:832): avc: denied { create } for pid=19751 comm="syz.4.19600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5603.607505][ T31] audit: type=1400 audit(9954.519:833): avc: denied { create } for pid=19751 comm="syz.4.19600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5604.051704][ T31] audit: type=1400 audit(9954.959:834): avc: denied { create } for pid=19754 comm="syz.3.19601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5605.661056][ T31] audit: type=1400 audit(9956.569:835): avc: denied { allowed } for pid=19767 comm="syz.4.19606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 5605.667459][ T31] audit: type=1400 audit(9956.579:836): avc: denied { create } for pid=19767 comm="syz.4.19606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5605.765601][ T31] audit: type=1400 audit(9956.679:837): avc: denied { create } for pid=19767 comm="syz.4.19606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5606.319532][ T31] audit: type=1400 audit(9957.229:838): avc: denied { allowed } for pid=19771 comm="syz.4.19608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 5606.812187][ T31] audit: type=1400 audit(9957.719:839): avc: denied { create } for pid=19777 comm="syz.4.19611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5606.842963][ T31] audit: type=1400 audit(9957.749:840): avc: denied { create } for pid=19777 comm="syz.4.19611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5607.365836][ T31] audit: type=1400 audit(9958.279:841): avc: denied { setcheckreqprot } for pid=19781 comm="syz.4.19613" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=0 [ 5617.190022][ T31] audit: type=1400 audit(9968.099:842): avc: denied { accept } for pid=19805 comm="syz.3.19622" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=0 [ 5619.119300][ T31] audit: type=1400 audit(9970.029:843): avc: denied { allowed } for pid=19813 comm="syz.3.19626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 5620.488271][ T31] audit: type=1400 audit(9971.399:844): avc: denied { write } for pid=19816 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5620.500936][ T31] audit: type=1400 audit(9971.409:845): avc: denied { search } for pid=19816 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 5620.575929][ T31] audit: type=1400 audit(9971.489:846): avc: denied { search } for pid=19818 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 5620.578817][ T31] audit: type=1400 audit(9971.489:847): avc: denied { search } for pid=19818 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 5620.584529][ T31] audit: type=1400 audit(9971.489:848): avc: denied { search } for pid=19818 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 5620.587663][ T31] audit: type=1400 audit(9971.489:849): avc: denied { search } for pid=19818 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 5620.591345][ T31] audit: type=1400 audit(9971.489:850): avc: denied { search } for pid=19818 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 5620.595075][ T31] audit: type=1400 audit(9971.489:851): avc: denied { search } for pid=19818 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=0 [ 5625.207762][ T31] kauditd_printk_skb: 50 callbacks suppressed [ 5625.211336][ T31] audit: type=1400 audit(9976.119:902): avc: denied { create } for pid=19828 comm="syz.4.19630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5630.946741][ T31] audit: type=1400 audit(9981.859:903): avc: denied { create } for pid=19855 comm="syz.3.19639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5632.722183][ T31] audit: type=1400 audit(9983.619:904): avc: denied { create } for pid=19863 comm="syz.4.19641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5642.255145][ T31] audit: type=1400 audit(9993.169:905): avc: denied { create } for pid=19909 comm="syz.4.19655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5643.060866][ T31] audit: type=1400 audit(9993.969:906): avc: denied { allowed } for pid=19915 comm="syz.4.19657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 5658.186991][ T31] audit: type=1400 audit(10009.029:907): avc: denied { allowed } for pid=19983 comm="syz.4.19678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 5658.187420][ T31] audit: type=1400 audit(10009.029:908): avc: denied { create } for pid=19983 comm="syz.4.19678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5658.187682][ T31] audit: type=1400 audit(10009.059:909): avc: denied { create } for pid=19983 comm="syz.4.19678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5663.797856][ T31] audit: type=1400 audit(10014.709:910): avc: denied { allowed } for pid=20020 comm="syz.4.19688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 5663.979213][ T31] audit: type=1400 audit(10014.889:911): avc: denied { create } for pid=20023 comm="syz.4.19689" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5664.085545][ T31] audit: type=1400 audit(10014.999:912): avc: denied { read open } for pid=20023 comm="syz.4.19689" path="net:[4026532935]" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5664.375063][ T31] audit: type=1400 audit(10015.289:913): avc: denied { create } for pid=20025 comm="syz.4.19690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5664.414080][ T31] audit: type=1400 audit(10015.299:914): avc: denied { create } for pid=20025 comm="syz.4.19690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5668.489025][ T31] audit: type=1400 audit(10019.399:915): avc: denied { create } for pid=20043 comm="syz.4.19696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=0 [ 5669.253217][ T31] audit: type=1400 audit(10020.149:916): avc: denied { create } for pid=20046 comm="syz.4.19697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5669.650955][ T31] audit: type=1400 audit(10020.559:917): avc: denied { map_create } for pid=20050 comm="syz.4.19698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5669.669402][ T31] audit: type=1400 audit(10020.579:918): avc: denied { prog_load } for pid=20050 comm="syz.4.19698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5669.681553][ T31] audit: type=1400 audit(10020.589:919): avc: denied { prog_load } for pid=20050 comm="syz.4.19698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5670.143733][ T31] audit: type=1400 audit(10021.019:920): avc: denied { module_request } for pid=20054 comm="syz.3.19700" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 5670.144049][ T31] audit: type=1400 audit(10021.019:921): avc: denied { sys_module } for pid=20054 comm="syz.3.19700" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 5674.688721][ T31] audit: type=1400 audit(10025.599:922): avc: denied { create } for pid=20076 comm="syz.4.19709" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5674.785933][ T31] audit: type=1400 audit(10025.699:923): avc: denied { module_request } for pid=20078 comm="syz.3.19710" kmod="netdev-vxcan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 5674.787014][ T31] audit: type=1400 audit(10025.699:924): avc: denied { sys_module } for pid=20078 comm="syz.3.19710" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 5675.205012][ T31] audit: type=1400 audit(10026.119:925): avc: denied { mounton } for pid=20080 comm="syz.3.19711" path="/6355/file0" dev="tmpfs" ino=34700 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 5676.321052][ T31] audit: type=1400 audit(10027.229:926): avc: denied { create } for pid=20088 comm="syz.4.19715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5676.352940][ T31] audit: type=1400 audit(10027.239:927): avc: denied { create } for pid=20088 comm="syz.4.19715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5676.528482][ T31] audit: type=1400 audit(10027.439:928): avc: denied { create } for pid=20092 comm="syz.4.19717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5676.805887][ T31] audit: type=1400 audit(10027.719:929): avc: denied { create } for pid=20094 comm="syz.3.19719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5677.819577][ T31] audit: type=1400 audit(10028.729:930): avc: denied { create } for pid=20101 comm="syz.3.19721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5677.914676][ T31] audit: type=1400 audit(10028.829:931): avc: denied { create } for pid=20101 comm="syz.3.19721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5680.716562][T20118] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=20118 comm=syz.3.19728 [ 5680.718885][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 5680.719214][ T31] audit: type=1400 audit(10031.629:936): avc: denied { create } for pid=20117 comm="syz.3.19728" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5680.758272][ T31] audit: type=1400 audit(10031.669:937): avc: denied { create } for pid=20113 comm="syz.4.19727" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5681.021744][ T31] audit: type=1400 audit(10031.929:938): avc: denied { create } for pid=20121 comm="syz.4.19730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5681.150086][ T31] audit: type=1400 audit(10032.059:939): avc: denied { create } for pid=20120 comm="syz.3.19729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5681.273482][ T31] audit: type=1400 audit(10032.179:940): avc: denied { create } for pid=20120 comm="syz.3.19729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 5681.725702][ T31] audit: type=1400 audit(10032.609:941): avc: denied { create } for pid=20121 comm="syz.4.19730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 5681.725983][ T31] audit: type=1400 audit(10032.619:942): avc: denied { read } for pid=20121 comm="syz.4.19730" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5682.933167][ T31] audit: type=1400 audit(10033.839:943): avc: denied { name_bind } for pid=20128 comm="syz.4.19733" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 5684.130753][ T31] audit: type=1400 audit(10035.039:944): avc: denied { create } for pid=20131 comm="syz.3.19734" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5685.898425][ T31] audit: type=1400 audit(10036.809:945): avc: denied { create } for pid=20136 comm="syz.4.19736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5685.926480][ T31] audit: