last executing test programs: 11m51.462700187s ago: executing program 0 (id=1851): r0 = io_uring_setup(0x791d, &(0x7f0000002080)={0x0, 0xd97a, 0x80, 0x0, 0x34e}) io_uring_register$IORING_UNREGISTER_FILES(r0, 0x3, 0x0, 0x0) 11m50.292318839s ago: executing program 0 (id=1852): lsetxattr$system_posix_acl(0x0, &(0x7f0000002440)='system.posix_acl_default\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32=0xee01, @ANYBLOB="02000000", @ANYRES32=0xee00, @ANYRES32=0xee00, @ANYBLOB="02000000", @ANYRES32=0x0, @ANYBLOB="040000000000800008000000", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB, @ANYRES32=0x0], 0x5c, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x18, 0x4, &(0x7f0000000280)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x43, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000480)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x40001e0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = socket(0x40000000015, 0x5, 0x0) connect$inet(r4, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) bind$inet(r4, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$NL80211_CMD_JOIN_MESH(r4, &(0x7f00000001c0)={0x0, 0x3d, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[], 0x1a000}}, 0x0) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r5, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{}, 0x0, &(0x7f00000002c0)}, 0x20) 11m32.409293514s ago: executing program 0 (id=1857): syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) syz_usb_control_io(0xffffffffffffffff, 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, 0x0, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x14927e, 0x2) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r1, 0x0) fallocate(r1, 0x0, 0x0, 0x1000f4) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) 11m31.857774768s ago: executing program 0 (id=1858): sendmsg$ETHTOOL_MSG_WOL_GET(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)={0x14, 0x0, 0x1, 0x0, 0x25dfdbfd, {0x1b}}, 0x14}}, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000540)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_NEW_KEY(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="010829bd7000000000000b00000008000300", @ANYRES32=r2, @ANYBLOB="60005080110001004abee339084eeef16f162471f4000000080003000aac0f00050002"], 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x0) 11m29.947982268s ago: executing program 0 (id=1859): r0 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000000000002) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000300)=@abs={0x0, 0x0, 0xb}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet_udp(0x2, 0x2, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=@newlink={0x5c, 0x10, 0x1, 0x170bd27, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2100}, [@IFLA_GROUP={0x8}, @IFLA_AF_SPEC={0x34, 0x1a, 0x0, 0x1, [@AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}, @AF_INET={0x20, 0x2, 0x0, 0x1, {0x1c, 0x1, 0x0, 0x1, [{0x8, 0x1a, 0x0, 0x0, 0x4}, {0x8, 0xd, 0x0, 0x0, 0x101}, {0x8, 0x6, 0x0, 0x0, 0x1}]}}, @AF_INET={0x8, 0x2, 0x0, 0x1, {0x4}}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc0}, 0x0) 11m12.388523678s ago: executing program 0 (id=1864): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ptrace$pokeuser(0x6, r0, 0x7, 0xf39) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) read$FUSE(0xffffffffffffffff, 0x0, 0x0) fstatfs(r5, 0x0) r6 = socket(0xa, 0x3, 0x87) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000000)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x18, r8}) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x8936, &(0x7f0000000000)) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 10m26.99392805s ago: executing program 32 (id=1864): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ptrace$pokeuser(0x6, r0, 0x7, 0xf39) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) read$FUSE(0xffffffffffffffff, 0x0, 0x0) fstatfs(r5, 0x0) r6 = socket(0xa, 0x3, 0x87) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r6, 0x8916, &(0x7f0000000000)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x18, r8}) ioctl$sock_inet6_tcp_SIOCINQ(r6, 0x8936, &(0x7f0000000000)) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 3m38.848402161s ago: executing program 1 (id=2001): r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$int_in(r1, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000200)={0x1, 0x1, 0x0, &(0x7f0000000740)=""/51, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000640)) r2 = dup(r0) ioctl$VHOST_NET_SET_BACKEND(r1, 0x4008af30, &(0x7f0000000000)={0x1, r2}) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x0, 0x0, 0xdddd0000}) 3m37.442968302s ago: executing program 1 (id=2002): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(r0, &(0x7f0000000000)='./file0\x00', 0x8000, &(0x7f0000001dc0)={0x81, 0x0, 0x80000}, 0x20) 3m36.251315295s ago: executing program 1 (id=2003): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=@encrypted_new={'new ', 'default', 0x20, 'trusted:', '\x918s\x89X', 0x20, 0xffd}, 0x2f, 0x0) r0 = add_key(&(0x7f0000000140)='encrypted\x00', 0x0, &(0x7f0000000100), 0x0, 0xfffffffffffffffe) keyctl$read(0xb, r0, &(0x7f0000000240)=""/112, 0x349b7f55) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, 0x0, 0x310) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x3000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000400)=0xa) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d00000004000000070000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0xc) r5 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x200cc0c5, &(0x7f0000000080)={0xa, 0x4c20, 0x0, @empty, 0x8}, 0x1c) recvmmsg(r5, 0x0, 0x0, 0x40002003, 0x0) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r6, 0x5609, &(0x7f0000000040)={0x1, 0x7, 0x3}) 3m21.687303944s ago: executing program 1 (id=2006): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xb2570000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x2000000}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sched_setaffinity(r0, 0x8, &(0x7f0000000000)=0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000001c0)='sched_switch\x00', r4}, 0xe) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)={0x54, r6, 0x1, 0x0, 0x0, {0x3}, [@TIPC_NLA_BEARER={0x40, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1b}}}, {0x14, 0x2, @in={0x2, 0x0, @broadcast}}}}, @TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz2\x00'}]}]}, 0x54}}, 0x20000054) 3m1.549559052s ago: executing program 1 (id=2015): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001803000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c3000000"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_DAEMON(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)={0x50, r3, 0x1, 0x4, 0x1, {}, [@IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'vcan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}]}]}, 0x50}, 0x1, 0x0, 0x0, 0x48c1}, 0x0) 3m0.861149676s ago: executing program 1 (id=2016): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ptrace$pokeuser(0x6, r0, 0x7, 0xf39) r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) r5 = socket(0xa, 0x3, 0x87) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000000)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x18, r6}) ioctl$sock_inet6_tcp_SIOCINQ(r5, 0x8936, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 2m44.046393482s ago: executing program 2 (id=2018): syz_usb_connect(0x0, 0x24, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0xcf, 0x8b, 0xed, 0x20, 0xfd9, 0x25, 0x2940, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xca, 0xfb, 0x1a}}]}}]}}, 0x0) r0 = syz_open_dev$I2C(&(0x7f0000000000), 0x1, 0x402) ioctl$I2C_SMBUS(r0, 0x720, &(0x7f0000000180)={0x1, 0x8, 0x6, 0x0}) 2m43.639662294s ago: executing program 2 (id=2019): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x164}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000b00)=ANY=[@ANYBLOB="e00200001e00010029bd7000fcdbdf2514000000cc00f30077650b8a3ff9624abc1fd3da1bc0c6165a422c86814441545cb1b21b10faf9156b52762a3a585b0505a754f2b3179eb9f54b9c7acb9b63e89f0a7cf36901758b047a9eb5721469c5ab335e702191f66210049ccf5281e56ba05624adea5773915541647aa36afd4fe6e9efc6c4237cdaa06e90ba5706a8c99cea7cd91f817b9fc91850fb2a4c6d7e943728a3f01ab77f10dc4e665f9fe784621ce4dfd1662bdc3428b1289e486e77cdd873a5b74ef1f4ba2df6789b23d309453a83d6a43ba46ed5407dedb3d0695e08000c00", @ANYRES32, @ANYBLOB="8f00"], 0x2e0}, 0x1, 0x0, 0x0, 0x890}, 0x20004080) 2m43.319964919s ago: executing program 2 (id=2020): r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x41d) creat(0x0, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x4, 0x45, 0x1488, 0xffffffffffffffff, 0x5}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000040)={&(0x7f0000000300)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x3, 0x0, 0x4, 0x0, 0x2, [{0x6, 0x0, 0x8}, {0x2, 0x4, 0x5}, {0x1, 0x4, 0x8}]}]}}, &(0x7f0000000a40)=""/276, 0x4a, 0x114, 0x1, 0x7a72}, 0x28) recvmmsg(r0, &(0x7f00000021c0), 0x5b, 0x40, 0x0) 2m29.850135041s ago: executing program 2 (id=2021): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x50, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) mlock2(&(0x7f00004c4000/0x2000)=nil, 0x2000, 0x1) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r2 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r2, 0x0, 0x48c, &(0x7f0000000040)={0x1, 'veth0_vlan\x00', 0x2}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1}, 0x800) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000000)=0x6d93, 0x4) sendmsg$sock(0xffffffffffffffff, 0x0, 0x4c040) socket(0x28, 0xa, 0x4) r3 = socket$nl_route(0x10, 0x3, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) close(0x3) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0xc, 0x0, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000040c0)=@ipv6_getaddrlabel={0x24, 0x4a, 0x3, 0x70bd29, 0x25dfdbfd, {}, [@IFAL_LABEL={0x8, 0x2, 0xb}]}, 0x24}}, 0x40004040) 2m15.750745543s ago: executing program 33 (id=2016): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e23}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ptrace$pokeuser(0x6, r0, 0x7, 0xf39) r3 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) r5 = socket(0xa, 0x3, 0x87) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r5, 0x8916, &(0x7f0000000000)={@private1={0xfc, 0x1, '\x00', 0x1}, 0x18, r6}) ioctl$sock_inet6_tcp_SIOCINQ(r5, 0x8936, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8}, 0x78) 2m10.483218068s ago: executing program 2 (id=2023): socket$netlink(0x10, 0x3, 0x0) syz_usb_connect(0x0, 0x36, &(0x7f0000000040)=ANY=[@ANYBLOB="130100002add1e20ef050a023691010203010902"], 0x0) socket$nl_route(0x10, 0x3, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000140)={0x8, 0x8b}, 0x0) epoll_create1(0x0) epoll_create1(0x0) 2m5.188303686s ago: executing program 2 (id=2024): socket$nl_generic(0x10, 0x3, 0x10) r0 = mq_open(0x0, 0x40, 0x0, 0x0) mq_notify(r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000001080)={0x2, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e1f, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x1}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=@newtfilter={0x59c, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfe, {0x0, 0x0, 0x0, r6, {0xf}, {}, {0x7, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x570, 0x2, [@TCA_U32_SEL={0x334, 0x5, {0x9, 0x7f, 0x3, 0x200, 0x8, 0x0, 0x3, 0x8, [{0x4, 0x400000, 0x0, 0x2}, {0x4800, 0x1, 0x9, 0x3}, {0x4, 0x0, 0x6, 0x8}, {0x1a8f, 0x9, 0xfffff801, 0x7}, {0x73, 0x1400, 0x57e76c05, 0x7fff}, {0x7, 0x5, 0x0, 0x81}, {0x7fffffff, 0x0, 0x9, 0x7}, {0x5c4, 0xa, 0x6, 0xc}, {0x2, 0x8, 0x2}, {0x7, 0x8, 0xff, 0x6}, {0x401, 0xffffffff, 0x7, 0x7}, {0x2, 0x3, 0xd, 0x7}, {0x2, 0x0, 0x100, 0x6}, {0x6, 0x8, 0x1, 0x9}, {0x7fff, 0x0, 0x3, 0x101}, {0x4, 0x5b61, 0x0, 0xe37}, {0x7, 0x2, 0x6, 0x6d}, {0x21, 0x600000, 0xffff, 0x54}, {0xff, 0x81, 0xd4, 0x6}, {0x3, 0x2, 0x3fa4f833, 0x46a}, {0x1, 0x6, 0xff, 0x3ff}, {0x5, 0x9, 0x1, 0x3}, {0x8, 0x100, 0x7, 0x3}, {0x7, 0x9819, 0x6, 0x6}, {0x3, 0xc, 0x5, 0x6}, {0x81, 0x9, 0xf3b8, 0xffff7fff}, {0x0, 0x1, 0x4, 0x9}, {0xfffffffb, 0xd, 0x7, 0x7f}, {0x2, 0x81, 0x80000000, 0x8}, {0x4, 0xffff, 0x6, 0x2}, {0x80000001, 0x7, 0x6, 0xe0}, {0x0, 0x9, 0x4, 0xb76}, {0x0, 0x8, 0x4, 0x36c2}, {0x6, 0xc63, 0xb, 0x7}, {0x1, 0x5, 0x5, 0x4}, {0x7, 0x200, 0x5, 0x400}, {0x10, 0x0, 0x6, 0x3}, {0xb, 0x5, 0x5, 0x5}, {0x0, 0x9, 0x8, 0xa}, {0x9, 0xd, 0x7f, 0x8000}, {0x7fffffff, 0x51, 0xd6fa, 0xb}, {0xd, 0x6, 0x2, 0x8}, {0x9, 0x9, 0x7ff, 0x9}, {0x8, 0xffffffff, 0x80, 0x200}, {0x7, 0x3, 0x6, 0x401}, {0xdc, 0x1ff, 0x101, 0x5}, {0x0, 0x7f, 0x60d4, 0x3}, {0x6, 0x8, 0xc, 0x8}, {0x400, 0xaef2, 0xffff, 0x1}, {0x10001, 0xfffffffb, 0xfffffffa, 0x1ad}]}}, @TCA_U32_INDEV={0x14, 0x8, 'vxcan1\x00'}, @TCA_U32_SEL={0x224, 0x5, {0x10, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x1000, 0xe, 0xfffff000, 0x9f6}, {0x5, 0x3ff, 0x3, 0x4}, {0x2, 0xffffffff, 0x69c, 0x4000000}, {0x4009, 0x7, 0x40, 0x7d}, {0x2, 0xd033, 0x57, 0x8000}, {0x1, 0x2, 0x9, 0x8}, {0x6, 0x7fff, 0x9, 0x6}, {0x3, 0xde5, 0x1, 0xbd}, {0x3, 0x80, 0x1, 0x6}, {0x7, 0x7fff, 0x0, 0x40}, {0x9, 0x10, 0x5, 0x5}, {0xac, 0xfffff08a, 0x8, 0x3}, {0x8, 0xfffffff9, 0xfffffffa, 0x51}, {0x49f, 0x7, 0x81, 0xb}, {0x5, 0x9, 0x2}, {0x1000, 0x2, 0x264, 0x9}, {0x6, 0x0, 0x8, 0x7}, {0x3ff, 0xb, 0x3, 0xa6d}, {0x7, 0x7ff, 0x5, 0xc7}, {0x6, 0x8, 0x2, 0x1}, {0x7, 0x2, 0x5, 0x2}, {0xaa4, 0x406, 0x2, 0x127c}, {0x2, 0x4f, 0x5a2, 0xa2fa}, {0x10, 0xb, 0x2, 0x9}, {0x3, 0x7, 0x200, 0x1}, {0x4, 0x5d14, 0x7f, 0x72}, {0x7, 0x2, 0x7, 0x7}, {0x5, 0x7fff, 0x7, 0x438}, {0x7fff, 0x5, 0x401, 0xc42b}, {0x80, 0x3, 0x2, 0x1e0}, {0xfffffffc, 0x9, 0x40, 0x7}, {0x3, 0xa67, 0x400, 0x80}, {0xc, 0x8000, 0xfffffffb}]}}]}}]}, 0x59c}}, 0x24040084) socket$l2tp6(0xa, 0x2, 0x73) clock_adjtime(0x0, &(0x7f0000000100)={0x362, 0x6a, 0x55cd, 0x8000000000000001, 0x48c, 0x5, 0xd, 0x424, 0x2, 0xffffffffffffffff, 0xf423f, 0xfffffffffffffff9, 0x7, 0x2, 0x1000000081, 0x5, 0x0, 0x5, 0x2, 0x9220000000000000, 0x3, 0x0, 0x80000001, 0x0, 0x5, 0x7}) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000c40)=ANY=[@ANYBLOB="a00000002100010000000000fefffffffc020000000000000000000000000000fc020000000000000000000000000001fffc0000000000000200e08000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0xa0}, 0x1, 0x0, 0x0, 0x800}, 0x42000) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000054e000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000022c000/0x3000)=nil) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_mrelease(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') 1m20.040316867s ago: executing program 34 (id=2024): socket$nl_generic(0x10, 0x3, 0x10) r0 = mq_open(0x0, 0x40, 0x0, 0x0) mq_notify(r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000001080)={0x2, {{0x2, 0x4e21, @multicast1}}, {{0x2, 0x4e1f, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x1}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000600)=@newtfilter={0x59c, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfe, {0x0, 0x0, 0x0, r6, {0xf}, {}, {0x7, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x570, 0x2, [@TCA_U32_SEL={0x334, 0x5, {0x9, 0x7f, 0x3, 0x200, 0x8, 0x0, 0x3, 0x8, [{0x4, 0x400000, 0x0, 0x2}, {0x4800, 0x1, 0x9, 0x3}, {0x4, 0x0, 0x6, 0x8}, {0x1a8f, 0x9, 0xfffff801, 0x7}, {0x73, 0x1400, 0x57e76c05, 0x7fff}, {0x7, 0x5, 0x0, 0x81}, {0x7fffffff, 0x0, 0x9, 0x7}, {0x5c4, 0xa, 0x6, 0xc}, {0x2, 0x8, 0x2}, {0x7, 0x8, 