last executing test programs: 8.60097375s ago: executing program 2 (id=10104): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000062d14406d0470084761000000010902120001000000000904"], 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000001940)={0x2c, &(0x7f00000017c0)={0x20}, 0x0, 0x0, 0x0, 0x0}) 7.903311053s ago: executing program 2 (id=10112): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x5a20}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r3, 0x114, 0x8, &(0x7f00000008c0), 0x4) close(r3) syz_open_procfs(0x0, 0x0) 6.604147395s ago: executing program 2 (id=10124): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000003000/0x2000)=nil) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={r4, r0}, 0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x2, @remote, 'veth1_to_batadv\x00'}}, 0x1e) r6 = socket$pppoe(0x18, 0x1, 0x0) r7 = syz_open_dev$cec(&(0x7f0000000000), 0x0, 0x0) ioctl$CEC_S_MODE(r7, 0x40046109, &(0x7f0000000140)=0x11) close_range(r7, r7, 0x0) connect$pppoe(r6, &(0x7f00000000c0)={0x18, 0x0, {0x2, @empty, 'veth1_to_bridge\x00'}}, 0x1e) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='contention_end\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 5.568176702s ago: executing program 2 (id=10131): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) syz_emit_vhci(0x0, 0x24) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, 0x0) 4.376066932s ago: executing program 1 (id=10133): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000380)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendto$inet6(r3, &(0x7f0000000080)="b3019c28", 0x4, 0x0, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2}, 0x1c) recvmmsg(r3, &(0x7f0000000d80)=[{{0x0, 0x0, 0x0}}, {{&(0x7f00000000c0)=@nl, 0x0, &(0x7f0000000240)=[{&(0x7f0000000180)=""/186}, {0xffffffffffffffff}], 0x0, &(0x7f0000000280)=""/239, 0x13}}, {{&(0x7f0000000e80)=@vsock={0x28, 0x0, 0x0, @host}, 0x0, &(0x7f0000000680)=[{&(0x7f0000000400)=""/18}, {&(0x7f0000000440)=""/110}, {&(0x7f00000004c0)=""/165}, {&(0x7f0000001540)=""/4096}, {&(0x7f0000000580)=""/245}], 0x0, &(0x7f0000000700)=""/27}}, {{&(0x7f0000000740)=@nfc, 0x0, &(0x7f0000000c00), 0x0, &(0x7f0000000cc0)=""/180}}], 0x4000000000001f1, 0x10162, 0x0) 4.067848247s ago: executing program 0 (id=10139): sendmsg$rds(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000800}, 0x4000008) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000080)={0x5, 0x1000086}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x4) sched_setaffinity(0x0, 0x43, &(0x7f0000000040)=0x2) r0 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r0, &(0x7f0000019680)=""/102392, 0x18ff8) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x200000000000) r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) 4.05265225s ago: executing program 0 (id=10140): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x4) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000080)={0x1, 0x7f}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)=r1) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1, r1}) r2 = userfaultfd(0x80001) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000380)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x1, 0x0, &(0x7f0000000600)=""/52, 0x0, 0xffff1000}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, &(0x7f0000000380)=""/236, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/66}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000680)={0x1, 0x0, [{0x0, 0xfffffeac, &(0x7f00000001c0)=""/115}]}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)=0x1) syz_clone(0x80001000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) 3.838971979s ago: executing program 0 (id=10141): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000003000/0x2000)=nil) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={r4, r0}, 0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) connect$pppoe(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x0, {0x2, @remote, 'veth1_to_batadv\x00'}}, 0x1e) r6 = socket$pppoe(0x18, 0x1, 0x0) r7 = syz_open_dev$cec(&(0x7f0000000000), 0x0, 0x0) ioctl$CEC_S_MODE(r7, 0x40046109, &(0x7f0000000140)=0x11) close_range(r7, r7, 0x0) connect$pppoe(r6, &(0x7f00000000c0)={0x18, 0x0, {0x2, @empty, 'veth1_to_bridge\x00'}}, 0x1e) r8 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='contention_end\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r8}}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 3.373707488s ago: executing program 1 (id=10144): mkdir(&(0x7f00000020c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="1500000065ffff097b000008003950323030302e4c"], 0x15) r2 = dup(r1) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB], 0x0, 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18}, 0x18) write$FUSE_DIRENTPLUS(r2, &(0x7f0000000440)=ANY=[@ANYBLOB="b0000000000000ab284dc9a94095f54e34f11a5a480d2115805745f8a24d"], 0xb0) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000380)={0x30, 0x5, 0x0, {0x0, 0x0, 0xffffffffffffffff}}, 0x30) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) chdir(&(0x7f0000000100)='./file0\x00') utimensat(0xffffffffffffff9c, &(0x7f0000000340)='.\x00', 0x0, 0x0) 3.299839376s ago: executing program 2 (id=10146): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000480)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) setsockopt$sock_int(r2, 0x1, 0x29, 0x0, 0x0) r3 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$IP_VS_SO_GET_DESTS(r3, 0x0, 0xe, 0x0, &(0x7f0000000780)) 3.299653306s ago: executing program 4 (id=10147): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, 0x0, 0xc) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000240)={0x34, 0x2d, 0x1, 0x700, 0x0, "", [@nested={0x4, 0x800}, @nested={0x20, 0x11, 0x0, 0x1, [@generic="2fe5afbf24fbcccc554cd9761e79b8dad8a2018544a3f855448c7798"]}]}, 0x34}], 0x1}, 0x0) 3.241071014s ago: executing program 1 (id=10148): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000003000/0x2000)=nil) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={r4, r0}, 0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) r6 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x2, @remote, 'veth1_to_batadv\x00'}}, 0x1e) r7 = socket$pppoe(0x18, 0x1, 0x0) r8 = syz_open_dev$cec(&(0x7f0000000000), 0x0, 0x0) ioctl$CEC_S_MODE(r8, 0x40046109, &(0x7f0000000140)=0x11) close_range(r8, r8, 0x0) connect$pppoe(r7, &(0x7f00000000c0)={0x18, 0x0, {0x2, @empty, 'veth1_to_bridge\x00'}}, 0x1e) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='contention_end\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r9}}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 3.219172466s ago: executing program 4 (id=10149): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x1, r3, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4}, &(0x7f0000000840), &(0x7f0000000880)=r3}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r4, 0x0}, 0x20) 2.648898388s ago: executing program 0 (id=10150): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) r2 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r2, 0x28, 0x6, &(0x7f0000000000), 0x10) fsmount(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000180)={0x26, 'rng\x00', 0x0, 0x0, 'stdrng\x00'}, 0x58) syz_io_uring_setup(0x10d, &(0x7f0000000140)={0x0, 0xbcb5, 0x0, 0x5, 0x1000}, &(0x7f0000000040), &(0x7f0000000300)) eventfd2(0x58, 0x80000) r4 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0_virt_wifi\x00', 0x2000000}, 0x18) 2.125311449s ago: executing program 3 (id=10152): syz_io_uring_setup(0x9e, &(0x7f0000000640)={0x0, 0xec25, 0x0, 0x0, 0x40000333}, 0x0, &(0x7f00000001c0)=0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0xffffffffffffffb3}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x1) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x400000bce) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000002000)=""/102400, 0x19000) socket$nl_generic(0x10, 0x3, 0x10) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) r2 = socket$l2tp(0x2, 0x2, 0x73) bind$inet(r2, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000200)={0x2, 0x4e22, @local}, 0x10) syz_io_uring_submit(0x0, r0, 0x0) 1.994649808s ago: executing program 3 (id=10153): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8e}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) r1 = creat(&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = fanotify_init(0xf00, 0x0) fanotify_mark(r2, 0x105, 0x40009975, r1, 0x0) fallocate(r0, 0x0, 0x1000000, 0x3) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x3) sched_setaffinity(0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = syz_open_dev$MSR(&(0x7f0000000200), 0x0, 0x0) read$msr(r3, &(0x7f0000019680)=""/102392, 0x18ff8) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000002bc0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000880}, 0x0) 1.90936385s ago: executing program 4 (id=10154): r0 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x79af, 0x3180, 0x8000, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_TIMEOUT={0xb, 0x1, 0x0, 0x0, 0x7, &(0x7f0000000100)={0x0, 0x989680}, 0x1, 0x4, 0x1}) io_uring_enter(r0, 