type=1400 audit(10036.839:946): avc: denied { map_create } for pid=20136 comm="syz.4.19736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5685.931815][ T31] audit: type=1400 audit(10036.839:947): avc: denied { map_create } for pid=20136 comm="syz.4.19736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5685.954962][ T31] audit: type=1400 audit(10036.869:948): avc: denied { create } for pid=20136 comm="syz.4.19736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5686.160207][T20141] sch_fq: defrate 0 ignored. [ 5686.176930][ T31] audit: type=1400 audit(10037.089:949): avc: denied { map_create } for pid=20139 comm="syz.3.19737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5686.183495][ T31] audit: type=1400 audit(10037.089:950): avc: denied { prog_load } for pid=20139 comm="syz.3.19737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5686.187971][ T31] audit: type=1400 audit(10037.099:951): avc: denied { prog_load } for pid=20139 comm="syz.3.19737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5686.211288][ T31] audit: type=1400 audit(10037.119:952): avc: denied { create } for pid=20140 comm="syz.4.19738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 5686.218566][ T31] audit: type=1400 audit(10037.129:953): avc: denied { read } for pid=20140 comm="syz.4.19738" name="nvme-fabrics" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5686.245127][ T31] audit: type=1400 audit(10037.159:954): avc: denied { create } for pid=20140 comm="syz.4.19738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5690.950326][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 5690.950560][ T31] audit: type=1400 audit(10041.859:962): avc: denied { create } for pid=20162 comm="syz.3.19747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 5690.995253][ T31] audit: type=1400 audit(10041.909:963): avc: denied { create } for pid=20163 comm="syz.4.19748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 5691.226632][ T31] audit: type=1400 audit(10042.139:964): avc: denied { create } for pid=20167 comm="syz.4.19750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5691.297357][ T31] audit: type=1400 audit(10042.209:965): avc: denied { create } for pid=20166 comm="syz.3.19749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5691.497064][ T31] audit: type=1400 audit(10042.409:966): avc: denied { create } for pid=20170 comm="syz.4.19751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5691.863233][ T31] audit: type=1400 audit(10042.769:967): avc: denied { create } for pid=20174 comm="syz.4.19753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 5691.987037][ T31] audit: type=1400 audit(10042.899:968): avc: denied { read append } for pid=20177 comm="syz.4.19755" name="renderD128" dev="devtmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5692.106507][ T31] audit: type=1400 audit(10043.019:969): avc: denied { prog_load } for pid=20180 comm="syz.4.19756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5692.285681][ T31] audit: type=1400 audit(10043.199:970): avc: denied { create } for pid=20183 comm="syz.4.19758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5692.374687][ T31] audit: type=1400 audit(10043.289:971): avc: denied { create } for pid=20182 comm="syz.3.19757" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 5693.998378][T20218] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=369 sclass=netlink_audit_socket pid=20218 comm=syz.4.19775 [ 5696.054935][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 5696.055313][ T31] audit: type=1400 audit(10046.969:993): avc: denied { read write } for pid=20256 comm="syz.4.19795" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5696.060606][ T31] audit: type=1400 audit(10046.969:994): avc: denied { mounton } for pid=20256 comm="syz.4.19795" path="/3069/file0" dev="tmpfs" ino=17586 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 5697.459932][ T31] audit: type=1400 audit(10048.369:995): avc: denied { create } for pid=20270 comm="syz.3.19800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5697.696148][ T31] audit: type=1400 audit(10048.589:996): avc: denied { create } for pid=20272 comm="syz.4.19801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5697.985047][ T31] audit: type=1400 audit(10048.899:997): avc: denied { read write } for pid=20274 comm="syz.4.19802" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5698.106530][ T31] audit: type=1400 audit(10049.019:998): avc: denied { create } for pid=20277 comm="syz.4.19804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5698.114922][ T31] audit: type=1400 audit(10049.029:999): avc: denied { create } for pid=20277 comm="syz.4.19804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5699.424904][ T31] audit: type=1400 audit(10050.339:1000): avc: denied { create } for pid=20289 comm="syz.3.19809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5699.504789][ T31] audit: type=1400 audit(10050.419:1001): avc: denied { create } for pid=20289 comm="syz.3.19809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5699.573807][ T31] audit: type=1400 audit(10050.489:1002): avc: denied { read write } for pid=20291 comm="syz.4.19810" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5704.646167][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 5704.646495][ T31] audit: type=1400 audit(10055.559:1005): avc: denied { create } for pid=20314 comm="syz.4.19819" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5714.589409][ T31] audit: type=1400 audit(10065.499:1006): avc: denied { create } for pid=20355 comm="syz.4.19830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5717.058743][ T31] audit: type=1400 audit(10067.969:1007): avc: denied { create } for pid=20370 comm="syz.3.19835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5717.087668][ T31] audit: type=1400 audit(10067.999:1008): avc: denied { create } for pid=20372 comm="syz.4.19836" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5717.096956][ T31] audit: type=1400 audit(10068.009:1009): avc: denied { create } for pid=20370 comm="syz.3.19835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5720.304013][ T31] audit: type=1400 audit(10071.169:1010): avc: denied { create } for pid=20391 comm="syz.3.19842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5720.304456][ T31] audit: type=1400 audit(10071.179:1011): avc: denied { create } for pid=20391 comm="syz.3.19842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5726.525174][ T31] audit: type=1400 audit(10077.439:1012): avc: denied { create } for pid=20420 comm="syz.3.19851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5728.673458][ T31] audit: type=1400 audit(10079.579:1013): avc: denied { create } for pid=20432 comm="syz.4.19854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5731.148092][ T31] audit: type=1400 audit(10082.059:1014): avc: denied { create } for pid=20444 comm="syz.4.19858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5738.533442][ T31] audit: type=1400 audit(10089.439:1015): avc: denied { create } for pid=20480 comm="syz.4.19869" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5742.021286][ T31] audit: type=1400 audit(10092.929:1016): avc: denied { read } for pid=20492 comm="syz.4.19873" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5742.038143][ T31] audit: type=1400 audit(10092.949:1017): avc: denied { create } for pid=20492 comm="syz.4.19873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5742.060737][ T31] audit: type=1400 audit(10092.969:1018): avc: denied { create } for pid=20492 comm="syz.4.19873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5742.085698][ T31] audit: type=1400 audit(10092.989:1019): avc: denied { read } for pid=20492 comm="syz.4.19873" name="ptmx" dev="devtmpfs" ino=603 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5742.303217][ T31] audit: type=1400 audit(10093.209:1020): avc: denied { create } for pid=20494 comm="syz.4.19874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5742.349580][ T31] audit: type=1400 audit(10093.259:1021): avc: denied { read } for pid=20494 comm="syz.4.19874" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5742.415324][ T31] audit: type=1400 audit(10093.329:1022): avc: denied { create } for pid=20494 comm="syz.4.19874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5742.419485][ T31] audit: type=1400 audit(10093.329:1023): avc: denied { read write } for pid=20494 comm="syz.4.19874" name="virtual_nci" dev="devtmpfs" ino=658 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5742.691002][ T31] audit: type=1400 audit(10093.599:1024): avc: denied { create } for pid=20496 comm="syz.4.19875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5744.812339][T20504] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=20504 comm=syz.4.19878 [ 5746.560523][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 5746.561075][ T31] audit: type=1400 audit(10097.459:1026): avc: denied { create } for pid=20507 comm="syz.4.19880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5746.571940][ T31] audit: type=1400 audit(10097.479:1027): avc: denied { create } for pid=20507 comm="syz.4.19880" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5746.866795][ T31] audit: type=1400 audit(10097.779:1028): avc: denied { map_create } for pid=20509 comm="syz.4.19881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5747.075591][ T31] audit: type=1400 audit(10097.989:1029): avc: denied { create } for pid=20511 comm="syz.4.19882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=0 [ 5747.236813][ T31] audit: type=1400 audit(10098.149:1030): avc: denied { write } for pid=20511 comm="syz.4.19882" name="ttyprintk" dev="devtmpfs" ino=609 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5747.355227][ T31] audit: type=1400 audit(10098.269:1031): avc: denied { read } for pid=20511 comm="syz.4.19882" name="rfkill" dev="devtmpfs" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5747.601599][ T31] audit: type=1400 audit(10098.509:1032): avc: denied { create } for pid=20513 comm="syz.4.19883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 