last executing test programs: 22.389246323s ago: executing program 3 (id=24702): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) keyctl$search(0xa, 0x0, &(0x7f0000000300)='asymmetric\x00', 0x0, 0x0) 22.313201401s ago: executing program 3 (id=24707): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000000600)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) 22.175931825s ago: executing program 3 (id=24712): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_GET(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000b80)={0x18, 0x1, 0x2, 0x5, 0x0, 0x0, {0xa, 0x0, 0xe}, [@CTA_EXPECT_MASTER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x2000}, 0x40000) 22.114821971s ago: executing program 3 (id=24715): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) 22.107006282s ago: executing program 3 (id=24717): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000300), 0x10) sendmsg$can_bcm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="05000000040000004768000000000000", @ANYRES64=0x0, @ANYRES64=0xea60, @ANYRES64=0x0, @ANYBLOB="040000600100000000000080"], 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x90) 21.186345574s ago: executing program 3 (id=24751): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) timer_create(0x0, 0x0, &(0x7f0000000300)) 9.150229352s ago: executing program 0 (id=24797): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_usb_connect(0x1, 0x24, &(0x7f0000000600)={{0x12, 0x1, 0x200, 0x1a, 0x2, 0x53, 0x8, 0x2040, 0xc61a, 0xf496, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x10, 0x8, 0x10, 0xde, [{{0x9, 0x4, 0xec, 0x0, 0x0, 0x10, 0x9, 0xe0, 0x7d}}]}}]}}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 9.146214862s ago: executing program 1 (id=24798): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x28181, 0x0) 9.058684561s ago: executing program 2 (id=24800): rt_sigaction(0xd, 0x0, 0x0, 0x0, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00), 0x0, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r3, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) 7.501580377s ago: executing program 0 (id=24801): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) write(r0, 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 7.497703398s ago: executing program 1 (id=24802): rt_sigaction(0xd, 0x0, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f00000001c0)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000240)='b'}) 7.497080338s ago: executing program 2 (id=24803): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) write(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, &(0x7f0000000040)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl0\x00', 0x0, 0x4, 0xef, 0x9, 0xfb5, 0xe, @rand_addr=' \x01\x00', @mcast2, 0x10, 0x8000, 0x4, 0xc}}) 5.77958223s ago: executing program 0 (id=24804): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="020d000018"], 0xc0}}, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) close_range(r5, 0xffffffffffffffff, 0x0) 5.77594934s ago: executing program 1 (id=24805): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0, @ANYRESHEX=r1, @ANYRESHEX=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x6}, 0x1c) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r4, 0x29, 0x3, &(0x7f0000000000)=0x1, 0x4) bind$inet6(r4, &(0x7f0000000280)={0xa, 0x4e22, 0x9, @loopback, 0x6}, 0x1c) connect$inet6(r4, &(0x7f0000000140)={0xa, 0x4e22, 0x23, @loopback, 0x23}, 0x1c) r5 = dup(r4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r5) 5.775026611s ago: executing program 2 (id=24806): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r1, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) write(r3, 0x0, 0x0) prctl$PR_SET_THP_DISABLE(0x29, 0x10000000000005) 3.962009223s ago: executing program 0 (id=24807): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000500), 0x16b042, 0x0) read(r3, 0x0, 0x0) 3.958453483s ago: executing program 1 (id=24808): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) capset(&(0x7f00000001c0)={0x20071026}, &(0x7f0000000080)={0x0, 0x203}) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone3(&(0x7f0000000140)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 3.957690053s ago: executing program 2 (id=24809): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_usb_connect(0x1, 0x24, &(0x7f0000000600)={{0x12, 0x1, 0x200, 0x1a, 0x2, 0x53, 0x8, 0x2040, 0xc61a, 0xf496, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x10, 0x8, 0x10, 0xde, [{{0x9, 0x4, 0xec, 0x0, 0x0, 0x10, 0x9, 0xe0, 0x7d}}]}}]}}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x1, [{0x0, 0x0}]}) 2.017748008s ago: executing program 0 (id=24810): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x28181, 0x0) 2.017120458s ago: executing program 1 (id=24811): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) fsopen(&(0x7f0000000000)='pipefs\x00', 0x0) 2.016343708s ago: executing program 2 (id=24812): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, 0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) write(r0, 0x0, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r1, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x80) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) 4.58093ms ago: executing program 0 (id=24813): rt_sigaction(0xd, &(0x7f0000000180)={0x0, 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000040)='./binderfs/binder0\x00', 0x800, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000002c0)={0x44, 0x0, &(0x7f00000001c0)=[@transaction={0x40406300, {0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1, 0x0, &(0x7f0000000240)='b'}) 1.14571ms ago: executing program 1 (id=24814): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r3, 0x0, 0x0, 0x805, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 2 (id=24815): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="020d000018"], 0xc0}}, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) close_range(r5, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): yzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 736.076780][T10651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 736.076793][T10651] Call Trace: [ 736.076800][T10651] [ 736.076808][T10651] __dump_stack+0x21/0x30 [ 736.076839][T10651] dump_stack_lvl+0x10c/0x190 [ 736.076862][T10651] ? __cfi_dump_stack_lvl+0x10/0x10 [ 736.076887][T10651] ? __kasan_check_write+0x18/0x20 [ 736.076914][T10651] dump_stack+0x19/0x20 [ 736.076936][T10651] should_fail_ex+0x3d9/0x530 [ 736.076956][T10651] should_failslab+0xac/0x100 [ 736.076977][T10651] kmem_cache_alloc_noprof+0x42/0x430 [ 736.076995][T10651] ? getname_flags+0xc6/0x710 [ 736.077013][T10651] ? __cfi_ksys_write+0x10/0x10 [ 736.077031][T10651] getname_flags+0xc6/0x710 [ 736.077049][T10651] __x64_sys_mkdirat+0x7e/0xa0 [ 736.077071][T10651] x64_sys_call+0x2ba8/0x2ee0 [ 736.077096][T10651] do_syscall_64+0x58/0xf0 [ 736.077119][T10651] ? clear_bhb_loop+0x50/0xa0 [ 736.077139][T10651] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 736.077158][T10651] RIP: 0033:0x7f6a3058f6c9 [ 736.077175][T10651] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 736.077191][T10651] RSP: 002b:00007f6a314b5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 736.077213][T10651] RAX: ffffffffffffffda RBX: 00007f6a307e5fa0 RCX: 00007f6a3058f6c9 [ 736.077227][T10651] RDX: 0000000000000000 RSI: 0000200000000100 RDI: ffffffffffffff9c [ 736.077241][T10651] RBP: 00007f6a314b5090 R08: 0000000000000000 R09: 0000000000000000 [ 736.077254][T10651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 736.077265][T10651] R13: 00007f6a307e6038 R14: 00007f6a307e5fa0 R15: 00007ffc4f32dd08 [ 736.077282][T10651] [ 737.576109][T10744] FAULT_INJECTION: forcing a failure. [ 737.576109][T10744] name failslab, interval 1, probability 0, space 0, times 0 [ 737.589058][T10744] CPU: 0 UID: 0 PID: 10744 Comm: syz.0.21003 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 737.589089][T10744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 737.589101][T10744] Call Trace: [ 737.589108][T10744] [ 737.589116][T10744] __dump_stack+0x21/0x30 [ 737.589144][T10744] dump_stack_lvl+0x10c/0x190 [ 737.589167][T10744] ? __cfi_dump_stack_lvl+0x10/0x10 [ 737.589191][T10744] ? __kasan_check_write+0x18/0x20 [ 737.589218][T10744] ? proc_fail_nth_write+0x17e/0x210 [ 737.589240][T10744] ? __cfi_proc_fail_nth_write+0x10/0x10 [ 737.589264][T10744] dump_stack+0x19/0x20 [ 737.589286][T10744] should_fail_ex+0x3d9/0x530 [ 737.589306][T10744] should_failslab+0xac/0x100 [ 737.589326][T10744] kmem_cache_alloc_noprof+0x42/0x430 [ 737.589344][T10744] ? getname_flags+0xc6/0x710 [ 737.589363][T10744] getname_flags+0xc6/0x710 [ 737.589380][T10744] ? build_open_flags+0x487/0x600 [ 737.589403][T10744] getname+0x1b/0x30 [ 737.589419][T10744] do_sys_openat2+0xcb/0x1c0 [ 737.589440][T10744] ? fput+0x1a5/0x240 [ 737.589460][T10744] ? do_sys_open+0x100/0x100 [ 737.589487][T10744] ? ksys_write+0x1ef/0x250 [ 737.589503][T10744] ? __cfi_ksys_write+0x10/0x10 [ 737.589521][T10744] __x64_sys_openat+0x13a/0x170 [ 737.589543][T10744] x64_sys_call+0xe69/0x2ee0 [ 737.589565][T10744] do_syscall_64+0x58/0xf0 [ 737.589587][T10744] ? clear_bhb_loop+0x50/0xa0 [ 737.589608][T10744] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 737.589628][T10744] RIP: 0033:0x7f6abe18f6c9 [ 737.589643][T10744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 737.589660][T10744] RSP: 002b:00007f6abf037038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 737.589681][T10744] RAX: ffffffffffffffda RBX: 00007f6abe3e5fa0 RCX: 00007f6abe18f6c9 [ 737.589696][T10744] RDX: 000000000000275a RSI: 0000200000000080 RDI: ffffffffffffff9c [ 737.589708][T10744] RBP: 00007f6abf037090 R08: 0000000000000000 R09: 0000000000000000 [ 737.589720][T10744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 737.589731][T10744] R13: 00007f6abe3e6038 R14: 00007f6abe3e5fa0 R15: 00007ffeb36d8228 [ 737.589746][T10744] [ 737.760693][T10759] FAULT_INJECTION: forcing a failure. [ 737.760693][T10759] name failslab, interval 1, probability 0, space 0, times 0 [ 737.857910][T10759] CPU: 0 UID: 0 PID: 10759 Comm: syz.3.21011 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 737.857943][T10759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 737.857954][T10759] Call Trace: [ 737.857961][T10759] [ 737.857969][T10759] __dump_stack+0x21/0x30 [ 737.857996][T10759] dump_stack_lvl+0x10c/0x190 [ 737.858019][T10759] ? __cfi_dump_stack_lvl+0x10/0x10 [ 737.858044][T10759] dump_stack+0x19/0x20 [ 737.858066][T10759] should_fail_ex+0x3d9/0x530 [ 737.858086][T10759] should_failslab+0xac/0x100 [ 737.858106][T10759] kmem_cache_alloc_noprof+0x42/0x430 [ 737.858123][T10759] ? vm_area_dup+0x42/0x570 [ 737.858143][T10759] vm_area_dup+0x42/0x570 [ 737.858161][T10759] __split_vma+0x1bd/0xa80 [ 737.858179][T10759] ? kernel_text_address+0xa9/0xe0 [ 737.858209][T10759] ? __kernel_text_address+0x11/0x40 [ 737.858231][T10759] ? vms_gather_munmap_vmas+0xdd0/0xdd0 [ 737.858251][T10759] ? _parse_integer_limit+0x195/0x1e0 [ 737.858276][T10759] vms_gather_munmap_vmas+0x273/0xdd0 [ 737.858294][T10759] ? _parse_integer+0x2e/0x40 [ 737.858322][T10759] do_vmi_align_munmap+0x244/0x5d0 [ 737.858344][T10759] ? __cfi_do_vmi_align_munmap+0x10/0x10 [ 737.858363][T10759] ? mas_walk+0x3f7/0x650 [ 737.858383][T10759] ? mas_find+0x358/0x5f0 [ 737.858400][T10759] ? __kasan_check_write+0x18/0x20 [ 737.858426][T10759] do_vmi_munmap+0x246/0x2e0 [ 737.858446][T10759] __vm_munmap+0x22b/0x370 [ 737.858464][T10759] ? vm_munmap+0x40/0x40 [ 737.858482][T10759] ? __kasan_check_write+0x18/0x20 [ 737.858509][T10759] ? __cfi_ksys_write+0x10/0x10 [ 737.858526][T10759] ? blocking_notifier_call_chain+0x7c/0x90 [ 737.858553][T10759] __se_sys_munmap+0xc0/0x3a0 [ 737.858572][T10759] __x64_sys_munmap+0x5f/0x80 [ 737.858591][T10759] x64_sys_call+0x9c6/0x2ee0 [ 737.858616][T10759] do_syscall_64+0x58/0xf0 [ 737.858638][T10759] ? clear_bhb_loop+0x50/0xa0 [ 737.858659][T10759] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 737.858678][T10759] RIP: 0033:0x7fedced8f6c9 [ 737.858696][T10759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 737.858711][T10759] RSP: 002b:00007fedcfbb9038 EFLAGS: 00000246 ORIG_RAX: 000000000000000b [ 737.858730][T10759] RAX: ffffffffffffffda RBX: 00007fedcefe5fa0 RCX: 00007fedced8f6c9 [ 737.858744][T10759] RDX: 0000000000000000 RSI: 0000000000e06500 RDI: 0000200000470000 [ 737.858757][T10759] RBP: 00007fedcfbb9090 R08: 0000000000000000 R09: 0000000000000000 [ 737.858769][T10759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 737.858781][T10759] R13: 00007fedcefe6038 R14: 00007fedcefe5fa0 R15: 00007fffa7529548 [ 737.858797][T10759] [ 738.592680][T10789] FAULT_INJECTION: forcing a failure. [ 738.592680][T10789] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 738.618755][T10789] CPU: 1 UID: 0 PID: 10789 Comm: syz.0.21027 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 738.618790][T10789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 738.618802][T10789] Call Trace: [ 738.618808][T10789] [ 738.618817][T10789] __dump_stack+0x21/0x30 [ 738.618847][T10789] dump_stack_lvl+0x10c/0x190 [ 738.618870][T10789] ? __cfi_dump_stack_lvl+0x10/0x10 [ 