0xff, 0x6}, {0x401, 0xffffffff, 0x7, 0x7}, {0x2, 0x3, 0xd, 0x7}, {0x2, 0x0, 0x100, 0x6}, {0x6, 0x8, 0x1, 0x9}, {0x7fff, 0x0, 0x3, 0x101}, {0x4, 0x5b61, 0x0, 0xe37}, {0x7, 0x2, 0x6, 0x6d}, {0x21, 0x600000, 0xffff, 0x54}, {0xff, 0x81, 0xd4, 0x6}, {0x3, 0x2, 0x3fa4f833, 0x46a}, {0x1, 0x6, 0xff, 0x3ff}, {0x5, 0x9, 0x1, 0x3}, {0x8, 0x100, 0x7, 0x3}, {0x7, 0x9819, 0x6, 0x6}, {0x3, 0xc, 0x5, 0x6}, {0x81, 0x9, 0xf3b8, 0xffff7fff}, {0x0, 0x1, 0x4, 0x9}, {0xfffffffb, 0xd, 0x7, 0x7f}, {0x2, 0x81, 0x80000000, 0x8}, {0x4, 0xffff, 0x6, 0x2}, {0x80000001, 0x7, 0x6, 0xe0}, {0x0, 0x9, 0x4, 0xb76}, {0x0, 0x8, 0x4, 0x36c2}, {0x6, 0xc63, 0xb, 0x7}, {0x1, 0x5, 0x5, 0x4}, {0x7, 0x200, 0x5, 0x400}, {0x10, 0x0, 0x6, 0x3}, {0xb, 0x5, 0x5, 0x5}, {0x0, 0x9, 0x8, 0xa}, {0x9, 0xd, 0x7f, 0x8000}, {0x7fffffff, 0x51, 0xd6fa, 0xb}, {0xd, 0x6, 0x2, 0x8}, {0x9, 0x9, 0x7ff, 0x9}, {0x8, 0xffffffff, 0x80, 0x200}, {0x7, 0x3, 0x6, 0x401}, {0xdc, 0x1ff, 0x101, 0x5}, {0x0, 0x7f, 0x60d4, 0x3}, {0x6, 0x8, 0xc, 0x8}, {0x400, 0xaef2, 0xffff, 0x1}, {0x10001, 0xfffffffb, 0xfffffffa, 0x1ad}]}}, @TCA_U32_INDEV={0x14, 0x8, 'vxcan1\x00'}, @TCA_U32_SEL={0x224, 0x5, {0x10, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x1000, 0xe, 0xfffff000, 0x9f6}, {0x5, 0x3ff, 0x3, 0x4}, {0x2, 0xffffffff, 0x69c, 0x4000000}, {0x4009, 0x7, 0x40, 0x7d}, {0x2, 0xd033, 0x57, 0x8000}, {0x1, 0x2, 0x9, 0x8}, {0x6, 0x7fff, 0x9, 0x6}, {0x3, 0xde5, 0x1, 0xbd}, {0x3, 0x80, 0x1, 0x6}, {0x7, 0x7fff, 0x0, 0x40}, {0x9, 0x10, 0x5, 0x5}, {0xac, 0xfffff08a, 0x8, 0x3}, {0x8, 0xfffffff9, 0xfffffffa, 0x51}, {0x49f, 0x7, 0x81, 0xb}, {0x5, 0x9, 0x2}, {0x1000, 0x2, 0x264, 0x9}, {0x6, 0x0, 0x8, 0x7}, {0x3ff, 0xb, 0x3, 0xa6d}, {0x7, 0x7ff, 0x5, 0xc7}, {0x6, 0x8, 0x2, 0x1}, {0x7, 0x2, 0x5, 0x2}, {0xaa4, 0x406, 0x2, 0x127c}, {0x2, 0x4f, 0x5a2, 0xa2fa}, {0x10, 0xb, 0x2, 0x9}, {0x3, 0x7, 0x200, 0x1}, {0x4, 0x5d14, 0x7f, 0x72}, {0x7, 0x2, 0x7, 0x7}, {0x5, 0x7fff, 0x7, 0x438}, {0x7fff, 0x5, 0x401, 0xc42b}, {0x80, 0x3, 0x2, 0x1e0}, {0xfffffffc, 0x9, 0x40, 0x7}, {0x3, 0xa67, 0x400, 0x80}, {0xc, 0x8000, 0xfffffffb}]}}]}}]}, 0x59c}}, 0x24040084) socket$l2tp6(0xa, 0x2, 0x73) clock_adjtime(0x0, &(0x7f0000000100)={0x362, 0x6a, 0x55cd, 0x8000000000000001, 0x48c, 0x5, 0xd, 0x424, 0x2, 0xffffffffffffffff, 0xf423f, 0xfffffffffffffff9, 0x7, 0x2, 0x1000000081, 0x5, 0x0, 0x5, 0x2, 0x9220000000000000, 0x3, 0x0, 0x80000001, 0x0, 0x5, 0x7}) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000c40)=ANY=[@ANYBLOB="a00000002100010000000000fefffffffc020000000000000000000000000000fc020000000000000000000000000001fffc0000000000000200e08000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="02000000000000005000110000000000000000000093aef68b00000100000000000000000000ffff0a01010200000000000000000000000000000000fc0200000000000000000000000000003c0000000000000008000800f69421511bf8bc9408c9ec917143702cd9db6d2dbd0ca3c9f4ec6584b1fbd873d2a6b21b6be3dfd5cadb517443464da153df865f9e1363807597468943624cb233c274eac90f9446a7dc659d526108c6d7a137af05ae7140f9470d22bff17b598794007ea4efe763b6c616c5987a85f9f32a8f54512f2984de9019194becc450244992ecbe55f12131f961a323c25ca6e535700192e0c861c2d2e1e3feb4adf37ae893f22b59969563ae3bc27a9628b53060ec04d2"], 0xa0}, 0x1, 0x0, 0x0, 0x800}, 0x42000) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x80000000e) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) mremap(&(0x7f000054e000/0x1000)=nil, 0x1000, 0x3000, 0x3, &(0x7f000022c000/0x3000)=nil) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) process_mrelease(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') 45.999241823s ago: executing program 4 (id=2031): r0 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000340), 0x101802, 0x0) write$cgroup_int(r0, &(0x7f0000000380)=0x6, 0x12) 45.352444644s ago: executing program 4 (id=2033): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) close(r0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYRES16=r0], 0x48) socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x0) r2 = syz_open_dev$dri(&(0x7f00000008c0), 0xd21, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f00000001c0)={0x0, &(0x7f00000000c0)=[0x0], 0x0, 0x0, 0x0, 0x1}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000080)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha256\x00'}, 0x58) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r8 = accept4(r4, 0x0, 0x0, 0x0) sendmsg$alg(r8, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f00000003c0)={0x0, 0x0, r3, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r2, 0xc06864ce, &(0x7f0000000440)={r9, 0x0, 0x0, 0x0, 0x0, [0x0]}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000140)={0x3ff, 0x2, 0xb5}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r1, 0xc00c642d, &(0x7f0000000080)={r10, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000300)={0x0, 0x0, r11}) 41.34438201s ago: executing program 3 (id=2036): syz_emit_ethernet(0x86, &(0x7f0000000000)={@multicast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x1b59, 0x64, 0x0, @wg=@response={0x2, 0x0, 0xe0, "00000001390403040101006400000001000000efffffffff00", "9384bbeb3018ad591b661fe808b21b77", {"694c875dfb1be5d2a0057a62022a1564", "a329d3a13bd5b6cc6a9471314a1d8c69"}}}}}}}, 0x0) 40.546820273s ago: executing program 3 (id=2037): creat(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) mremap(&(0x7f0000532000/0x3000)=nil, 0x3000, 0x1000, 0x3, &(0x7f0000190000/0x1000)=nil) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r3, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x7}, 0x1c) listen(r3, 0xfffffffc) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) r6 = socket(0x10, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000000)={0x10002, 0xffffffff, 0xd7c4, 0xfffffff9}, 0x10) r7 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)={0x28, r5, 0x7, 0x0, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}]}]}, 0x28}}, 0x0) 25.600771691s ago: executing program 4 (id=2038): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket(0x80000000000000a, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x1b, &(0x7f00000000c0)={@remote={0xfe, 0x80, '\x00', 0xffffffffffffffff}, 0x4, 0x0, 0x1}, 0x20) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000180)=""/66, 0x42}], 0x1, 0x2, 0x3) 21.402948572s ago: executing program 4 (id=2039): userfaultfd(0x80801) r0 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x2710, @local}, 0x10) userfaultfd(0x800) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r4 = openat$ttyS3(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCMGET(r4, 0x5415, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE_wg(r5, 0x1, 0x19, 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$IPVS_CMD_NEW_SERVICE(0xffffffffffffffff, 0x0, 0x20000050) write$proc_mixer(0xffffffffffffffff, &(0x7f0000000380)=[{'VOLUME', @val={' \'', 'Synth Capture Switch', '\' ', 0x9}}, {'CD', @void}, {'VIDEO', @val={' \'', 'Synth Capture'}}, {'OGAIN', @val={' \'', 'CD'}}, {'IGAIN', @val={' \'', 'Capture'}}, {'PHONEOUT', @val={' \'', 'Master'}}, {'SYNTH', @val={' \'', 'Master Capture'}}, {'SYNTH', @void}], 0xff) listen(r0, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) r6 = accept4(r0, 0x0, 0x0, 0x0) getpeername$packet(r6, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000280)=0x14) 20.472101846s ago: executing program 3 (id=2040): socketpair(0x1, 0x1, 0x0, 0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000040)=ANY=[], 0x118) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x8) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='sys_enter\x00', r0}, 0x10) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) 19.77931477s ago: executing program 3 (id=2041): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000000340)={{0x80, 0xfc}, 'port1\x00', 0x0, 0x60004, 0x0, 0xffffffff, 0x6, 0x0, 0x0, 0x0, 0x1}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000001e00)={{0x80, 0x3}, 'port0\x00', 0x24, 0x0, 0x7ffc, 0xfff, 0x4, 0x0, 0x5, 0x0, 0x0, 0x9}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000200)={{0x80, 0x9}, 'port0\x00', 0x89, 0x90010, 0x4, 0x8, 0x0, 0x0, 0x200000, 0x0, 0x4875c99660ff2b2d}) 18.681376777s ago: executing program 3 (id=2042): socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) clock_nanosleep(0x9, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0) 3.112758844s ago: executing program 4 (id=2043): r0 = syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000000c0), 0x2200) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x40345410, 0x0) r5 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) close_range(r5, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x20000080) r6 = socket(0x10, 0x803, 0x0) sendto(r6, &(0x7f0000000740)="12000000", 0x4, 0x0, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000340)={0x0, 0x4, 0x0, 0x8002, '\x00', '\x00', '\x00', 0x4, 0xfffffffe, 0x100, 0x0, "abd206a1ebd7cedfd17ebd65400ed41b"}) getsockopt$IP_SET_OP_GET_BYNAME(r6, 0x1, 0x53, &(0x7f0000000000)={0x6, 0x7, 'syz2\x00'}, &(0x7f0000000080)=0x28) 260.86363ms ago: executing program 4 (id=2044): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x8001, 0x2, 0x1, 0x7, 0x4, 0xcc9, 0x8, 0xab, 0xa, 0x100, 0x0, 0x1, 0x5, 0x7, 0x6, 0x7fff, 0x1, 0x1a449, 0xffffffff, 0x40000003, 0x89, 0x2, 0x2, 0x20001e58, 0x115, 0x8, 0x3c, 0x4, 0x4, 0x7, 0xd]}) ioctl$COMEDI_DEVINFO(r0, 0x80b06401, &(0x7f0000000240)) 0s ago: executing program 3 (id=2045): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x20, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x73cea2d47785b264, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) mkdir(0x0, 0x0) getpeername$packet(r4, 0x0, &(0x7f0000000080)) request_key(&(0x7f0000000780)='asymmetric\x00', &(0x7f0000000400)={'syz', 0x3}, &(0x7f00000003c0)='incremental-fs\x00', 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7fe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) kernel console output (not intermixed with test programs): 2299.310:20222): avc: denied { perfmon } for pid=11884 comm="syz.1.1960" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2299.415517][ T29] audit: type=1400 audit(2299.320:20223): avc: denied { perfmon } for pid=11884 comm="syz.1.1960" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2299.426477][ T29] audit: type=1400 audit(2299.330:20224): avc: denied { perfmon } for pid=11884 comm="syz.1.1960" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2299.429072][ T29] audit: type=1400 audit(2299.330:20225): avc: denied { perfmon } for pid=11884 comm="syz.1.1960" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2299.435783][ T29] audit: type=1400 audit(2299.340:20226): avc: denied { perfmon } for pid=11884 comm="syz.1.1960" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2308.573229][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 2308.573622][ T29] audit: type=1400 audit(2308.480:20257): avc: denied { execmem } for pid=11890 comm="syz.2.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2310.607175][ T29] audit: type=1400 audit(2310.510:20258): avc: denied { prog_load } for pid=11890 comm="syz.2.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2310.613620][ T29] audit: type=1400 audit(2310.520:20259): avc: denied { bpf } for pid=11890 comm="syz.2.1961" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2310.625551][ T29] audit: type=1400 audit(2310.530:20260): avc: denied { map_create } for pid=11890 comm="syz.2.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2310.633632][ T29] audit: type=1400 audit(2310.540:20261): avc: denied { bpf } for pid=11890 comm="syz.2.1961" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2310.642723][ T29] audit: type=1400 audit(2310.540:20262): avc: denied { map_read map_write } for pid=11890 comm="syz.2.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2310.658584][ T29] audit: type=1400 audit(2310.560:20263): avc: denied { prog_load } for pid=11890 comm="syz.2.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2310.668508][ T29] audit: type=1400 audit(2310.570:20264): avc: denied { bpf } for pid=11890 comm="syz.2.1961" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2310.677781][ T29] audit: type=1400 audit(2310.580:20265): avc: denied { prog_load } for pid=11890 comm="syz.2.1961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2310.683351][ T29] audit: type=1400 audit(2310.590:20266): avc: denied { bpf } for pid=11890 comm="syz.2.1961" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2313.863403][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 2313.863836][ T29] audit: type=1400 audit(2313.770:20274): avc: denied { read write } for pid=7119 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2313.878850][ T29] audit: type=1400 audit(2313.780:20275): avc: denied { read write open } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2313.898112][ T29] audit: type=1400 audit(2313.800:20276): avc: denied { ioctl } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2314.213438][ T29] audit: type=1400 audit(2314.100:20277): avc: denied { create } for pid=11893 comm="syz.2.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2314.239875][ T29] audit: type=1400 audit(2314.130:20278): avc: denied { create } for pid=11893 comm="syz.2.