5747.826567][T20516] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1538 sclass=netlink_audit_socket pid=20516 comm=syz.4.19884 [ 5748.017966][ T31] audit: type=1400 audit(10098.929:1033): avc: denied { mounton } for pid=20517 comm="syz.3.19885" path="/6422/file0" dev="tmpfs" ino=35048 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 5748.088552][ T31] audit: type=1400 audit(10098.999:1034): avc: denied { create } for pid=20518 comm="syz.4.19886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5748.934776][ T31] audit: type=1400 audit(10099.849:1035): avc: denied { create } for pid=20529 comm="syz.3.19891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5752.004489][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 5752.004859][ T31] audit: type=1400 audit(10102.919:1039): avc: denied { read write } for pid=20553 comm="syz.4.19902" name="seq" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5752.375316][ T31] audit: type=1400 audit(10103.289:1040): avc: denied { prog_load } for pid=20560 comm="syz.4.19906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5752.379333][ T31] audit: type=1400 audit(10103.289:1041): avc: denied { create } for pid=20560 comm="syz.4.19906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 5752.568927][ T31] audit: type=1400 audit(10103.479:1042): avc: denied { create } for pid=20563 comm="syz.3.19908" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5753.426963][ T31] audit: type=1400 audit(10104.339:1043): avc: denied { read write } for pid=20576 comm="syz.4.19914" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5753.659130][ T31] audit: type=1400 audit(10104.569:1044): avc: denied { create } for pid=20575 comm="syz.3.19913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5753.756945][ T31] audit: type=1400 audit(10104.669:1045): avc: denied { create } for pid=20579 comm="syz.4.19915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5753.875136][ T31] audit: type=1400 audit(10104.789:1046): avc: denied { create } for pid=20575 comm="syz.3.19913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5755.055578][ T31] audit: type=1400 audit(10105.969:1047): avc: denied { create } for pid=20588 comm="syz.3.19919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5756.676442][ T31] audit: type=1400 audit(10107.589:1048): avc: denied { read write } for pid=20594 comm="syz.4.19922" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5757.686162][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 5757.686513][ T31] audit: type=1400 audit(10108.599:1052): avc: denied { create } for pid=20597 comm="syz.3.19924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5760.136655][ T31] audit: type=1400 audit(10111.049:1053): avc: denied { create } for pid=20612 comm="syz.3.19928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5760.195116][ T31] audit: type=1400 audit(10111.109:1054): avc: denied { create } for pid=20612 comm="syz.3.19928" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5761.943810][ T31] audit: type=1400 audit(10112.809:1055): avc: denied { create } for pid=20617 comm="syz.4.19930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5764.513165][ T31] audit: type=1400 audit(10115.379:1056): avc: denied { create } for pid=20634 comm="syz.3.19935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5764.569797][ T31] audit: type=1400 audit(10115.479:1057): avc: denied { create } for pid=20634 comm="syz.3.19935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5768.144032][ T31] audit: type=1400 audit(10119.029:1058): avc: denied { create } for pid=20653 comm="syz.4.19941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5768.144457][ T31] audit: type=1400 audit(10119.049:1059): avc: denied { create } for pid=20653 comm="syz.4.19941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5768.386700][ T31] audit: type=1400 audit(10119.299:1060): avc: denied { read } for pid=20658 comm="syz.4.19943" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5768.920773][ T31] audit: type=1400 audit(10119.829:1061): avc: denied { execute } for pid=20658 comm="syz.4.19943" path=2F6D656D66643A0B88E0731AD6467445234AFB881EE8032501EC018B3163CF2C2C887F8AE77A25E6FDAF8853AC5132491FA65D697BFC85AF57EC202864656C6574656429 dev="tmpfs" ino=302 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 5771.030967][ T31] audit: type=1400 audit(10121.939:1062): avc: denied { create } for pid=20667 comm="syz.4.19945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5771.804647][ T31] audit: type=1400 audit(10122.719:1063): avc: denied { create } for pid=20672 comm="syz.3.19947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5771.866658][ T31] audit: type=1400 audit(10122.779:1064): avc: denied { create } for pid=20672 comm="syz.3.19947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5773.405247][T20683] netlink: 'syz.3.19950': attribute type 27 has an invalid length. [ 5773.456440][ T31] audit: type=1400 audit(10124.359:1065): avc: denied { create } for pid=20682 comm="syz.4.19951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5773.936949][ T31] audit: type=1400 audit(10124.849:1066): avc: denied { prog_load } for pid=20681 comm="syz.3.19950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 5774.505171][ T31] audit: type=1400 audit(10125.419:1067): avc: denied { create } for pid=20689 comm="syz.4.19953" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5774.661180][ T31] audit: type=1400 audit(10125.569:1068): avc: denied { create } for pid=20691 comm="syz.4.19954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5775.310837][T20687] 8021q: adding VLAN 0 to HW filter on device  [ 5775.596076][T20687] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 5775.617680][T20687] veth1_vlan: left promiscuous mode [ 5775.647211][T20687] veth0_vlan: left promiscuous mode [ 5775.651628][T20687] veth0_vlan: entered promiscuous mode [ 5775.661042][T20687] veth1_vlan: entered promiscuous mode [ 5775.709520][T20687] veth1_macvtap: left promiscuous mode [ 5775.711600][T20687] veth0_macvtap: left promiscuous mode [ 5775.828655][T20687] veth0_macvtap: entered promiscuous mode [ 5775.831077][T20687] veth1_macvtap: entered promiscuous mode [ 5776.369166][ T31] audit: type=1400 audit(10127.279:1069): avc: denied { mounton } for pid=20699 comm="syz.3.19956" path="/6459/file0" dev="tmpfs" ino=35245 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 5779.433966][ T31] audit: type=1400 audit(10130.339:1070): avc: denied { create } for pid=20713 comm="syz.3.19961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 5781.393252][ T31] audit: type=1400 audit(10132.249:1071): avc: denied { read write } for pid=20721 comm="syz.4.19963" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5781.393614][ T31] audit: type=1400 audit(10132.259:1072): avc: denied { mounton } for pid=20721 comm="syz.4.19963" path="/3168/file0" dev="tmpfs" ino=18095 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 5782.705976][ T31] audit: type=1400 audit(10133.619:1073): avc: denied { create } for pid=20725 comm="syz.3.19965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5783.616243][ T31] audit: type=1400 audit(10134.529:1074): avc: denied { module_request } for pid=20733 comm="syz.3.19968" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 5783.619126][ T31] audit: type=1400 audit(10134.529:1075): avc: denied { sys_module } for pid=20733 comm="syz.3.19968" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 5783.802978][ T31] audit: type=1400 audit(10134.709:1076): avc: denied { create } for pid=20729 comm="syz.4.19966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5783.803367][ T31] audit: type=1400 audit(10134.709:1077): avc: denied { create } for pid=20733 comm="syz.3.19968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 5783.924094][ T31] audit: type=1400 audit(10134.789:1078): avc: denied { allowed } for pid=20733 comm="syz.3.19968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 5783.998692][ T31] audit: type=1400 audit(10134.909:1079): avc: denied { create } for pid=20733 comm="syz.3.19968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5784.937527][ T31] audit: type=1400 audit(10135.849:1080): avc: denied { create } for pid=20735 comm="syz.3.19969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5788.447211][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 5788.450207][ T31] audit: type=1400 audit(10139.359:1082): avc: denied { create } for pid=20742 comm="syz.4.19971" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5788.535267][ T31] audit: type=1400 audit(10139.449:1083): avc: denied { create } for pid=20744 comm="syz.3.19972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5789.348572][ T31] audit: type=1400 audit(10140.259:1084): avc: denied { create } for pid=20747 comm="syz.4.19973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5790.453274][ T31] audit: type=1400 audit(10141.359:1085): avc: denied { create } for pid=20750 comm="syz.4.19974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5791.328635][ T31] audit: type=1400 audit(10142.239:1086): avc: denied { create } for pid=20753 comm="syz.4.19975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5791.744420][T20759] FAULT_INJECTION: forcing a failure. [ 5791.744420][T20759] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 5791.746444][T20759] CPU: 0 UID: 0 PID: 20759 Comm: syz.4.19977 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 5791.746581][T20759] Hardware name: ARM-Versatile Express [ 5791.746751][T20759] Call trace: [ 5791.746935][T20759] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5791.747163][T20759] r7:20000540 r6:00000000 r5:60000013 r4:82260088 [ 5791.747217][T20759] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5791.747250][T20759] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5791.747280][T20759] r5:84178c00 r4:8294f150 [ 5791.747286][T20759] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 5791.747317][T20759] [<80971c40>] (should_fail_ex) from [<80971e7c>] (should_fail+0x14/0x18) [ 5791.747348][T20759] r8:ea811efc r7:20000540 r6:ea811e88 r5:00000004 r4:00000004 [ 