0x3516, 0x0, 0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) write$UHID_INPUT(r3, &(0x7f0000000940)={0x8, {"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", 0x1000}}, 0x1006) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r3, 0x0) io_uring_setup(0x7625, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) syz_open_dev$MSR(0x0, 0x8000002000000, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) 1.879524611s ago: executing program 3 (id=10155): socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x6) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000600)={0x0, 0x7f390004, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="60000000020605020000200000000000000000001400078008001340040000000800124000060000050001000700000013000300686173683a6e65742c6966616365000005000440000000000900020073797a3100000000050005000a"], 0x60}}, 0x0) 1.8319492s ago: executing program 1 (id=10156): bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000480)={0xffffffffffffffff, 0x0, 0x25, 0x2, @val=@uprobe_multi={0x0, 0x0, 0x0, 0x6, 0x0, 0x1}}, 0x40) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0xc) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)=r1) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/67, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, &(0x7f0000000380)=""/247, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/74}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000e40)={0x1, 0x0, [{0x0, 0xf3, &(0x7f00000008c0)=""/243}]}) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000002c0)={0x1, r1}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)=0xfffffffa) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xf, @void, @value}, 0x94) unshare(0x64000600) 1.787666381s ago: executing program 4 (id=10157): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'geneve1\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-camellia-asm\x00'}, 0x58) setsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0xfffc}, 0x8) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r3 = accept4(r2, 0x0, 0x0, 0x800) sendmmsg$alg(r3, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="f78d9ca38fff48f3be52163448412ba8", 0xfffffe3f}, {&(0x7f0000000140)="ebe3a0e9796cfd1647e299f4e376fdba128280b372219d205e81f4a7f71c1926aae1efd7e0054a863f3d5cfe6cb55b5bb9fa6935849e6098ed884e7cb51726b360fbb37b4fe035bbb095873048"}, {&(0x7f00000003c0)="e8700e444d50a969ff67347cff6127e6ef12ee3819271482a4975a52c1ab9b8b4db3945d1032005eabe97b4dc33a47d3a158da988456d30026b433186f53cdcdb93a4722bf306a10470d50f5cb1ece9ead3459bab1cf1538cd0b157653c5e892962c80f158c443e9c6ad7d2a8103ef2f4b93766b9a21501f94c1568b13756b66f74f46cf801704d2da8b96c34070b233af0afcc436712e58ed25e721193af05a045ad3fdc928f02f3dbad19d3e66eebda2e63f3f46ef4511cee26d7b48241847bf9e343ef4674c45e2a085060f11"}], 0x1, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x40800) recvmsg(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x7ffff000}, {&(0x7f0000000200)=""/83, 0x20000253}], 0x2}, 0x0) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_TRIGGER_SCAN(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010024bd7000e8dbdf252100000008000300", @ANYRES32=r5, @ANYBLOB="08009e00"], 0x24}, 0x1, 0x0, 0x0, 0x4014001}, 0x0) 1.68642158s ago: executing program 2 (id=10158): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) mq_notify(0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) kexec_load(0x0, 0x1, &(0x7f00000002c0)=[{0x0, 0x0, 0x0, 0x10000}], 0x0) 1.685730095s ago: executing program 0 (id=10159): setxattr$incfs_metadata(&(0x7f0000000800)='./cgroup\x00', &(0x7f0000000840), 0x0, 0x0, 0x1) r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r2, 0x4028af11, &(0x7f0000000200)={0x1, 0x1, 0x0, &(0x7f0000000740)=""/51, 0x0}) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000340)) r4 = dup(r3) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f0000000000)={0x1, r4}) pselect6(0x0, 0x0, 0x0, &(0x7f00000000c0)={0x3ff, 0x0, 0xa67, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f00000003c0)={0x1, r1}) 1.479715498s ago: executing program 4 (id=10160): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, 0x0) syz_clone(0x0, 0x0, 0xfffffe11, 0x0, 0x0, 0x0) r2 = syz_open_dev$MSR(&(0x7f0000000140), 0x0, 0x0) read$msr(r2, &(0x7f0000019680)=""/102392, 0x18ff8) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="050000009f6000"/16, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="000000000101"], 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x8800) 1.409974388s ago: executing program 1 (id=10161): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = add_key$user(&(0x7f0000000200), &(0x7f0000000440), &(0x7f00000000c0), 0x14b, 0xfffffffffffffffd) r4 = add_key(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={'syz', 0x0}, &(0x7f00000002c0)='4', 0xba, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000000540), &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000005c0)="cd8a325c7a8f", 0x6, 0xffffffffffffffff) keyctl$dh_compute(0x17, &(0x7f0000000340)={r5, r3, r4}, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={'blake2b-256\x00'}}) 969.095037ms ago: executing program 3 (id=10162): pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xc9, 0x0, "a05c7b5d00008023e9c5bcf5ff770400"}) syz_open_pts(r1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$vsock_stream(0x28, 0x1, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') mount$9p_fd(0x0, &(0x7f0000000380)='.\x00', &(0x7f0000000080), 0x0, &(0x7f0000000640)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r2}}) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_submit(r4, 0x1, &(0x7f0000000300)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r0, &(0x7f00000001c0)='m', 0x1}]) 929.354117ms ago: executing program 4 (id=10163): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000400)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)=@updpolicy={0xb8, 0x19, 0x1, 0xfffffffc, 0x0, {{@in=@dev={0xac, 0x14, 0x14, 0x2c}, @in6=@local, 0x4f22, 0x0, 0x4e24, 0x0, 0xa, 0x0, 0x60}, {0x0, 0xbec1, 0xfffffffffffffffe, 0x40000000, 0x0, 0x1a, 0x1, 0xfffffffffffffffe}, {0x7a, 0x5, 0x0, 0x7fff}, 0x8, 0x0, 0x1, 0x1, 0x3}}, 0xb8}}, 0x0) sendto$inet6(r3, &(0x7f0000000240)="8a", 0x1, 0x51, &(0x7f0000000080)={0xa, 0x3, 0x1, @local, 0x9}, 0x1c) 752.110782ms ago: executing program 3 (id=10164): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='vegas\x00', 0x6) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) open(0x0, 0x14200, 0x0) syz_emit_ethernet(0x56, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) fanotify_mark(r1, 0x80, 0x40009965, 0xffffffffffffffff, 0x0) sched_setscheduler(0x0, 0x1, 0x0) syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000080), 0xffffffffffffffff, 0x0, 0x3, 0x1}}, 0x20) ioctl$VIDIOC_LOG_STATUS(0xffffffffffffffff, 0x5646, 0x0) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x0, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) write$binfmt_script(r0, &(0x7f0000000200), 0xfffffd9d) 291.627777ms ago: executing program 3 (id=10165): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000003000/0x2000)=nil) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={r4, r0}, 0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) r6 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x2, @remote, 'veth1_to_batadv\x00'}}, 0x1e) r7 = socket$pppoe(0x18, 0x1, 0x0) r8 = syz_open_dev$cec(&(0x7f0000000000), 0x0, 0x0) ioctl$CEC_S_MODE(r8, 0x40046109, &(0x7f0000000140)=0x11) close_range(r8, r8, 0x0) connect$pppoe(r7, &(0x7f00000000c0)={0x18, 0x0, {0x2, @empty, 'veth1_to_bridge\x00'}}, 0x1e) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='contention_end\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r9}}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 291.245837ms ago: executing program 0 (id=10166): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0x2, 0xc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) mremap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000003000/0x2000)=nil) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000200)={r4, r0}, 0xc) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) r6 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r6, &(0x7f0000000000)={0x18, 0x0, {0x2, @remote, 'veth1_to_batadv\x00'}}, 0x1e) r7 = socket$pppoe(0x18, 0x1, 0x0) r8 = syz_open_dev$cec(&(0x7f0000000000), 0x0, 0x0) ioctl$CEC_S_MODE(r8, 0x40046109, &(0x7f0000000140)=0x11) close_range(r8, r8, 0x0) connect$pppoe(r7, &(0x7f00000000c0)={0x18, 0x0, {0x2, @empty, 'veth1_to_bridge\x00'}}, 0x1e) r9 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='contention_end\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x6}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r9}}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 0s ago: executing program 1 (id=10167): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xc, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000840)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) request_key(&(0x7f0000000000)='user\x00', 0x0, &(0x7f0000000080)='\x00', 