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2314.245875][ T29] audit: type=1400 audit(2314.150:20279): avc: denied { allowed } for pid=11893 comm="syz.2.1962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2314.268109][ T29] audit: type=1400 audit(2314.170:20280): avc: denied { create } for pid=11893 comm="syz.2.1962" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2314.313494][ T29] audit: type=1400 audit(2314.190:20281): avc: denied { map } for pid=11893 comm="syz.2.1962" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=23608 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2314.313781][ T29] audit: type=1400 audit(2314.190:20282): avc: denied { read write } for pid=11893 comm="syz.2.1962" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=23608 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2314.314194][ T29] audit: type=1400 audit(2314.200:20283): avc: denied { map } for pid=11893 comm="syz.2.1962" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=23608 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2314.612278][ T9596] usb 2-1: new high-speed USB device number 45 using dummy_hcd [ 2314.902649][ T9596] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2314.903104][ T9596] usb 2-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 2314.903439][ T9596] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 2314.944420][ T9596] usb 2-1: config 0 descriptor?? [ 2322.256448][ T29] kauditd_printk_skb: 633 callbacks suppressed [ 2322.290514][ T29] audit: type=1400 audit(2322.140:20917): avc: denied { ioctl } for pid=11894 comm="syz.1.1963" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2325.290944][T10795] usb 2-1: USB disconnect, device number 45 [ 2325.360191][ T29] audit: type=1400 audit(2325.260:20918): avc: denied { read write } for pid=7119 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2325.370259][ T29] audit: type=1400 audit(2325.270:20919): avc: denied { read write open } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2325.373441][ T29] audit: type=1400 audit(2325.270:20920): avc: denied { ioctl } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2325.577007][ T29] audit: type=1400 audit(2325.480:20921): avc: denied { prog_load } for pid=11918 comm="syz.1.1966" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2325.579649][ T29] audit: type=1400 audit(2325.480:20922): avc: denied { bpf } for pid=11918 comm="syz.1.1966" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2325.590716][ T29] audit: type=1400 audit(2325.490:20923): avc: denied { perfmon } for pid=11918 comm="syz.1.1966" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2325.601990][ T29] audit: type=1400 audit(2325.500:20924): avc: denied { perfmon } for pid=11918 comm="syz.1.1966" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2325.605604][ T29] audit: type=1400 audit(2325.510:20925): avc: denied { perfmon } for pid=11918 comm="syz.1.1966" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2325.621761][ T29] audit: type=1400 audit(2325.520:20926): avc: denied { perfmon } for pid=11918 comm="syz.1.1966" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2328.342033][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 2328.342546][ T29] audit: type=1400 audit(2328.240:20944): avc: denied { write } for pid=11918 comm="syz.1.1966" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2328.358987][ T29] audit: type=1400 audit(2328.260:20945): avc: denied { write open } for pid=11918 comm="syz.1.1966" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2328.409824][ T29] audit: type=1400 audit(2328.310:20946): avc: denied { ioctl } for pid=11918 comm="syz.1.1966" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x4701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2328.410328][ T29] audit: type=1400 audit(2328.310:20947): avc: denied { ioctl } for pid=11918 comm="syz.1.1966" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2328.430686][ T29] audit: type=1400 audit(2328.330:20948): avc: denied { ioctl } for pid=11918 comm="syz.1.1966" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2328.492033][ T29] audit: type=1400 audit(2328.380:20949): avc: denied { ioctl } for pid=11918 comm="syz.1.1966" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2328.505040][ T29] audit: type=1400 audit(2328.400:20950): avc: denied { ioctl } for pid=11918 comm="syz.1.1966" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5412 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2333.852012][ T29] audit: type=1400 audit(2333.750:20951): avc: denied { unmount } for pid=11115 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2334.208770][ T29] audit: type=1400 audit(2334.110:20952): avc: denied { read } for pid=11922 comm="syz.2.1967" name="controlC0" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2334.215203][ T29] audit: type=1400 audit(2334.120:20953): avc: denied { read open } for pid=11922 comm="syz.2.1967" path="/dev/snd/controlC0" dev="devtmpfs" ino=728 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2334.234769][ T29] audit: type=1400 audit(2334.140:20954): avc: denied { ioctl } for pid=11922 comm="syz.2.1967" path="/dev/snd/controlC0" dev="devtmpfs" ino=728 ioctlcmd=0x5513 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2334.570755][ T29] audit: type=1400 audit(2334.470:20955): avc: denied { prog_load } for pid=11924 comm="syz.2.1968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2334.578672][ T29] audit: type=1400 audit(2334.480:20956): avc: denied { bpf } for pid=11924 comm="syz.2.1968" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2334.712441][ T29] audit: type=1400 audit(2334.610:20957): avc: denied { execmem } for pid=11924 comm="syz.2.1968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2337.396048][ T29] audit: type=1400 audit(2337.300:20958): avc: denied { map_create } for pid=11924 comm="syz.2.1968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2337.519708][ T29] audit: type=1400 audit(2337.420:20959): avc: denied { map_read map_write } for pid=11924 comm="syz.2.1968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2337.537590][ T29] audit: type=1400 audit(2337.440:20960): avc: denied { prog_load } for pid=11924 comm="syz.2.1968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2339.249071][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 2339.249583][ T29] audit: type=1400 audit(2339.150:21005): avc: denied { read write } for pid=7119 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2339.263902][ T29] audit: type=1400 audit(2339.170:21006): avc: denied { read write open } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2339.269583][ T29] audit: type=1400 audit(2339.170:21007): avc: denied { ioctl } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2339.932074][ T29] audit: type=1400 audit(2339.830:21008): avc: denied { append } for pid=11933 comm="syz.1.1970" name="midi2" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2339.963725][ T29] audit: type=1400 audit(2339.850:21009): avc: denied { append open } for pid=11933 comm="syz.1.1970" path="/dev/midi2" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2340.503037][ T29] audit: type=1400 audit(2340.380:21010): avc: denied { read write } for pid=7119 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2340.503527][ T29] audit: type=1400 audit(2340.390:21011): avc: denied { read write open } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2340.503998][ T29] audit: type=1400 audit(2340.390:21012): avc: denied { ioctl } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2341.293015][ T29] audit: type=1400 audit(2341.190:21013): avc: denied { read write } for pid=11935 comm="syz.1.1971" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2341.312083][ T29] audit: type=1400 audit(2341.210:21014): avc: denied { read write open } for pid=11935 comm="syz.1.1971" path="/dev/virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2346.706550][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 2346.719905][ T29] audit: type=1400 audit(2346.610:21028): avc: denied { prog_load } for pid=11945 comm="syz.1.1972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2346.730550][ T29] audit: type=1400 audit(2346.610:21029): avc: denied { bpf } for pid=11945 comm="syz.1.1972" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2346.772800][ T29] audit: type=1400 audit(2346.620:21030): avc: denied { read } for pid=11945 comm="syz.1.1972" name="card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2346.773247][ T29] audit: type=1400 audit(2346.630:21031): avc: denied { read open } for pid=11945 comm="syz.1.1972" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2346.838943][ T29] audit: type=1400 audit(2346.740:21032): avc: denied { ioctl } for pid=11945 comm="syz.1.1972" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2346.897270][ T29] audit: type=1400 audit(2346.800:21033): avc: denied { ioctl } for pid=11945 comm="syz.1.1972" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64c6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2346.900426][ T29] audit: type=1400 audit(2346.800:21034): avc: denied { read open } for pid=11945 comm="syz.1.1972" path="/dev/dri/card1" dev="devtmpfs" ino=615 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2347.024427][ T29] audit: type=1400 audit(2346.820:21035): avc: denied { ioctl } for pid=11945 comm="syz.1.1972" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64a7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2347.085581][ T29] audit: type=1400 audit(2346.980:21036): avc: denied { ioctl } for pid=11945 comm="syz.1.1972" path="/dev/dri/card1" dev="devtmpfs" ino=615 ioctlcmd=0x64a6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2349.919929][ C1] vkms_vblank_simulate: vblank timer overrun [ 2351.168236][ C1] vkms_vblank_simulate: vblank timer overrun [ 2354.008861][ T29] audit: type=1400 audit(2353.910:21037): avc: denied { execmem } for pid=11952 comm="syz.2.1974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2356.665893][ T29] audit: type=1400 audit(2356.550:21038): avc: denied { read write } for pid=7119 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2356.667751][ T29] audit: type=1400 audit(2356.570:21039): avc: denied { read write open } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2356.713414][ T29] audit: type=1400 audit(2356.610:21040): avc: denied { ioctl } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2357.153900][ T29] audit: type=1400 audit(2357.060:21041): avc: denied { append } for pid=11955 comm="syz.1.1975" name="midi2" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2357.158787][ T29] audit: type=1400 audit(2357.060:21042): avc: denied { append open } for pid=11955 comm="syz.1.1975" path="/dev/midi2" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2357.168499][ T29] audit: type=1400 audit(2357.070:21043): avc: denied { prog_load } for pid=11952 comm="syz.2.1974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2357.182455][ T29] audit: type=1400 audit(2357.090:21044): avc: denied { bpf } for pid=11952 comm="syz.2.1974" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2357.210363][ T29] audit: type=1400 audit(2357.110:21045): avc: denied { perfmon } for pid=11952 comm="syz.2.1974" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2357.216755][ T29] audit: type=1400 audit(2357.120:21046): avc: denied { perfmon } for pid=11952 comm="syz.2.1974" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2357.809187][T11959] bond1: (slave tunl0): Device is not bonding slave [ 2357.810601][T11959] bond1: option active_slave: invalid value (tunl0) [ 2357.818812][T11959] bond1 (unregistering): Released all slaves [ 2359.545683][ T29] kauditd_printk_skb: 39 callbacks suppressed [ 2359.546115][ T29] audit: type=1400 audit(2359.410:21086): avc: denied { allowed } for pid=12031 comm="syz.1.1978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2359.632872][ T29] audit: type=1400 audit(2359.530:21087): avc: denied { execmem } for pid=12031 comm="syz.1.1978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2364.897381][ T29] audit: type=1400 audit(2364.800:21088): avc: denied { prog_load } for pid=12031 comm="syz.1.1978" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2364.900147][ T29] audit: type=1400 audit(2364.800:21089): avc: denied { bpf } for pid=12031 comm="syz.1.1978" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2364.944481][ T29] audit: type=1400 audit(2364.850:21090): avc: denied { read write } for pid=12031 comm="syz.1.1978" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2364.952599][ T29] audit: type=1400 audit(2364.850:21091): avc: denied { read write open } for pid=12031 comm="syz.1.1978" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2373.452542][ T29] audit: type=1400 audit(2373.350:21092): avc: denied { read write } for pid=7119 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2373.456814][ T29] audit: type=1400 audit(2373.360:21093): avc: denied { read write open } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2373.462411][ T29] audit: type=1400 audit(2373.360:21094): avc: denied { ioctl } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2373.736698][ T29] audit: type=1400 audit(2373.640:21095): avc: denied { create } for pid=12035 comm="syz.1.1979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2373.767899][ T29] audit: type=1400 audit(2373.670:21096): avc: denied { read } for pid=12035 comm="syz.1.1979" dev="nsfs" ino=4026532744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2373.775335][ T29] audit: type=1400 audit(2373.680:21097): avc: denied { read open } for pid=12035 comm="syz.1.1979" path="net:[4026532744]" dev="nsfs" ino=4026532744 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2373.784753][ T29] audit: type=1400 audit(2373.690:21098): avc: denied { create } for pid=12035 comm="syz.1.1979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2373.797476][ T29] audit: type=1400 audit(2373.700:21099): avc: denied { write } for pid=12035 comm="syz.1.1979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2373.887848][ T29] audit: type=1400 audit(2373.790:21100): avc: denied { read write } for pid=7119 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2373.900639][ T29] audit: type=1400 audit(2373.800:21101): avc: denied { read write open } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2375.032667][ T9637] usb 2-1: new full-speed USB device number 46 using dummy_hcd [ 2375.213024][ T9637] usb 2-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 2375.213492][ T9637] usb 2-1: config 1 has an invalid descriptor of length 48, skipping remainder of the config [ 2375.213874][ T9637] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 2375.214087][ T9637] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 12336, setting to 64 [ 2375.413786][ T9637] usb 2-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 2375.414225][ T9637] usb 2-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 2375.414557][ T9637] usb 2-1: Product: syz [ 2375.414740][ T9637] usb 2-1: Manufacturer: syz [ 2375.643773][ T9637] cdc_wdm 2-1:1.0: skipping garbage [ 2375.646053][ T9637] cdc_wdm 2-1:1.0: skipping garbage [ 2375.682408][ T9637] cdc_wdm 2-1:1.0: cdc-wdm0: USB WDM device [ 2375.858567][ T9476] usb 2-1: USB disconnect, device number 46 [ 2379.174365][ T29] kauditd_printk_skb: 64 callbacks suppressed [ 2379.174769][ T29] audit: type=1400 audit(2379.080:21166): avc: denied { prog_load } for pid=12071 comm="syz.1.1985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2379.200624][ T29] audit: type=1400 audit(2379.090:21167): avc: denied { bpf } for pid=12071 comm="syz.1.1985" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2379.262573][ T29] audit: type=1400 audit(2379.100:21168): avc: denied { perfmon } for pid=12071 comm="syz.1.1985" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2379.279936][ T29] audit: type=1400 audit(2379.170:21169): avc: denied { name_bind } for pid=12071 comm="syz.1.1985" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2379.308554][ T29] audit: type=1400 audit(2379.170:21170): avc: denied { node_bind } for pid=12071 comm="syz.1.1985" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2387.547163][ T29] audit: type=1400 audit(2387.450:21171): avc: denied { unmount } for pid=11115 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2387.836482][ T29] audit: type=1400 audit(2387.740:21172): avc: denied { read write } for pid=7119 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2387.840069][ T29] audit: type=1400 audit(2387.740:21173): avc: denied { read write open } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2387.862170][ T29] audit: type=1400 audit(2387.760:21174): avc: denied { ioctl } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2387.893038][ T29] audit: type=1400 audit(2387.790:21175): avc: denied { append } for pid=12075 comm="syz.2.1986" name="midi2" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2387.896530][ T29] audit: type=1400 audit(2387.800:21176): avc: denied { append open } for pid=12075 comm="syz.2.1986" path="/dev/midi2" dev="devtmpfs" ino=740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2388.120622][ T29] audit: type=1400 audit(2388.020:21177): avc: denied { read write } for pid=12077 comm="syz.1.1987" name="rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2388.130495][ T29] audit: type=1400 audit(2388.030:21178): avc: denied { read write open } for pid=12077 comm="syz.1.1987" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2388.186789][ T29] audit: type=1400 audit(2388.080:21179): avc: denied { prog_load } for pid=12077 