5791.747356][T20759] [<80971e68>] (should_fail) from [<80971e9c>] (should_fail_usercopy+0x1c/0x20) [ 5791.747382][T20759] [<80971e80>] (should_fail_usercopy) from [<815464b8>] (copy_from_sockptr_offset.constprop.0+0x5c/0x11c) [ 5791.747462][T20759] [<8154645c>] (copy_from_sockptr_offset.constprop.0) from [<8154bbf8>] (sk_setsockopt+0x90/0x1410) [ 5791.747496][T20759] r8:ea811efc r7:ea811eac r6:00000025 r5:840edac0 r4:00000000 [ 5791.747504][T20759] [<8154bb6c>] (sk_setsockopt) from [<8154cfa4>] (sock_setsockopt+0x2c/0x34) [ 5791.747552][T20759] r10:00000126 r9:84178c00 r8:00000004 r7:834b1180 r6:00000025 r5:00000001 [ 5791.747568][T20759] r4:00000000 [ 5791.747576][T20759] [<8154cf7c>] (sock_setsockopt) from [<815414a4>] (do_sock_setsockopt+0xb0/0xc8) [ 5791.747606][T20759] [<815413f4>] (do_sock_setsockopt) from [<81544a1c>] (__sys_setsockopt+0x7c/0xc4) [ 5791.747638][T20759] r8:00000000 r7:84950240 r6:84950241 r5:00000025 r4:00000001 [ 5791.747646][T20759] [<815449a0>] (__sys_setsockopt) from [<81544a80>] (sys_setsockopt+0x1c/0x24) [ 5791.747683][T20759] r8:8020029c r7:00000126 r6:00130270 r5:00000000 r4:00000004 [ 5791.747691][T20759] [<81544a64>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5791.747760][T20759] Exception stack(0xea811fa8 to 0xea811ff0) [ 5791.747862][T20759] 1fa0: 00000004 00000000 00000003 00000001 00000025 20000540 [ 5791.747889][T20759] 1fc0: 00000004 00000000 00130270 00000126 002e0000 00000000 00006364 76f190bc [ 5791.747902][T20759] 1fe0: 76f18ec0 76f18eb0 0001948c 001322c0 [ 5791.979632][ T31] audit: type=1400 audit(10142.889:1087): avc: denied { create } for pid=20755 comm="syz.3.19976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5792.716414][ T31] audit: type=1400 audit(10143.629:1088): avc: denied { create } for pid=20763 comm="syz.3.19979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5792.743662][ T31] audit: type=1400 audit(10143.649:1089): avc: denied { create } for pid=20761 comm="syz.4.19978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5793.153124][T20767] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=771 sclass=netlink_tcpdiag_socket pid=20767 comm=syz.4.19980 [ 5793.387925][T20769] FAULT_INJECTION: forcing a failure. [ 5793.387925][T20769] name failslab, interval 1, probability 0, space 0, times 1 [ 5793.416868][T20769] CPU: 0 UID: 0 PID: 20769 Comm: syz.4.19981 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 5793.417041][T20769] Hardware name: ARM-Versatile Express [ 5793.417070][T20769] Call trace: [ 5793.417116][T20769] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5793.417231][T20769] r7:00000c40 r6:00000000 r5:60000113 r4:82260088 [ 5793.417253][T20769] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5793.417311][T20769] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5793.417368][T20769] r5:83b4e000 r4:82917bc0 [ 5793.417385][T20769] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 5793.417447][T20769] [<80971c40>] (should_fail_ex) from [<8051f460>] (should_failslab+0x6c/0x94) [ 5793.417524][T20769] r8:83b4e000 r7:00000c40 r6:84950f28 r5:00001000 r4:830016c0 [ 5793.417544][T20769] [<8051f3f4>] (should_failslab) from [<80503df4>] (__kmalloc_noprof+0x9c/0x458) [ 5793.417599][T20769] [<80503d58>] (__kmalloc_noprof) from [<807c337c>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 5793.417668][T20769] r10:83b4e000 r9:849d1000 r8:00000000 r7:8501a000 r6:84950f28 r5:00001000 [ 5793.417701][T20769] r4:00000000 [ 5793.417718][T20769] [<807c3340>] (tomoyo_realpath_from_path) from [<807bf4c0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5793.417791][T20769] r10:83b4e000 r9:00000000 r8:84950f00 r7:00005450 r6:00000004 r5:81cd6504 [ 5793.417814][T20769] r4:84950f28 r3:826c0200 [ 5793.417831][T20769] [<807bf3f4>] (tomoyo_path_number_perm) from [<807c3da0>] (tomoyo_file_ioctl+0x1c/0x20) [ 5793.417901][T20769] r9:00000004 r8:84950f00 r7:00000000 r6:00000000 r5:00005450 r4:84950f00 [ 5793.417923][T20769] [<807c3d84>] (tomoyo_file_ioctl) from [<807705f4>] (security_file_ioctl+0x64/0x1e4) [ 5793.417985][T20769] [<80770590>] (security_file_ioctl) from [<8056cd78>] (sys_ioctl+0x4c/0xba0) [ 5793.418047][T20769] r7:00000000 r6:84950f01 r5:00000000 r4:00005450 [ 5793.418067][T20769] [<8056cd2c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5793.418122][T20769] Exception stack(0xea821fa8 to 0xea821ff0) [ 5793.418161][T20769] 1fa0: 00000000 00000000 00000004 00005450 00000000 00000000 [ 5793.418194][T20769] 1fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f190bc [ 5793.418221][T20769] 1fe0: 76f18ec0 76f18eb0 0001948c 001322c0 [ 5793.418256][T20769] r10:00000036 r9:83b4e000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 5793.418275][T20769] r4:00000000 [ 5793.418812][T20769] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5793.638429][ T31] audit: type=1400 audit(10144.549:1090): avc: denied { create } for pid=20771 comm="syz.4.19982" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5795.088399][ T31] audit: type=1400 audit(10145.969:1091): avc: denied { create } for pid=20778 comm="syz.3.19985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5795.090533][ T31] audit: type=1400 audit(10145.969:1092): avc: denied { create } for pid=20778 comm="syz.3.19985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5795.094062][ T31] audit: type=1400 audit(10145.979:1093): avc: denied { create } for pid=20774 comm="syz.4.19983" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5795.154196][ T31] audit: type=1400 audit(10146.009:1094): avc: denied { create } for pid=20778 comm="syz.3.19985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5795.154558][ T31] audit: type=1400 audit(10146.019:1095): avc: denied { create } for pid=20778 comm="syz.3.19985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 5795.226316][ T31] audit: type=1400 audit(10146.139:1096): avc: denied { create } for pid=20778 comm="syz.3.19985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5795.255870][ T31] audit: type=1400 audit(10146.169:1097): avc: denied { create } for pid=20778 comm="syz.3.19985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5796.372182][ T31] audit: type=1400 audit(10147.279:1098): avc: denied { read } for pid=20784 comm="syz.4.19987" name="fb1" dev="devtmpfs" ino=762 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5796.407229][ T31] audit: type=1400 audit(10147.319:1099): avc: denied { create } for pid=20781 comm="syz.3.19986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5796.786242][T20787] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pid=20787 comm=syz.4.19988 [ 5796.788814][T20787] netlink: 4 bytes leftover after parsing attributes in process `syz.4.19988'. [ 5796.864715][T20787] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=20787 comm=syz.4.19988 [ 5797.811710][T20800] FAULT_INJECTION: forcing a failure. [ 5797.811710][T20800] name failslab, interval 1, probability 0, space 0, times 0 [ 5797.823473][T20800] CPU: 1 UID: 0 PID: 20800 Comm: syz.4.19994 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 5797.823665][T20800] Hardware name: ARM-Versatile Express [ 5797.823695][T20800] Call trace: [ 5797.823741][T20800] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5797.823856][T20800] r7:00000d40 r6:00000000 r5:60000113 r4:82260088 [ 5797.823880][T20800] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5797.823954][T20800] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5797.824014][T20800] r5:83b48000 r4:82917bc0 [ 5797.824036][T20800] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 5797.824103][T20800] [<80971c40>] (should_fail_ex) from [<8051f460>] (should_failslab+0x6c/0x94) [ 5797.824183][T20800] r8:83b48000 r7:00000d40 r6:859c7268 r5:0000001f r4:83001240 [ 5797.824208][T20800] [<8051f3f4>] (should_failslab) from [<80503df4>] (__kmalloc_noprof+0x9c/0x458) [ 5797.824264][T20800] [<80503d58>] (__kmalloc_noprof) from [<807c3284>] (tomoyo_encode2+0x64/0xf0) [ 5797.824338][T20800] r10:00000fff r9:833d2800 r8:00000000 r7:85075dd0 r6:859c7268 r5:83b44ffd [ 5797.824360][T20800] r4:83b44fe9 [ 5797.824377][T20800] [<807c3220>] (tomoyo_encode2) from [<807c3334>] (tomoyo_encode+0x24/0x30) [ 5797.824443][T20800] r9:833d2800 r8:00000000 r7:85075dd0 r6:859c7268 r5:00001000 r4:83b44fea [ 5797.824462][T20800] [<807c3310>] (tomoyo_encode) from [<807c33c0>] (tomoyo_realpath_from_path+0x80/0x17c) [ 5797.824520][T20800] r5:00001000 r4:83b44000 [ 5797.824536][T20800] [<807c3340>] (tomoyo_realpath_from_path) from [<807bf4c0>] (tomoyo_path_number_perm+0xcc/0x22c) [ 5797.824604][T20800] r10:83b48000 r9:00000000 r8:859c7240 r7:00005450 r6:00000004 r5:81cd6504 [ 5797.824628][T20800] r4:859c7268 r3:826c0200 [ 5797.824646][T20800] [<807bf3f4>] (tomoyo_path_number_perm) from [<807c3da0>] (tomoyo_file_ioctl+0x1c/0x20) [ 5797.824717][T20800] r9:00000003 r8:859c7240 r7:00000000 r6:00000000 r5:00005450 r4:859c7240 [ 5797.824736][T20800] [<807c3d84>] (tomoyo_file_ioctl) from [<807705f4>] (security_file_ioctl+0x64/0x1e4) [ 5797.824795][T20800] [<80770590>] (security_file_ioctl) from [<8056cd78>] (sys_ioctl+0x4c/0xba0) [ 5797.824861][T20800] r7:00000000 r6:859c7241 r5:00000000 r4:00005450 [ 5797.824881][T20800] [<8056cd2c>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5797.825075][T20800] Exception stack(0xea885fa8 to 0xea885ff0) [ 5797.825116][T20800] 5fa0: 00000000 00000000 00000003 00005450 00000000 00000000 [ 5797.825147][T20800] 5fc0: 00000000 00000000 00130270 00000036 002e0000 00000000 00006364 76f190bc [ 5797.825171][T20800] 5fe0: 76f18ec0 76f18eb0 0001948c 001322c0 [ 5797.825202][T20800] r10:00000036 r9:83b48000 r8:8020029c r7:00000036 r6:00130270 r5:00000000 [ 5797.825224][T20800] r4:00000000 [ 5797.840439][T20800] ERROR: Out of memory at tomoyo_realpath_from_path. [ 5798.740531][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 5798.741027][ T31] audit: type=1400 audit(10149.649:1120): avc: denied { read } for pid=20808 comm="syz.4.19998" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5798.786857][ T31] audit: type=1400 audit(10149.699:1121): avc: denied { create } for pid=20808 