0xfffffffffffffffd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) fsopen(&(0x7f0000000740)='gfs2meta\x00', 0x0) madvise(&(0x7f000011c000/0x4000)=nil, 0x4000, 0x9) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) kernel console output (not intermixed with test programs): mode [ 1834.359334][T30328] veth0_vlan: entered promiscuous mode [ 1834.412630][T30328] lo speed is unknown, defaulting to 1000 [ 1834.420534][T30328] lo speed is unknown, defaulting to 1000 [ 1835.130211][ T30] kauditd_printk_skb: 114 callbacks suppressed [ 1835.130224][ T30] audit: type=1400 audit(1879307317.920:14914): avc: denied { create } for pid=30333 comm="syz.3.7549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1835.206762][ T30] audit: type=1400 audit(1879307317.957:14915): avc: denied { create } for pid=30332 comm="syz.0.7550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1835.302009][ T30] audit: type=1400 audit(1879307317.966:14916): avc: denied { allowed } for pid=30333 comm="syz.3.7549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1835.341310][ T30] audit: type=1400 audit(1879307317.966:14917): avc: denied { execmem } for pid=30333 comm="syz.3.7549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1835.382323][ T30] audit: type=1400 audit(1879307317.966:14918): avc: denied { prog_load } for pid=30333 comm="syz.3.7549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1835.423821][ T30] audit: type=1400 audit(1879307317.966:14919): avc: denied { name_bind } for pid=30333 comm="syz.3.7549" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 1835.450940][ T30] audit: type=1400 audit(1879307317.966:14920): avc: denied { prog_load } for pid=30333 comm="syz.3.7549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1835.565994][ T30] audit: type=1400 audit(1879307318.032:14921): avc: denied { execmem } for pid=30337 comm="syz.3.7552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1835.698079][ T30] audit: type=1400 audit(1879307318.051:14922): avc: denied { create } for pid=30332 comm="syz.0.7550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1835.823137][ T30] audit: type=1400 audit(1879307318.060:14923): avc: denied { map_create } for pid=30332 comm="syz.0.7550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1837.826581][T30382] veth0_vlan: left promiscuous mode [ 1837.843533][T30382] veth0_vlan: entered promiscuous mode [ 1837.903109][T30382] lo speed is unknown, defaulting to 1000 [ 1837.927601][T30382] lo speed is unknown, defaulting to 1000 [ 1840.718484][ T30] kauditd_printk_skb: 137 callbacks suppressed [ 1840.718501][ T30] audit: type=1400 audit(1879307323.083:15061): avc: denied { create } for pid=30425 comm="syz.4.7582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1841.186823][ T30] audit: type=1400 audit(1879307323.092:15062): avc: denied { map_create } for pid=30421 comm="syz.2.7581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1841.316579][ T30] audit: type=1400 audit(1879307323.092:15063): avc: denied { prog_load } for pid=30421 comm="syz.2.7581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1841.370393][ T30] audit: type=1400 audit(1879307323.167:15064): avc: denied { prog_load } for pid=30428 comm="syz.0.7583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1841.396752][ T30] audit: type=1400 audit(1879307323.598:15065): avc: denied { create } for pid=30425 comm="syz.4.7582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1841.428755][ T30] audit: type=1400 audit(1879307323.598:15066): avc: denied { map_create } for pid=30425 comm="syz.4.7582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1841.490812][ T30] audit: type=1400 audit(1879307323.598:15067): avc: denied { create } for pid=30425 comm="syz.4.7582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1841.781555][ T30] audit: type=1400 audit(1879307323.598:15068): avc: denied { create } for pid=30428 comm="syz.0.7583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1841.838966][ T30] audit: type=1400 audit(1879307323.598:15069): avc: denied { prog_load } for pid=30428 comm="syz.0.7583" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1841.897656][ T30] audit: type=1400 audit(1879307323.598:15070): avc: denied { module_request } for pid=30428 comm="syz.0.7583" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1845.551050][T30513] ptrace attach of "./syz-executor exec"[5821] was attempted by "./syz-executor exec"[30513] [ 1846.241483][T30519] lo speed is unknown, defaulting to 1000 [ 1846.285249][T30519] lo speed is unknown, defaulting to 1000 [ 1846.440853][ T30] kauditd_printk_skb: 117 callbacks suppressed [ 1846.440864][ T30] audit: type=1400 audit(1879307328.499:15188): avc: denied { execmem } for pid=30520 comm="syz.3.7611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1846.692341][ T30] audit: type=1400 audit(1879307328.602:15189): avc: denied { create } for pid=30520 comm="syz.3.7611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=0 [ 1847.133503][ T30] audit: type=1400 audit(1879307329.154:15190): avc: denied { create } for pid=30526 comm="syz.0.7612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 1847.153594][ T30] audit: type=1400 audit(1879307329.163:15191): avc: denied { prog_load } for pid=30523 comm="syz.1.7613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1847.210614][ T30] audit: type=1400 audit(1879307329.163:15192): avc: denied { execmem } for pid=30523 comm="syz.1.7613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1847.288586][ T30] audit: type=1400 audit(1879307329.182:15193): avc: denied { create } for pid=30526 comm="syz.0.7612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 1847.367305][ T30] audit: type=1400 audit(1879307329.201:15194): avc: denied { execmem } for pid=30526 comm="syz.0.7612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1847.417722][ T30] audit: type=1400 audit(1879307329.201:15195): avc: denied { create } for pid=30526 comm="syz.0.7612" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1847.438843][ T30] audit: type=1400 audit(1879307329.201:15196): avc: denied { read } for pid=30526 comm="syz.0.7612" dev="nsfs" ino=4026532880 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1847.504952][ T30] audit: type=1400 audit(1879307329.219:15197): avc: denied { create } for pid=30523 comm="syz.1.7613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1848.198751][T30547] lo speed is unknown, defaulting to 1000 [ 1848.215554][T30547] lo speed is unknown, defaulting to 1000 [ 1851.103410][T30614] Cannot find map_set index 0 as target [ 1851.809105][ T30] kauditd_printk_skb: 118 callbacks suppressed [ 1851.809119][ T30] audit: type=1400 audit(1879307333.522:15316): avc: denied { create } for pid=30618 comm="syz.4.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1851.857864][ T30] audit: type=1400 audit(1879307333.560:15317): avc: denied { create } for pid=30618 comm="syz.4.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1851.892311][ T30] audit: type=1400 audit(1879307333.560:15318): avc: denied { create } for pid=30618 comm="syz.4.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 1851.912554][ T30] audit: type=1400 audit(1879307333.560:15319): avc: denied { create } for pid=30618 comm="syz.4.7644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1851.982659][ T30] audit: type=1400 audit(1879307333.691:15320): avc: denied { prog_load } for pid=30622 comm="syz.3.7645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1852.007886][ T30] audit: type=1400 audit(1879307333.691:15321): avc: denied { execmem } for pid=30621 comm="syz.1.7655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1852.028832][ T30] audit: type=1400 audit(1879307333.709:15322): avc: denied { create } for pid=30622 comm="syz.3.7645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1852.050397][ T30] audit: type=1400 audit(1879307333.709:15323): avc: denied { execmem } for pid=30622 comm="syz.3.7645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1852.112541][ T30] audit: type=1400 audit(1879307333.709:15324): avc: denied { name_bind } for pid=30622 comm="syz.3.7645" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 1852.157925][ T30] audit: type=1400 audit(1879307333.709:15325): avc: denied { name_bind } for pid=30622 comm="syz.3.7645" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 1855.224803][T15186] libceph: connect (1)[c::]:6789 error -101 [ 1855.231091][T15186] libceph: mon0 (1)[c::]:6789 connect error [ 1855.242921][T30676] ceph: No mds server is up or the cluster is laggy [ 1855.249720][T15186] libceph: connect (1)[c::]:6789 error -101 [ 1855.279846][T15186] libceph: mon0 (1)[c::]:6789 connect error [ 1857.214013][ T30] kauditd_printk_skb: 150 callbacks suppressed [ 1857.214027][ T30] audit: type=1400 audit(1879307338.583:15476): avc: denied { prog_load } for pid=30723 comm="syz.2.7679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1857.332231][ T30] audit: type=1400 audit(1879307338.620:15477): avc: denied { create } for pid=30723 comm="syz.2.7679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 1857.460068][ T30] audit: type=1400 audit(1879307338.620:15478): avc: denied { prog_load } for pid=30723 comm="syz.2.7679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1857.547513][ T30] audit: type=1326 audit(1879307338.639:15479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30706 comm="syz.4.7673" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8084f8e169 code=0x7fc00000 [ 1857.600194][ T30] audit: type=1400 audit(1879307338.714:15480): avc: denied { allowed } for pid=30727 comm="syz.4.7680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1857.825486][ T30] audit: type=1400 audit(1879307338.714:15481): avc: denied { write } for pid=30727 comm="syz.4.7680" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 1857.924287][ T30] audit: type=1400 audit(1879307338.723:15482): avc: denied { write } for pid=30727 comm="syz.4.7680" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 1857.940076][T30722] syz.0.7678 (30722): drop_caches: 2 [ 1858.012159][ T30] audit: type=1400 audit(1879307338.723:15483): avc: denied { create } for pid=30727 comm="syz.4.7680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1858.244065][T30748] serio: Serial port ptm0 [ 1858.248695][ T30] audit: type=1400 audit(1879307338.723:15484): avc: denied { create } for pid=30727 comm="syz.4.7680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1858.269738][ T30] audit: type=1400 audit(1879307338.723:15485): avc: denied { create } for pid=30727 comm="syz.4.7680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1859.227328][T30769] PKCS8: Unsupported PKCS#8 version [ 1861.435792][T30811] lo speed is unknown, defaulting to 1000 [ 1861.508040][T30811] lo speed is unknown, defaulting to 1000 [ 1862.590234][ T30] kauditd_printk_skb: 154 callbacks suppressed [ 1862.590250][ T30] audit: type=1400 audit(1879307343.615:15640): avc: denied { execmem } for pid=30836 comm="syz.2.7716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1862.632222][ T30] audit: type=1400 audit(1879307343.643:15641): avc: denied { create } for pid=30836 comm="syz.2.7716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 1862.814327][ T30] audit: type=1400 audit(1879307343.821:15642): avc: denied { prog_load } for pid=30839 comm="syz.2.7718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1862.899971][ T30] audit: type=1400 audit(1879307343.849:15643): avc: denied { execmem } for pid=30839 comm="syz.2.7718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1862.944637][ T30] audit: type=1400 audit(1879307343.849:15644): avc: denied { watch } for pid=30839 comm="syz.2.7718" path="/1548/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=8329 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 1863.127878][ T30] audit: type=1400 audit(1879307344.111:15645): avc: denied { create } for pid=30841 comm="syz.0.7719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1863.179201][ T30] audit: type=1400 audit(1879307344.167:15646): avc: denied { create } for pid=30843 comm="syz.1.7720" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1863.214157][ T30] audit: type=1400 audit(1879307344.195:15647): avc: denied { create } for pid=30841 comm="syz.0.7719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 1863.243828][ T30] audit: type=1400 audit(1879307344.214:15648): avc: denied { read write } for pid=30841 comm="syz.0.7719" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 1863.392747][ T30] audit: type=1400 audit(1879307344.214:15649): avc: denied { prog_load } for pid=30841 comm="syz.0.7719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1865.877189][T30902] trusted_key: encrypted_key: master key parameter '"Master"' is invalid [ 1865.991339][T30902] lo speed is unknown, defaulting to 1000 [ 1866.139947][T30902] lo speed is unknown, defaulting to 1000 [ 1867.041210][T30927] serio: Serial port ttyS3 [ 1868.076203][ T30] kauditd_printk_skb: 142 callbacks suppressed [ 1868.076220][ T30] audit: type=1400 audit(1879307348.741:15792): avc: denied { read } for pid=30937 comm="syz.0.7752" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1868.159451][ T30] audit: type=1400 audit(1879307348.788:15793): avc: denied { create } for pid=30937 comm="syz.0.7752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1868.218003][T30940] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1868.499858][ T30] audit: type=1400 audit(1879307348.788:15794): avc: denied { prog_load } for pid=30937 comm="syz.0.7752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1868.542793][ T30] audit: type=1400 audit(1879307348.788:15795): avc: denied { execmem } for pid=30937 comm="syz.0.7752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1868.568793][ T30] audit: type=1400 audit(1879307348.816:15796): avc: denied { create } for pid=30939 comm="syz.2.7753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 1868.590912][ T30] audit: type=1400 audit(1879307348.872:15797): avc: denied { prog_load } for pid=30939 comm="syz.2.7753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1868.611705][ T30] audit: type=1400 audit(1879307348.872:15798): avc: denied { create } for pid=30939 comm="syz.2.7753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1868.636030][ T30] audit: type=1400 audit(1879307348.872:15799): avc: denied { create } for pid=30939 comm="syz.2.7753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1868.691832][ T30] audit: type=1400 audit(1879307348.881:15800): avc: denied { read } for pid=30937 comm="syz.0.7752" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 1868.717707][ T30] audit: type=1400 audit(1879307348.891:15801): avc: denied { map_create } for pid=30942 comm="syz.4.7755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1869.792107][T30976] lo speed is unknown, defaulting to 1000 [ 1869.798510][T30976] lo speed is unknown, defaulting to 1000 [ 1870.178321][T30983] sp0: Synchronizing with TNC [ 1870.191090][T30982] [U] è [ 1872.508187][T31026] bridge_slave_0: entered promiscuous mode [ 1872.532506][T31026] bridge_slave_0: entered allmulticast mode [ 1873.433902][ T30] kauditd_printk_skb: 140 callbacks suppressed [ 1873.433917][ T30] audit: type=1400 audit(1879307353.753:15942): avc: denied { create } for pid=31035 comm="syz.4.7786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1873.528125][ T30] audit: type=1400 audit(1879307353.753:15943): avc: denied { prog_load } for pid=31035 comm="syz.4.7786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1873.597818][ T30] audit: type=1400 audit(1879307353.753:15944): avc: denied { module_request } for pid=31035 comm="syz.4.7786" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1873.697573][ T30] audit: type=1400 audit(1879307353.753:15945): avc: denied { sys_module } for pid=31035 comm="syz.4.7786" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1873.751588][ T30] audit: type=1400 audit(1879307353.753:15946): avc: denied { prog_load } for pid=31035 comm="syz.4.7786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1873.807074][ T30] audit: type=1400 audit(1879307353.819:15947): avc: denied { create } for pid=31030 comm="syz.2.7784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1873.838696][ T30] audit: type=1400 audit(1879307353.819:15948): avc: denied { create } for pid=31030 comm="syz.2.7784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 [ 1873.865647][ T30] audit: type=1400 audit(1879307353.931:15949): avc: denied { name_bind } for pid=31030 comm="syz.2.7784" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 1873.927660][ T30] audit: type=1400 audit(1879307353.931:15950): avc: denied { create } for pid=31030 comm="syz.2.7784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1873.952200][ T30] audit: type=1400 audit(1879307353.987:15951): avc: denied { create } for pid=31037 comm="syz.1.7787" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 1876.258389][T31091] Cannot find add_set index 0 as target [ 1878.208607][T31132] veth0_vlan: left promiscuous mode [ 1878.215168][T31132] veth0_vlan: entered promiscuous mode [ 1878.265028][T31132] lo speed is unknown, defaulting to 1000 [ 1878.295400][T31132] lo speed is unknown, defaulting to 1000 [ 1878.808034][ T30] kauditd_printk_skb: 156 callbacks suppressed [ 1878.808051][ T30] audit: type=1400 audit(1879307358.786:16108): avc: denied { prog_load } for pid=31136 comm="syz.4.7823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1878.876415][ T30] audit: type=1400 audit(1879307358.823:16109): avc: denied { execmem } for pid=31136 comm="syz.4.7823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1878.914951][ T30] audit: type=1400 audit(1879307358.879:16110): avc: denied { watch } for pid=31136 comm="syz.4.7823" path="/1652/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=8905 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 1879.037482][ T30] audit: type=1400 audit(1879307358.926:16111): avc: denied { create } for pid=31136 comm="syz.4.7823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1879.100638][ T30] audit: type=1400 audit(1879307358.935:16112): avc: denied { create } for pid=31136 comm="syz.4.7823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 1879.150800][ T30] audit: type=1400 