738.618891][T10789] ? __kasan_check_write+0x18/0x20 [ 738.618915][T10789] ? mutex_unlock+0x8b/0x240 [ 738.618933][T10789] dump_stack+0x19/0x20 [ 738.618955][T10789] should_fail_ex+0x3d9/0x530 [ 738.618974][T10789] should_fail+0xf/0x20 [ 738.618991][T10789] should_fail_usercopy+0x1e/0x30 [ 738.619011][T10789] _copy_from_user+0x22/0xb0 [ 738.619033][T10789] __x64_sys_sendfile64+0x112/0x1f0 [ 738.619055][T10789] ? __cfi___x64_sys_sendfile64+0x10/0x10 [ 738.619076][T10789] ? __kasan_check_read+0x15/0x20 [ 738.619103][T10789] x64_sys_call+0xa26/0x2ee0 [ 738.619147][T10789] do_syscall_64+0x58/0xf0 [ 738.619170][T10789] ? clear_bhb_loop+0x50/0xa0 [ 738.619191][T10789] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 738.619210][T10789] RIP: 0033:0x7f6abe18f6c9 [ 738.619227][T10789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 738.619243][T10789] RSP: 002b:00007f6abf037038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 738.619266][T10789] RAX: ffffffffffffffda RBX: 00007f6abe3e5fa0 RCX: 00007f6abe18f6c9 [ 738.619280][T10789] RDX: 0000200000000140 RSI: ffffffffffffffff RDI: ffffffffffffffff [ 738.619295][T10789] RBP: 00007f6abf037090 R08: 0000000000000000 R09: 0000000000000000 [ 738.619309][T10789] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 738.619322][T10789] R13: 00007f6abe3e6038 R14: 00007f6abe3e5fa0 R15: 00007ffeb36d8228 [ 738.619338][T10789] [ 739.610371][T10839] FAULT_INJECTION: forcing a failure. [ 739.610371][T10839] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 739.626467][ T36] kauditd_printk_skb: 551 callbacks suppressed [ 739.626484][ T36] audit: type=1400 audit(1763228688.220:1500): avc: denied { execute } for pid=10840 comm="syz.2.21053" path="/436/blkio.bfq.group_wait_time" dev="tmpfs" ino=2773 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 739.678748][T10839] CPU: 1 UID: 0 PID: 10839 Comm: syz.1.21052 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 739.678781][T10839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 739.678793][T10839] Call Trace: [ 739.678800][T10839] [ 739.678808][T10839] __dump_stack+0x21/0x30 [ 739.678836][T10839] dump_stack_lvl+0x10c/0x190 [ 739.678859][T10839] ? __cfi_dump_stack_lvl+0x10/0x10 [ 739.678882][T10839] ? check_stack_object+0x12c/0x140 [ 739.678902][T10839] dump_stack+0x19/0x20 [ 739.678924][T10839] should_fail_ex+0x3d9/0x530 [ 739.678943][T10839] should_fail+0xf/0x20 [ 739.678965][T10839] should_fail_usercopy+0x1e/0x30 [ 739.678984][T10839] _copy_to_user+0x24/0xa0 [ 739.679006][T10839] simple_read_from_buffer+0xed/0x160 [ 739.679048][T10839] proc_fail_nth_read+0x19e/0x210 [ 739.679071][T10839] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 739.679094][T10839] ? bpf_lsm_file_permission+0xd/0x20 [ 739.679118][T10839] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 739.679139][T10839] vfs_read+0x27d/0xc70 [ 739.679156][T10839] ? __cfi_vfs_read+0x10/0x10 [ 739.679172][T10839] ? __kasan_check_write+0x18/0x20 [ 739.679198][T10839] ? mutex_lock+0x92/0x1c0 [ 739.679214][T10839] ? __cfi_mutex_lock+0x10/0x10 [ 739.679230][T10839] ? __fget_files+0x2c5/0x340 [ 739.679250][T10839] ksys_read+0x141/0x250 [ 739.679267][T10839] ? __cfi_ksys_read+0x10/0x10 [ 739.679284][T10839] ? __kasan_check_read+0x15/0x20 [ 739.679308][T10839] __x64_sys_read+0x7f/0x90 [ 739.679331][T10839] x64_sys_call+0x2638/0x2ee0 [ 739.679354][T10839] do_syscall_64+0x58/0xf0 [ 739.679376][T10839] ? clear_bhb_loop+0x50/0xa0 [ 739.679396][T10839] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 739.679416][T10839] RIP: 0033:0x7f6a3058e0dc [ 739.679431][T10839] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 739.679448][T10839] RSP: 002b:00007f6a314b5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 739.679468][T10839] RAX: ffffffffffffffda RBX: 00007f6a307e5fa0 RCX: 00007f6a3058e0dc [ 739.679483][T10839] RDX: 000000000000000f RSI: 00007f6a314b50a0 RDI: 0000000000000006 [ 739.679496][T10839] RBP: 00007f6a314b5090 R08: 0000000000000000 R09: 0000000000000000 [ 739.679509][T10839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 739.679521][T10839] R13: 00007f6a307e6038 R14: 00007f6a307e5fa0 R15: 00007ffc4f32dd08 [ 739.679536][T10839] [ 739.848815][ T36] audit: type=1400 audit(1763228688.230:1501): avc: denied { execute } for pid=10841 comm="syz.3.21054" path="/343/blkio.bfq.group_wait_time" dev="tmpfs" ino=2184 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 740.037369][ T36] audit: type=1400 audit(1763228688.260:1502): avc: denied { execute } for pid=10841 comm="syz.3.21054" path="/343/blkio.bfq.group_wait_time" dev="tmpfs" ino=2184 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 740.062948][ T36] audit: type=1400 audit(1763228688.270:1503): avc: denied { read write } for pid=7192 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 740.109555][ T36] audit: type=1400 audit(1763228688.270:1504): avc: denied { read write open } for pid=7192 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 740.135568][ T36] audit: type=1400 audit(1763228688.270:1505): avc: denied { ioctl } for pid=7192 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 740.196414][ T36] audit: type=1400 audit(1763228688.290:1506): avc: denied { read write } for pid=8042 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 740.242822][ T36] audit: type=1400 audit(1763228688.290:1507): avc: denied { read write open } for pid=8042 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 740.270232][ T36] audit: type=1400 audit(1763228688.290:1508): avc: denied { ioctl } for pid=8042 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 740.322871][ T6700] audit: audit_backlog=65 > audit_backlog_limit=64 [ 742.312555][T10936] bpf: Bad value for 'uid' [ 744.631483][ T36] kauditd_printk_skb: 481 callbacks suppressed [ 744.631500][ T36] audit: type=1400 audit(1763228693.230:1988): avc: denied { execute } for pid=11046 comm="syz.1.21155" path="/506/blkio.bfq.group_wait_time" dev="tmpfs" ino=3222 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 744.702787][ T36] audit: type=1400 audit(1763228693.230:1989): avc: denied { execute } for pid=11048 comm="syz.2.21150" path="/472/blkio.bfq.group_wait_time" dev="tmpfs" ino=2990 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 744.748372][ T36] audit: type=1400 audit(1763228693.280:1990): avc: denied { read write } for pid=7192 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 744.812953][ T36] audit: type=1400 audit(1763228693.280:1991): avc: denied { read write open } for pid=7192 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 744.886841][ T36] audit: type=1400 audit(1763228693.280:1992): avc: denied { ioctl } for pid=7192 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 744.944550][ T36] audit: type=1400 audit(1763228693.300:1993): avc: denied { read write } for pid=6700 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 744.998734][ T36] audit: type=1400 audit(1763228693.300:1994): avc: denied { read write open } for pid=6700 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 745.068732][ T36] audit: type=1400 audit(1763228693.300:1995): avc: denied { ioctl } for pid=6700 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 745.119109][ T36] audit: type=1400 audit(1763228693.330:1996): avc: denied { execute } for pid=11050 comm="syz.2.21156" path="/473/blkio.bfq.group_wait_time" dev="tmpfs" ino=2997 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 745.178790][ T36] audit: type=1400 audit(1763228693.380:1997): avc: denied { execute } for pid=11052 comm="syz.1.21157" path="/507/blkio.bfq.group_wait_time" dev="tmpfs" ino=3228 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 748.263463][T10387] bridge_slave_1: left allmulticast mode [ 748.274925][T10387] bridge_slave_1: left promiscuous mode [ 748.296742][T10387] bridge0: port 2(bridge_slave_1) entered disabled state [ 748.307203][T10387] bridge_slave_0: left allmulticast mode [ 748.318766][T10387] bridge_slave_0: left promiscuous mode [ 748.329238][T10387] bridge0: port 1(bridge_slave_0) entered disabled state [ 748.474495][T10387] veth1_macvtap: left promiscuous mode [ 748.489690][T10387] veth0_vlan: left promiscuous mode [ 748.721743][T11193] bridge0: port 1(bridge_slave_0) entered blocking state [ 748.733038][T11193] bridge0: port 1(bridge_slave_0) entered disabled state [ 748.758762][T11193] bridge_slave_0: entered allmulticast mode [ 748.779168][T11193] bridge_slave_0: entered promiscuous mode [ 748.797876][T11193] bridge0: port 2(bridge_slave_1) entered blocking state [ 748.818730][T11193] bridge0: port 2(bridge_slave_1) entered disabled state [ 748.825836][T11193] bridge_slave_1: entered allmulticast mode [ 748.833870][T11193] bridge_slave_1: entered promiscuous mode [ 749.030924][T11193] bridge0: port 2(bridge_slave_1) entered blocking state [ 749.037998][T11193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 749.045315][T11193] bridge0: port 1(bridge_slave_0) entered blocking state [ 749.052368][T11193] bridge0: port 1(bridge_slave_0) entered forwarding state [ 749.199226][T10387] bridge0: port 1(bridge_slave_0) entered disabled state [ 749.218822][T10387] bridge0: port 2(bridge_slave_1) entered disabled state [ 749.257063][T10387] bridge0: port 1(bridge_slave_0) entered blocking state [ 749.264145][T10387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 749.288177][T10387] bridge0: port 2(bridge_slave_1) entered blocking state [ 749.295264][T10387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 749.429797][T11193] veth0_vlan: entered promiscuous mode [ 749.488842][T11193] veth1_macvtap: entered promiscuous mode [ 749.646405][ T36] kauditd_printk_skb: 624 callbacks suppressed [ 749.646427][ T36] audit: type=1400 audit(1763228698.240:2622): avc: denied { read write } for pid=8042 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 749.695064][ T36] audit: type=1400 audit(1763228698.280:2623): avc: denied { read write } for pid=11193 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 749.720340][ T36] audit: type=1400 audit(1763228698.280:2624): avc: denied { read write open } for pid=11193 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 749.746534][ T36] audit: type=1400 audit(1763228698.280:2625): avc: denied { ioctl } for pid=11193 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 749.775590][ T36] audit: type=1400 audit(1763228698.290:2626): avc: denied { read write open } for pid=8042 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 749.805764][ T36] audit: type=1400 audit(1763228698.290:2627): avc: denied { ioctl } for pid=8042 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 749.833076][ T36] audit: type=1400 audit(1763228698.400:2628): avc: denied { execute } for pid=11272 comm="syz.3.21262" path="/384/blkio.bfq.group_wait_time" dev="tmpfs" ino=2435 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 749.859274][ T36] audit: type=1400 audit(1763228698.400:2629): avc: denied { execute } for pid=11273 comm="syz.0.21225" path="/0/blkio.bfq.group_wait_time" dev="tmpfs" ino=18 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 749.940898][ T36] audit: type=1400 audit(1763228698.490:2630): avc: denied { read } for pid=11272 comm="syz.3.21262" name="kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 750.009145][ T36] audit: type=1400 audit(1763228698.490:2631): avc: denied { read open } for pid=11272 comm="syz.3.21262" path="/dev/kvm" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 754.682762][ T36] kauditd_printk_skb: 496 callbacks suppressed [ 754.682779][ T36] audit: type=1400 audit(1763228703.280:3128): avc: denied { read write } for pid=7192 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 754.734756][ T36] audit: type=1400 audit(1763228703.310:3129): avc: denied { read write open } for pid=7192 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 754.788737][ T36] audit: type=1400 audit(1763228703.310:3130): avc: denied { ioctl } for pid=7192 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 754.836175][ T36] audit: type=1400 audit(1763228703.360:3131): avc: denied { execute } for pid=11460 comm="syz.2.21355" path="/522/blkio.bfq.group_wait_time" dev="tmpfs" ino=3298 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 754.885280][ T36] audit: type=1400 audit(1763228703.380:3132): avc: denied { read write } for pid=7192 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 754.936861][ T36] audit: type=1400 audit(1763228703.380:3133): avc: denied { read write open } for pid=7192 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 754.970524][ T36] audit: type=1400 audit(1763228703.380:3134): avc: denied { ioctl } for pid=7192 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 754.998076][ T36] audit: type=1400 audit(1763228703.420:3135): avc: denied { execute } for pid=11462 comm="syz.2.21358" path="/523/blkio.bfq.group_wait_time" dev="tmpfs" ino=3304 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 755.024299][ T36] audit: type=1400 audit(1763228703.430:3136): avc: denied { create } for pid=11462 comm="syz.2.21358" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 755.047492][ T36] audit: type=1400 audit(1763228703.430:3137): avc: denied { map } for pid=11462 comm="syz.2.21358" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=304095 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 759.691478][ T36] kauditd_printk_skb: 597 callbacks suppressed [ 759.691497][ T36] audit: type=1400 audit(1763228708.290:3735): avc: denied { execute } for pid=11698 comm="syz.2.21474" path="/559/blkio.bfq.group_wait_time" dev="tmpfs" ino=3520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 759.748737][ T36] audit: type=1400 audit(1763228708.330:3736): avc: denied { read write } for pid=6700 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 759.793272][ T36] audit: type=1400 audit(1763228708.330:3737): avc: denied { read write open } for pid=6700 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 759.850372][ T36] audit: type=1400 audit(1763228708.330:3738): avc: denied { ioctl } for pid=6700 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 759.903779][ T36] audit: type=1400 audit(1763228708.340:3739): avc: denied { read write } for pid=7192 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 759.957734][ T36] audit: type=1400 audit(1763228708.340:3740): avc: denied { read write open } for pid=7192 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 760.013550][ T36] audit: type=1400 audit(1763228708.340:3741): avc: denied { ioctl } for pid=7192 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 760.068739][ T36] audit: type=1400 audit(1763228708.380:3742): avc: denied { execute } for pid=11700 comm="syz.2.21476" path="/560/blkio.bfq.group_wait_time" dev="tmpfs" ino=3526 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 760.127840][ T36] audit: type=1400 audit(1763228708.390:3743): avc: denied { write } for pid=11700 comm="syz.2.21476" name="snmp6" dev="proc" ino=4026533215 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 760.198738][ T36] audit: type=1400 audit(1763228708.390:3744): avc: denied { write } for pid=11700 comm="syz.2.21476" path="/proc/1129/net/snmp6" dev="proc" ino=4026533215 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 760.855162][T10387] bridge_slave_1: left allmulticast mode [ 760.860896][T10387] bridge_slave_1: left promiscuous mode [ 760.866522][T10387] bridge0: port 2(bridge_slave_1) entered disabled state [ 760.889145][T10387] bridge_slave_0: left allmulticast mode [ 760.894835][T10387] bridge_slave_0: left promiscuous mode [ 760.908834][T10387] bridge0: port 1(bridge_slave_0) entered disabled state [ 761.069322][T10387] veth1_macvtap: left promiscuous mode [ 761.074868][T10387] veth0_vlan: left promiscuous mode [ 761.264291][T11753] bridge0: port 1(bridge_slave_0) entered blocking state [ 761.273854][T11753] bridge0: port 1(bridge_slave_0) entered disabled state [ 761.281977][T11753] bridge_slave_0: entered allmulticast mode [ 761.293996][T11753] bridge_slave_0: entered promiscuous mode [ 761.310346][T11753] bridge0: port 2(bridge_slave_1) entered blocking state [ 761.330526][T11753] bridge0: port 2(bridge_slave_1) entered disabled state [ 761.337631][T11753] bridge_slave_1: entered allmulticast mode [ 761.354175][T11753] bridge_slave_1: entered promiscuous mode [ 761.581120][T11753] bridge0: port 2(bridge_slave_1) entered blocking state [ 761.588220][T11753] bridge0: port 2(bridge_slave_1) entered forwarding state [ 761.595552][T11753] bridge0: port 1(bridge_slave_0) entered blocking state [ 761.602618][T11753] bridge0: port 1(bridge_slave_0) entered forwarding state [ 761.732408][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 761.740053][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 761.762016][T10387] bridge0: port 1(bridge_slave_0) entered blocking state [ 761.769104][T10387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 761.799623][T10387] bridge0: port 2(bridge_slave_1) entered blocking state [ 761.806689][T10387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 761.970936][T11753] veth0_vlan: entered promiscuous mode [ 762.051606][T11753] veth1_macvtap: entered promiscuous mode [ 764.704971][ T36] kauditd_printk_skb: 788 callbacks suppressed [ 764.704989][ T36] audit: type=1400 audit(1763228713.300:4533): avc: denied { read write open } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 764.761937][ T36] audit: type=1400 audit(1763228713.330:4534): avc: denied { ioctl } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 764.795323][ T36] audit: type=1400 audit(1763228713.350:4535): avc: denied { execute } for pid=11967 comm="syz.0.21603" path="/114/blkio.bfq.group_wait_time" dev="tmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 764.820745][ T36] audit: type=1400 audit(1763228713.360:4536): avc: denied { create } for pid=11967 comm="syz.0.21603" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 764.880528][ T36] audit: type=1400 audit(1763228713.360:4537): avc: denied { map } for pid=11967 comm="syz.0.21603" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=308478 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 764.938759][ T36] audit: type=1400 audit(1763228713.360:4538): avc: denied { read write } for pid=11967 comm="syz.0.21603" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=308478 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 765.004313][ T36] audit: type=1400 audit(1763228713.390:4539): avc: denied { execute } for pid=11968 comm="syz.1.21604" path="/17/blkio.bfq.group_wait_time" dev="tmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 765.058738][ T36] audit: type=1400 audit(1763228713.390:4540): avc: denied { read write } for pid=11193 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 765.119855][ T36] audit: type=1400 audit(1763228713.390:4541): avc: denied { read write open } for pid=11193 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 765.176323][ T36] audit: type=1400 audit(1763228713.390:4542): avc: denied { ioctl } for pid=11193 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 766.171940][ T13] bridge_slave_1: left allmulticast mode [ 766.177622][ T13] bridge_slave_1: left promiscuous mode [ 766.185716][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 766.199337][ T13] bridge_slave_0: left allmulticast mode [ 766.205006][ T13] bridge_slave_0: left promiscuous mode [ 766.228892][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 766.361338][ T13] veth1_macvtap: left promiscuous mode [ 766.366890][ T13] veth0_vlan: left promiscuous mode [ 766.598872][T12031] bridge0: port 1(bridge_slave_0) entered blocking state [ 766.606073][T12031] bridge0: port 1(bridge_slave_0) entered disabled state [ 766.618772][T12031] bridge_slave_0: entered allmulticast mode [ 766.630454][T12031] bridge_slave_0: entered promiscuous mode [ 766.644732][T12031] bridge0: port 2(bridge_slave_1) entered blocking state [ 766.661298][T12031] bridge0: port 2(bridge_slave_1) entered disabled state [ 766.676614][T12031] bridge_slave_1: entered allmulticast mode [ 766.689164][T12031] bridge_slave_1: entered promiscuous mode [ 766.892452][T12031] bridge0: port 2(bridge_slave_1) entered blocking state [ 766.899555][T12031] bridge0: port 2(bridge_slave_1) entered forwarding state [ 766.906843][T12031] bridge0: port 1(bridge_slave_0) entered blocking state [ 766.913928][T12031] bridge0: port 1(bridge_slave_0) entered forwarding state [ 767.039826][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 767.047209][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 767.083003][T11253] bridge0: port 1(bridge_slave_0) entered blocking state [ 767.090103][T11253] bridge0: port 1(bridge_slave_0) entered forwarding state [ 767.111143][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 767.118202][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 767.237344][T12031] veth0_vlan: entered promiscuous mode [ 767.289961][T12031] veth1_macvtap: entered promiscuous mode [ 769.731152][ T36] kauditd_printk_skb: 749 callbacks suppressed [ 769.731170][ T36] audit: type=1400 audit(1763228718.330:5292): avc: denied { read write } for pid=11193 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 769.778739][ T36] audit: type=1400 audit(1763228718.330:5293): avc: denied { read write open } for pid=11193 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 769.835767][ T36] audit: type=1400 audit(1763228718.330:5294): avc: denied { ioctl } for pid=11193 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 769.888820][ T36] audit: type=1400 audit(1763228718.400:5295): avc: denied { create } for pid=12246 comm="syz.0.21737" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 769.938733][ T36] audit: type=1400 audit(1763228718.400:5296): avc: denied { ioctl } for pid=12246 comm="syz.0.21737" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=310384 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 769.985333][ T36] audit: type=1400 audit(1763228718.400:5297): avc: denied { ioctl } for pid=12246 comm="syz.0.21737" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=310384 ioctlcmd=0xaa05 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 770.047059][ T36] audit: type=1400 audit(1763228718.430:5298): avc: denied { read write } for pid=11193 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 770.098729][ T36] audit: type=1400 audit(1763228718.430:5299): avc: denied { read write open } for pid=11193 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 770.188750][ T36] audit: type=1400 audit(1763228718.430:5300): avc: denied { ioctl } for pid=11193 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 770.236941][ T36] audit: type=1400 audit(1763228718.550:5301): avc: denied { read write } for pid=11193 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 772.912470][T12380] FAULT_INJECTION: forcing a failure. [ 772.912470][T12380] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 772.946617][T12380] CPU: 0 UID: 0 PID: 12380 Comm: syz.1.21804 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 772.946651][T12380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 772.946664][T12380] Call Trace: [ 772.946671][T12380] [ 772.946680][T12380] __dump_stack+0x21/0x30 [ 772.946710][T12380] dump_stack_lvl+0x10c/0x190 [ 772.946734][T12380] ? __cfi_dump_stack_lvl+0x10/0x10 [ 772.946758][T12380] ? check_stack_object+0x12c/0x140 [ 772.946777][T12380] dump_stack+0x19/0x20 [ 772.946799][T12380] should_fail_ex+0x3d9/0x530 [ 772.946819][T12380] should_fail+0xf/0x20 [ 772.946835][T12380] should_fail_usercopy+0x1e/0x30 [ 772.946854][T12380] _copy_to_user+0x24/0xa0 [ 772.946877][T12380] simple_read_from_buffer+0xed/0x160 [ 772.946900][T12380] proc_fail_nth_read+0x19e/0x210 [ 772.946925][T12380] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 772.946948][T12380] ? __kasan_check_write+0x18/0x20 [ 772.946974][T12380] ? bpf_lsm_file_permission+0xd/0x20 [ 772.946999][T12380] ? __cfi_proc_fail_nth_read+0x10/0x10 [ 772.947022][T12380] vfs_read+0x27d/0xc70 [ 772.947046][T12380] ? __cfi_vfs_read+0x10/0x10 [ 772.947062][T12380] ? __kasan_check_write+0x18/0x20 [ 772.947087][T12380] ? mutex_lock+0x92/0x1c0 [ 772.947105][T12380] ? __cfi_mutex_lock+0x10/0x10 [ 772.947122][T12380] ? __fget_files+0x2c5/0x340 [ 772.947143][T12380] ksys_read+0x141/0x250 [ 772.947161][T12380] ? __cfi_ksys_read+0x10/0x10 [ 772.947178][T12380] ? __kasan_check_read+0x15/0x20 [ 772.947204][T12380] __x64_sys_read+0x7f/0x90 [ 772.947222][T12380] x64_sys_call+0x2638/0x2ee0 [ 772.947247][T12380] do_syscall_64+0x58/0xf0 [ 772.947269][T12380] ? clear_bhb_loop+0x50/0xa0 [ 772.947290][T12380] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 772.947310][T12380] RIP: 0033:0x7f17a378e0dc [ 772.947326][T12380] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 772.947340][T12380] RSP: 002b:00007f17a46db030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 772.947360][T12380] RAX: ffffffffffffffda RBX: 00007f17a39e5fa0 RCX: 00007f17a378e0dc [ 772.947372][T12380] RDX: 000000000000000f RSI: 00007f17a46db0a0 RDI: 0000000000000009 [ 772.947383][T12380] RBP: 00007f17a46db090 R08: 0000000000000000 R09: 0000000000000000 [ 772.947394][T12380] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 772.947404][T12380] R13: 00007f17a39e6038 R14: 00007f17a39e5fa0 R15: 00007fff3603a448 [ 772.947418][T12380] [ 774.738711][ T36] kauditd_printk_skb: 585 callbacks suppressed [ 774.738728][ T36] audit: type=1400 audit(1763228723.330:5887): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 774.787760][ T36] audit: type=1400 audit(1763228723.370:5888): avc: denied { execute } for pid=12472 comm="syz.0.21850" path="/206/blkio.bfq.group_wait_time" dev="tmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 774.818892][ T36] audit: type=1400 audit(1763228723.370:5889): avc: denied { create } for pid=12472 comm="syz.0.21850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 774.839751][ T36] audit: type=1400 audit(1763228723.380:5890): avc: denied { execute } for pid=12474 comm="syz.1.21851" path="/65/blkio.bfq.group_wait_time" dev="tmpfs" ino=413 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 774.893259][ T36] audit: type=1400 audit(1763228723.410:5891): avc: denied { create } for pid=12472 comm="syz.0.21850" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 774.916758][ T36] audit: type=1400 