comm="syz.4.19998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5798.794607][ T31] audit: type=1400 audit(10149.709:1122): avc: denied { create } for pid=20808 comm="syz.4.19998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5799.011221][ T31] audit: type=1400 audit(10149.919:1123): avc: denied { create } for pid=20810 comm="syz.3.19999" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5799.092321][ T31] audit: type=1400 audit(10149.999:1124): avc: denied { create } for pid=20811 comm="syz.4.20000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5799.373747][ T31] audit: type=1400 audit(10150.289:1125): avc: denied { write } for pid=20815 comm="syz.4.20002" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5799.373947][T20819] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2305 sclass=netlink_route_socket pid=20819 comm=syz.3.20001 [ 5799.456407][ T31] audit: type=1400 audit(10150.329:1126): avc: denied { create } for pid=20815 comm="syz.4.20002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5799.456746][ T31] audit: type=1400 audit(10150.349:1127): avc: denied { create } for pid=20815 comm="syz.4.20002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5799.535816][T20819] netlink: 4 bytes leftover after parsing attributes in process `syz.3.20001'. [ 5799.595460][ T31] audit: type=1400 audit(10150.509:1128): avc: denied { create } for pid=20814 comm="syz.3.20001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5799.645501][T20819] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=20819 comm=syz.3.20001 [ 5799.798520][T20822] FAULT_INJECTION: forcing a failure. [ 5799.798520][T20822] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5799.814476][T20822] CPU: 1 UID: 0 PID: 20822 Comm: syz.4.20003 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 5799.814670][T20822] Hardware name: ARM-Versatile Express [ 5799.814701][T20822] Call trace: [ 5799.814765][T20822] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5799.814892][T20822] r7:00000000 r6:00000000 r5:60000113 r4:82260088 [ 5799.814914][T20822] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5799.814977][T20822] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5799.815040][T20822] r5:8544ec00 r4:8294f150 [ 5799.815059][T20822] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 5799.815125][T20822] [<80971c40>] (should_fail_ex) from [<80971e7c>] (should_fail+0x14/0x18) [ 5799.815195][T20822] r8:8020029c r7:00000000 r6:82465858 r5:20000000 r4:20000000 [ 5799.815214][T20822] [<80971e68>] (should_fail) from [<80971e9c>] (should_fail_usercopy+0x1c/0x20) [ 5799.815271][T20822] [<80971e80>] (should_fail_usercopy) from [<80977f68>] (strncpy_from_user+0x20/0x1a0) [ 5799.815332][T20822] [<80977f48>] (strncpy_from_user) from [<80562c34>] (getname_flags.part.0+0x44/0x18c) [ 5799.815429][T20822] r10:00000142 r9:8544ec00 r8:8020029c r7:00000000 r6:82465858 r5:20000000 [ 5799.815457][T20822] r4:832e3000 [ 5799.815474][T20822] [<80562bf0>] (getname_flags.part.0) from [<80567bb4>] (getname_flags+0x3c/0x50) [ 5799.815543][T20822] r9:8544ec00 r8:8020029c r7:ffffff9c r6:ea8a5f58 r5:00000000 r4:20000000 [ 5799.815560][T20822] [<80567b78>] (getname_flags) from [<805504dc>] (do_sys_openat2+0x60/0xe0) [ 5799.815634][T20822] r5:20000000 r4:00000000 [ 5799.815649][T20822] [<8055047c>] (do_sys_openat2) from [<80550934>] (sys_openat+0x98/0xd4) [ 5799.815705][T20822] r7:00000142 r6:00130270 r5:20000000 r4:ffffff9c [ 5799.815724][T20822] [<8055089c>] (sys_openat) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5799.815779][T20822] Exception stack(0xea8a5fa8 to 0xea8a5ff0) [ 5799.815819][T20822] 5fa0: 00000000 00000000 ffffff9c 20000000 00000000 00000000 [ 5799.815853][T20822] 5fc0: 00000000 00000000 00130270 00000142 002e0000 00000000 00006364 76f190bc [ 5799.815878][T20822] 5fe0: 76f18ec0 76f18eb0 0001948c 001322c0 [ 5799.815900][T20822] r5:00000000 r4:00000000 [ 5800.075189][ T31] audit: type=1400 audit(10150.989:1129): avc: denied { create } for pid=20823 comm="syz.3.20004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5800.979718][T20831] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20831 comm=syz.3.20007 [ 5804.162336][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 5804.163222][ T31] audit: type=1400 audit(10155.069:1154): avc: denied { create } for pid=20849 comm="syz.3.20015" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5804.356473][ T31] audit: type=1400 audit(10155.269:1155): avc: denied { create } for pid=20851 comm="syz.3.20016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5804.549761][ T31] audit: type=1400 audit(10155.379:1156): avc: denied { create } for pid=20851 comm="syz.3.20016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 5805.674990][ T31] audit: type=1400 audit(10156.589:1157): avc: denied { create } for pid=20857 comm="syz.4.20019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5805.681404][ T31] audit: type=1400 audit(10156.589:1158): avc: denied { create } for pid=20857 comm="syz.4.20019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5805.726909][ T31] audit: type=1400 audit(10156.619:1159): avc: denied { create } for pid=20857 comm="syz.4.20019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5805.727352][ T31] audit: type=1400 audit(10156.619:1160): avc: denied { create } for pid=20857 comm="syz.4.20019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5805.727762][ T31] audit: type=1400 audit(10156.619:1161): avc: denied { read } for pid=20857 comm="syz.4.20019" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5805.729289][ T31] audit: type=1400 audit(10156.639:1162): avc: denied { create } for pid=20857 comm="syz.4.20019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5805.767359][ T31] audit: type=1400 audit(10156.679:1163): avc: denied { create } for pid=20857 comm="syz.4.20019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5806.991989][T20871] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=260 sclass=netlink_route_socket pid=20871 comm=syz.4.20024 [ 5809.210098][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 5809.210446][ T31] audit: type=1400 audit(10160.069:1177): avc: denied { create } for pid=20879 comm="syz.3.20028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5809.544100][ T31] audit: type=1400 audit(10160.419:1178): avc: denied { create } for pid=20884 comm="syz.4.20030" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5810.579458][ T31] audit: type=1400 audit(10161.489:1179): avc: denied { mount } for pid=20884 comm="syz.4.20030" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=0 [ 5810.829061][ T31] audit: type=1400 audit(10161.739:1180): avc: denied { create } for pid=20888 comm="syz.4.20031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 5810.894785][ T31] audit: type=1400 audit(10161.809:1181): avc: denied { create } for pid=20888 comm="syz.4.20031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5811.058550][ T31] audit: type=1400 audit(10161.969:1182): avc: denied { read } for pid=20890 comm="syz.4.20032" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5811.071173][ T31] audit: type=1400 audit(10161.979:1183): avc: denied { create } for pid=20890 comm="syz.4.20032" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5811.088747][T20891] FAULT_INJECTION: forcing a failure. [ 5811.088747][T20891] name failslab, interval 1, probability 0, space 0, times 0 [ 5811.095062][T20891] CPU: 1 UID: 0 PID: 20891 Comm: syz.4.20032 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 5811.095247][T20891] Hardware name: ARM-Versatile Express [ 5811.095275][T20891] Call trace: [ 5811.095330][T20891] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5811.095613][T20891] r7:00000820 r6:00000000 r5:60000013 r4:82260088 [ 5811.095668][T20891] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5811.095730][T20891] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5811.095793][T20891] r5:83b4e000 r4:82917bc0 [ 5811.095808][T20891] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 5811.095868][T20891] [<80971c40>] (should_fail_ex) from [<8051f460>] (should_failslab+0x6c/0x94) [ 5811.095986][T20891] r8:83b4e000 r7:00000820 r6:848ee218 r5:00000017 r4:83001240 [ 5811.096019][T20891] [<8051f3f4>] (should_failslab) from [<80504aa8>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 5811.096167][T20891] [<80504a08>] (__kmalloc_node_track_caller_noprof) from [<8049b7a8>] (kmemdup_noprof+0x28/0x44) [ 5811.096242][T20891] r10:00000119 r9:84aa8004 r8:ea8eddc8 r7:83225000 r6:848ee218 r5:ea8eddc0 [ 5811.096261][T20891] r4:00000017 [ 5811.096278][T20891] [<8049b780>] (kmemdup_noprof) from [<807a1ce8>] (sidtab_sid2str_get+0x54/0xa4) [ 5811.096353][T20891] r7:83225000 r6:ea8eddc8 r5:ea8eddc0 r4:841040c0 [ 5811.096370][T20891] [<807a1c94>] (sidtab_sid2str_get) from [<807a91f0>] (sidtab_entry_to_string+0x34/0x94) [ 5811.096470][T20891] r7:83225000 r6:841040c0 r5:ea8eddc0 r4:0000005f [ 5811.096520][T20891] [<807a91bc>] (sidtab_entry_to_string) from [<807a9368>] (security_sid_to_context_core+0x118/0x17c) [ 5811.096610][T20891] r9:00000000 r8:83225000 r7:84aa8004 r6:ea8eddc8 r5:ea8eddc0 r4:0000005f [ 5811.096630][T20891] [<807a9250>] (security_sid_to_context_core) from [<807ac37c>] (security_sid_to_context+0x1c/0x24) [ 5811.096701][T20891] r8:8078c4a0 r7:8078d4a4 r6:83b4e000 r5:848224f0 r4:ea8ede50 [ 5811.096719][T20891] [<807ac360>] (security_sid_to_context) from [<8078d524>] (avc_audit_post_callback+0x80/0x2f4) [ 5811.096776][T20891] [<8078d4a4>] (avc_audit_post_callback) from [<807b4938>] (common_lsm_audit+0x104/0x148) [ 5811.096850][T20891] r10:00000119 r9:00000000 r8:8078c4a0 r7:8078d4a4 r6:ea8ede40 r5:848224f0 [ 5811.096871][T20891] r4:83b4e7f0 [ 5811.096885][T20891] [<807b4834>] (common_lsm_audit) from [<8078d9b0>] (slow_avc_audit+0xbc/0x114) [ 5811.096976][T20891] r8:0000002c r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 5811.097063][T20891] [<8078d8f4>] (slow_avc_audit) from [<8078e434>] (avc_has_perm+0xd8/0xe8) [ 5811.097130][T20891] r5:fffffff3 r4:00000008 [ 5811.097146][T20891] [<8078e35c>] (avc_has_perm) from [<80791038>] (selinux_socket_create+0x164/0x230) [ 