audit(1879307358.982:16113): avc: denied { execmem } for pid=31139 comm="syz.0.7822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1879.239963][ T30] audit: type=1400 audit(1879307359.029:16114): avc: denied { create } for pid=31139 comm="syz.0.7822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1879.301934][ T30] audit: type=1400 audit(1879307359.029:16115): avc: denied { create } for pid=31139 comm="syz.0.7822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1879.387369][ T30] audit: type=1400 audit(1879307359.029:16116): avc: denied { create } for pid=31139 comm="syz.0.7822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1879.446425][ T30] audit: type=1400 audit(1879307359.029:16117): avc: denied { prog_load } for pid=31139 comm="syz.0.7822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1880.945816][T31178] trusted_key: encrypted_key: insufficient parameters specified [ 1882.302087][T31197] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1882.462420][T31201] lo speed is unknown, defaulting to 1000 [ 1882.479398][T31201] lo speed is unknown, defaulting to 1000 [ 1885.094754][ T30] kauditd_printk_skb: 119 callbacks suppressed [ 1885.094768][ T30] audit: type=1400 audit(1879307364.660:16237): avc: denied { create } for pid=31214 comm="syz.3.7849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1885.229876][ T30] audit: type=1400 audit(1879307364.660:16238): avc: denied { prog_load } for pid=31214 comm="syz.3.7849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1885.293188][ T30] audit: type=1400 audit(1879307364.697:16239): avc: denied { create } for pid=31214 comm="syz.3.7849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 1885.358800][ T30] audit: type=1400 audit(1879307364.697:16240): avc: denied { prog_load } for pid=31214 comm="syz.3.7849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1885.783299][T31233] lo speed is unknown, defaulting to 1000 [ 1885.796650][T31233] lo speed is unknown, defaulting to 1000 [ 1886.099059][ T30] audit: type=1400 audit(1879307364.707:16241): avc: denied { create } for pid=31214 comm="syz.3.7849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1886.120035][ T30] audit: type=1400 audit(1879307364.707:16242): avc: denied { create } for pid=31214 comm="syz.3.7849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1886.158274][ T30] audit: type=1400 audit(1879307364.707:16243): avc: denied { allowed } for pid=31214 comm="syz.3.7849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1886.177895][ T30] audit: type=1400 audit(1879307364.725:16244): avc: denied { execmem } for pid=31212 comm="syz.1.7848" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1886.393564][ T30] audit: type=1400 audit(1879307364.753:16245): avc: denied { execmem } for pid=31221 comm="syz.4.7851" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1886.467963][ T30] audit: type=1400 audit(1879307364.753:16246): avc: denied { execute } for pid=31221 comm="syz.4.7851" name="file0" dev="tmpfs" ino=8922 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 1887.900777][T31263] veth0_vlan: left promiscuous mode [ 1887.922753][T31263] veth0_vlan: entered promiscuous mode [ 1890.456675][ T30] kauditd_printk_skb: 113 callbacks suppressed [ 1890.456690][ T30] audit: type=1400 audit(1879307369.683:16360): avc: denied { create } for pid=31309 comm="syz.4.7881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1890.494067][ T30] audit: type=1400 audit(1879307369.711:16361): avc: denied { create } for pid=31309 comm="syz.4.7881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1890.579050][ T30] audit: type=1400 audit(1879307369.730:16362): avc: denied { write } for pid=31309 comm="syz.4.7881" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 1890.657724][ T30] audit: type=1400 audit(1879307369.730:16363): avc: denied { bpf } for pid=31309 comm="syz.4.7881" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 1890.707929][ T30] audit: type=1400 audit(1879307369.758:16364): avc: denied { create } for pid=31311 comm="syz.3.7882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1890.755160][ T30] audit: type=1400 audit(1879307369.758:16365): avc: denied { create } for pid=31311 comm="syz.3.7882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1890.806474][ T30] audit: type=1400 audit(1879307369.786:16366): avc: denied { execmem } for pid=31314 comm="syz.4.7883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1890.851492][T31323] trusted_key: encrypted_key: insufficient parameters specified [ 1890.975764][ T30] audit: type=1400 audit(1879307369.795:16367): avc: denied { create } for pid=31313 comm="syz.3.7884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1891.017068][ T30] audit: type=1400 audit(1879307369.823:16368): avc: denied { create } for pid=31313 comm="syz.3.7884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1891.040123][ T30] audit: type=1400 audit(1879307369.851:16369): avc: denied { create } for pid=31314 comm="syz.4.7883" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 1891.081744][T31326] x_tables: ip_tables: ah match: only valid for protocol 51 [ 1893.436580][T31372] ipt_REJECT: ECHOREPLY no longer supported. [ 1895.829438][ T30] kauditd_printk_skb: 130 callbacks suppressed [ 1895.829453][ T30] audit: type=1400 audit(1879307374.706:16500): avc: denied { prog_load } for pid=31413 comm="syz.4.7917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1895.917256][ T30] audit: type=1400 audit(1879307374.734:16501): avc: denied { create } for pid=31413 comm="syz.4.7917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1895.982267][ T30] audit: type=1400 audit(1879307374.734:16502): avc: denied { prog_load } for pid=31413 comm="syz.4.7917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1896.049781][ T30] audit: type=1400 audit(1879307374.734:16503): avc: denied { module_request } for pid=31413 comm="syz.4.7917" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1896.135158][ T30] audit: type=1400 audit(1879307374.734:16504): avc: denied { sys_module } for pid=31413 comm="syz.4.7917" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1896.203936][ T30] audit: type=1400 audit(1879307374.734:16505): avc: denied { prog_load } for pid=31413 comm="syz.4.7917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1896.271526][ T30] audit: type=1400 audit(1879307374.809:16506): avc: denied { execmem } for pid=31415 comm="syz.4.7918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1896.333182][ T30] audit: type=1400 audit(1879307374.828:16507): avc: denied { create } for pid=31415 comm="syz.4.7918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 1896.410578][ T30] audit: type=1400 audit(1879307374.884:16508): avc: denied { create } for pid=31417 comm="syz.3.7919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1896.456925][ T30] audit: type=1400 audit(1879307374.884:16509): avc: denied { create } for pid=31417 comm="syz.3.7919" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1901.250897][ T30] kauditd_printk_skb: 174 callbacks suppressed [ 1901.250917][ T30] audit: type=1400 audit(1879307379.776:16684): avc: denied { create } for pid=31521 comm="syz.1.7957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1901.281938][ T30] audit: type=1400 audit(1879307379.776:16685): avc: denied { create } for pid=31521 comm="syz.1.7957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1901.287279][T31532] serio: Serial port ptm0 [ 1901.321189][ T30] audit: type=1400 audit(1879307379.776:16686): avc: denied { write } for pid=31521 comm="syz.1.7957" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 1901.381152][ T30] audit: type=1400 audit(1879307379.785:16687): avc: denied { read write } for pid=31531 comm="syz.0.7960" name="radio0" dev="devtmpfs" ino=955 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 1901.433169][ T30] audit: type=1400 audit(1879307379.804:16688): avc: denied { create } for pid=31531 comm="syz.0.7960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1901.562677][ T30] audit: type=1400 audit(1879307379.804:16689): avc: denied { create } for pid=31531 comm="syz.0.7960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1901.665925][ T30] audit: type=1400 audit(1879307379.804:16690): avc: denied { map_create } for pid=31531 comm="syz.0.7960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1901.748225][ T30] audit: type=1400 audit(1879307379.804:16691): avc: denied { prog_load } for pid=31531 comm="syz.0.7960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1901.768952][ T30] audit: type=1400 audit(1879307379.804:16692): avc: denied { prog_load } for pid=31531 comm="syz.0.7960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1901.994596][ T30] audit: type=1400 audit(1879307379.804:16693): avc: denied { execmem } for pid=31531 comm="syz.0.7960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1902.709704][T31561] SELinux: security_context_str_to_sid (5ýÆÉ] ÖS9q#“ë) failed with errno=-22 [ 1905.612935][T31626] lo speed is unknown, defaulting to 1000 [ 1905.628230][T31626] lo speed is unknown, defaulting to 1000 [ 1906.660277][ T30] kauditd_printk_skb: 