audit(1763228723.410:5892): avc: denied { map } for pid=12472 comm="syz.0.21850" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=311151 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 774.953537][ T36] audit: type=1400 audit(1763228723.410:5893): avc: denied { read write } for pid=12472 comm="syz.0.21850" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=311151 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 774.979309][ T36] audit: type=1400 audit(1763228723.470:5894): avc: denied { read write } for pid=11753 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 775.004352][ T36] audit: type=1400 audit(1763228723.470:5895): avc: denied { read write open } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 775.030551][ T36] audit: type=1400 audit(1763228723.470:5896): avc: denied { ioctl } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 779.753850][ T36] kauditd_printk_skb: 974 callbacks suppressed [ 779.753867][ T36] audit: type=1400 audit(1763228728.350:6871): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 779.816087][ T36] audit: type=1400 audit(1763228728.350:6872): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 779.856930][ T36] audit: type=1400 audit(1763228728.350:6873): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 779.884121][ T36] audit: type=1400 audit(1763228728.350:6874): avc: denied { execute } for pid=12844 comm="syz.1.22036" path="/107/blkio.bfq.group_wait_time" dev="tmpfs" ino=667 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 779.941846][ T36] audit: type=1400 audit(1763228728.380:6875): avc: denied { create } for pid=12844 comm="syz.1.22036" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 780.007171][ T36] audit: type=1400 audit(1763228728.380:6876): avc: denied { map } for pid=12844 comm="syz.1.22036" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=313183 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 780.060174][ T36] audit: type=1400 audit(1763228728.380:6877): avc: denied { read write } for pid=12844 comm="syz.1.22036" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=313183 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 780.104914][ T36] audit: type=1400 audit(1763228728.380:6878): avc: denied { create } for pid=12846 comm="syz.3.22037" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 780.137254][ T36] audit: type=1400 audit(1763228728.380:6879): avc: denied { map } for pid=12846 comm="syz.3.22037" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=313435 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 780.181994][ T36] audit: type=1400 audit(1763228728.380:6880): avc: denied { read write } for pid=12846 comm="syz.3.22037" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=313435 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 784.759338][ T36] kauditd_printk_skb: 645 callbacks suppressed [ 784.759356][ T36] audit: type=1400 audit(1763228733.360:7490): avc: denied { execute } for pid=13078 comm="syz.2.22153" path="/124/blkio.bfq.group_wait_time" dev="tmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 784.833706][ T36] audit: type=1400 audit(1763228733.390:7491): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 784.877963][ T36] audit: type=1400 audit(1763228733.390:7492): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 784.908959][ T36] audit: type=1400 audit(1763228733.390:7493): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 784.976964][ T36] audit: type=1400 audit(1763228733.400:7494): avc: denied { create } for pid=13079 comm="syz.1.22154" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 785.013459][ T36] audit: type=1400 audit(1763228733.400:7495): avc: denied { map } for pid=13079 comm="syz.1.22154" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=314904 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 785.039606][ T36] audit: type=1400 audit(1763228733.400:7496): avc: denied { read write } for pid=13079 comm="syz.1.22154" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=314904 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 785.071865][ T36] audit: type=1400 audit(1763228733.430:7497): avc: denied { read write } for pid=11753 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 785.098057][ T36] audit: type=1400 audit(1763228733.430:7498): avc: denied { read write open } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 785.130071][ T36] audit: type=1400 audit(1763228733.430:7499): avc: denied { ioctl } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 788.634727][T11253] bridge_slave_1: left allmulticast mode [ 788.654540][T11253] bridge_slave_1: left promiscuous mode [ 788.678796][T11253] bridge0: port 2(bridge_slave_1) entered disabled state [ 788.689748][T11253] bridge_slave_0: left allmulticast mode [ 788.695426][T11253] bridge_slave_0: left promiscuous mode [ 788.726928][T11253] bridge0: port 1(bridge_slave_0) entered disabled state [ 788.871444][T11253] veth1_macvtap: left promiscuous mode [ 788.876999][T11253] veth0_vlan: left promiscuous mode [ 789.089274][T13313] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.096339][T13313] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.116172][T13313] bridge_slave_0: entered allmulticast mode [ 789.122562][T13313] bridge_slave_0: entered promiscuous mode [ 789.130082][T13313] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.137138][T13313] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.144278][T13313] bridge_slave_1: entered allmulticast mode [ 789.150680][T13313] bridge_slave_1: entered promiscuous mode [ 789.349927][T13313] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.356997][T13313] bridge0: port 2(bridge_slave_1) entered forwarding state [ 789.364307][T13313] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.371374][T13313] bridge0: port 1(bridge_slave_0) entered forwarding state [ 789.515058][T10387] bridge0: port 1(bridge_slave_0) entered disabled state [ 789.529466][T10387] bridge0: port 2(bridge_slave_1) entered disabled state [ 789.551388][T10387] bridge0: port 1(bridge_slave_0) entered blocking state [ 789.558439][T10387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 789.595259][T10387] bridge0: port 2(bridge_slave_1) entered blocking state [ 789.602350][T10387] bridge0: port 2(bridge_slave_1) entered forwarding state [ 789.780044][T13313] veth0_vlan: entered promiscuous mode [ 789.780310][ T36] kauditd_printk_skb: 805 callbacks suppressed [ 789.780324][ T36] audit: type=1400 audit(1763228738.380:8305): avc: denied { execute } for pid=13357 comm="syz.2.22286" path="/152/blkio.bfq.group_wait_time" dev="tmpfs" ino=939 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 789.850588][T13313] veth1_macvtap: entered promiscuous mode [ 789.871365][ T36] audit: type=1400 audit(1763228738.390:8306): avc: denied { sys_module } for pid=13313 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 789.918732][ T36] audit: type=1400 audit(1763228738.390:8307): avc: denied { sys_module } for pid=13313 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 789.975735][ T36] audit: type=1400 audit(1763228738.390:8308): avc: denied { sys_module } for pid=13313 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 790.027627][ T36] audit: type=1400 audit(1763228738.390:8309): avc: denied { sys_module } for pid=13313 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 790.075470][ T36] audit: type=1400 audit(1763228738.390:8310): avc: denied { sys_module } for pid=13313 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 790.124350][ T36] audit: type=1400 audit(1763228738.410:8311): avc: denied { sys_module } for pid=13313 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 790.166092][ T36] audit: type=1400 audit(1763228738.410:8312): avc: denied { sys_module } for pid=13313 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 790.189749][T13368] audit: audit_backlog=65 > audit_backlog_limit=64 [ 790.196278][T13368] audit: audit_lost=15 audit_rate_limit=0 audit_backlog_limit=64 [ 794.796922][ T36] kauditd_printk_skb: 584 callbacks suppressed [ 794.796940][ T36] audit: type=1400 audit(1763228743.390:8878): avc: denied { read write } for pid=11193 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 794.853676][ T36] audit: type=1400 audit(1763228743.410:8879): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 794.904644][ T36] audit: type=1400 audit(1763228743.410:8880): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 794.958732][ T36] audit: type=1400 audit(1763228743.410:8881): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 795.028739][ T36] audit: type=1400 audit(1763228743.430:8882): avc: denied { read write open } for pid=11193 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 795.088743][ T36] audit: type=1400 audit(1763228743.430:8883): avc: denied { ioctl } for pid=11193 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 795.142140][ T36] audit: type=1400 audit(1763228743.470:8884): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 795.196740][ T36] audit: type=1400 audit(1763228743.470:8885): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 795.275304][ T36] audit: type=1400 audit(1763228743.470:8886): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 795.328646][ T36] audit: type=1400 audit(1763228743.520:8887): avc: denied { execute } for pid=13561 comm="syz.2.22389" path="/166/blkio.bfq.group_wait_time" dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 799.811287][ T36] kauditd_printk_skb: 613 callbacks suppressed [ 799.811305][ T36] audit: type=1400 audit(1763228748.410:9501): avc: denied { execute } for pid=13771 comm="syz.1.22496" path="/243/blkio.bfq.group_wait_time" dev="tmpfs" ino=1488 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 799.868726][ T36] audit: type=1400 audit(1763228748.450:9502): avc: denied { execute } for pid=13773 comm="syz.3.22497" path="/42/blkio.bfq.group_wait_time" dev="tmpfs" ino=274 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 799.938729][ T36] audit: type=1400 audit(1763228748.460:9503): avc: denied { create } for pid=13771 comm="syz.1.22496" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 799.978748][ T36] audit: type=1400 audit(1763228748.460:9504): avc: denied { map } for pid=13771 comm="syz.1.22496" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=319128 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 800.038262][ T36] audit: type=1400 audit(1763228748.460:9505): avc: denied { create } for pid=13773 comm="syz.3.22497" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 800.098782][ T36] audit: type=1400 audit(1763228748.460:9506): avc: denied { read write } for pid=13771 comm="syz.1.22496" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=319128 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 800.153449][ T36] audit: type=1400 audit(1763228748.460:9507): avc: denied { map } for pid=13773 comm="syz.3.22497" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=318241 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 800.192075][ T36] audit: type=1400 audit(1763228748.460:9508): avc: denied { read write } for pid=13773 comm="syz.3.22497" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=318241 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 800.229096][T13798] audit: audit_backlog=65 > audit_backlog_limit=64 [ 800.233518][T13796] audit: audit_backlog=65 > audit_backlog_limit=64 [ 805.280857][ T36] kauditd_printk_skb: 834 callbacks suppressed [ 805.280875][ T36] audit: type=1400 audit(1763228753.880:10330): avc: denied { read write } for pid=13313 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 805.334028][ T36] audit: type=1400 audit(1763228753.910:10331): avc: denied { read write open } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 805.385493][ T36] audit: type=1400 audit(1763228753.910:10332): avc: denied { ioctl } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 805.438729][ T36] audit: type=1400 audit(1763228753.980:10333): avc: denied { execute } for pid=14069 comm="syz.3.22643" path="/83/blkio.bfq.group_wait_time" dev="tmpfs" ino=518 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 805.498737][ T36] audit: type=1400 audit(1763228754.080:10334): avc: denied { read write } for pid=13313 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 805.543998][ T36] audit: type=1400 audit(1763228754.080:10335): avc: denied { read write open } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 805.615875][ T36] audit: type=1400 audit(1763228754.080:10336): avc: denied { ioctl } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 805.666897][ T36] audit: type=1400 audit(1763228754.090:10337): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 805.726992][ T36] audit: type=1400 audit(1763228754.090:10338): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 805.758972][ T36] audit: type=1400 audit(1763228754.090:10339): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 809.050942][T11253] bridge_slave_1: left allmulticast mode [ 809.067929][T11253] bridge_slave_1: left promiscuous mode [ 809.076363][T11253] bridge0: port 2(bridge_slave_1) entered disabled state [ 809.094139][T11253] bridge_slave_0: left allmulticast mode [ 809.109546][T11253] bridge_slave_0: left promiscuous mode [ 809.135067][T11253] bridge0: port 1(bridge_slave_0) entered disabled state [ 809.289853][T11253] veth1_macvtap: left promiscuous mode [ 809.295403][T11253] veth0_vlan: left promiscuous mode [ 810.289156][ T36] kauditd_printk_skb: 651 callbacks suppressed [ 810.289173][ T36] audit: type=1400 audit(1763228758.890:10991): avc: denied { create } for pid=14302 comm="syz.2.22759" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 810.325763][ T36] audit: type=1400 audit(1763228758.910:10992): avc: denied { map } for pid=14302 comm="syz.2.22759" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=322755 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 810.356230][ T36] audit: type=1400 audit(1763228758.910:10993): avc: denied { read write } for pid=14302 comm="syz.2.22759" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=322755 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 810.383375][ T36] audit: type=1400 audit(1763228758.940:10994): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 810.409155][ T36] audit: type=1400 audit(1763228758.940:10995): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 810.436618][ T36] audit: type=1400 audit(1763228758.940:10996): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 810.508769][ T36] audit: type=1400 audit(1763228758.990:10997): avc: denied { execute } for pid=14307 comm="syz.2.22763" path="/227/blkio.bfq.group_wait_time" dev="tmpfs" ino=1404 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 810.538932][ T36] audit: type=1400 audit(1763228759.000:10998): avc: denied { create } for pid=14307 comm="syz.2.22763" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 810.561602][ T36] audit: type=1400 audit(1763228759.000:10999): avc: denied { map } for pid=14307 comm="syz.2.22763" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=321971 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 810.648808][ T36] audit: type=1400 audit(1763228759.000:11000): avc: denied { read write } for pid=14307 comm="syz.2.22763" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=321971 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 815.636179][ T36] kauditd_printk_skb: 834 callbacks suppressed [ 815.636197][ T36] audit: type=1400 audit(1763228764.230:11835): avc: denied { read write } for pid=11193 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 815.738736][ T36] audit: type=1400 audit(1763228764.300:11836): avc: denied { read write open } for pid=11193 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 815.838735][ T36] audit: type=1400 audit(1763228764.300:11837): avc: denied { ioctl } for pid=11193 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 815.908753][ T36] audit: type=1400 audit(1763228764.360:11838): avc: denied { execute } for pid=14607 comm="syz.0.22912" path="/498/blkio.bfq.group_wait_time" dev="tmpfs" ino=3043 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 815.958732][ T36] audit: type=1400 audit(1763228764.360:11839): avc: denied { read write } for pid=13313 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 816.038928][ T36] audit: type=1400 audit(1763228764.360:11840): avc: denied { read write open } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 816.089081][ T36] audit: type=1400 audit(1763228764.360:11841): avc: denied { ioctl } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 816.132050][T12031] audit: audit_backlog=65 > audit_backlog_limit=64 [ 816.138598][T12031] audit: audit_lost=27 audit_rate_limit=0 audit_backlog_limit=64 [ 816.146881][ T36] audit: type=1400 audit(1763228764.370:11842): avc: denied { create } for pid=14607 comm="syz.0.22912" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 820.639928][ T36] kauditd_printk_skb: 735 callbacks suppressed [ 820.639946][ T36] audit: type=1400 audit(1763228769.240:12568): avc: denied { read write } for pid=11753 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 820.709216][ T36] audit: type=1400 audit(1763228769.240:12569): avc: denied { read write open } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 820.748725][ T36] audit: type=1400 audit(1763228769.240:12570): avc: denied { ioctl } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 820.806312][ T36] audit: type=1400 audit(1763228769.270:12571): avc: denied { execute } for pid=14845 comm="syz.0.23030" path="/545/blkio.bfq.group_wait_time" dev="tmpfs" ino=3322 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 820.874346][ T36] audit: type=1400 audit(1763228769.290:12572): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 820.928730][ T36] audit: type=1400 audit(1763228769.290:12573): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 820.993790][ T36] audit: type=1400 audit(1763228769.290:12574): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 821.039928][ T36] audit: type=1400 audit(1763228769.310:12575): avc: denied { execute } for pid=14849 comm="syz.1.23033" path="/380/blkio.bfq.group_wait_time" dev="tmpfs" ino=2315 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 821.093337][ T36] audit: type=1400 audit(1763228769.310:12576): avc: denied { create } for pid=14849 comm="syz.1.23033" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 821.135103][ T36] audit: type=1400 audit(1763228769.310:12577): avc: denied { map } for pid=14849 comm="syz.1.23033" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=325331 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 825.651498][ T36] kauditd_printk_skb: 763 callbacks suppressed [ 825.651516][ T36] audit: type=1400 audit(1763228774.250:13341): avc: denied { create } for pid=15095 comm="syz.0.23156" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 825.691570][ T36] audit: type=1400 audit(1763228774.250:13342): avc: denied { map } for pid=15095 comm="syz.0.23156" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=326993 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 825.718110][ T36] audit: type=1400 audit(1763228774.250:13343): avc: denied { read write } for pid=15095 comm="syz.0.23156" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=326993 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 825.746131][ T36] audit: type=1400 audit(1763228774.250:13344): avc: denied { read write } for pid=11753 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 825.772082][ T36] audit: type=1400 audit(1763228774.250:13345): avc: denied { read write open } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 825.838740][ T36] audit: type=1400 audit(1763228774.250:13346): avc: denied { ioctl } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 825.874144][ T36] audit: type=1400 audit(1763228774.250:13347): avc: denied { read write } for pid=13313 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 825.900698][ T36] audit: type=1400 audit(1763228774.250:13348): avc: denied { read write open } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 825.966396][ T36] audit: type=1400 audit(1763228774.250:13349): avc: denied { ioctl } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 826.028832][ T36] audit: type=1400 audit(1763228774.310:13350): avc: denied { read write } for pid=11193 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 829.393093][T11253] bridge_slave_1: left allmulticast mode [ 829.399539][T11253] bridge_slave_1: left promiscuous mode [ 829.409660][T11253] bridge0: port 2(bridge_slave_1) entered disabled state [ 829.428883][T11253] bridge_slave_0: left allmulticast mode [ 829.434560][T11253] bridge_slave_0: left promiscuous mode [ 829.449149][T11253] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.591519][T11253] veth1_macvtap: left promiscuous mode [ 829.597068][T11253] veth0_vlan: left promiscuous mode [ 829.830327][T15320] bridge0: port 1(bridge_slave_0) entered blocking state [ 829.837391][T15320] bridge0: port 1(bridge_slave_0) entered disabled state [ 829.856998][T15320] bridge_slave_0: entered allmulticast mode [ 829.868144][T15320] bridge_slave_0: entered promiscuous mode [ 829.889102][T15320] bridge0: port 2(bridge_slave_1) entered blocking state [ 829.896166][T15320] bridge0: port 2(bridge_slave_1) entered disabled state [ 829.904252][T15320] bridge_slave_1: entered allmulticast mode [ 829.919293][T15320] bridge_slave_1: entered promiscuous mode [ 830.096583][T15320] bridge0: port 2(bridge_slave_1) entered blocking state [ 830.103687][T15320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 830.110994][T15320] bridge0: port 1(bridge_slave_0) entered blocking state [ 830.118027][T15320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 830.241008][T10387] bridge0: port 1(bridge_slave_0) entered disabled state [ 830.251791][T10387] bridge0: port 2(bridge_slave_1) entered disabled state [ 830.279542][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 830.286625][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 830.316860][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 830.323969][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 830.502407][T15320] veth0_vlan: entered promiscuous mode [ 830.591541][T15320] veth1_macvtap: entered promiscuous mode [ 830.675287][ T36] kauditd_printk_skb: 875 callbacks suppressed [ 830.675304][ T36] audit: type=1400 audit(1763228779.270:14223): avc: denied { execute } for pid=15368 comm="syz.2.23288" path="/370/blkio.bfq.group_wait_time" dev="tmpfs" ino=2268 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 830.736676][ T36] audit: type=1400 audit(1763228779.280:14224): avc: denied { mounton } for pid=15320 comm="syz-executor" path="/root/syzkaller.34pE1o/syz-tmp" dev="sda1" ino=2115 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 830.795305][ T36] audit: type=1400 audit(1763228779.280:14225): avc: denied { mount } for pid=15320 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 830.868739][ T36] audit: type=1400 audit(1763228779.280:14226): avc: denied { mounton } for pid=15320 comm="syz-executor" path="/root/syzkaller.34pE1o/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 830.918737][ T36] audit: type=1400 audit(1763228779.280:14227): avc: denied { mounton } for pid=15320 comm="syz-executor" path="/root/syzkaller.34pE1o/syz-tmp/newroot/proc" dev="tmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 830.969566][ T36] audit: type=1400 audit(1763228779.280:14228): avc: denied { mount } for pid=15320 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 831.009223][ T36] audit: type=1400 audit(1763228779.280:14229): avc: denied { mounton } for pid=15320 comm="syz-executor" path="/root/syzkaller.34pE1o/syz-tmp/newroot/selinux" dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 831.092733][ T36] audit: type=1400 audit(1763228779.280:14230): avc: denied { mounton } for pid=15320 comm="syz-executor" path="/root/syzkaller.34pE1o/syz-tmp/newroot/selinux" dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 831.161165][ T36] audit: type=1400 audit(1763228779.280:14231): avc: denied { mounton } for pid=15320 comm="syz-executor" path="/root/syzkaller.34pE1o/syz-tmp/newroot/sys" dev="tmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 831.209012][ T36] audit: type=1400 audit(1763228779.280:14232): avc: denied { mounton } for pid=15320 comm="syz-executor" path="/root/syzkaller.34pE1o/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 835.714092][ T36] kauditd_printk_skb: 539 callbacks suppressed [ 835.714110][ T36] audit: type=1400 audit(1763228784.310:14772): avc: denied { execute } for pid=15546 comm="syz.1.23377" path="/468/blkio.bfq.group_wait_time" dev="tmpfs" ino=2847 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 835.788783][ T36] audit: type=1400 audit(1763228784.360:14773): avc: denied { create } for pid=15546 comm="syz.1.23377" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 835.832936][ T36] audit: type=1400 audit(1763228784.360:14774): avc: denied { map } for pid=15546 comm="syz.1.23377" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=330208 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 835.888748][ T36] audit: type=1400 audit(1763228784.360:14775): avc: denied { read write } for pid=15546 comm="syz.1.23377" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=330208 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 835.938729][ T36] audit: type=1400 audit(1763228784.380:14776): avc: denied { read write } for pid=11753 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 835.988734][ T36] audit: type=1400 audit(1763228784.380:14777): avc: denied { read write open } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 836.031729][ T36] audit: type=1400 audit(1763228784.380:14778): avc: denied { ioctl } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 836.071233][ T36] audit: type=1400 audit(1763228784.410:14779): avc: denied { read write } for pid=15320 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 836.136857][ T36] audit: type=1400 audit(1763228784.410:14780): avc: denied { read write open } for pid=15320 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 836.201080][ T36] audit: type=1400 audit(1763228784.410:14781): avc: denied { ioctl } for pid=15320 