comm="syz.1.1987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2388.202048][ T29] audit: type=1400 audit(2388.100:21180): avc: denied { bpf } for pid=12077 comm="syz.1.1987" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2392.582061][ T9637] usb 2-1: new high-speed USB device number 47 using dummy_hcd [ 2392.629070][ T29] kauditd_printk_skb: 52 callbacks suppressed [ 2392.629635][ T29] audit: type=1400 audit(2392.530:21233): avc: denied { ioctl } for pid=12091 comm="syz.1.1991" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2392.654137][ T29] audit: type=1400 audit(2392.560:21234): avc: denied { ioctl } for pid=12091 comm="syz.1.1991" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2392.672536][ T29] audit: type=1400 audit(2392.570:21235): avc: denied { ioctl } for pid=12091 comm="syz.1.1991" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2392.736642][ T29] audit: type=1400 audit(2392.630:21236): avc: denied { ioctl } for pid=12091 comm="syz.1.1991" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2392.812262][ T9637] usb 2-1: Using ep0 maxpacket: 32 [ 2392.882446][ T29] audit: type=1400 audit(2392.770:21237): avc: denied { ioctl } for pid=12091 comm="syz.1.1991" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2392.963563][ T29] audit: type=1400 audit(2392.860:21238): avc: denied { ioctl } for pid=12091 comm="syz.1.1991" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2392.983028][ T29] audit: type=1400 audit(2392.860:21239): avc: denied { ioctl } for pid=12091 comm="syz.1.1991" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2392.986839][ T29] audit: type=1400 audit(2392.890:21240): avc: denied { ioctl } for pid=12091 comm="syz.1.1991" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2393.002649][ T9637] usb 2-1: config 0 has an invalid interface number: 16 but max is 0 [ 2393.002787][ T9637] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 2393.002824][ T9637] usb 2-1: config 0 has no interface number 0 [ 2393.002892][ T9637] usb 2-1: config 0 interface 16 altsetting 0 bulk endpoint 0x6 has invalid maxpacket 255 [ 2393.002938][ T9637] usb 2-1: config 0 interface 16 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 2393.013062][ T29] audit: type=1400 audit(2392.890:21241): avc: denied { ioctl } for pid=12091 comm="syz.1.1991" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2393.020757][ T29] audit: type=1400 audit(2392.920:21242): avc: denied { ioctl } for pid=12091 comm="syz.1.1991" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2393.232531][ T9637] usb 2-1: New USB device found, idVendor=0499, idProduct=102a, bcdDevice=85.2d [ 2393.232962][ T9637] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 2393.233310][ T9637] usb 2-1: Product: syz [ 2393.233506][ T9637] usb 2-1: Manufacturer: syz [ 2393.233673][ T9637] usb 2-1: SerialNumber: syz [ 2393.318236][ T9637] usb 2-1: config 0 descriptor?? [ 2393.383442][T12092] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 2393.423818][ T9637] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 2393.436048][ T9637] usb 2-1: invalid MIDI in EP 0 [ 2393.622608][ T9637] snd-usb-audio 2-1:0.16: probe with driver snd-usb-audio failed with error -22 [ 2393.694562][ T9637] usb 2-1: USB disconnect, device number 47 [ 2398.084857][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 2398.085372][ T29] audit: type=1400 audit(2397.940:21286): avc: denied { create } for pid=12128 comm="syz.1.1994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2398.118407][ T29] audit: type=1400 audit(2398.020:21287): avc: denied { prog_load } for pid=12128 comm="syz.1.1994" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2398.119020][ T29] audit: type=1400 audit(2398.020:21288): avc: denied { bpf } for pid=12128 comm="syz.1.1994" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2398.133019][ T29] audit: type=1400 audit(2398.030:21289): avc: denied { perfmon } for pid=12128 comm="syz.1.1994" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2401.947475][ T29] audit: type=1400 audit(2401.850:21290): avc: denied { module_request } for pid=12128 comm="syz.1.1994" kmod="net-pf-2-proto-0-type-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2402.514161][ T29] audit: type=1400 audit(2402.420:21291): avc: denied { read append } for pid=12128 comm="syz.1.1994" name="comedi3" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2402.549669][ T29] audit: type=1400 audit(2402.450:21292): avc: denied { module_request } for pid=12128 comm="syz.1.1994" kmod="net-pf-2-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2402.550092][ T29] audit: type=1400 audit(2402.450:21293): avc: denied { read open } for pid=12128 comm="syz.1.1994" path="/dev/comedi3" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2402.597236][T12133] comedi: valid board names for 8255 driver are: [ 2402.597744][T12133] 8255 [ 2402.597825][T12133] comedi: valid board names for vmk80xx driver are: [ 2402.597846][T12133] vmk80xx [ 2402.597861][T12133] comedi: valid board names for usbduxsigma driver are: [ 2402.597876][T12133] usbduxsigma [ 2402.597891][T12133] comedi: valid board names for usbduxfast driver are: [ 2402.597909][T12133] usbduxfast [ 2402.598015][T12133] comedi: valid board names for usbdux driver are: [ 2402.598043][T12133] usbdux [ 2402.598067][T12133] comedi: valid board names for ni6501 driver are: [ 2402.598107][T12133] ni6501 [ 2402.598127][T12133] comedi: valid board names for dt9812 driver are: [ 2402.598482][T12133] dt9812 [ 2402.598508][T12133] comedi: valid board names for ni_labpc_cs driver are: [ 2402.598529][T12133] ni_labpc_cs [ 2402.598547][T12133] comedi: valid board names for ni_daq_700 driver are: [ 2402.598583][T12133] ni_daq_700 [ 2402.598603][T12133] comedi: valid board names for labpc_pci driver are: [ 2402.598621][T12133] labpc_pci [ 2402.598638][T12133] comedi: valid board names for adl_pci9118 driver are: [ 2402.598716][T12133] pci9118dg [ 2402.598768][T12133] pci9118hg [ 2402.599008][T12133] pci9118hr [ 2402.599038][T12133] comedi: valid board names for 8255_pci driver are: [ 2402.599071][T12133] 8255_pci [ 2402.599136][T12133] comedi: valid board names for comedi_parport driver are: [ 2402.599160][T12133] comedi_parport [ 2402.599177][T12133] comedi: valid board names for comedi_test driver are: [ 2402.599195][T12133] comedi_test [ 2402.599257][T12133] comedi: valid board names for comedi_bond driver are: [ 2402.599278][T12133] comedi_bond [ 2402.599975][ T29] audit: type=1400 audit(2402.490:21294): avc: denied { ioctl } for pid=12128 comm="syz.1.1994" path="/dev/comedi3" dev="devtmpfs" ino=713 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2402.602993][ T29] audit: type=1400 audit(2402.500:21295): avc: denied { ioctl } for pid=12128 comm="syz.1.1994" path="/dev/comedi3" dev="devtmpfs" ino=713 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2411.284017][ T29] audit: type=1400 audit(2411.190:21296): avc: denied { allowed } for pid=12135 comm="syz.2.1995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2411.344766][ T29] audit: type=1400 audit(2411.250:21297): avc: denied { sqpoll } for pid=12135 comm="syz.2.1995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2411.364057][ T29] audit: type=1400 audit(2411.260:21298): avc: denied { create } for pid=12135 comm="syz.2.1995" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2411.501835][ T29] audit: type=1400 audit(2411.400:21299): avc: denied { read write } for pid=7119 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2411.502389][ T29] audit: type=1400 audit(2411.400:21300): avc: denied { read write open } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2411.502485][ T29] audit: type=1400 audit(2411.400:21301): avc: denied { ioctl } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2411.873050][ T29] audit: type=1400 audit(2411.770:21302): avc: denied { create } for pid=12138 comm="syz.1.1996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2411.932875][ T29] audit: type=1400 audit(2411.820:21303): avc: denied { write } for pid=12138 comm="syz.1.1996" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 2412.056588][ T29] audit: type=1400 audit(2411.960:21304): avc: denied { read write } for pid=7119 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2412.058775][ T29] audit: type=1400 audit(2411.960:21305): avc: denied { read write open } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2416.588683][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 2416.595298][ T29] audit: type=1400 audit(2416.480:21335): avc: denied { read } for pid=12150 comm="syz.1.2000" name="timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2416.602746][ T29] audit: type=1400 audit(2416.480:21336): avc: denied { read open } for pid=12150 comm="syz.1.2000" path="/dev/snd/timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2416.610263][ T29] audit: type=1400 audit(2416.480:21337): avc: denied { allowed } for pid=12150 comm="syz.1.2000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2416.624126][ T29] audit: type=1400 audit(2416.500:21338): avc: denied { create } for pid=12150 comm="syz.1.2000" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2416.632510][ T29] audit: type=1400 audit(2416.500:21339): avc: denied { map } for pid=12150 comm="syz.1.2000" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=23886 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2416.652991][ T29] audit: type=1400 audit(2416.510:21340): avc: denied { read write } for pid=12150 comm="syz.1.2000" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=23886 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2416.660947][ T29] audit: type=1400 audit(2416.510:21341): avc: denied { map } for pid=12150 comm="syz.1.2000" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=23886 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2416.692708][ T29] audit: type=1400 audit(2416.510:21342): avc: denied { read write } for pid=12150 comm="syz.1.2000" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=23886 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2417.067178][ T29] audit: type=1400 audit(2416.970:21343): avc: denied { read write } for pid=7119 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2417.112071][ T29] audit: type=1400 audit(2417.010:21344): avc: denied { read write open } for pid=7119 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 2423.916016][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 2423.916462][ T29] audit: type=1400 audit(2423.820:21364): avc: denied { prog_load } for pid=12157 comm="syz.1.2003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2423.954282][ T29] audit: type=1400 audit(2423.860:21365): avc: denied { bpf } for pid=12157 comm="syz.1.2003" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2423.956909][ T29] audit: type=1400 audit(2423.860:21366): avc: denied { perfmon } for pid=12157 comm="syz.1.2003" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2423.997444][ T29] audit: type=1400 audit(2423.900:21367): avc: denied { perfmon } for pid=12157 comm="syz.1.2003" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2424.030309][ T29] audit: type=1400 audit(2423.930:21368): avc: denied { perfmon } for pid=12157 comm="syz.1.2003" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2424.068969][ T29] audit: type=1400 audit(2423.960:21369): avc: denied { perfmon } for pid=12157 comm="syz.1.2003" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2424.090005][ T29] audit: type=1400 audit(2423.990:21370): avc: denied { perfmon } for pid=12157 comm="syz.1.2003" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2424.095472][ T29] audit: type=1400 audit(2424.000:21371): avc: denied { bpf } for pid=12157 comm="syz.1.2003" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2433.366328][ T29] audit: type=1400 audit(2433.270:21372): avc: denied { create } for pid=12161 comm="syz.2.2004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2433.387742][ T29] audit: type=1400 audit(2433.290:21373): avc: denied { create } for pid=12161 comm="syz.2.2004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2433.403150][ T29] audit: type=1400 audit(2433.310:21374): avc: denied { write } for pid=12161 comm="syz.2.2004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2433.425599][ T29] audit: type=1400 audit(2433.330:21375): avc: denied { read } for pid=12161 comm="syz.2.2004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2433.429211][ T29] audit: type=1400 audit(2433.330:21376): avc: denied { read } for pid=12161 comm="syz.2.2004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2433.450875][ T29] audit: type=1400 audit(2433.350:21377): avc: denied { write } for pid=12161 comm="syz.2.2004" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2433.846135][ T29] audit: type=1400 audit(2433.750:21378): avc: denied { read write } for pid=12163 comm="syz.2.2005" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2433.849604][ T29] audit: type=1400 audit(2433.750:21379): avc: denied { read write open } for pid=12163 comm="syz.2.2005" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2433.895297][ T29] audit: type=1400 audit(2433.800:21380): avc: denied { ioctl } for pid=12163 comm="syz.2.2005" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2433.912548][ T29] audit: type=1400 audit(2433.800:21381): avc: denied { ioctl } for pid=12163 comm="syz.2.2005" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2433.934208][T12164] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2433.936710][T12164] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2438.629509][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 2438.629962][ T29] audit: type=1400 audit(2438.530:21410): avc: denied { read } for pid=12171 comm="syz.2.2008" dev="nsfs" ino=4026532931 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2438.642872][ T29] audit: type=1400 audit(2438.540:21411): avc: denied { read open } for pid=12171 comm="syz.2.2008" path="net:[4026532931]" dev="nsfs" ino=4026532931 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2438.662773][ T29] audit: type=1400 audit(2438.550:21412): avc: denied { create } for pid=12171 comm="syz.2.2008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2438.717910][ T29] audit: type=1400 audit(2438.620:21413): avc: denied { map_create } for pid=12171 comm="syz.2.2008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2438.738775][ T29] audit: type=1400 audit(2438.640:21414): avc: denied { map_read map_write } for pid=12171 comm="syz.2.2008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2438.756105][ T29] audit: type=1400 audit(2438.650:21415): avc: denied { map_create } for pid=12171 comm="syz.2.2008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2438.832735][ T29] audit: type=1400 audit(2438.700:21416): avc: denied { map_read map_write } for pid=12171 comm="syz.2.2008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2438.833249][ T29] audit: type=1400 audit(2438.700:21417): avc: denied { prog_load } for pid=12171 comm="syz.2.2008" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2438.869107][ T29] audit: type=1400 audit(2438.770:21418): avc: denied { bpf } for pid=12171 comm="syz.2.2008" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2438.892522][ T29] audit: type=1400 audit(2438.780:21419): avc: denied { perfmon } for pid=12171 