137 callbacks suppressed [ 1906.660291][ T30] audit: type=1400 audit(1879307384.836:16831): avc: denied { execmem } for pid=31635 comm="syz.3.7997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1906.703146][ T30] audit: type=1400 audit(1879307384.865:16832): avc: denied { prog_load } for pid=31635 comm="syz.3.7997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1906.725188][ T30] audit: type=1400 audit(1879307384.865:16833): avc: denied { create } for pid=31635 comm="syz.3.7997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1906.748218][ T30] audit: type=1400 audit(1879307384.865:16834): avc: denied { prog_load } for pid=31635 comm="syz.3.7997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1906.769867][ T30] audit: type=1400 audit(1879307384.865:16835): avc: denied { create } for pid=31635 comm="syz.3.7997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1906.798204][ T30] audit: type=1400 audit(1879307384.874:16836): avc: denied { execmem } for pid=31636 comm="syz.1.7998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1906.831064][ T30] audit: type=1400 audit(1879307384.883:16837): avc: denied { create } for pid=31636 comm="syz.1.7998" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 1906.859866][ T30] audit: type=1400 audit(1879307384.921:16838): avc: denied { execmem } for pid=31639 comm="syz.4.7995" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1906.923452][ T30] audit: type=1400 audit(1879307384.995:16839): avc: denied { execmem } for pid=31646 comm="syz.3.8000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1906.957373][ T30] audit: type=1400 audit(1879307384.995:16840): avc: denied { create } for pid=31646 comm="syz.3.8000" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1908.229571][T31668] ALSA: mixer_oss: invalid OSS volume 'SPEA' [ 1910.792354][T31729] veth0_vlan: left promiscuous mode [ 1910.825328][T31729] veth0_vlan: entered promiscuous mode [ 1912.094167][ T30] kauditd_printk_skb: 175 callbacks suppressed [ 1912.094198][ T30] audit: type=1400 audit(1879307389.925:17016): avc: denied { create } for pid=31754 comm="syz.0.8042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1912.211449][ T30] audit: type=1400 audit(1879307389.953:17017): avc: denied { create } for pid=31754 comm="syz.0.8042" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 1912.358611][ T30] audit: type=1400 audit(1879307389.953:17018): avc: denied { execmem } for pid=31758 comm="syz.3.8043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1912.534097][ T30] audit: type=1400 audit(1879307389.953:17019): avc: denied { execmem } for pid=31754 comm="syz.0.8042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1912.616767][ T30] audit: type=1400 audit(1879307390.000:17020): avc: denied { create } for pid=31755 comm="syz.4.8041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1912.647237][ T30] audit: type=1400 audit(1879307390.009:17021): avc: denied { create } for pid=31755 comm="syz.4.8041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 [ 1912.749835][ T30] audit: type=1400 audit(1879307390.009:17022): avc: denied { name_bind } for pid=31755 comm="syz.4.8041" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 1912.801941][ T30] audit: type=1400 audit(1879307390.009:17023): avc: denied { create } for pid=31755 comm="syz.4.8041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1912.863166][ T30] audit: type=1400 audit(1879307390.037:17024): avc: denied { create } for pid=31758 comm="syz.3.8043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 1912.926282][ T30] audit: type=1400 audit(1879307390.037:17025): avc: denied { create } for pid=31758 comm="syz.3.8043" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1917.579938][ T30] kauditd_printk_skb: 147 callbacks suppressed [ 1917.579953][ T30] audit: type=1400 audit(1879307395.051:17173): avc: denied { create } for pid=31857 comm="syz.3.8082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1917.759622][ T30] audit: type=1400 audit(1879307395.098:17174): avc: denied { create } for pid=31857 comm="syz.3.8082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1917.868219][ T30] audit: type=1400 audit(1879307395.117:17175): avc: denied { create } for pid=31859 comm="syz.3.8083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1918.058021][ T30] audit: type=1400 audit(1879307395.117:17176): avc: denied { create } for pid=31859 comm="syz.3.8083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1918.170696][ T30] audit: type=1400 audit(1879307395.117:17177): avc: denied { prog_load } for pid=31859 comm="syz.3.8083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1918.296110][ T30] audit: type=1400 audit(1879307395.117:17178): avc: denied { execmem } for pid=31859 comm="syz.3.8083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1918.824461][ T30] audit: type=1400 audit(1879307395.117:17179): avc: denied { nlmsg_write } for pid=31859 comm="syz.3.8083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=0 [ 1918.899095][ T30] audit: type=1400 audit(1879307395.163:17180): avc: denied { create } for pid=31861 comm="syz.0.8084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1918.950697][ T30] audit: type=1400 audit(1879307395.163:17181): avc: denied { map_create } for pid=31861 comm="syz.0.8084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1919.013384][ T30] audit: type=1400 audit(1879307395.173:17182): avc: denied { prog_load } for pid=31861 comm="syz.0.8084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1922.381231][T31942] xt_HMARK: proto mask must be zero with L3 mode [ 1923.155031][ T30] kauditd_printk_skb: 141 callbacks suppressed [ 1923.155046][ T30] audit: type=1400 audit(1879307400.261:17324): avc: denied { prog_load } for pid=31944 comm="syz.4.8113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1923.210567][ T30] audit: type=1400 audit(1879307400.299:17325): avc: denied { create } for pid=31944 comm="syz.4.8113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1923.267705][ T30] audit: type=1400 audit(1879307400.299:17326): avc: denied { create } for pid=31944 comm="syz.4.8113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1923.314293][ T30] audit: type=1400 audit(1879307400.299:17327): avc: denied { map_create } for pid=31944 comm="syz.4.8113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1923.356388][ T30] audit: type=1400 audit(1879307400.299:17328): avc: denied { prog_load } for pid=31944 comm="syz.4.8113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1923.411107][ T30] audit: type=1400 audit(1879307400.504:17329): avc: denied { prog_load } for pid=31954 comm="syz.1.8116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1923.437388][ T30] audit: type=1400 audit(1879307400.523:17330): avc: denied { execmem } for pid=31954 comm="syz.1.8116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1923.492404][ T30] audit: type=1400 audit(1879307400.579:17331): avc: denied { map_create } for pid=31954 comm="syz.1.8116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1923.512044][ T30] audit: type=1400 audit(1879307400.579:17332): avc: denied { prog_load } for pid=31954 comm="syz.1.8116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1923.659979][ T30] audit: type=1400 audit(1879307400.729:17333): avc: denied { create } for pid=31957 comm="syz.2.8117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1928.558087][ T30] kauditd_printk_skb: 107 callbacks suppressed [ 1928.558103][ T30] audit: type=1400 audit(1879307405.322:17441): avc: denied { prog_load } for pid=32017 comm="syz.1.8136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1928.629475][ T30] audit: type=1400 audit(1879307405.340:17442): avc: denied { create } for pid=32017 comm="syz.1.8136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1928.742156][ T30] audit: type=1400 audit(1879307405.340:17443): avc: denied { create } for pid=32017 comm="syz.1.8136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1928.849370][ T30] audit: type=1400 audit(1879307405.340:17444): avc: denied { map_create } for pid=32017 comm="syz.1.8136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1928.879865][ T30] audit: type=1400 audit(1879307405.340:17445): avc: denied { create } for pid=32025 comm="syz.2.8138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1928.931650][ T30] audit: type=1400 audit(1879307405.350:17446): avc: denied { map_create } for pid=32025 comm="syz.2.8138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1928.984805][ T30] audit: type=1400 audit(1879307405.350:17447): avc: denied { prog_load } for pid=32025 comm="syz.2.8138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1929.049005][ T30] audit: type=1400 audit(1879307405.537:17448): avc: denied { map_create } for pid=32023 comm="syz.0.8148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1929.384686][ T30] audit: type=1400 audit(1879307405.537:17449): avc: denied { prog_load } for pid=32023 comm="syz.0.8148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1929.412683][ T30] audit: type=1400 audit(1879307405.743:17450): avc: denied { prog_load } for