5811.097264][T20891] r9:84f2ac40 r8:80790ed4 r7:00000000 r6:00000010 r5:0000002c r4:848faa08 [ 5811.097283][T20891] [<80790ed4>] (selinux_socket_create) from [<80786488>] (security_socket_create+0x204/0x210) [ 5811.097339][T20891] r5:00000003 r4:00000010 [ 5811.097375][T20891] [<80786284>] (security_socket_create) from [<815410ec>] (__sock_create+0x68/0x228) [ 5811.097451][T20891] r9:84f2ac40 r8:8020029c r7:00000010 r6:83b4e000 r5:00000003 r4:00000010 [ 5811.097472][T20891] [<81541084>] (__sock_create) from [<81543a50>] (__sys_socket+0x94/0x10c) [ 5811.097611][T20891] r10:00000119 r9:83b4e000 r8:8020029c r7:00000119 r6:83b4e000 r5:00000010 [ 5811.097642][T20891] r4:00000003 [ 5811.097657][T20891] [<815439bc>] (__sys_socket) from [<81543ad8>] (sys_socket+0x10/0x14) [ 5811.097744][T20891] r6:00000000 r5:ffffffff r4:76f17eb0 [ 5811.097763][T20891] [<81543ac8>] (sys_socket) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5811.097819][T20891] Exception stack(0xea8edfa8 to 0xea8edff0) [ 5811.097857][T20891] dfa0: 76f17eb0 ffffffff 00000010 00000003 00000010 00000000 [ 5811.097892][T20891] dfc0: 76f17eb0 ffffffff 00000000 00000119 002e0000 00000000 00006364 76f190bc [ 5811.097914][T20891] dfe0: 00000000 76f17e7c 0001bf38 0013497c [ 5811.159043][ T31] audit: type=1400 audit(10161.999:1184): avc: denied { create } for pid=20890 comm="syz.4.20032" scontext=root:sysadm_r:sysadm_t tsid=95 tclass=netlink_generic_socket permissive=0 [ 5811.364421][ T31] audit: type=1400 audit(10162.279:1185): avc: denied { read } for pid=20892 comm="syz.4.20033" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5811.369401][ T31] audit: type=1400 audit(10162.279:1186): avc: denied { create } for pid=20892 comm="syz.4.20033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5812.604698][T20903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20903 comm=syz.4.20038 [ 5812.734050][T20903] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20903 comm=syz.4.20038 [ 5814.593819][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 5814.594106][ T31] audit: type=1400 audit(10165.509:1208): avc: denied { read } for pid=20910 comm="syz.4.20042" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5815.852264][ T31] audit: type=1400 audit(10166.759:1209): avc: denied { mounton } for pid=20920 comm="syz.3.20046" path="/6498/file0" dev="tmpfs" ino=35446 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 5816.435016][ T31] audit: type=1400 audit(10167.349:1210): avc: denied { read write } for pid=20927 comm="syz.4.20050" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5816.500728][ T31] audit: type=1400 audit(10167.409:1211): avc: denied { create } for pid=20927 comm="syz.4.20050" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5816.535052][ T31] audit: type=1400 audit(10167.449:1212): avc: denied { create } for pid=20926 comm="syz.3.20049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5816.721810][ T31] audit: type=1400 audit(10167.629:1213): avc: denied { create } for pid=20926 comm="syz.3.20049" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=0 [ 5816.853034][T20931] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 5816.853365][T20931] audit: out of memory in audit_log_start [ 5817.747968][T20939] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=20939 comm=syz.3.20055 [ 5817.755174][T20939] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=20939 comm=syz.3.20055 [ 5819.116877][ T31] audit: type=1400 audit(10170.029:1214): avc: denied { create } for pid=20942 comm="syz.3.20057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5820.636755][ T31] audit: type=1400 audit(10171.549:1215): avc: denied { create } for pid=20951 comm="syz.3.20061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5822.165213][ T31] audit: type=1400 audit(10173.079:1216): avc: denied { create } for pid=20959 comm="syz.3.20065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5822.205864][ T31] audit: type=1400 audit(10173.119:1217): avc: denied { create } for pid=20959 comm="syz.3.20065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5822.259384][ T31] audit: type=1400 audit(10173.149:1218): avc: denied { create } for pid=20959 comm="syz.3.20065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5822.259826][ T31] audit: type=1400 audit(10173.149:1219): avc: denied { create } for pid=20959 comm="syz.3.20065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5822.314741][ T31] audit: type=1400 audit(10173.229:1220): avc: denied { create } for pid=20959 comm="syz.3.20065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5822.618571][ T31] audit: type=1400 audit(10173.529:1221): avc: denied { create } for pid=20964 comm="syz.3.20066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5822.724154][ T31] audit: type=1400 audit(10173.639:1222): avc: denied { create } for pid=20964 comm="syz.3.20066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5822.813700][ T31] audit: type=1400 audit(10173.729:1223): avc: denied { create } for pid=20964 comm="syz.3.20066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5822.824953][ T31] audit: type=1400 audit(10173.739:1224): avc: denied { create } for pid=20964 comm="syz.3.20066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5823.381160][T20969] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20969 comm=syz.3.20068 [ 5825.678306][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 5825.678687][ T31] audit: type=1400 audit(10176.589:1247): avc: denied { create } for pid=20983 comm="syz.3.20075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5825.775495][ T31] audit: type=1400 audit(10176.689:1248): avc: denied { create } for pid=20983 comm="syz.3.20075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5825.786252][ T31] audit: type=1400 audit(10176.699:1249): avc: denied { create } for pid=20983 comm="syz.3.20075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 5825.808870][ T31] audit: type=1400 audit(10176.719:1250): avc: denied { create } for pid=20983 comm="syz.3.20075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5825.824126][ T31] audit: type=1400 audit(10176.729:1251): avc: denied { create } for pid=20983 comm="syz.3.20075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 5825.826574][ T31] audit: type=1400 audit(10176.739:1252): avc: denied { create } for pid=20983 comm="syz.3.20075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5826.175032][ T31] audit: type=1400 audit(10177.089:1253): avc: denied { create } for pid=20989 comm="syz.3.20076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5826.185702][ T31] audit: type=1400 audit(10177.089:1254): avc: denied { create } for pid=20989 comm="syz.3.20076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5826.335972][ T31] audit: type=1400 audit(10177.229:1255): avc: denied { create } for pid=20989 comm="syz.3.20076" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5826.431435][ T31] audit: type=1400 audit(10177.339:1256): avc: denied { mounton } for pid=20991 comm="syz.4.20077" path="/3219/file0" dev="tmpfs" ino=18369 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 5826.709981][T20994] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=20994 comm=syz.3.20078 [ 5827.711479][T21011] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21011 comm=syz.4.20085 [ 5827.901110][T21016] FAULT_INJECTION: forcing a failure. [ 5827.901110][T21016] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5827.908836][T21016] CPU: 1 UID: 0 PID: 21016 Comm: syz.4.20088 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 5827.909028][T21016] Hardware name: ARM-Versatile Express [ 5827.909062][T21016] Call trace: [ 5827.909118][T21016] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5827.909238][T21016] r7:00000001 r6:00000000 r5:60000013 r4:82260088 [ 5827.909261][T21016] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5827.909322][T21016] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5827.909389][T21016] r5:8544ec00 r4:8294f150 [ 5827.909406][T21016] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 5827.909534][T21016] [<80971c40>] (should_fail_ex) from [<80971e7c>] (should_fail+0x14/0x18) [ 5827.909612][T21016] r8:00000000 r7:00000001 r6:82465858 r5:20000300 r4:20000300 [ 5827.909630][T21016] [<80971e68>] (should_fail) from [<80971e9c>] (should_fail_usercopy+0x1c/0x20) [ 5827.909689][T21016] [<80971e80>] (should_fail_usercopy) from [<80977f68>] (strncpy_from_user+0x20/0x1a0) [ 5827.909749][T21016] [<80977f48>] (strncpy_from_user) from [<80562c34>] (getname_flags.part.0+0x44/0x18c) [ 5827.909829][T21016] r10:00000015 r9:8544ec00 r8:00000000 r7:00000001 r6:82465858 r5:20000300 [ 5827.909860][T21016] r4:832e6000 [ 5827.909876][T21016] [<80562bf0>] (getname_flags.part.0) from [<80567bb4>] (getname_flags+0x3c/0x50) [ 5827.909950][T21016] r9:8544ec00 r8:00000000 r7:00000000 r6:ffffff9c r5:00000001 r4:20000300 [ 5827.909969][T21016] [<80567b78>] (getname_flags) from [<8056816c>] (user_path_at+0x2c/0x64) [ 5827.910027][T21016] r5:00000001 r4:ea95df6c [ 5827.910247][T21016] [<80568140>] (user_path_at) from [<80586890>] (sys_mount+0x158/0x260) [ 5827.910319][T21016] r6:00000000 r5:00000000 r4:00000000 [ 5827.910339][T21016] [<80586738>] (sys_mount) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5827.910393][T21016] Exception stack(0xea95dfa8 to 0xea95dff0) [ 5827.910436][T21016] dfa0: 00000000 00000000 00000000 20000300 00000000 00084000 [ 5827.910472][T21016] dfc0: 00000000 00000000 00130270 00000015 002e0000 00000000 00006364 76f190bc [ 5827.910502][T21016] dfe0: 76f18ec0 76f18eb0 0001948c 001322c0 [ 5827.910539][T21016] r10:00000015 r9:8544ec00 r8:8020029c r7:00000015 r6:00130270 r5:00000000 [ 5827.910560][T21016] r4:00000000 [ 5828.939335][T21029] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21029 comm=syz.4.20094 [ 5830.234382][T21047] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21047 comm=syz.4.20100 [ 5830.701092][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 5830.701536][ T31] audit: type=1400 audit(10181.609:1292): avc: denied { create } for pid=21052 