comm="syz.2.2008" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2445.297478][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 2445.297839][ T29] audit: type=1400 audit(2445.200:21444): avc: denied { create } for pid=12177 comm="syz.2.2009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2445.320874][ T29] audit: type=1400 audit(2445.220:21445): avc: denied { write } for pid=12177 comm="syz.2.2009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2445.325838][ T29] audit: type=1400 audit(2445.230:21446): avc: denied { module_request } for pid=12177 comm="syz.2.2009" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2445.616224][ T29] audit: type=1400 audit(2445.520:21447): avc: denied { read } for pid=12177 comm="syz.2.2009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2445.634491][ T29] audit: type=1400 audit(2445.540:21448): avc: denied { create } for pid=12177 comm="syz.2.2009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2445.650089][ T29] audit: type=1400 audit(2445.550:21449): avc: denied { ioctl } for pid=12177 comm="syz.2.2009" path="socket:[23962]" dev="sockfs" ino=23962 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2445.655316][ T29] audit: type=1400 audit(2445.560:21450): avc: denied { module_request } for pid=12177 comm="syz.2.2009" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2446.083095][ T29] audit: type=1400 audit(2445.990:21451): avc: denied { sys_module } for pid=12177 comm="syz.2.2009" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2446.085018][ T29] audit: type=1400 audit(2445.990:21452): avc: denied { module_request } for pid=12177 comm="syz.2.2009" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2446.179401][ T29] audit: type=1400 audit(2446.080:21453): avc: denied { write } for pid=12177 comm="syz.2.2009" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2451.860354][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 2451.869897][ T29] audit: type=1400 audit(2451.760:21492): avc: denied { read write } for pid=12195 comm="syz.2.2013" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2451.886152][ T29] audit: type=1400 audit(2451.790:21493): avc: denied { read write open } for pid=12195 comm="syz.2.2013" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2451.900978][ T29] audit: type=1400 audit(2451.800:21494): avc: denied { ioctl } for pid=12195 comm="syz.2.2013" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2451.924035][ T29] audit: type=1400 audit(2451.820:21495): avc: denied { ioctl } for pid=12195 comm="syz.2.2013" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2452.226959][ T29] audit: type=1400 audit(2452.130:21496): avc: denied { create } for pid=12198 comm="syz.2.2014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2452.253240][ T29] audit: type=1400 audit(2452.150:21497): avc: denied { bind } for pid=12198 comm="syz.2.2014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2452.262240][ T29] audit: type=1400 audit(2452.160:21498): avc: denied { listen } for pid=12198 comm="syz.2.2014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2453.361795][ T29] audit: type=1400 audit(2453.260:21499): avc: denied { allowed } for pid=12198 comm="syz.2.2014" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2453.429382][ T29] audit: type=1400 audit(2453.330:21500): avc: denied { create } for pid=12198 comm="syz.2.2014" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2453.438674][ T29] audit: type=1400 audit(2453.340:21501): avc: denied { map } for pid=12198 comm="syz.2.2014" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=22984 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2457.512301][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 2457.512752][ T29] audit: type=1400 audit(2457.400:21529): avc: denied { prog_load } for pid=12205 comm="syz.1.2016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2457.512954][ T29] audit: type=1400 audit(2457.410:21530): avc: denied { bpf } for pid=12205 comm="syz.1.2016" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2457.513016][ T29] audit: type=1400 audit(2457.410:21531): avc: denied { perfmon } for pid=12205 comm="syz.1.2016" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2457.513102][ T29] audit: type=1400 audit(2457.410:21532): avc: denied { perfmon } for pid=12205 comm="syz.1.2016" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2457.528904][ T29] audit: type=1400 audit(2457.430:21533): avc: denied { perfmon } for pid=12205 comm="syz.1.2016" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2457.558418][ T29] audit: type=1400 audit(2457.450:21534): avc: denied { perfmon } for pid=12205 comm="syz.1.2016" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2457.564010][ T29] audit: type=1400 audit(2457.470:21535): avc: denied { perfmon } for pid=12205 comm="syz.1.2016" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2457.587849][ T29] audit: type=1400 audit(2457.490:21536): avc: denied { bpf } for pid=12205 comm="syz.1.2016" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2457.599159][ T29] audit: type=1400 audit(2457.500:21537): avc: denied { create } for pid=12205 comm="syz.1.2016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2457.644545][ T29] audit: type=1400 audit(2457.550:21538): avc: denied { ioctl } for pid=12205 comm="syz.1.2016" path="socket:[22991]" dev="sockfs" ino=22991 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2471.303409][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 2471.303840][ T29] audit: type=1400 audit(2471.210:21573): avc: denied { create } for pid=12209 comm="syz.2.2017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2471.334837][ T29] audit: type=1400 audit(2471.240:21574): avc: denied { read } for pid=12209 comm="syz.2.2017" name="fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2471.342045][ T29] audit: type=1400 audit(2471.240:21575): avc: denied { read open } for pid=12209 comm="syz.2.2017" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2471.390915][ T29] audit: type=1400 audit(2471.280:21576): avc: denied { allowed } for pid=12209 comm="syz.2.2017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2471.399446][ T29] audit: type=1400 audit(2471.300:21577): avc: denied { create } for pid=12209 comm="syz.2.2017" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2471.420921][ T29] audit: type=1400 audit(2471.320:21578): avc: denied { map } for pid=12209 comm="syz.2.2017" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=23018 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2471.426068][ T29] audit: type=1400 audit(2471.330:21579): avc: denied { read write } for pid=12209 comm="syz.2.2017" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=23018 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2471.445787][ T29] audit: type=1400 audit(2471.350:21580): avc: denied { map } for pid=12209 comm="syz.2.2017" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=23018 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2471.448123][ T29] audit: type=1400 audit(2471.350:21581): avc: denied { read write } for pid=12209 comm="syz.2.2017" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=23018 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2471.511037][ T29] audit: type=1400 audit(2471.410:21582): avc: denied { create } for pid=12209 comm="syz.2.2017" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2471.570446][T12210] batadv_slave_1: entered promiscuous mode [ 2471.588323][T12209] batadv_slave_1: left promiscuous mode [ 2471.952636][T12212] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2471.958550][T12212] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2487.380998][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 2487.381907][ T29] audit: type=1400 audit(2487.280:21607): avc: denied { create } for pid=12221 comm="syz.2.2021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2489.441210][ T29] audit: type=1400 audit(2489.340:21608): avc: denied { create } for pid=12221 comm="syz.2.2021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2489.454602][ T29] audit: type=1400 audit(2489.350:21609): avc: denied { setopt } for pid=12221 comm="syz.2.2021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2489.470572][ T29] audit: type=1400 audit(2489.370:21610): avc: denied { create } for pid=12221 comm="syz.2.2021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2489.565405][ T29] audit: type=1400 audit(2489.470:21611): avc: denied { create } for pid=12221 comm="syz.2.2021" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2489.604918][ T29] audit: type=1400 audit(2489.500:21612): avc: denied { read } for pid=12221 comm="syz.2.2021" name="timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2489.616798][ T29] audit: type=1400 audit(2489.510:21613): avc: denied { read open } for pid=12221 comm="syz.2.2021" path="/dev/snd/timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2493.552172][ T29] audit: type=1400 audit(2493.440:21614): avc: denied { write } for pid=12226 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2493.552687][ T29] audit: type=1400 audit(2493.450:21615): avc: denied { write open } for pid=12226 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2493.593233][ T29] audit: type=1400 audit(2493.490:21616): avc: denied { search } for pid=12226 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2493.595198][ T29] audit: type=1400 audit(2493.490:21617): avc: denied { search } for pid=12226 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2493.597648][ T29] audit: type=1400 audit(2493.500:21618): avc: denied { search } for pid=12226 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2493.599796][ T29] audit: type=1400 audit(2493.500:21619): avc: denied { search } for pid=12226 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2493.729297][ T29] audit: type=1400 audit(2493.630:21620): avc: denied { search } for pid=12227 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2493.733288][ T29] audit: type=1400 audit(2493.640:21621): avc: denied { search } for pid=12227 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2493.736100][ T29] audit: type=1400 audit(2493.640:21622): avc: denied { search } for pid=12227 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2493.762083][ T29] audit: type=1400 audit(2493.640:21623): avc: denied { read open } for pid=12227 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2500.055716][ T29] kauditd_printk_skb: 178 callbacks suppressed [ 2500.056231][ T29] audit: type=1400 audit(2499.960:21802): avc: denied { execute } for pid=12231 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2500.097042][ T29] audit: type=1400 audit(2500.000:21803): avc: denied { execute_no_trans } for pid=12231 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2500.113870][ T29] audit: type=1400 audit(2500.020:21804): avc: denied { execute } for pid=12231 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2500.150745][ T29] audit: type=1400 audit(2500.050:21805): avc: denied { execmem } for pid=12231 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2500.207618][ T29] audit: type=1400 audit(2500.110:21806): avc: denied { read } for pid=12232 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2500.242296][ T29] audit: type=1400 audit(2500.140:21807): avc: denied { read open } for pid=12232 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2500.255821][ T29] audit: type=1400 audit(2500.160:21808): avc: denied { mounton } for pid=12232 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2500.336988][ T29] audit: type=1400 audit(2500.240:21809): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="netdev-nr3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2500.574828][ T29] audit: type=1400 audit(2500.480:21810): avc: denied { sys_module } for pid=12232 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2500.586609][ T29] audit: type=1400 audit(2500.490:21811): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="nr3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2505.129689][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 2505.130054][ T29] audit: type=1400 audit(2505.030:21830): avc: denied { sys_module } for pid=12232 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2505.139218][ T29] audit: type=1400 audit(2505.030:21831): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2505.566002][ T29] audit: type=1400 audit(2505.470:21832): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2505.848819][ T29] audit: type=1400 audit(2505.750:21833): avc: denied { sys_module } for pid=12232 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2505.859302][ T29] audit: type=1400 audit(2505.760:21834): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2506.327148][T12232] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2506.348134][T12232] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2506.534792][ T29] audit: type=1400 audit(2506.440:21835): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2506.912205][ T29] audit: type=1400 audit(2506.800:21836): avc: denied { sys_module } for pid=12232 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2506.912778][ T29] audit: type=1400 audit(2506.810:21837): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2507.222404][ T29] audit: type=1400 audit(2507.120:21838): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2507.510364][ T29] audit: type=1400 audit(2507.410:21839): avc: denied { sys_module } for pid=12232 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2509.496490][T12232] hsr_slave_0: entered promiscuous mode [ 2509.504203][T12232] hsr_slave_1: entered promiscuous mode [ 2509.518807][T12232] debugfs: 'hsr0' already exists in 'hsr' [ 2509.519329][T12232] Cannot create hsr debugfs directory [ 2510.328766][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 2510.330095][ T29] audit: type=1400 audit(2510.230:21848): avc: denied { read write } for pid=12479 comm="syz.2.2023" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2510.338306][ T29] audit: type=1400 audit(2510.240:21849): avc: denied { read write open } for pid=12479 comm="syz.2.2023" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2510.357704][ T29] audit: type=1400 audit(2510.260:21850): avc: denied { ioctl } for pid=12479 comm="syz.2.2023" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2510.363303][ T29] audit: type=1400 audit(2510.270:21851): avc: denied { ioctl } for pid=12479 comm="syz.2.2023" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2510.369972][T12519] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2510.373346][T12519] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2510.390220][ T29] audit: type=1400 audit(2510.290:21852): avc: denied { read } for pid=12479 comm="syz.2.2023" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2510.397512][ T29] audit: type=1400 audit(2510.300:21853): avc: denied { read open } for pid=12479 comm="syz.2.2023" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2510.612118][ T29] audit: type=1400 audit(2510.510:21854): avc: denied { create } for pid=12232 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2510.642853][ T29] audit: type=1400 audit(2510.530:21855): avc: denied { write } for pid=12232 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2510.643235][ T29] audit: type=1400 audit(2510.540:21856): avc: denied { read } for pid=12232 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2510.646238][ T29] audit: type=1400 audit(2510.550:21857): avc: denied { read } for pid=12232 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2510.686209][T12232] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 2510.715636][T12232] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 2510.747058][T12232] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 2510.778049][T12232] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 2513.019819][T12232] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2515.728914][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 2515.729472][ T29] audit: type=1400 audit(2515.630:21889): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2516.206457][ T29] audit: type=1400 audit(2516.110:21890): avc: denied { sys_module } for pid=12232 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2516.220612][ T29] audit: type=1400 audit(2516.120:21891): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2516.243005][ T29] audit: type=1400 audit(2516.130:21892): avc: denied { create } for pid=12548 comm="syz.2.2024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2516.397512][ T29] audit: type=1400 audit(2516.300:21893): avc: denied { create } for pid=12548 comm="syz.2.2024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2516.430070][ T29] audit: type=1400 audit(2516.330:21894): avc: denied { write } for pid=12548 comm="syz.2.2024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2516.442690][ T29] audit: type=1400 audit(2516.350:21895): avc: denied { nlmsg_write } for pid=12548 comm="syz.2.2024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2516.492940][ T29] audit: type=1400 audit(2516.390:21896): avc: denied { bpf } for pid=12548 comm="syz.2.2024" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2516.800746][ T29] audit: type=1400 audit(2516.700:21897): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2517.079891][ T29] audit: type=1400 audit(2516.980:21898): avc: denied { sys_module } for pid=12232 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2520.795233][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 2520.805134][ T29] audit: type=1400 audit(2520.700:21915): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2521.126345][ T29] audit: type=1400 audit(2521.030:21916): avc: denied { sys_module } for pid=12232 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2521.126909][ T29] audit: type=1400 audit(2521.030:21917): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2521.652689][ T29] audit: type=1400 audit(2521.550:21918): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2522.024332][ T29] audit: type=1400 audit(2521.930:21919): avc: denied { sys_module } for pid=12232 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2522.029037][ T29] audit: type=1400 audit(2521.930:21920): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2522.340410][ T29] audit: type=1400 audit(2522.240:21921): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2522.658638][ T29] audit: type=1400 audit(2522.530:21922): avc: denied { sys_module } for pid=12232 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2522.659155][ T29] audit: type=1400 audit(2522.530:21923): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2522.976681][ T29] audit: type=1400 audit(2522.880:21924): avc: denied { module_request } for pid=12232 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2523.655651][T12232] veth0_vlan: entered promiscuous mode [ 2523.737414][T12232] veth1_vlan: entered promiscuous mode [ 2524.017374][T12232] veth0_macvtap: entered promiscuous mode [ 2524.054659][T12232] veth1_macvtap: entered promiscuous mode [ 2524.256313][T12025] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2524.256783][T12025] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2524.257028][T12025] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2524.257117][T12025] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2527.418060][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 2527.418478][ T29] audit: type=1400 audit(2527.320:21952): avc: denied { create } for pid=12594 comm="syz.3.2025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2527.449565][ T29] audit: type=1400 audit(2527.340:21953): avc: denied { bind } for pid=12594 comm="syz.3.2025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2527.450083][ T29] audit: type=1400 audit(2527.350:21954): avc: denied { listen } for pid=12594 comm="syz.3.2025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2527.455301][ T29] audit: type=1400 audit(2527.360:21955): avc: denied { create } for pid=12594 comm="syz.3.2025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2527.488909][ T29] audit: type=1400 audit(2527.390:21956): avc: denied { connect } for pid=12594 comm="syz.3.2025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2528.548947][ T29] audit: type=1400 audit(2528.450:21957): avc: denied { allowed } for pid=12594 comm="syz.3.2025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2528.569488][ T29] audit: type=1400 audit(2528.470:21958): avc: denied { create } for pid=12594 comm="syz.3.2025" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2528.589412][ T29] audit: type=1400 audit(2528.490:21959): avc: denied { map } for pid=12594 comm="syz.3.2025" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=24480 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2528.610323][ T29] audit: type=1400 audit(2528.510:21960): avc: denied { read write } for pid=12594 comm="syz.3.2025" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=24480 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2528.666415][ T29] audit: type=1400 audit(2528.550:21961): avc: denied { map } for pid=12594 comm="syz.3.2025" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=24480 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2535.374401][ T8939] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2535.469942][ T8939] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2535.587936][ T8939] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2535.658076][ T8939] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2536.127351][ T8939] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2536.144334][ T8939] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2536.165192][ T8939] bond0 (unregistering): Released all slaves [ 2536.266753][ T8939] hsr_slave_0: left promiscuous mode [ 2536.271053][ T8939] hsr_slave_1: left promiscuous mode [ 2536.294171][ T8939] veth1_macvtap: left promiscuous mode [ 2536.297959][ T8939] veth0_macvtap: left promiscuous mode [ 2537.829149][ T29] kauditd_printk_skb: 204 callbacks suppressed [ 2537.830413][ T29] audit: type=1400 audit(2537.730:22166): avc: denied { write } for pid=12611 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2537.842050][ T29] audit: type=1400 audit(2537.730:22167): avc: denied { write open } for pid=12611 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2538.174808][ T29] audit: type=1400 audit(2538.080:22168): avc: denied { write } for pid=12612 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2538.178636][ T29] audit: type=1400 audit(2538.080:22169): avc: denied { write open } for pid=12612 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2538.198623][ T29] audit: type=1400 audit(2538.100:22170): avc: denied { search } for pid=12612 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2538.201010][ T29] audit: type=1400 audit(2538.100:22171): avc: denied { search } for pid=12612 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2538.212310][ T29] audit: type=1400 audit(2538.110:22172): avc: denied { search } for pid=12612 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2538.214370][ T29] audit: type=1400 audit(2538.110:22173): avc: denied { search } for pid=12612 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2538.294163][ T29] audit: type=1400 audit(2538.200:22174): avc: denied { search } for pid=12613 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2538.296785][ T29] audit: type=1400 audit(2538.200:22175): avc: denied { search } for pid=12613 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2543.189850][ T29] kauditd_printk_skb: 395 callbacks suppressed [ 2543.190436][ T29] audit: type=1400 audit(2543.090:22571): avc: denied { search } for pid=12628 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2543.205660][ T29] audit: type=1400 audit(2543.110:22572): avc: denied { search } for pid=12628 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2543.213209][ T29] audit: type=1400 audit(2543.110:22573): avc: denied { search } for pid=12628 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2543.274374][ T29] audit: type=1400 audit(2543.180:22574): avc: denied { search } for pid=12623 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2543.826291][ T29] audit: type=1400 audit(2543.730:22575): avc: denied { map_create } for pid=12621 comm="syz.3.2027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2543.837093][ T29] audit: type=1400 audit(2543.740:22576): avc: denied { prog_load } for pid=12621 comm="syz.3.2027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2543.837609][ T29] audit: type=1400 audit(2543.740:22577): avc: denied { bpf } for pid=12621 comm="syz.3.2027" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2543.867179][ T29] audit: type=1400 audit(2543.770:22578): avc: denied { perfmon } for pid=12621 comm="syz.3.2027" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2543.912412][ T29] audit: type=1400 audit(2543.800:22579): avc: denied { perfmon } for pid=12621 comm="syz.3.2027" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2543.912834][ T29] audit: type=1400 audit(2543.810:22580): avc: denied { perfmon } for pid=12621 comm="syz.3.2027" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2548.512707][ T29] kauditd_printk_skb: 226 callbacks suppressed [ 2548.513167][ T29] audit: type=1400 audit(2548.420:22807): avc: denied { write } for pid=12639 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2548.515616][ T29] audit: type=1400 audit(2548.420:22808): avc: denied { write open } for pid=12639 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2548.538418][ T29] audit: type=1400 audit(2548.440:22809): avc: denied { search } for pid=12639 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2548.557017][ T29] audit: type=1400 audit(2548.440:22810): avc: denied { search } for pid=12639 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2548.565377][ T29] audit: type=1400 audit(2548.440:22811): avc: denied { search } for pid=12639 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2548.582572][ T29] audit: type=1400 audit(2548.440:22812): avc: denied { search } for pid=12639 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2548.722608][ T29] audit: type=1400 audit(2548.620:22813): avc: denied { search } for pid=12640 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2548.724947][ T29] audit: type=1400 audit(2548.620:22814): avc: denied { search } for pid=12640 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2548.726829][ T29] audit: type=1400 audit(2548.620:22815): avc: denied { search } for pid=12640 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2548.742157][ T29] audit: type=1400 audit(2548.620:22816): avc: denied { read open } for pid=12640 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2555.729215][ T29] kauditd_printk_skb: 222 callbacks suppressed [ 2555.730751][ T29] audit: type=1400 audit(2555.630:23039): avc: denied { execute } for pid=12652 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2555.765584][ T29] audit: type=1400 audit(2555.670:23040): avc: denied { execute_no_trans } for pid=12652 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2555.785488][ T29] audit: type=1400 audit(2555.690:23041): avc: denied { execute } for pid=12652 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 2555.844737][ T29] audit: type=1400 audit(2555.750:23042): avc: denied { execmem } for pid=12652 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2555.889318][ T29] audit: type=1400 audit(2555.790:23043): avc: denied { read } for pid=12653 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2555.893873][ T29] audit: type=1400 audit(2555.800:23044): avc: denied { read open } for pid=12653 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2555.908808][ T29] audit: type=1400 audit(2555.810:23045): avc: denied { mounton } for pid=12653 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 2555.953799][ T29] audit: type=1400 audit(2555.860:23046): avc: denied { module_request } for pid=12653 comm="syz-executor" kmod="netdev-nr4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2556.405667][ T29] audit: type=1400 audit(2556.310:23047): avc: denied { sys_module } for pid=12653 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2556.413690][ T29] audit: type=1400 audit(2556.310:23048): avc: denied { module_request } for pid=12653 comm="syz-executor" kmod="nr4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2560.879824][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 2560.881651][ T29] audit: type=1400 audit(2560.780:23080): avc: denied { module_request } for pid=12653 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2561.435786][ T29] audit: type=1400 audit(2561.340:23081): avc: denied { module_request } for pid=12653 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2561.822134][ T29] audit: type=1400 audit(2561.710:23082): avc: denied { module_request } for pid=12653 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2561.895918][ T29] audit: type=1400 audit(2561.800:23083): avc: denied { write } for pid=12743 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.901830][ T29] audit: type=1400 audit(2561.800:23084): avc: denied { write open } for pid=12743 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2561.926589][ T29] audit: type=1400 audit(2561.830:23085): avc: denied { search } for pid=12743 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2561.929934][ T29] audit: type=1400 audit(2561.830:23086): avc: denied { search } for pid=12743 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2561.934072][ T29] audit: type=1400 audit(2561.840:23087): avc: denied { search } for pid=12743 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2561.942175][ T29] audit: type=1400 audit(2561.840:23088): avc: denied { search } for pid=12743 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2562.047302][ T29] audit: type=1400 audit(2561.950:23089): avc: denied { search } for pid=12745 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2564.365248][T12653] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2564.397709][T12653] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2564.683550][ T8939] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2564.774986][ T8939] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2564.877010][ T8939] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2564.944009][ T8939] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2565.465636][ T8939] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2565.496356][ T8939] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2565.515214][ T8939] bond0 (unregistering): Released all slaves [ 2565.730498][ T8939] hsr_slave_0: left promiscuous mode [ 2565.745222][ T8939] hsr_slave_1: left promiscuous mode [ 2565.777843][ T8939] veth1_macvtap: left promiscuous mode [ 2565.778283][ T8939] veth0_macvtap: left promiscuous mode [ 2565.778764][ T8939] veth1_vlan: left promiscuous mode [ 2565.780037][ T8939] veth0_vlan: left promiscuous mode [ 2565.992145][ T29] kauditd_printk_skb: 278 callbacks suppressed [ 2565.992963][ T29] audit: type=1400 audit(2565.800:23368): avc: denied { search } for pid=12868 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2565.993225][ T29] audit: type=1400 audit(2565.800:23369): avc: denied { search } for pid=12868 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2566.000225][ T29] audit: type=1400 audit(2565.800:23370): avc: denied { search } for pid=12868 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2566.000447][ T29] audit: type=1400 audit(2565.800:23371): avc: denied { read open } for pid=12868 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2566.000651][ T29] audit: type=1400 audit(2565.800:23372): avc: denied { getattr } for pid=12868 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2566.000852][ T29] audit: type=1400 audit(2565.830:23373): avc: denied { search } for pid=12868 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2566.001059][ T29] audit: type=1400 audit(2565.830:23374): avc: denied { search } for pid=12868 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2566.043871][ T29] audit: type=1400 audit(2565.830:23375): avc: denied { search } for pid=12868 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2566.044263][ T29] audit: type=1400 audit(2565.830:23376): avc: denied { search } for pid=12868 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2566.044529][ T29] audit: type=1400 audit(2565.880:23377): avc: denied { search } for pid=12868 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2568.719421][T12653] hsr_slave_0: entered promiscuous mode [ 2568.736174][T12653] hsr_slave_1: entered promiscuous mode [ 2568.738556][T12653] debugfs: 'hsr0' already exists in 'hsr' [ 2568.743066][T12653] Cannot create hsr debugfs directory [ 2569.965477][T12653] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 2569.987399][T12653] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 2570.018272][T12653] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 2570.045539][T12653] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 2571.099762][ T29] kauditd_printk_skb: 402 callbacks suppressed [ 2571.112499][ T29] audit: type=1400 audit(2571.000:23780): avc: denied { sys_module } for pid=12653 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2571.120578][ T29] audit: type=1400 audit(2571.000:23781): avc: denied { module_request } for pid=12653 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2571.158864][ T29] audit: type=1400 audit(2571.060:23782): avc: denied { search } for pid=13010 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2571.159298][ T29] audit: type=1400 audit(2571.060:23783): avc: denied { search } for pid=13010 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2571.159404][ T29] audit: type=1400 audit(2571.060:23784): avc: denied { search } for pid=13010 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2571.192884][ T29] audit: type=1400 audit(2571.100:23785): avc: denied { getattr } for pid=13010 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth7.ipv4ll" dev="tmpfs" ino=69 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2571.208217][ T29] audit: type=1400 audit(2571.110:23786): avc: denied { search } for pid=13010 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2571.208670][ T29] audit: type=1400 audit(2571.110:23787): avc: denied { search } for pid=13010 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2571.208789][ T29] audit: type=1400 audit(2571.110:23788): avc: denied { search } for pid=13010 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2571.218519][ T29] audit: type=1400 audit(2571.120:23789): avc: denied { search } for pid=13010 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2572.655830][T12653] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2576.104841][ T29] kauditd_printk_skb: 313 callbacks suppressed [ 2576.105324][ T29] audit: type=1400 audit(2576.010:24103): avc: denied { read open } for pid=13034 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2576.134428][ T29] audit: type=1400 audit(2576.020:24104): avc: denied { getattr } for pid=13034 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2576.134994][ T29] audit: type=1400 audit(2576.030:24105): avc: denied { search } for pid=13034 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2576.135828][ T29] audit: type=1400 audit(2576.030:24106): avc: denied { search } for pid=13034 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2576.135926][ T29] audit: type=1400 audit(2576.030:24107): avc: denied { search } for pid=13034 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2576.136011][ T29] audit: type=1400 audit(2576.030:24108): avc: denied { search } for pid=13034 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2576.157116][ T29] audit: type=1400 audit(2576.050:24109): avc: denied { search } for pid=13034 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2576.162071][ T29] audit: type=1400 audit(2576.050:24110): avc: denied { search } for pid=13034 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2576.162206][ T29] audit: type=1400 audit(2576.050:24111): avc: denied { search } for pid=13034 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2576.162256][ T29] audit: type=1400 audit(2576.050:24112): avc: denied { read open } for pid=13034 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2581.286252][ T29] kauditd_printk_skb: 419 callbacks suppressed [ 2581.289100][ T29] audit: type=1400 audit(2581.190:24532): avc: denied { sys_module } for pid=12653 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2581.294600][ T29] audit: type=1400 audit(2581.190:24533): avc: denied { module_request } for pid=12653 comm="syz-executor" kmod="netdevsim4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2581.383105][ T29] audit: type=1400 audit(2581.290:24534): avc: denied { search } for pid=13058 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2581.385868][ T29] audit: type=1400 audit(2581.290:24535): avc: denied { search } for pid=13058 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2581.393357][ T29] audit: type=1400 audit(2581.300:24536): avc: denied { search } for pid=13058 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2581.433717][ T29] audit: type=1400 audit(2581.340:24537): avc: denied { search } for pid=13049 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2581.815330][ T29] audit: type=1400 audit(2581.710:24538): avc: denied { module_request } for pid=12653 comm="syz-executor" kmod="netdev-netdevsim4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2582.424860][ T29] audit: type=1400 audit(2582.310:24539): avc: denied { sys_module } for pid=12653 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2582.439867][ T29] audit: type=1400 audit(2582.310:24540): avc: denied { module_request } for pid=12653 comm="syz-executor" kmod="netdevsim4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2582.674538][ T29] audit: type=1400 audit(2582.580:24541): avc: denied { write } for pid=13062 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2586.359068][ T29] kauditd_printk_skb: 262 callbacks suppressed [ 2586.359497][ T29] audit: type=1400 audit(2586.240:24804): avc: denied { sys_module } for pid=12653 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2586.379346][ T29] audit: type=1400 audit(2586.280:24805): avc: denied { module_request } for pid=12653 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2586.976264][T12653] veth0_vlan: entered promiscuous mode [ 2587.117941][T12653] veth1_vlan: entered promiscuous mode [ 2587.394746][ T29] audit: type=1400 audit(2587.300:24806): avc: denied { write } for pid=13078 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2587.398775][ T29] audit: type=1400 audit(2587.300:24807): avc: denied { write open } for pid=13078 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2587.522742][T12653] veth0_macvtap: entered promiscuous mode [ 2587.589177][T12653] veth1_macvtap: entered promiscuous mode [ 2587.829442][T12015] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2587.830157][T12015] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2587.830808][T12015] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2587.831037][T12015] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2587.868480][ T29] audit: type=1400 audit(2587.770:24808): avc: denied { write } for pid=13079 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2587.877637][ T29] audit: type=1400 audit(2587.780:24809): avc: denied { write open } for pid=13079 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2587.910141][ T29] audit: type=1400 audit(2587.810:24810): avc: denied { search } for pid=13079 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2587.922166][ T29] audit: type=1400 audit(2587.830:24811): avc: denied { search } for pid=13079 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2587.930504][ T29] audit: type=1400 audit(2587.830:24812): avc: denied { search } for pid=13079 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2587.940214][ T29] audit: type=1400 audit(2587.840:24813): avc: denied { search } for pid=13079 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2589.192108][T13082] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2589.193024][T13082] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2591.520329][ T29] kauditd_printk_skb: 294 callbacks suppressed [ 2591.520710][ T29] audit: type=1400 audit(2591.420:25108): avc: denied { search } for pid=13094 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2591.520943][ T29] audit: type=1400 audit(2591.420:25109): avc: denied { search } for pid=13094 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2591.521030][ T29] audit: type=1400 audit(2591.420:25110): avc: denied { search } for pid=13094 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2591.554273][ T29] audit: type=1400 audit(2591.460:25111): avc: denied { getattr } for pid=13094 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth12.link" dev="tmpfs" ino=74 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2591.565702][ T29] audit: type=1400 audit(2591.470:25112): avc: denied { search } for pid=13094 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2591.566161][ T29] audit: type=1400 audit(2591.470:25113): avc: denied { search } for pid=13094 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2591.566391][ T29] audit: type=1400 audit(2591.470:25114): avc: denied { search } for pid=13094 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2591.566468][ T29] audit: type=1400 audit(2591.470:25115): avc: denied { search } for pid=13094 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2591.584867][ T29] audit: type=1400 audit(2591.490:25116): avc: denied { remove_name search } for pid=13094 comm="rm" name="resolv.conf.eth12.link" dev="tmpfs" ino=74 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2591.594980][ T29] audit: type=1400 audit(2591.500:25117): avc: denied { unlink } for pid=13094 comm="rm" name="resolv.conf.eth12.link" dev="tmpfs" ino=74 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2597.507555][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 2597.508078][ T29] audit: type=1400 audit(2597.410:25143): avc: denied { write } for pid=13122 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2597.542122][ T29] audit: type=1400 audit(2597.430:25144): avc: denied { write open } for pid=13122 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2599.345277][ T29] audit: type=1400 audit(2599.250:25145): avc: denied { name_bind } for pid=13116 comm="syz.3.2037" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2599.351084][ T29] audit: type=1400 audit(2599.250:25146): avc: denied { node_bind } for pid=13116 comm="syz.3.2037" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2599.376853][ T29] audit: type=1400 audit(2599.280:25147): avc: denied { create } for pid=13116 comm="syz.3.2037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2599.392088][ T29] audit: type=1400 audit(2599.290:25148): avc: denied { create } for pid=13116 comm="syz.3.2037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2599.415520][ T29] audit: type=1400 audit(2599.320:25149): avc: denied { write } for pid=13116 comm="syz.3.2037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2599.419065][ T29] audit: type=1400 audit(2599.320:25150): avc: denied { read } for pid=13116 comm="syz.3.2037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2599.449942][ T29] audit: type=1400 audit(2599.350:25151): avc: denied { read } for pid=13116 comm="syz.3.2037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2599.547149][ T29] audit: type=1400 audit(2599.440:25152): avc: denied { write } for pid=13116 comm="syz.3.2037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2607.380721][ T29] audit: type=1400 audit(2607.280:25153): avc: denied { write } for pid=13131 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2607.421805][ T29] audit: type=1400 audit(2607.320:25154): avc: denied { write open } for pid=13131 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2607.507172][ T29] audit: type=1400 audit(2607.400:25155): avc: denied { search } for pid=13131 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2607.509817][ T29] audit: type=1400 audit(2607.410:25156): avc: denied { search } for pid=13131 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2607.511250][ T29] audit: type=1400 audit(2607.410:25157): avc: denied { search } for pid=13131 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2607.533184][ T29] audit: type=1400 audit(2607.420:25158): avc: denied { search } for pid=13131 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2607.843258][ T29] audit: type=1400 audit(2607.750:25159): avc: denied { search } for pid=13132 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2607.843853][ T29] audit: type=1400 audit(2607.750:25160): avc: denied { search } for pid=13132 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2607.845263][ T29] audit: type=1400 audit(2607.750:25161): avc: denied { search } for pid=13132 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2607.849708][ T29] audit: type=1400 audit(2607.750:25162): avc: denied { read open } for pid=13132 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2612.506007][ T29] kauditd_printk_skb: 260 callbacks suppressed [ 2612.506419][ T29] audit: type=1400 audit(2612.400:25423): avc: denied { search } for pid=13140 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2612.523065][ T29] audit: type=1400 audit(2612.400:25424): avc: denied { search } for pid=13140 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2612.523510][ T29] audit: type=1400 audit(2612.400:25425): avc: denied { search } for pid=13140 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2612.594529][ T29] audit: type=1400 audit(2612.470:25426): avc: denied { read open } for pid=13140 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2612.595049][ T29] audit: type=1400 audit(2612.470:25427): avc: denied { getattr } for pid=13140 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2612.595281][ T29] audit: type=1400 audit(2612.470:25428): avc: denied { search } for pid=13140 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2612.595502][ T29] audit: type=1400 audit(2612.470:25429): avc: denied { search } for pid=13140 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2612.595701][ T29] audit: type=1400 audit(2612.470:25430): avc: denied { search } for pid=13140 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2612.595898][ T29] audit: type=1400 audit(2612.470:25431): avc: denied { search } for pid=13140 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2612.596139][ T29] audit: type=1400 audit(2612.500:25432): avc: denied { search } for pid=13140 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2617.539602][ T29] kauditd_printk_skb: 283 callbacks suppressed [ 2617.540100][ T29] audit: type=1400 audit(2617.430:25716): avc: denied { write } for pid=13152 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2617.540226][ T29] audit: type=1400 audit(2617.440:25717): avc: denied { write open } for pid=13152 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2617.811879][ T29] audit: type=1400 audit(2617.710:25718): avc: denied { search } for pid=13152 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2617.812559][ T29] audit: type=1400 audit(2617.710:25719): avc: denied { search } for pid=13152 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2617.813238][ T29] audit: type=1400 audit(2617.710:25720): avc: denied { search } for pid=13152 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2617.813471][ T29] audit: type=1400 audit(2617.710:25721): avc: denied { search } for pid=13152 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2618.199667][ T29] audit: type=1400 audit(2618.100:25722): avc: denied { search } for pid=13158 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2618.232944][ T29] audit: type=1400 audit(2618.100:25723): avc: denied { search } for pid=13158 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2618.233618][ T29] audit: type=1400 audit(2618.100:25724): avc: denied { search } for pid=13158 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2618.233885][ T29] audit: type=1400 audit(2618.120:25725): avc: denied { read open } for pid=13158 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2622.544368][ T29] kauditd_printk_skb: 233 callbacks suppressed [ 2622.544719][ T29] audit: type=1400 audit(2622.450:25959): avc: denied { read } for pid=13161 comm="cmp" name="resolv.conf.eth12.ipv4ll" dev="tmpfs" ino=77 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2622.564648][ T29] audit: type=1400 audit(2622.450:25960): avc: denied { read open } for pid=13161 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth12.ipv4ll" dev="tmpfs" ino=77 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2622.564859][ T29] audit: type=1400 audit(2622.450:25961): avc: denied { getattr } for pid=13161 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2622.564924][ T29] audit: type=1400 audit(2622.450:25962): avc: denied { getattr } for pid=13161 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth12.ipv4ll" dev="tmpfs" ino=77 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2623.506688][ T29] audit: type=1400 audit(2623.410:25963): avc: denied { search } for pid=13162 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2623.515267][ T29] audit: type=1400 audit(2623.410:25964): avc: denied { search } for pid=13162 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2623.525980][ T29] audit: type=1400 audit(2623.410:25965): avc: denied { search } for pid=13162 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2623.526461][ T29] audit: type=1400 audit(2623.410:25966): avc: denied { getattr } for pid=13162 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth12.ipv4ll" dev="tmpfs" ino=77 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2623.530119][ T29] audit: type=1400 audit(2623.430:25967): avc: denied { search } for pid=13162 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2623.531008][ T29] audit: type=1400 audit(2623.430:25968): avc: denied { search } for pid=13162 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2627.897430][ T29] kauditd_printk_skb: 258 callbacks suppressed [ 2627.897924][ T29] audit: type=1400 audit(2627.800:26227): avc: denied { search } for pid=13170 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2627.904867][ T29] audit: type=1400 audit(2627.810:26228): avc: denied { search } for pid=13170 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2627.915432][ T29] audit: type=1400 audit(2627.820:26229): avc: denied { search } for pid=13170 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2627.922081][ T29] audit: type=1400 audit(2627.820:26230): avc: denied { getattr } for pid=13170 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth11.ipv4ll" dev="tmpfs" ino=78 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2627.982685][ T29] audit: type=1400 audit(2627.860:26231): avc: denied { search } for pid=13170 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2627.983223][ T29] audit: type=1400 audit(2627.870:26232): avc: denied { search } for pid=13170 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2627.983562][ T29] audit: type=1400 audit(2627.870:26233): avc: denied { search } for pid=13170 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2627.983665][ T29] audit: type=1400 audit(2627.880:26234): avc: denied { search } for pid=13170 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2627.983736][ T29] audit: type=1400 audit(2627.880:26235): avc: denied { remove_name search } for pid=13170 comm="rm" name="resolv.conf.eth11.ipv4ll" dev="tmpfs" ino=78 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2627.983791][ T29] audit: type=1400 audit(2627.880:26236): avc: denied { unlink } for pid=13170 comm="rm" name="resolv.conf.eth11.ipv4ll" dev="tmpfs" ino=78 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2633.437959][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 2633.438408][ T29] audit: type=1400 audit(2633.340:26243): avc: denied { read write } for pid=13173 comm="syz.4.2043" name="timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2633.445278][ T29] audit: type=1400 audit(2633.350:26244): avc: denied { read open } for pid=13173 comm="syz.4.2043" path="/dev/snd/timer" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2633.460426][ T29] audit: type=1400 audit(2633.360:26245): avc: denied { ioctl } for pid=13173 comm="syz.4.2043" path="/dev/snd/timer" dev="devtmpfs" ino=718 ioctlcmd=0x5410 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2633.507446][ T29] audit: type=1400 audit(2633.410:26246): avc: denied { ioctl } for pid=13173 comm="syz.4.2043" path="/dev/snd/controlC0" dev="devtmpfs" ino=728 ioctlcmd=0x5531 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2635.680802][ T29] audit: type=1400 audit(2635.580:26247): avc: denied { read append } for pid=13176 comm="syz.4.2044" name="comedi3" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2635.688184][ T29] audit: type=1400 audit(2635.590:26248): avc: denied { read open } for pid=13176 comm="syz.4.2044" path="/dev/comedi3" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2635.715604][ T29] audit: type=1400 audit(2635.620:26249): avc: denied { ioctl } for pid=13176 comm="syz.4.2044" path="/dev/comedi3" dev="devtmpfs" ino=713 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2635.725981][T13177] 8<--- cut here --- [ 2635.726116][T13177] Unable to handle kernel paging request at virtual address fee08004 when write [ 2635.726256][T13177] [fee08004] *pgd=80000080007003, *pmd=00000000 [ 2635.735036][T13177] Internal error: Oops: a06 [#1] SMP ARM [ 2635.741859][T13177] Modules linked in: [ 2635.744570][T13177] CPU: 0 UID: 0 PID: 13177 Comm: syz.4.2044 Not tainted syzkaller #0 PREEMPT [ 2635.745118][T13177] Hardware name: ARM-Versatile Express [ 2635.745460][T13177] PC is at subdev_8255_io+0x60/0x6c [ 2635.745832][T13177] LR is at subdev_8255_io+0x4c/0x6c [ 2635.746180][T13177] pc : [<813db398>] lr : [<813db384>] psr: 60000013 [ 2635.746556][T13177] sp : df94dcb8 ip : df94dcb8 fp : df94dcd4 [ 2635.746904][T13177] r10: 00000000 r9 : 00000000 r8 : 00000084 [ 2635.747230][T13177] r7 : 00008001 r6 : 0000009b r5 : 84151600 r4 : 00008004 [ 2635.747618][T13177] r3 : 0000009b r2 : fee08004 r1 : 00000001 r0 : 84151600 [ 2635.748127][T13177] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 2635.748595][T13177] Control: 30c5387d Table: 84eb4100 DAC: fffffffd [ 2635.748988][T13177] Register r0 information: slab kmalloc-192 start 84151600 pointer offset 0 size 192 [ 2635.750291][T13177] Register r1 information: non-paged memory [ 2635.751121][T13177] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 2635.757404][T13177] Register r3 information: non-paged memory [ 2635.757778][T13177] Register r4 information: non-paged memory [ 2635.758108][T13177] Register r5 information: slab kmalloc-192 start 84151600 pointer offset 0 size 192 [ 2635.758694][T13177] Register r6 information: non-paged memory [ 2635.759006][T13177] Register r7 information: non-paged memory [ 2635.759314][T13177] Register r8 information: non-paged memory [ 2635.759621][T13177] Register r9 information: NULL pointer [ 2635.759890][T13177] Register r10 information: NULL pointer [ 2635.760201][T13177] Register r11 information: 2-page vmalloc region starting at 0xdf94c000 allocated at kernel_clone+0xac/0x3ec [ 2635.760729][T13177] Register r12 information: 2-page vmalloc region starting at 0xdf94c000 allocated at kernel_clone+0xac/0x3ec [ 2635.761864][T13177] Process syz.4.2044 (pid: 13177, stack limit = 0xdf94c000) [ 2635.762502][T13177] Stack: (0xdf94dcb8 to 0xdf94e000) [ 2635.762820][T13177] dca0: 813db338 84151600 [ 2635.763265][T13177] dcc0: 00008001 00008001 df94dcf4 df94dcd8 813db070 813db344 00008001 8050a54c [ 2635.763718][T13177] dce0: 84fcb800 84fcb800 df94dd14 df94dcf8 813db430 813db024 84fcb800 84151600 [ 2635.764192][T13177] dd00: df94dda4 00008001 df94dd54 df94dd18 813db624 813db3b0 8079d9dc 8416d400 [ 2635.764629][T13177] dd20: 828215f0 00000000 00000000 829d238c 84151600 84151644 df94dd90 84151600 [ 2635.765105][T13177] dd40: 00000000 82b25910 df94dd8c df94dd58 813ca520 813db574 200000c0 00000000 [ 2635.765699][T13177] dd60: df94dd7c 200000c0 84151600 b5403587 200000c0 8321a400 40946400 00000003 [ 2635.766117][T13177] dd80: df94de4c df94dd90 813c606c 813ca424 35353238 00000000 00000000 00000000 [ 2635.766635][T13177] dda0: 00000000 00008001 00000002 00000001 00000007 00000004 00000cc9 00000008 [ 2635.766995][T13177] ddc0: 000000ab 0000000a 00000100 00000000 00000001 00000005 00000007 00000006 [ 2635.768329][T13177] dde0: 00007fff 00000001 0001a449 ffffffff 40000003 00000089 00000002 00000002 [ 2635.768723][T13177] de00: 20001e58 00000115 00000008 0000003c 00000004 00000004 00000007 0000000d [ 2635.769087][T13177] de20: 00000000 c78d07d4 00000000 848ec900 84151600 200000c0 200000c0 8321a400 [ 2635.769469][T13177] de40: df94df14 df94de50 813c7038 813c5f78 00000000 df94de54 df94de54 c78d07d4 [ 2635.769826][T13177] de60: 00000000 00000000 824625b4 0000005f 83e24058 84151630 83db2abc 8321a400 [ 2635.770296][T13177] de80: df94dee4 df94de90 807a779c 8079db94 00000064 00000001 00000000 df94deac [ 2635.770679][T13177] dea0: 85a3f0d0 834e5880 00006400 0000000b df94dea0 00000000 df94dd30 c78d07d4 [ 2635.771029][T13177] dec0: 848ec900 40946400 200000c0 200000c0 848ec900 00000003 df94def4 df94dee8 [ 2635.772847][T13177] dee0: 807a78bc c78d07d4 df94df14 40946400 00000000 848ec901 200000c0 848ec900 [ 2635.773494][T13177] df00: 00000003 8321a400 df94dfa4 df94df18 805789d0 813c6a68 ecac8b10 8321a400 [ 2635.773939][T13177] df20: df94df3c df94df30 81a608b8 81a60788 df94df54 df94df40 8025c484 8028d914 [ 2635.774319][T13177] df40: df94dfb0 40000000 df94df84 df94df58 802229ec 8025c440 00000000 8281cfb4 [ 2635.774712][T13177] df60: df94dfb0 0014ced0 ecac8b10 80222940 00000000 c78d07d4 df94dfac 00000000 [ 2635.775087][T13177] df80: 00000000 00316308 00000036 8020029c 8321a400 00000036 00000000 df94dfa8 [ 2635.775472][T13177] dfa0: 80200060 805788ac 00000000 00000000 00000003 40946400 200000c0 00000000 [ 2635.777826][T13177] dfc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76fc50bc [ 2635.780620][T13177] dfe0: 76fc4ec0 76fc4eb0 0001928c 00132970 60000010 00000003 00000000 00000000 [ 2635.783367][T13177] Call trace: [ 2635.783689][T13177] [<813db338>] (subdev_8255_io) from [<813db070>] (subdev_8255_do_config+0x58/0x60) [ 2635.784471][T13177] r7:00008001 r6:00008001 r5:84151600 r4:813db338 [ 2635.784758][T13177] [<813db018>] (subdev_8255_do_config) from [<813db430>] (subdev_8255_io_init+0x8c/0x9c) [ 2635.785213][T13177] r4:84fcb800 [ 2635.785377][T13177] [<813db3a4>] (subdev_8255_io_init) from [<813db624>] (dev_8255_attach+0xbc/0x114) [ 2635.785798][T13177] r7:00008001 r6:df94dda4 r5:84151600 r4:84fcb800 [ 2635.786074][T13177] [<813db568>] (dev_8255_attach) from [<813ca520>] (comedi_device_attach+0x108/0x250) [ 2635.786538][T13177] r10:82b25910 r9:00000000 r8:84151600 r7:df94dd90 r6:84151644 r5:84151600 [ 2635.786863][T13177] r4:829d238c [ 2635.787042][T13177] [<813ca418>] (comedi_device_attach) from [<813c606c>] (do_devconfig_ioctl+0x100/0x220) [ 2635.787496][T13177] r10:00000003 r9:40946400 r8:8321a400 r7:200000c0 r6:b5403587 r5:84151600 [ 2635.787973][T13177] r4:200000c0 [ 2635.788191][T13177] [<813c5f6c>] (do_devconfig_ioctl) from [<813c7038>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 2635.788619][T13177] r8:8321a400 r7:200000c0 r6:200000c0 r5:84151600 r4:848ec900 [ 2635.788911][T13177] [<813c6a5c>] (comedi_unlocked_ioctl) from [<805789d0>] (sys_ioctl+0x130/0xba0) [ 2635.789338][T13177] r10:8321a400 r9:00000003 r8:848ec900 r7:200000c0 r6:848ec901 r5:00000000 [ 2635.789671][T13177] r4:40946400 [ 2635.789830][T13177] [<805788a0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2635.790206][T13177] Exception stack(0xdf94dfa8 to 0xdf94dff0) [ 2635.790483][T13177] dfa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 2635.790842][T13177] dfc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76fc50bc [ 2635.791390][T13177] dfe0: 76fc4ec0 76fc4eb0 0001928c 00132970 [ 2635.791667][T13177] r10:00000036 r9:8321a400 r8:8020029c r7:00000036 r6:00316308 r5:00000000 [ 2635.796258][T13177] r4:00000000 [ 2635.796795][T13177] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 2635.797617][T13177] ---[ end trace 0000000000000000 ]--- [ 2635.798539][T13177] Kernel panic - not syncing: Fatal exception [ 2635.801298][T13177] Rebooting in 86400 seconds.. VM DIAGNOSIS: 13:01:29 Registers: info registers vcpu 0 CPU#0 R00=828271d0 R01=00000000 R02=00000000 R03=00000000 R04=828271d0 R05=00000000 R06=00000000 R07=00001dd1 R08=df94da9c R09=00000000 R10=8321a400 R11=df94dae4 R12=df94dae8 R13=df94da88 R14=802e42ec R15=802e4dbc PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=829c8ad0 R01=824028d0 R02=a8fb6480 R03=81a610f0 R04=82abd340 R05=823d2e00 R06=0007d13c R07=00000265 R08=ddddb130 R09=ddddb180 R10=a8fb6480 R11=df805e74 R12=df805e78 R13=df805e68 R14=8130a638 R15=81a61100 PSR=60000193 -ZC- A S svc32 s00=6c69665f s01=65702065 d00=657020656c69665f s02=73696d72 s03=65766973 d01=6576697373696d72 s04=6e6f6374 s05=74786574 d02=747865746e6f6374 s06=7379733d s07=5f6d6574 d03=5f6d65747379733d s08=626f3a75 s09=7463656a d04=7463656a626f3a75 s10=643a725f s11=63697665 d05=63697665643a725f s12=20745f65 s13=616c6374 d06=616c637420745f65 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000