pid=32020 comm="syz.3.8137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1933.948838][ T30] kauditd_printk_skb: 124 callbacks suppressed [ 1933.948852][ T30] audit: type=1400 audit(1879307410.364:17575): avc: denied { execmem } for pid=32104 comm="syz.1.8162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1934.030517][ T30] audit: type=1400 audit(1879307410.429:17576): avc: denied { mounton } for pid=32103 comm="syz.3.8163" path="/1664/file0" dev="tmpfs" ino=8990 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 1934.130722][ T30] audit: type=1400 audit(1879307410.448:17577): avc: denied { create } for pid=32103 comm="syz.3.8163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 1934.180466][ T30] audit: type=1400 audit(1879307410.448:17578): avc: denied { prog_load } for pid=32103 comm="syz.3.8163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1934.341147][ T30] audit: type=1400 audit(1879307410.466:17579): avc: denied { create } for pid=32104 comm="syz.1.8162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1934.414492][ T30] audit: type=1400 audit(1879307410.466:17580): avc: denied { prog_load } for pid=32104 comm="syz.1.8162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1934.477597][ T30] audit: type=1400 audit(1879307410.466:17581): avc: denied { map_create } for pid=32104 comm="syz.1.8162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1934.588254][ T30] audit: type=1400 audit(1879307410.466:17582): avc: denied { prog_load } for pid=32104 comm="syz.1.8162" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1934.651604][ T30] audit: type=1400 audit(1879307410.700:17583): avc: denied { create } for pid=32110 comm="syz.0.8165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1934.725064][ T30] audit: type=1400 audit(1879307410.700:17584): avc: denied { map_create } for pid=32110 comm="syz.0.8165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1937.430086][T32165] lo speed is unknown, defaulting to 1000 [ 1937.481882][T32165] lo speed is unknown, defaulting to 1000 [ 1939.345613][ T30] kauditd_printk_skb: 152 callbacks suppressed [ 1939.345630][ T30] audit: type=1400 audit(1879307415.415:17737): avc: denied { allowed } for pid=32193 comm="syz.1.8189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1939.427447][ T30] audit: type=1400 audit(1879307415.443:17738): avc: denied { create } for pid=32193 comm="syz.1.8189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1939.483034][ T30] audit: type=1400 audit(1879307415.443:17739): avc: denied { create } for pid=32193 comm="syz.1.8189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1939.545793][ T30] audit: type=1400 audit(1879307415.443:17740): avc: denied { create } for pid=32193 comm="syz.1.8189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1939.588619][ T30] audit: type=1400 audit(1879307415.480:17741): avc: denied { prog_load } for pid=32198 comm="syz.1.8191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1939.608135][ T30] audit: type=1400 audit(1879307415.480:17742): avc: denied { execmem } for pid=32198 comm="syz.1.8191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1939.968626][ T30] audit: type=1400 audit(1879307415.546:17743): avc: denied { name_bind } for pid=32198 comm="syz.1.8191" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 1940.002450][ T30] audit: type=1400 audit(1879307415.546:17744): avc: denied { create } for pid=32198 comm="syz.1.8191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1940.023222][ T30] audit: type=1400 audit(1879307415.574:17745): avc: denied { prog_load } for pid=32201 comm="syz.4.8192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1940.042769][ T30] audit: type=1400 audit(1879307415.583:17746): avc: denied { execmem } for pid=32201 comm="syz.4.8192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1945.128723][T32293] xfrm0: entered promiscuous mode [ 1945.139884][ T30] kauditd_printk_skb: 151 callbacks suppressed [ 1945.139896][ T30] audit: type=1400 audit(1879307420.831:17898): avc: denied { prog_load } for pid=32294 comm="syz.3.8220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1945.183027][T32293] xfrm0: entered allmulticast mode [ 1945.223788][ T30] audit: type=1400 audit(1879307420.849:17899): avc: denied { prog_load } for pid=32296 comm="syz.1.8221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1945.277868][ T30] audit: type=1400 audit(1879307420.849:17900): avc: denied { execmem } for pid=32296 comm="syz.1.8221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1945.329566][ T30] audit: type=1400 audit(1879307420.849:17901): avc: denied { create } for pid=32294 comm="syz.3.8220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=0 [ 1945.370910][ T30] audit: type=1400 audit(1879307420.859:17902): avc: denied { prog_load } for pid=32294 comm="syz.3.8220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1945.407691][ T30] audit: type=1400 audit(1879307420.887:17903): avc: denied { create } for pid=32294 comm="syz.3.8220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1945.453498][ T30] audit: type=1400 audit(1879307420.887:17904): avc: denied { create } for pid=32294 comm="syz.3.8220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1945.495346][ T30] audit: type=1400 audit(1879307420.887:17905): avc: denied { allowed } for pid=32294 comm="syz.3.8220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1945.534885][ T30] audit: type=1400 audit(1879307420.887:17906): avc: denied { execmem } for pid=32292 comm="syz.2.8219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1945.574275][ T30] audit: type=1400 audit(1879307420.887:17907): avc: denied { create } for pid=32292 comm="syz.2.8219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1950.568821][ T30] kauditd_printk_skb: 172 callbacks suppressed [ 1950.568837][ T30] audit: type=1400 audit(1879307425.901:18080): avc: denied { create } for pid=32387 comm="syz.3.8252" anonclass=[secretmem] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 1950.863511][ T30] audit: type=1400 audit(1879307425.910:18081): avc: denied { prog_load } for pid=32390 comm="syz.4.8253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1950.900606][ T30] audit: type=1400 audit(1879307425.947:18082): avc: denied { map_create } for pid=32387 comm="syz.3.8252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1950.911992][T32399] ptrace attach of "./syz-executor exec"[5819] was attempted by "./syz-executor exec"[32399] [ 1950.926961][ T30] audit: type=1400 audit(1879307425.966:18083): avc: denied { allowed } for pid=32387 comm="syz.3.8252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1950.957096][ T30] audit: type=1400 audit(1879307425.985:18084): avc: denied { create } for pid=32390 comm="syz.4.8253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1951.069171][ T30] audit: type=1400 audit(1879307425.985:18085): avc: denied { prog_load } for pid=32390 comm="syz.4.8253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1951.148868][ T30] audit: type=1400 audit(1879307425.985:18086): avc: denied { module_request } for pid=32390 comm="syz.4.8253" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 1951.236822][ T30] audit: type=1400 audit(1879307425.985:18087): avc: denied { sys_module } for pid=32390 comm="syz.4.8253" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 1951.315906][ T30] audit: type=1400 audit(1879307425.985:18088): avc: denied { prog_load } for pid=32390 comm="syz.4.8253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1951.362032][ T30] audit: type=1400 audit(1879307426.162:18089): avc: denied { prog_load } for pid=32394 comm="syz.4.8254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1953.468481][T32440] serio: Serial port ttyS3 [ 1955.914523][ T30] kauditd_printk_skb: 139 callbacks suppressed [ 1955.914538][ T30] audit: type=1400 audit(1879307430.914:18229): avc: denied { allowed } for pid=32478 comm="syz.2.8283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 1956.678473][ T30] audit: type=1400 audit(1879307431.027:18230): avc: denied { write } for pid=32478 comm="syz.2.8283" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 1956.808540][ T30] audit: type=1400 audit(1879307431.027:18231): avc: denied { execmem } for pid=32480 comm="syz.3.8282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1957.069766][ T30] audit: type=1400 audit(1879307431.045:18232): avc: denied { write } for pid=32478 comm="syz.2.8283" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 1957.193521][ T30] audit: type=1400 audit(1879307431.045:18233): avc: denied { create } for pid=32478 comm="syz.2.8283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1957.236798][ T30] audit: type=1400 audit(1879307431.111:18234): avc: denied { create } for pid=32480 comm="syz.3.8282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 1957.275848][ T30] audit: type=1400 audit(1879307431.204:18235): avc: denied { create } for pid=32483 comm="syz.1.8284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1957.299772][ T30] audit: type=1400 audit(1879307431.214:18236): avc: denied { create } for pid=32483 