comm="syz.3.20103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5830.999292][ T31] audit: type=1400 audit(10181.859:1293): avc: denied { create } for pid=21052 comm="syz.3.20103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5830.999729][ T31] audit: type=1400 audit(10181.869:1294): avc: denied { create } for pid=21052 comm="syz.3.20103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5831.000020][ T31] audit: type=1400 audit(10181.879:1295): avc: denied { create } for pid=21052 comm="syz.3.20103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5831.044746][ T31] audit: type=1400 audit(10181.959:1296): avc: denied { create } for pid=21052 comm="syz.3.20103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5832.824251][T21063] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5124 sclass=netlink_audit_socket pid=21063 comm=syz.3.20107 [ 5832.856894][ T31] audit: type=1400 audit(10183.749:1297): avc: denied { create } for pid=21062 comm="syz.3.20107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5833.473599][ T31] audit: type=1400 audit(10184.379:1298): avc: denied { create } for pid=21066 comm="syz.3.20109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5834.028315][ T31] audit: type=1400 audit(10184.939:1299): avc: denied { create } for pid=21070 comm="syz.3.20110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5834.035068][ T31] audit: type=1400 audit(10184.949:1300): avc: denied { create } for pid=21070 comm="syz.3.20110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 5834.046257][ T31] audit: type=1400 audit(10184.959:1301): avc: denied { create } for pid=21070 comm="syz.3.20110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5835.849489][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 5835.849865][ T31] audit: type=1400 audit(10186.759:1305): avc: denied { create } for pid=21080 comm="syz.3.20115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5835.881726][ T31] audit: type=1400 audit(10186.789:1306): avc: denied { create } for pid=21080 comm="syz.3.20115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5836.855836][ T31] audit: type=1400 audit(10187.769:1307): avc: denied { create } for pid=21082 comm="syz.3.20116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5837.123934][ T31] audit: type=1400 audit(10188.019:1308): avc: denied { create } for pid=21049 comm="syz.4.20102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5837.124321][ T31] audit: type=1400 audit(10188.029:1309): avc: denied { create } for pid=21049 comm="syz.4.20102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5837.140266][ T31] audit: type=1400 audit(10188.049:1310): avc: denied { create } for pid=21049 comm="syz.4.20102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5837.156331][ T31] audit: type=1400 audit(10188.049:1311): avc: denied { create } for pid=21049 comm="syz.4.20102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5837.156724][ T31] audit: type=1400 audit(10188.059:1312): avc: denied { allowed } for pid=21049 comm="syz.4.20102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 5837.157084][ T31] audit: type=1400 audit(10188.059:1313): avc: denied { create } for pid=21049 comm="syz.4.20102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5837.157282][ T31] audit: type=1400 audit(10188.069:1314): avc: denied { create } for pid=21049 comm="syz.4.20102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5841.085487][ T31] kauditd_printk_skb: 24 callbacks suppressed [ 5841.085918][ T31] audit: type=1400 audit(10191.999:1337): avc: denied { create } for pid=21100 comm="syz.3.20124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 5841.445555][ T31] audit: type=1400 audit(10192.359:1338): avc: denied { create } for pid=21120 comm="syz.4.20133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5841.467060][ T31] audit: type=1400 audit(10192.379:1339): avc: denied { allowed } for pid=21120 comm="syz.4.20133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 5841.669145][ T31] audit: type=1400 audit(10192.579:1340): avc: denied { create } for pid=21119 comm="syz.3.20132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5841.726616][ T31] audit: type=1400 audit(10192.639:1341): avc: denied { create } for pid=21119 comm="syz.3.20132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5842.567888][ T31] audit: type=1400 audit(10193.479:1342): avc: denied { execmem } for pid=21119 comm="syz.3.20132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 5842.667780][ T31] audit: type=1400 audit(10193.579:1343): avc: denied { lock } for pid=21119 comm="syz.3.20132" path="socket:[178517]" dev="sockfs" ino=178517 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 5843.874556][ T31] audit: type=1400 audit(10194.789:1344): avc: denied { create } for pid=21127 comm="syz.3.20134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=0 [ 5844.077350][ T31] audit: type=1400 audit(10194.989:1345): avc: denied { create } for pid=21127 comm="syz.3.20134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 5844.318850][T21152] FAULT_INJECTION: forcing a failure. [ 5844.318850][T21152] name failslab, interval 1, probability 0, space 0, times 0 [ 5844.325502][T21152] CPU: 1 UID: 0 PID: 21152 Comm: syz.4.20136 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 5844.325632][T21152] Hardware name: ARM-Versatile Express [ 5844.325662][T21152] Call trace: [ 5844.325727][T21152] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5844.325844][T21152] r7:00000820 r6:00000000 r5:60000013 r4:82260088 [ 5844.325865][T21152] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5844.325922][T21152] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5844.325981][T21152] r5:855ab000 r4:82917bc0 [ 5844.325998][T21152] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 5844.326059][T21152] [<80971c40>] (should_fail_ex) from [<8051f460>] (should_failslab+0x6c/0x94) [ 5844.326131][T21152] r8:855ab000 r7:00000820 r6:848ee218 r5:00000017 r4:83001240 [ 5844.326149][T21152] [<8051f3f4>] (should_failslab) from [<80504aa8>] (__kmalloc_node_track_caller_noprof+0xa0/0x464) [ 5844.326207][T21152] [<80504a08>] (__kmalloc_node_track_caller_noprof) from [<8049b7a8>] (kmemdup_noprof+0x28/0x44) [ 5844.326278][T21152] r10:00000119 r9:84aa8004 r8:eaa29dc4 r7:83225000 r6:848ee218 r5:eaa29dbc [ 5844.326299][T21152] r4:00000017 [ 5844.326316][T21152] [<8049b780>] (kmemdup_noprof) from [<807a1ce8>] (sidtab_sid2str_get+0x54/0xa4) [ 5844.326384][T21152] r7:83225000 r6:eaa29dc4 r5:eaa29dbc r4:841040c0 [ 5844.326402][T21152] [<807a1c94>] (sidtab_sid2str_get) from [<807a91f0>] (sidtab_entry_to_string+0x34/0x94) [ 5844.326469][T21152] r7:83225000 r6:841040c0 r5:eaa29dbc r4:0000005f [ 5844.326487][T21152] [<807a91bc>] (sidtab_entry_to_string) from [<807a9368>] (security_sid_to_context_core+0x118/0x17c) [ 5844.326555][T21152] r9:00000000 r8:83225000 r7:84aa8004 r6:eaa29dc4 r5:eaa29dbc r4:0000005f [ 5844.326572][T21152] [<807a9250>] (security_sid_to_context_core) from [<807ac37c>] (security_sid_to_context+0x1c/0x24) [ 5844.326639][T21152] r8:8078c4a0 r7:8078d4a4 r6:855ab000 r5:848224e0 r4:eaa29e50 [ 5844.326657][T21152] [<807ac360>] (security_sid_to_context) from [<8078d4ec>] (avc_audit_post_callback+0x48/0x2f4) [ 5844.326725][T21152] [<8078d4a4>] (avc_audit_post_callback) from [<807b4938>] (common_lsm_audit+0x104/0x148) [ 5844.326791][T21152] r10:00000119 r9:00000000 r8:8078c4a0 r7:8078d4a4 r6:eaa29e40 r5:848224e0 [ 5844.326809][T21152] r4:855ab7f0 [ 5844.326824][T21152] [<807b4834>] (common_lsm_audit) from [<8078d9b0>] (slow_avc_audit+0xbc/0x114) [ 5844.326887][T21152] r8:0000002c r7:0000005f r6:0000005f r5:0000005f r4:0000005f [ 5844.326906][T21152] [<8078d8f4>] (slow_avc_audit) from [<8078e434>] (avc_has_perm+0xd8/0xe8) [ 5844.326962][T21152] r5:fffffff3 r4:00000008 [ 5844.326979][T21152] [<8078e35c>] (avc_has_perm) from [<80791038>] (selinux_socket_create+0x164/0x230) [ 5844.327036][T21152] r9:84f2ac40 r8:80790ed4 r7:00000000 r6:00000010 r5:0000002c r4:84a82188 [ 5844.327052][T21152] [<80790ed4>] (selinux_socket_create) from [<80786488>] (security_socket_create+0x204/0x210) [ 5844.327108][T21152] r5:00000003 r4:00000010 [ 5844.327126][T21152] [<80786284>] (security_socket_create) from [<815410ec>] (__sock_create+0x68/0x228) [ 5844.327189][T21152] r9:84f2ac40 r8:8020029c r7:00000010 r6:855ab000 r5:00000003 r4:00000010 [ 5844.327207][T21152] [<81541084>] (__sock_create) from [<81543a50>] (__sys_socket+0x94/0x10c) [ 5844.327266][T21152] r10:00000119 r9:855ab000 r8:8020029c r7:00000119 r6:855ab000 r5:00000010 [ 5844.327288][T21152] r4:00000003 [ 5844.327303][T21152] [<815439bc>] (__sys_socket) from [<81543ad8>] (sys_socket+0x10/0x14) [ 5844.327360][T21152] r6:00000000 r5:ffffffff r4:76f17eb0 [ 5844.327374][T21152] [<81543ac8>] (sys_socket) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5844.327520][T21152] Exception stack(0xeaa29fa8 to 0xeaa29ff0) [ 5844.327558][T21152] 9fa0: 76f17eb0 ffffffff 00000010 00000003 00000010 00000000 [ 5844.327591][T21152] 9fc0: 76f17eb0 ffffffff 00000000 00000119 002e0000 00000000 00006364 76f190bc [ 5844.327614][T21152] 9fe0: 00000000 76f17e7c 0001bf38 0013497c [ 5844.329254][ T31] audit: type=1400 audit(10195.229:1346): avc: denied { create } for pid=21151 comm="syz.4.20136" ssid=95 tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5846.143963][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 5846.144311][ T31] audit: type=1400 audit(10197.049:1350): avc: denied { read } for pid=21173 comm="syz.4.20147" dev="nsfs" ino=4026532935 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5846.455171][ T31] audit: type=1400 audit(10197.369:1351): avc: denied { create } for pid=21175 comm="syz.4.20149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5846.682362][T21182] FAULT_INJECTION: forcing a failure. [ 5846.682362][T21182] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 5846.686295][T21182] CPU: 1 UID: 0 PID: 21182 Comm: syz.4.20151 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 5846.686436][T21182] Hardware name: ARM-Versatile Express [ 5846.686463][T21182] Call trace: [ 