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 840.726431][ T36] kauditd_printk_skb: 853 callbacks suppressed [ 840.726447][ T36] audit: type=1400 audit(1763228789.320:15635): avc: denied { read write } for pid=15320 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 840.790161][ T36] audit: type=1400 audit(1763228789.340:15636): avc: denied { read write } for pid=13313 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 840.834815][ T36] audit: type=1400 audit(1763228789.340:15637): avc: denied { read write open } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 840.898723][ T36] audit: type=1400 audit(1763228789.340:15638): avc: denied { ioctl } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 840.968756][ T36] audit: type=1400 audit(1763228789.370:15639): avc: denied { read write open } for pid=15320 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 841.038733][ T36] audit: type=1400 audit(1763228789.370:15640): avc: denied { ioctl } for pid=15320 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 841.108736][ T36] audit: type=1400 audit(1763228789.390:15641): avc: denied { execute } for pid=15828 comm="syz.3.23518" path="/311/blkio.bfq.group_wait_time" dev="tmpfs" ino=1897 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 841.157365][ T36] audit: type=1400 audit(1763228789.410:15642): avc: denied { create } for pid=15828 comm="syz.3.23518" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 841.198732][ T36] audit: type=1400 audit(1763228789.410:15643): avc: denied { map } for pid=15828 comm="syz.3.23518" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=331887 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 841.235548][ T36] audit: type=1400 audit(1763228789.410:15644): avc: denied { read write } for pid=15828 comm="syz.3.23518" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=331887 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 843.058550][ T13] bridge_slave_1: left allmulticast mode [ 843.065913][ T13] bridge_slave_1: left promiscuous mode [ 843.077478][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 843.095432][ T13] bridge_slave_0: left allmulticast mode [ 843.106131][ T13] bridge_slave_0: left promiscuous mode [ 843.125544][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 843.261358][ T13] veth1_macvtap: left promiscuous mode [ 843.266903][ T13] veth0_vlan: left promiscuous mode [ 845.610481][ T13] bridge_slave_1: left allmulticast mode [ 845.616173][ T13] bridge_slave_1: left promiscuous mode [ 845.648851][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 845.679616][ T13] bridge_slave_0: left allmulticast mode [ 845.685291][ T13] bridge_slave_0: left promiscuous mode [ 845.705682][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 845.729020][ T36] kauditd_printk_skb: 690 callbacks suppressed [ 845.729037][ T36] audit: type=1400 audit(1763228794.330:16335): avc: denied { ioctl } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 845.783750][ T36] audit: type=1400 audit(1763228794.370:16336): avc: denied { read write } for pid=11753 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 845.825728][ T36] audit: type=1400 audit(1763228794.370:16337): avc: denied { read write open } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 845.879615][ T13] veth1_macvtap: left promiscuous mode [ 845.885183][ T13] veth0_vlan: left promiscuous mode [ 845.891441][ T36] audit: type=1400 audit(1763228794.370:16338): avc: denied { ioctl } for pid=11753 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 845.947567][ T36] audit: type=1400 audit(1763228794.370:16339): avc: denied { execute } for pid=16078 comm="syz.0.23637" path="/86/blkio.bfq.group_wait_time" dev="tmpfs" ino=535 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 846.018758][ T36] audit: type=1400 audit(1763228794.380:16340): avc: denied { execute } for pid=16080 comm="syz.3.23643" path="/347/blkio.bfq.group_wait_time" dev="tmpfs" ino=2110 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 846.088793][ T36] audit: type=1400 audit(1763228794.410:16341): avc: denied { execute } for pid=16082 comm="syz.1.23644" path="/545/blkio.bfq.group_wait_time" dev="tmpfs" ino=3307 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 846.147426][ T36] audit: type=1400 audit(1763228794.410:16342): avc: denied { create } for pid=16078 comm="syz.0.23637" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 846.189250][ T36] audit: type=1400 audit(1763228794.410:16343): avc: denied { map } for pid=16078 comm="syz.0.23637" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=332561 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 846.258763][ T36] audit: type=1400 audit(1763228794.410:16344): avc: denied { read write } for pid=16078 comm="syz.0.23637" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=332561 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 850.796915][ T36] kauditd_printk_skb: 632 callbacks suppressed [ 850.796933][ T36] audit: type=1400 audit(1763228799.390:16977): avc: denied { read write } for pid=15320 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 850.868741][ T36] audit: type=1400 audit(1763228799.430:16978): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 850.918725][ T36] audit: type=1400 audit(1763228799.430:16979): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 850.994834][ T36] audit: type=1400 audit(1763228799.430:16980): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 851.058746][ T36] audit: type=1400 audit(1763228799.440:16981): avc: denied { read write open } for pid=15320 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 851.100891][ T36] audit: type=1400 audit(1763228799.440:16982): avc: denied { ioctl } for pid=15320 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=49 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 851.156941][ T36] audit: type=1400 audit(1763228799.480:16983): avc: denied { create } for pid=16313 comm="syz.0.23759" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 851.208770][ T36] audit: type=1400 audit(1763228799.480:16984): avc: denied { map } for pid=16313 comm="syz.0.23759" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=334295 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 851.271994][ T36] audit: type=1400 audit(1763228799.480:16985): avc: denied { read write } for pid=16313 comm="syz.0.23759" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=334295 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 851.328506][ T36] audit: type=1400 audit(1763228799.480:16986): avc: denied { read write } for pid=11753 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 853.290918][ T12] bridge_slave_1: left allmulticast mode [ 853.296844][ T12] bridge_slave_1: left promiscuous mode [ 853.308928][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 853.339199][ T12] bridge_slave_0: left allmulticast mode [ 853.344875][ T12] bridge_slave_0: left promiscuous mode [ 853.358809][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 853.529549][ T12] veth1_macvtap: left promiscuous mode [ 853.535091][ T12] veth0_vlan: left promiscuous mode [ 855.983659][ T36] kauditd_printk_skb: 492 callbacks suppressed [ 855.983676][ T36] audit: type=1400 audit(1763228804.580:17479): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 856.053366][ T36] audit: type=1400 audit(1763228804.620:17480): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 856.128776][ T36] audit: type=1400 audit(1763228804.620:17481): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 856.208024][ T36] audit: type=1400 audit(1763228804.690:17482): avc: denied { execute } for pid=16510 comm="syz.2.23858" path="/500/blkio.bfq.group_wait_time" dev="tmpfs" ino=3053 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 856.258746][ T36] audit: type=1400 audit(1763228804.710:17483): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 856.308764][ T36] audit: type=1400 audit(1763228804.710:17484): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 856.388728][ T36] audit: type=1400 audit(1763228804.710:17485): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 856.444802][ T36] audit: type=1400 audit(1763228804.730:17486): avc: denied { execute } for pid=16512 comm="syz.2.23859" path="/501/blkio.bfq.group_wait_time" dev="tmpfs" ino=3059 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 856.493235][ T36] audit: type=1400 audit(1763228804.780:17487): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 856.557499][ T36] audit: type=1400 audit(1763228804.780:17488): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 857.053872][ T12] bridge_slave_1: left allmulticast mode [ 857.059648][ T12] bridge_slave_1: left promiscuous mode [ 857.065280][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 857.074881][ T12] bridge_slave_0: left allmulticast mode [ 857.088723][ T12] bridge_slave_0: left promiscuous mode [ 857.114666][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 857.250503][ T12] veth1_macvtap: left promiscuous mode [ 857.256050][ T12] veth0_vlan: left promiscuous mode [ 857.458997][T16535] bridge0: port 1(bridge_slave_0) entered blocking state [ 857.466059][T16535] bridge0: port 1(bridge_slave_0) entered disabled state [ 857.483774][T16535] bridge_slave_0: entered allmulticast mode [ 857.497319][T16535] bridge_slave_0: entered promiscuous mode [ 857.520260][T16535] bridge0: port 2(bridge_slave_1) entered blocking state [ 857.527316][T16535] bridge0: port 2(bridge_slave_1) entered disabled state [ 857.558769][T16535] bridge_slave_1: entered allmulticast mode [ 857.565114][T16535] bridge_slave_1: entered promiscuous mode [ 857.824057][T16535] bridge0: port 2(bridge_slave_1) entered blocking state [ 857.831170][T16535] bridge0: port 2(bridge_slave_1) entered forwarding state [ 857.838460][T16535] bridge0: port 1(bridge_slave_0) entered blocking state [ 857.845562][T16535] bridge0: port 1(bridge_slave_0) entered forwarding state [ 857.927889][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 857.939674][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 857.969065][T10387] bridge0: port 1(bridge_slave_0) entered blocking state [ 857.976144][T10387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 858.003948][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 858.011036][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 858.191384][T16535] veth0_vlan: entered promiscuous mode [ 858.264317][T16535] veth1_macvtap: entered promiscuous mode [ 860.344496][ T13] bridge_slave_1: left allmulticast mode [ 860.369449][ T13] bridge_slave_1: left promiscuous mode [ 860.375261][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 860.409297][ T13] bridge_slave_0: left allmulticast mode [ 860.428740][ T13] bridge_slave_0: left promiscuous mode [ 860.439496][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 860.592519][ T13] veth1_macvtap: left promiscuous mode [ 860.598065][ T13] veth0_vlan: left promiscuous mode [ 860.991482][ T36] kauditd_printk_skb: 587 callbacks suppressed [ 860.991500][ T36] audit: type=1400 audit(1763228809.590:18076): avc: denied { create } for pid=16721 comm="syz.2.23960" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 861.058734][ T36] audit: type=1400 audit(1763228809.630:18077): avc: denied { map } for pid=16721 comm="syz.2.23960" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=337272 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 861.105913][ T36] audit: type=1400 audit(1763228809.630:18078): avc: denied { read write } for pid=16721 comm="syz.2.23960" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=337272 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 861.163383][ T36] audit: type=1400 audit(1763228809.640:18079): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 861.214210][ T36] audit: type=1400 audit(1763228809.640:18080): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 861.268744][ T36] audit: type=1400 audit(1763228809.640:18081): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 861.324507][ T36] audit: type=1400 audit(1763228809.650:18082): avc: denied { read write } for pid=13313 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 861.375813][ T36] audit: type=1400 audit(1763228809.650:18083): avc: denied { read write open } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 861.433632][ T36] audit: type=1400 audit(1763228809.650:18084): avc: denied { ioctl } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 861.488726][ T36] audit: type=1400 audit(1763228809.690:18085): avc: denied { execute } for pid=16724 comm="syz.3.23956" path="/407/blkio.bfq.group_wait_time" dev="tmpfs" ino=2476 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 866.008664][ T36] kauditd_printk_skb: 508 callbacks suppressed [ 866.015645][ T36] audit: type=1400 audit(1763228814.600:18594): avc: denied { execute } for pid=16945 comm="syz.2.24070" path="/557/blkio.bfq.group_wait_time" dev="tmpfs" ino=3396 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 866.068756][ T36] audit: type=1400 audit(1763228814.650:18595): avc: denied { read write } for pid=13313 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 866.115198][ T36] audit: type=1400 