5846.686507][T21182] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5846.686631][T21182] r7:eaa2de20 r6:00000000 r5:60000013 r4:82260088 [ 5846.686655][T21182] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 5846.686723][T21182] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5846.686793][T21182] r5:83b49800 r4:8294f150 [ 5846.686811][T21182] [<8021fb9c>] (dump_stack) from [<80971e04>] (should_fail_ex+0x1c4/0x228) [ 5846.686881][T21182] [<80971c40>] (should_fail_ex) from [<80971e7c>] (should_fail+0x14/0x18) [ 5846.687019][T21182] r8:00000010 r7:eaa2de20 r6:200004c0 r5:00000000 r4:eaa2df20 [ 5846.687043][T21182] [<80971e68>] (should_fail) from [<80971e9c>] (should_fail_usercopy+0x1c/0x20) [ 5846.687116][T21182] [<80971e80>] (should_fail_usercopy) from [<81544ddc>] (copy_msghdr_from_user+0x50/0x130) [ 5846.687189][T21182] [<81544d8c>] (copy_msghdr_from_user) from [<81544f34>] (___sys_sendmsg+0x78/0xd0) [ 5846.687270][T21182] r8:00000010 r7:00000000 r6:850c5900 r5:eaa2df20 r4:eaa2de64 [ 5846.687287][T21182] [<81544ebc>] (___sys_sendmsg) from [<815453f0>] (__sys_sendmsg+0x8c/0xe0) [ 5846.687366][T21182] r10:00000128 r9:83b49800 r8:859c79c0 r7:00000010 r6:200004c0 r5:859c79c1 [ 5846.687409][T21182] r4:00000003 [ 5846.687432][T21182] [<81545364>] (__sys_sendmsg) from [<81545458>] (sys_sendmsg+0x14/0x18) [ 5846.687516][T21182] r8:8020029c r7:00000128 r6:00130270 r5:00000000 r4:00000000 [ 5846.687538][T21182] [<81545444>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5846.687595][T21182] Exception stack(0xeaa2dfa8 to 0xeaa2dff0) [ 5846.687635][T21182] dfa0: 00000000 00000000 00000003 200004c0 00000010 00000000 [ 5846.687673][T21182] dfc0: 00000000 00000000 00130270 00000128 002e0000 00000000 00006364 76f190bc [ 5846.687701][T21182] dfe0: 76f18ec0 76f18eb0 0001948c 001322c0 [ 5847.574675][ T31] audit: type=1400 audit(10198.489:1352): avc: denied { create } for pid=21186 comm="syz.3.20153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 5847.607728][T21191] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21191 comm=syz.4.20155 [ 5847.691098][ T31] audit: type=1400 audit(10198.569:1353): avc: denied { create } for pid=21186 comm="syz.3.20153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5847.691510][ T31] audit: type=1400 audit(10198.569:1354): avc: denied { create } for pid=21186 comm="syz.3.20153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5847.864246][ T31] audit: type=1400 audit(10198.779:1355): avc: denied { read write } for pid=21192 comm="syz.4.20156" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5847.926104][ T31] audit: type=1400 audit(10198.839:1356): avc: denied { create } for pid=21192 comm="syz.4.20156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 5848.156800][ T31] audit: type=1400 audit(10199.069:1357): avc: denied { read append } for pid=21192 comm="syz.4.20156" name="nvme-fabrics" dev="devtmpfs" ino=664 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5848.318759][ T31] audit: type=1400 audit(10199.229:1358): avc: denied { create } for pid=21192 comm="syz.4.20156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 5848.330364][ T31] audit: type=1400 audit(10199.239:1359): avc: denied { read } for pid=21192 comm="syz.4.20156" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 5851.326327][ T31] kauditd_printk_skb: 28 callbacks suppressed [ 5851.326680][ T31] audit: type=1400 audit(10202.239:1388): avc: denied { read } for pid=21225 comm="syz.4.20169" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5851.413558][ T31] audit: type=1400 audit(10202.259:1389): avc: denied { create } for pid=21225 comm="syz.4.20169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5851.414009][ T31] audit: type=1400 audit(10202.279:1390): avc: denied { create } for pid=21225 comm="syz.4.20169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5851.414265][ T31] audit: type=1400 audit(10202.279:1391): avc: denied { create } for pid=21225 comm="syz.4.20169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5851.414525][ T31] audit: type=1400 audit(10202.299:1392): avc: denied { create } for pid=21225 comm="syz.4.20169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5851.414849][ T31] audit: type=1400 audit(10202.299:1393): avc: denied { create } for pid=21225 comm="syz.4.20169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 5851.465443][ T31] audit: type=1400 audit(10202.349:1394): avc: denied { create } for pid=21225 comm="syz.4.20169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 5851.718773][ T31] audit: type=1400 audit(10202.629:1395): avc: denied { create } for pid=21218 comm="syz.3.20166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 5852.047113][ T31] audit: type=1400 audit(10202.959:1396): avc: denied { read write } for pid=21230 comm="syz.4.20171" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5852.057569][ T31] audit: type=1400 audit(10202.969:1397): avc: denied { read } for pid=21230 comm="syz.4.20171" name="sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 5852.347835][T21233] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21233 comm=syz.4.20172 [ 5852.880777][T18095] ------------[ cut here ** replaying previous printk message ** [ 5852.880777][T18095] ------------[ cut here ]------------ [ 5852.881267][T18095] WARNING: CPU: 1 PID: 18095 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 5852.885300][T18095] refcount_t: underflow; use-after-free. [ 5852.886358][T18095] Modules linked in: [ 5852.887107][T18095] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 5852.887703][T18095] CPU: 1 UID: 0 PID: 18095 Comm: kworker/1:1 Not tainted 6.16.0-syzkaller #0 PREEMPT [ 5852.888411][T18095] Hardware name: ARM-Versatile Express [ 5852.889241][T18095] Workqueue: md_misc mddev_delayed_delete [ 5852.889612][T18095] Call trace: [ 5852.889881][T18095] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 5852.890237][T18095] r7:00000000 r6:8281f77c r5:00000000 r4:82260088 [ 5852.890533][T18095] [<80201b08>] (show_stack) from [<8021fb74>] (dump_stack_lvl+0x54/0x7c) [ 5852.890874][T18095] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 5852.891223][T18095] r5:00000000 r4:82a77d18 [ 5852.891431][T18095] [<8021fb9c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 5852.891759][T18095] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 5852.892167][T18095] r7:808bae58 [ 5852.892402][T18095] [<80202824>] (panic) from [<80254960>] (get_taint+0x0/0x1c) [ 5852.892880][T18095] r3:8280c684 r2:00000001 r1:82246a9c r0:8224e518 [ 5852.893176][T18095] [<802548e8>] (check_panic_on_warn) from [<80254ac4>] (__warn+0x80/0x188) [ 5852.893541][T18095] [<80254a44>] (__warn) from [<80254db4>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 5852.894074][T18095] r8:00000009 r7:822b8b2c r6:dff21e54 r5:86419800 r4:00000000 [ 5852.894383][T18095] [<80254bd0>] (warn_slowpath_fmt) from [<808bae58>] (refcount_warn_saturate+0x13c/0x174) [ 5852.894870][T18095] r10:83368270 r9:83274825 r8:86419800 r7:ddde2d40 r6:83274800 r5:830ffa1c [ 5852.895168][T18095] r4:830ff850 [ 5852.895314][T18095] [<808bad1c>] (refcount_warn_saturate) from [<81a11208>] (kobject_put+0x158/0x1f4) [ 5852.895780][T18095] [<81a110b0>] (kobject_put) from [<81169660>] (mddev_delayed_delete+0x14/0x18) [ 5852.896201][T18095] r7:ddde2d40 r6:83274800 r5:830ffa1c r4:85abc600 [ 5852.896460][T18095] [<8116964c>] (mddev_delayed_delete) from [<8027a3bc>] (process_one_work+0x1b4/0x4f4) [ 5852.896824][T18095] [<8027a208>] (process_one_work) from [<8027b004>] (worker_thread+0x1fc/0x3d8) [ 5852.897445][T18095] r10:61c88647 r9:86419800 r8:85abc62c r7:82804d40 r6:ddde2d40 r5:ddde2d60 [ 5852.897961][T18095] r4:85abc600 [ 5852.898126][T18095] [<8027ae08>] (worker_thread) from [<80281fec>] (kthread+0x12c/0x280) [ 5852.898478][T18095] r10:00000000 r9:85abc600 r8:8027ae08 r7:eb801e60 r6:859c5100 r5:86419800 [ 5852.898785][T18095] r4:00000001 [ 5852.898947][T18095] [<80281ec0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 5852.899274][T18095] Exception stack(0xdff21fb0 to 0xdff21ff8) [ 5852.899546][T18095] 1fa0: 00000000 00000000 00000000 00000000 [ 5852.899893][T18095] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 5852.900177][T18095] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 5852.900417][T18095] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ec0 [ 5852.900656][T18095] r4:84e2cdc0 [ 5852.902766][T18095] Rebooting in 86400 seconds.. VM DIAGNOSIS: 05:03:36 Registers: info registers vcpu 0 CPU#0 R00=826b72c4 R01=5b70d000 R02=008af6e7 R03=81a38650 R04=00000008 R05=828f7848 R06=00000000 R07=828f7840 R08=841c4800 R09=00000028 R10=828f7848 R11=eb895d7c R12=eb895d80 R13=eb895d70 R14=8033d954 R15=81a38660 PSR=60000193 -ZC- A S svc32 s00=01000800 s01=00000000 d00=0000000001000800 s02=00048a03 s03=8c030c02 d01=8c030c0200048a03 s04=00040004 s05=00049003 d02=0004900300040004 s06=98030008 s07=00080004 d03=0008000498030008 s08=0004a003 s09=a2030a02 d04=a2030a020004a003 s10=00020004 s11=0004a403 d05=0004a40300020004 s12=03020484 s13=08000688 d06=0800068803020484 s14=07980328 s15=03020800 d07=0302080007980328 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=ff021fff s33=03ffffff d16=03ffffffff021fff s34=00000800 s35=03b00004 d17=03b0000400000800 s36=08060601 s37=01000000 d18=0100000008060601 s38=00010800 s39=6da00008 d19=6da0000800010800 s40=08000601 s41=06080020 d20=0608002008000601 s42=03120800 s43=ff020780 d21=ff02078003120800 s44=03ffffff s45=00078803 d22=0007880303ffffff s46=90030008 s47=06800207 d23=0680020790030008 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=adf4b426 s53=ac5a9780 d26=ac5a9780adf4b426 s54=52034d82 s55=0401d51b d27=0401d51b52034d82 s56=827286d8 s57=1245442c d28=1245442c827286d8 s58=9a7c0a02 s59=3b2756cf d29=3b2756cf9a7c0a02 s60=9add6db5 s61=71696b66 d30=71696b669add6db5 s62=fe80b071 s63=d51ab89e d31=d51ab89efe80b071 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=00000002 R02=eb87f030 R03=00000030 R04=83e86c40 R05=dff21bd0 R06=829590b8 R07=00000001 R08=82826ee0 R09=00000000 R10=00000a7f R11=dff21b6c R12=dff21b10 R13=dff21b50 R14=81a44ba0 R15=80a791b4 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000