audit(1763228814.650:18596): avc: denied { read write open } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 866.178761][ T36] audit: type=1400 audit(1763228814.650:18597): avc: denied { ioctl } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 866.228724][ T36] audit: type=1400 audit(1763228814.670:18598): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 866.278750][ T36] audit: type=1400 audit(1763228814.670:18599): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 866.334451][ T36] audit: type=1400 audit(1763228814.670:18600): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 866.398751][ T36] audit: type=1400 audit(1763228814.710:18601): avc: denied { execute } for pid=16947 comm="syz.3.24071" path="/430/blkio.bfq.group_wait_time" dev="tmpfs" ino=2614 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 866.462092][ T36] audit: type=1400 audit(1763228814.710:18602): avc: denied { create } for pid=16947 comm="syz.3.24071" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 866.508723][ T36] audit: type=1400 audit(1763228814.710:18603): avc: denied { map } for pid=16947 comm="syz.3.24071" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=337816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 867.029989][T16996] bpf: Bad value for 'uid' [ 870.570618][T10387] bridge_slave_1: left allmulticast mode [ 870.576309][T10387] bridge_slave_1: left promiscuous mode [ 870.583008][T10387] bridge0: port 2(bridge_slave_1) entered disabled state [ 870.609283][T10387] bridge_slave_0: left allmulticast mode [ 870.628868][T10387] bridge_slave_0: left promiscuous mode [ 870.634532][T10387] bridge0: port 1(bridge_slave_0) entered disabled state [ 870.782912][T10387] veth1_macvtap: left promiscuous mode [ 870.791690][T10387] veth0_vlan: left promiscuous mode [ 871.037016][ T36] kauditd_printk_skb: 549 callbacks suppressed [ 871.037033][ T36] audit: type=1400 audit(1763228819.630:19153): avc: denied { execute } for pid=17179 comm="syz.3.24188" path="/461/blkio.bfq.group_wait_time" dev="tmpfs" ino=2801 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 871.098726][ T36] audit: type=1400 audit(1763228819.640:19154): avc: denied { execute } for pid=17181 comm="syz.2.24184" path="/580/blkio.bfq.group_wait_time" dev="tmpfs" ino=3538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 871.167227][ T36] audit: type=1400 audit(1763228819.650:19155): avc: denied { create } for pid=17181 comm="syz.2.24184" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 871.209159][ T36] audit: type=1400 audit(1763228819.650:19156): avc: denied { map } for pid=17181 comm="syz.2.24184" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=338917 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 871.258763][ T36] audit: type=1400 audit(1763228819.650:19157): avc: denied { read write } for pid=17181 comm="syz.2.24184" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=338917 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 871.318723][ T36] audit: type=1400 audit(1763228819.680:19158): avc: denied { read write } for pid=12031 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 871.368779][ T36] audit: type=1400 audit(1763228819.680:19159): avc: denied { read write open } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 871.418726][ T36] audit: type=1400 audit(1763228819.680:19160): avc: denied { ioctl } for pid=12031 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=51 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 871.469112][ T36] audit: type=1400 audit(1763228819.690:19161): avc: denied { read write } for pid=13313 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 871.538753][ T36] audit: type=1400 audit(1763228819.690:19162): avc: denied { read write open } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 875.573643][ T12] bridge_slave_1: left allmulticast mode [ 875.580405][ T12] bridge_slave_1: left promiscuous mode [ 875.586045][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 875.609149][ T12] bridge_slave_0: left allmulticast mode [ 875.622443][T17328] FAULT_INJECTION: forcing a failure. [ 875.622443][T17328] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 875.635532][ T12] bridge_slave_0: left promiscuous mode [ 875.648115][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 875.665158][T17328] CPU: 0 UID: 0 PID: 17328 Comm: syz.0.24259 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 875.665192][T17328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 875.665204][T17328] Call Trace: [ 875.665211][T17328] [ 875.665219][T17328] __dump_stack+0x21/0x30 [ 875.665247][T17328] dump_stack_lvl+0x10c/0x190 [ 875.665269][T17328] ? __cfi_dump_stack_lvl+0x10/0x10 [ 875.665291][T17328] ? kernel_text_address+0xa9/0xe0 [ 875.665314][T17328] dump_stack+0x19/0x20 [ 875.665335][T17328] should_fail_ex+0x3d9/0x530 [ 875.665354][T17328] should_fail+0xf/0x20 [ 875.665372][T17328] should_fail_usercopy+0x1e/0x30 [ 875.665391][T17328] _copy_from_user+0x22/0xb0 [ 875.665414][T17328] ___sys_sendmsg+0x159/0x2a0 [ 875.665439][T17328] ? __sys_sendmsg+0x280/0x280 [ 875.665462][T17328] ? kstrtouint+0x78/0xf0 [ 875.665484][T17328] __sys_sendmmsg+0x271/0x470 [ 875.665510][T17328] ? __cfi___sys_sendmmsg+0x10/0x10 [ 875.665539][T17328] ? __cfi_ksys_write+0x10/0x10 [ 875.665558][T17328] __x64_sys_sendmmsg+0xa4/0xc0 [ 875.665605][T17328] x64_sys_call+0xfec/0x2ee0 [ 875.665630][T17328] do_syscall_64+0x58/0xf0 [ 875.665653][T17328] ? clear_bhb_loop+0x50/0xa0 [ 875.665674][T17328] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 875.665694][T17328] RIP: 0033:0x7feac638f6c9 [ 875.665711][T17328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 875.665727][T17328] RSP: 002b:00007feac72ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 875.665749][T17328] RAX: ffffffffffffffda RBX: 00007feac65e5fa0 RCX: 00007feac638f6c9 [ 875.665763][T17328] RDX: 0000000000000001 RSI: 0000200000003c00 RDI: 000000000000000a [ 875.665776][T17328] RBP: 00007feac72ac090 R08: 0000000000000000 R09: 0000000000000000 [ 875.665789][T17328] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 875.665801][T17328] R13: 00007feac65e6038 R14: 00007feac65e5fa0 R15: 00007fffa6dd1d88 [ 875.665817][T17328] [ 876.027075][ T12] veth1_macvtap: left promiscuous mode [ 876.040952][ T36] kauditd_printk_skb: 344 callbacks suppressed [ 876.040969][ T36] audit: type=1400 audit(1763228824.640:19507): avc: denied { read write } for pid=13313 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 876.072730][ T12] veth0_vlan: left promiscuous mode [ 876.085742][ T36] audit: type=1400 audit(1763228824.640:19508): avc: denied { execute } for pid=17338 comm="syz.1.24265" path="/94/blkio.bfq.group_wait_time" dev="tmpfs" ino=589 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 876.132299][ T36] audit: type=1400 audit(1763228824.640:19509): avc: denied { create } for pid=17338 comm="syz.1.24265" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 876.178782][ T36] audit: type=1400 audit(1763228824.640:19510): avc: denied { map } for pid=17338 comm="syz.1.24265" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=339873 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 876.220098][ T36] audit: type=1400 audit(1763228824.640:19511): avc: denied { read write } for pid=17338 comm="syz.1.24265" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=339873 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 876.283565][ T36] audit: type=1400 audit(1763228824.670:19512): avc: denied { read write } for pid=16535 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 876.350991][ T36] audit: type=1400 audit(1763228824.670:19513): avc: denied { read write open } for pid=16535 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 876.376826][ T36] audit: type=1400 audit(1763228824.670:19514): avc: denied { ioctl } for pid=16535 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 876.403747][ T36] audit: type=1400 audit(1763228824.670:19515): avc: denied { read write open } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 876.410751][T17329] bridge0: port 1(bridge_slave_0) entered blocking state [ 876.429069][ T36] audit: type=1400 audit(1763228824.680:19516): avc: denied { ioctl } for pid=13313 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=52 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 876.461728][T17329] bridge0: port 1(bridge_slave_0) entered disabled state [ 876.468883][T17329] bridge_slave_0: entered allmulticast mode [ 876.475197][T17329] bridge_slave_0: entered promiscuous mode [ 876.482930][T17329] bridge0: port 2(bridge_slave_1) entered blocking state [ 876.498722][T17329] bridge0: port 2(bridge_slave_1) entered disabled state [ 876.505815][T17329] bridge_slave_1: entered allmulticast mode [ 876.519185][T17329] bridge_slave_1: entered promiscuous mode [ 876.639807][T17355] FAULT_INJECTION: forcing a failure. [ 876.639807][T17355] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 876.653665][T17355] CPU: 0 UID: 0 PID: 17355 Comm: syz.0.24270 Not tainted syzkaller #0 0b5ffdee5fcd2f7749818d1ff954e9c21353764e [ 876.653695][T17355] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 876.653706][T17355] Call Trace: [ 876.653713][T17355] [ 876.653721][T17355] __dump_stack+0x21/0x30 [ 876.653757][T17355] dump_stack_lvl+0x10c/0x190 [ 876.653781][T17355] ? __cfi_dump_stack_lvl+0x10/0x10 [ 876.653805][T17355] ? check_stack_object+0x12c/0x140 [ 876.653824][T17355] dump_stack+0x19/0x20 [ 876.653846][T17355] should_fail_ex+0x3d9/0x530 [ 876.653866][T17355] should_fail+0xf/0x20 [ 876.653882][T17355] should_fail_usercopy+0x1e/0x30 [ 876.653902][T17355] _copy_from_user+0x22/0xb0 [ 876.653925][T17355] __copy_msghdr+0x3ec/0x5d0 [ 876.653951][T17355] ___sys_sendmsg+0x1a6/0x2a0 [ 876.653976][T17355] ? __sys_sendmsg+0x280/0x280 [ 876.654001][T17355] ? kstrtouint+0x78/0xf0 [ 876.654024][T17355] __sys_sendmmsg+0x271/0x470 [ 876.654050][T17355] ? __cfi___sys_sendmmsg+0x10/0x10 [ 876.654079][T17355] ? __cfi_ksys_write+0x10/0x10 [ 876.654098][T17355] __x64_sys_sendmmsg+0xa4/0xc0 [ 876.654123][T17355] x64_sys_call+0xfec/0x2ee0 [ 876.654148][T17355] do_syscall_64+0x58/0xf0 [ 876.654170][T17355] ? clear_bhb_loop+0x50/0xa0 [ 876.654190][T17355] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 876.654211][T17355] RIP: 0033:0x7feac638f6c9 [ 876.654227][T17355] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 876.654243][T17355] RSP: 002b:00007feac72ac038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 876.654264][T17355] RAX: ffffffffffffffda RBX: 00007feac65e5fa0 RCX: 00007feac638f6c9 [ 876.654280][T17355] RDX: 0000000000000001 RSI: 0000200000003480 RDI: 0000000000000007 [ 876.654293][T17355] RBP: 00007feac72ac090 R08: 0000000000000000 R09: 0000000000000000 [ 876.654306][T17355] R10: 0000000000000014 R11: 0000000000000246 R12: 0000000000000001 [ 876.654319][T17355] R13: 00007feac65e6038 R14: 00007feac65e5fa0 R15: 00007fffa6dd1d88 [ 876.654335][T17355] [ 877.128629][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 877.135724][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 877.162524][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 877.169613][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 877.319174][T17329] veth0_vlan: entered promiscuous mode [ 877.376925][T17329] veth1_macvtap: entered promiscuous mode [ 881.049439][ T36] kauditd_printk_skb: 510 callbacks suppressed [ 881.049457][ T36] audit: type=1400 audit(1763228829.650:20027): avc: denied { execute } for pid=17537 comm="syz.2.24356" path="/7/blkio.bfq.group_wait_time" dev="tmpfs" ino=62 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 881.099016][ T36] audit: type=1400 audit(1763228829.650:20028): avc: denied { read write } for pid=16535 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 881.150325][ T36] audit: type=1400 audit(1763228829.650:20029): avc: denied { read write open } for pid=16535 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 881.206177][ T36] audit: type=1400 audit(1763228829.650:20030): avc: denied { ioctl } for pid=16535 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 881.258756][ T36] audit: type=1400 audit(1763228829.690:20031): avc: denied { execute } for pid=17539 comm="syz.1.24357" path="/122/blkio.bfq.group_wait_time" dev="tmpfs" ino=757 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 881.318750][ T36] audit: type=1400 audit(1763228829.730:20032): avc: denied { read write } for pid=16535 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 881.368848][ T36] audit: type=1400 audit(1763228829.730:20033): avc: denied { read write open } for pid=16535 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 881.418752][ T36] audit: type=1400 audit(1763228829.730:20034): avc: denied { ioctl } for pid=16535 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=50 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 881.498723][ T36] audit: type=1400 audit(1763228829.750:20035): avc: denied { execute } for pid=17541 comm="syz.1.24358" path="/123/blkio.bfq.group_wait_time" dev="tmpfs" ino=763 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 881.551565][ T36] audit: type=1400 audit(1763228829.780:20036): avc: denied { create } for pid=17541 comm="syz.1.24358" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 881.759697][T17576] netlink: 128 bytes leftover after parsing attributes in process `syz.2.24376'. [ 881.892520][T17590] rust_binder: Failure when writing BR_NOOP at beginning of buffer. [ 881.892551][T17590] rust_binder: Read failure Err(EFAULT) in pid:34 [ 881.975172][T17597] tipc: Started in network mode [ 882.010436][T17597] tipc: Node identity ff020000000000000000000000000001, cluster identity 4711 [ 882.026244][T17597] tipc: Enabling of bearer rejected, failed to enable media [ 882.339423][T17640] fuseblk: Unknown parameter 'f' [ 882.632270][T17670] netlink: 68 bytes leftover after parsing attributes in process `syz.0.24419'. [ 882.871494][T17701] binder: Bad value for 'stats' [ 883.106990][T17719] netlink: 12 bytes leftover after parsing attributes in process `syz.1.24442'. [ 883.538816][T17777] netlink: 12 bytes leftover after parsing attributes in process `syz.0.24471'. [ 883.659576][T17788] capability: warning: `syz.1.24477' uses deprecated v2 capabilities in a way that may be insecure [ 883.915235][T17814] netlink: 12 bytes leftover after parsing attributes in process `syz.0.24488'. [ 886.078367][ T36] kauditd_printk_skb: 774 callbacks suppressed [ 886.078385][ T36] audit: type=1400 audit(1763228834.670:20811): avc: denied { execute } for pid=17945 comm="syz.3.24555" path="/553/blkio.bfq.group_wait_time" dev="tmpfs" ino=3357 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 886.153081][ T36] audit: type=1400 audit(1763228834.670:20812): avc: denied { read write } for pid=17329 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 886.177988][ T36] audit: type=1400 audit(1763228834.680:20813): avc: denied { execute } for pid=17948 comm="syz.2.24549" path="/52/blkio.bfq.group_wait_time" dev="tmpfs" ino=329 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 886.203334][ T36] audit: type=1400 audit(1763228834.680:20814): avc: denied { execute } for pid=17948 comm="syz.2.24549" dev="tmpfs" ino=228 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 886.227218][ T36] audit: type=1400 audit(1763228834.710:20815): avc: denied { execute } for pid=17941 comm="syz.1.24553" path="/178/blkio.bfq.group_wait_time" dev="tmpfs" ino=1092 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 886.252973][ T36] audit: type=1400 audit(1763228834.720:20816): avc: denied { execute } for pid=17944 comm="syz.0.24556" path="/345/blkio.bfq.group_wait_time" dev="tmpfs" ino=2099 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 886.292071][ T36] audit: type=1400 audit(1763228834.720:20817): avc: denied { read write } for pid=13313 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 886.318848][ T36] audit: type=1400 audit(1763228834.730:20818): avc: denied { read write } for pid=15320 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 886.344640][ T36] audit: type=1400 audit(1763228834.730:20819): avc: denied { read write } for pid=17329 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 886.374822][ T36] audit: type=1400 audit(1763228834.750:20820): avc: denied { read write } for pid=16535 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 886.950845][T18039] netlink: 12 bytes leftover after parsing attributes in process `syz.0.24598'. [ 890.546146][ T13] bridge_slave_1: left allmulticast mode [ 890.551846][ T13] bridge_slave_1: left promiscuous mode [ 890.560266][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 890.584808][ T13] bridge_slave_0: left allmulticast mode [ 890.598714][ T13] bridge_slave_0: left promiscuous mode [ 890.604358][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 890.721241][ T13] veth1_macvtap: left promiscuous mode [ 890.726775][ T13] veth0_vlan: left promiscuous mode [ 891.506368][ T36] kauditd_printk_skb: 518 callbacks suppressed [ 891.506387][ T36] audit: type=1400 audit(1763228840.100:21339): avc: denied { execmem } for pid=18391 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 891.533947][ T36] audit: type=1400 audit(1763228840.100:21340): avc: denied { read write } for pid=18392 comm="syz.0.24765" name="ashmem" dev="devtmpfs" ino=201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 891.557977][ T36] audit: type=1400 audit(1763228840.110:21341): avc: denied { read write } for pid=15320 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 891.582259][ T36] audit: type=1400 audit(1763228840.130:21342): avc: denied { execute } for pid=18396 comm="syz.2.24767" path="/92/blkio.bfq.group_wait_time" dev="tmpfs" ino=574 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 891.606777][ T36] audit: type=1400 audit(1763228840.130:21343): avc: denied { name_bind } for pid=18396 comm="syz.2.24767" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=0 [ 891.628191][ T36] audit: type=1400 audit(1763228840.130:21344): avc: denied { read write } for pid=17329 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 891.652487][ T36] audit: type=1400 audit(1763228840.150:21345): avc: denied { execute } for pid=18393 comm="syz.1.24766" path="/250/blkio.bfq.group_wait_time" dev="tmpfs" ino=1532 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 891.677246][ T36] audit: type=1400 audit(1763228840.150:21346): avc: denied { read write } for pid=16535 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 892.125804][ T36] audit: type=1400 audit(1763228840.720:21347): avc: denied { execmem } for pid=18399 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 892.150754][ T36] audit: type=1400 audit(1763228840.750:21348): avc: denied { execute } for pid=18401 comm="syz.1.24769" path="/251/blkio.bfq.group_wait_time" dev="tmpfs" ino=1538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 896.727408][ T36] kauditd_printk_skb: 34 callbacks suppressed [ 896.727423][ T36] audit: type=1400 audit(1763228845.320:21383): avc: denied { execmem } for pid=18435 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 896.760595][ T36] audit: type=1400 audit(1763228845.330:21384): avc: denied { execute } for pid=18438 comm="syz.1.24784" path="/256/blkio.bfq.group_wait_time" dev="tmpfs" ino=1569 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 896.786198][ T36] audit: type=1400 audit(1763228845.360:21385): avc: denied { read write } for pid=16535 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 896.811293][ T36] audit: type=1400 audit(1763228845.360:21386): avc: denied { execute } for pid=18442 comm="syz.1.24786" path="/257/blkio.bfq.group_wait_time" dev="tmpfs" ino=1575 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 896.836669][ T36] audit: type=1400 audit(1763228845.380:21387): avc: denied { read write } for pid=16535 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 896.860955][ T36] audit: type=1400 audit(1763228845.380:21388): avc: denied { execute } for pid=18437 comm="syz.2.24785" path="/98/blkio.bfq.group_wait_time" dev="tmpfs" ino=613 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 896.885519][ T36] audit: type=1400 audit(1763228845.410:21389): avc: denied { read write } for pid=17329 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 896.909778][ T36] audit: type=1400 audit(1763228845.430:21390): avc: denied { read write } for pid=15320 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 897.967035][ T36] audit: type=1400 audit(1763228846.560:21391): avc: denied { execmem } for pid=18444 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 898.005607][ T36] audit: type=1400 audit(1763228846.580:21392): avc: denied { execute } for pid=18447 comm="syz.2.24789" path="/99/blkio.bfq.group_wait_time" dev="tmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 902.246412][ T36] kauditd_printk_skb: 26 callbacks suppressed [ 902.246428][ T36] audit: type=1400 audit(1763228850.840:21419): avc: denied { execmem } for pid=18467 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 902.281978][ T36] audit: type=1400 audit(1763228850.850:21420): avc: denied { execute } for pid=18468 comm="syz.0.24797" path="/407/blkio.bfq.group_wait_time" dev="tmpfs" ino=2474 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 902.308363][ T36] audit: type=1400 audit(1763228850.850:21421): avc: denied { read write } for pid=18468 comm="syz.0.24797" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 902.332764][ T36] audit: type=1400 audit(1763228850.850:21422): avc: denied { execute } for pid=18470 comm="syz.2.24799" path="/103/blkio.bfq.group_wait_time" dev="tmpfs" ino=644 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 902.357401][ T36] audit: type=1400 audit(1763228850.850:21423): avc: denied { read write } for pid=18470 comm="syz.2.24799" name="ashmem" dev="devtmpfs" ino=201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 902.380792][ T36] audit: type=1400 audit(1763228850.870:21424): avc: denied { read write } for pid=17329 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 902.405084][ T36] audit: type=1400 audit(1763228850.880:21425): avc: denied { execute } for pid=18474 comm="syz.2.24800" path="/104/blkio.bfq.group_wait_time" dev="tmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 902.429714][ T36] audit: type=1400 audit(1763228850.900:21426): avc: denied { read write } for pid=17329 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 902.454060][ T36] audit: type=1400 audit(1763228850.900:21427): avc: denied { execute } for pid=18469 comm="syz.1.24798" path="/261/blkio.bfq.group_wait_time" dev="tmpfs" ino=1600 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 902.478751][ T36] audit: type=1326 audit(1763228850.900:21428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18469 comm="syz.1.24798" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f888898f6c9 code=0x7ffc0000 [ 907.431793][ T36] kauditd_printk_skb: 34 callbacks suppressed [ 907.431809][ T36] audit: type=1400 audit(1763228856.030:21463): avc: denied { execmem } for pid=18490 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 907.459613][ T36] audit: type=1400 audit(1763228856.030:21464): avc: denied { execute } for pid=18493 comm="syz.2.24809" path="/107/blkio.bfq.group_wait_time" dev="tmpfs" ino=669 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 907.484556][ T36] audit: type=1400 audit(1763228856.030:21465): avc: denied { read write } for pid=18493 comm="syz.2.24809" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 907.508373][ T36] audit: type=1400 audit(1763228856.060:21466): avc: denied { execute } for pid=18491 comm="syz.0.24807" path="/410/blkio.bfq.group_wait_time" dev="tmpfs" ino=2491 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 907.533146][ T36] audit: type=1400 audit(1763228856.060:21467): avc: denied { read write } for pid=18491 comm="syz.0.24807" name="ashmem" dev="devtmpfs" ino=201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 907.556592][ T36] audit: type=1400 audit(1763228856.080:21468): avc: denied { read write } for pid=15320 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 907.580858][ T36] audit: type=1400 audit(1763228856.080:21469): avc: denied { execute } for pid=18492 comm="syz.1.24808" path="/264/blkio.bfq.group_wait_time" dev="tmpfs" ino=1618 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 907.659064][ T36] audit: type=1400 audit(1763228856.260:21470): avc: denied { read write } for pid=16535 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 907.964477][ T36] audit: type=1400 audit(1763228856.560:21471): avc: denied { read write } for pid=17329 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 909.376727][ T36] audit: type=1400 audit(1763228857.970:21472): avc: denied { execmem } for pid=18498 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 911.479139][ T13] bridge_slave_1: left allmulticast mode [ 911.484799][ T13] bridge_slave_1: left promiscuous mode [ 911.509723][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 911.538898][ T13] bridge_slave_0: left allmulticast mode [ 911.544571][ T13] bridge_slave_0: left promiscuous mode [ 911.558776][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 911.670767][ T13] veth1_macvtap: left promiscuous mode [ 911.676286][ T13] veth0_vlan: left promiscuous mode [ 911.920849][ T13] bridge_slave_1: left allmulticast mode [ 911.926495][ T13] bridge_slave_1: left promiscuous mode [ 911.932141][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 911.939721][ T13] bridge_slave_0: left allmulticast mode [ 911.945344][ T13] bridge_slave_0: left promiscuous mode [ 911.951013][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 911.958553][ T13] bridge_slave_1: left allmulticast mode [ 911.964251][ T13] bridge_slave_1: left promiscuous mode [ 911.969848][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 911.977239][ T13] bridge_slave_0: left allmulticast mode [ 911.982956][ T13] bridge_slave_0: left promiscuous mode [ 911.988531][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 912.150510][ T13] tipc: Left network mode [ 912.155644][ T13] veth1_macvtap: left promiscuous mode [ 912.161167][ T13] veth0_vlan: left promiscuous mode [ 912.166510][ T13] veth1_macvtap: left promiscuous mode [ 912.172009][ T13] veth0_vlan: left promiscuous mode