comm="syz.1.8284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 1957.323836][ T30] audit: type=1400 audit(1879307431.214:18237): avc: denied { map_create } for pid=32483 comm="syz.1.8284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1957.460826][ T30] audit: type=1400 audit(1879307431.214:18238): avc: denied { map_create } for pid=32483 comm="syz.1.8284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1957.858168][T32505] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(6) [ 1957.864684][T32505] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 1957.876768][T32505] vhci_hcd vhci_hcd.0: Device attached [ 1958.138283][T26201] usb 33-1: new low-speed USB device number 10 using vhci_hcd [ 1960.082465][ T9] libceph: connect (1)[c::]:6789 error -101 [ 1960.090169][ T9] libceph: mon0 (1)[c::]:6789 connect error [ 1960.101498][T32543] ceph: No mds server is up or the cluster is laggy [ 1960.610517][ T9] libceph: connect (1)[c::]:6789 error -101 [ 1960.622635][ T9] libceph: mon0 (1)[c::]:6789 connect error [ 1961.283230][ T30] kauditd_printk_skb: 196 callbacks suppressed [ 1961.289184][ T30] audit: type=1400 audit(1879307435.919:18435): avc: denied { prog_load } for pid=32540 comm="syz.0.8301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1961.527035][ T30] audit: type=1400 audit(1879307435.947:18436): avc: denied { map_create } for pid=32556 comm="syz.2.8305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1961.553449][ T30] audit: type=1400 audit(1879307435.984:18437): avc: denied { map_create } for pid=32558 comm="syz.4.8306" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1961.743223][ T30] audit: type=1400 audit(1879307436.368:18438): avc: denied { create } for pid=32565 comm="syz.3.8308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1961.793233][ T30] audit: type=1400 audit(1879307436.368:18439): avc: denied { map_create } for pid=32565 comm="syz.3.8308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1961.839684][ T30] audit: type=1400 audit(1879307436.368:18440): avc: denied { prog_load } for pid=32565 comm="syz.3.8308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1961.922588][ T30] audit: type=1400 audit(1879307436.396:18441): avc: denied { create } for pid=32564 comm="syz.0.8307" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1961.970544][ T30] audit: type=1400 audit(1879307436.396:18442): avc: denied { read } for pid=32564 comm="syz.0.8307" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1962.046365][ T30] audit: type=1400 audit(1879307436.396:18443): avc: denied { read write } for pid=32564 comm="syz.0.8307" name="rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 1962.130037][ T30] audit: type=1400 audit(1879307436.396:18444): avc: denied { read } for pid=32564 comm="syz.0.8307" dev="nsfs" ino=4026532880 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1963.545482][T32595] netlink: 8 bytes leftover after parsing attributes in process `syz.3.8317'. [ 1964.793647][T32620] veth0_vlan: left promiscuous mode [ 1964.819612][T32620] veth0_vlan: entered promiscuous mode [ 1966.660778][ T30] kauditd_printk_skb: 158 callbacks suppressed [ 1966.660793][ T30] audit: type=1400 audit(1879307440.960:18603): avc: denied { create } for pid=32664 comm="syz.3.8345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 1966.708634][ T30] audit: type=1400 audit(1879307440.998:18604): avc: denied { create } for pid=32666 comm="syz.0.8346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1966.754425][ T30] audit: type=1400 audit(1879307440.998:18605): avc: denied { map_create } for pid=32666 comm="syz.0.8346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1966.848900][ T30] audit: type=1400 audit(1879307440.998:18606): avc: denied { prog_load } for pid=32666 comm="syz.0.8346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1967.096832][ T30] audit: type=1400 audit(1879307441.073:18607): avc: denied { create } for pid=32645 comm="syz.1.8338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1967.182912][ T30] audit: type=1400 audit(1879307441.073:18608): avc: denied { create } for pid=32645 comm="syz.1.8338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1967.257602][ T30] audit: type=1400 audit(1879307441.073:18609): avc: denied { create } for pid=32645 comm="syz.1.8338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1967.321601][ T30] audit: type=1400 audit(1879307441.073:18610): avc: denied { create } for pid=32645 comm="syz.1.8338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1967.368003][ T30] audit: type=1400 audit(1879307441.073:18611): avc: denied { prog_load } for pid=32645 comm="syz.1.8338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1967.430636][ T30] audit: type=1400 audit(1879307441.335:18612): avc: denied { execmem } for pid=32664 comm="syz.3.8345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1972.037768][ T30] kauditd_printk_skb: 102 callbacks suppressed [ 1972.037783][ T30] audit: type=1400 audit(1879307445.993:18715): avc: denied { prog_load } for pid=305 comm="syz.4.8389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1972.077292][ T30] audit: type=1400 audit(1879307446.012:18716): avc: denied { create } for pid=305 comm="syz.4.8389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1972.119992][ T30] audit: type=1400 audit(1879307446.012:18717): avc: denied { create } for pid=305 comm="syz.4.8389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1972.196224][ T30] audit: type=1400 audit(1879307446.012:18718): avc: denied { prog_load } for pid=305 comm="syz.4.8389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1972.255216][ T30] audit: type=1400 audit(1879307446.143:18719): avc: denied { create } for pid=315 comm="syz.0.8392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1972.509256][ T30] audit: type=1400 audit(1879307446.161:18720): avc: denied { read } for pid=315 comm="syz.0.8392" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1972.549188][ T30] audit: type=1400 audit(1879307446.161:18721): avc: denied { read write } for pid=315 comm="syz.0.8392" name="rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 1972.623993][ T30] audit: type=1400 audit(1879307446.161:18722): avc: denied { read } for pid=315 comm="syz.0.8392" dev="nsfs" ino=4026532880 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1972.706308][ T30] audit: type=1400 audit(1879307446.283:18723): avc: denied { create } for pid=317 comm="syz.0.8394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1972.762837][ T30] audit: type=1400 audit(1879307446.292:18724): avc: denied { map_create } for pid=317 comm="syz.0.8394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1977.396096][ T30] kauditd_printk_skb: 118 callbacks suppressed [ 1977.396112][ T30] audit: type=1400 audit(1879307451.007:18843): avc: denied { create } for pid=413 comm="syz.4.8429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 1977.926823][ T30] audit: type=1400 audit(1879307451.035:18844): avc: denied { read } for pid=415 comm="syz.0.8430" dev="nsfs" ino=4026532880 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1978.053923][ T30] audit: type=1400 audit(1879307451.446:18845): avc: denied { map_create } for pid=416 comm="syz.3.8431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1978.095371][ T30] audit: type=1400 audit(1879307451.474:18846): avc: denied { prog_load } for pid=416 comm="syz.3.8431" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1978.142970][ T30] audit: type=1400 audit(1879307451.643:18847): avc: denied { create } for pid=422 comm="syz.0.8432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1978.253546][ T30] audit: type=1400 audit(1879307451.792:18848): avc: denied { execmem } for pid=424 comm="syz.0.8433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1978.290202][ T30] audit: type=1400 audit(1879307451.802:18849): avc: denied { create } for pid=424 comm="syz.0.8433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 1978.395165][ T30] audit: type=1400 audit(1879307451.886:18850): avc: denied { execmem } for pid=426 comm="syz.1.8434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 1978.446511][ T30] audit: type=1400 audit(1879307451.942:18851): avc: denied { execute } for pid=426 comm="syz.1.8434" name="file0" dev="tmpfs" ino=8940 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 1978.499317][ T30] audit: type=1400 audit(1879307451.942:18852): avc: denied { create } for pid=426 comm="syz.1.8434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 1982.778565][ T30] kauditd_printk_skb: 133 callbacks suppressed [ 1982.778580][ T30] audit: type=1400 audit(1879307456.030:18986): avc: denied { create } for pid=592 comm="syz.1.8509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1982.828506][ T30] audit: type=1400 audit(1879307456.039:18987): avc: denied { map_create } for pid=592 comm="syz.1.8509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1982.919033][ T30] audit: type=1400 audit(1879307456.039:18988): avc: denied { prog_load } for pid=592 comm="syz.1.8509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1982.972448][ T30] audit: type=1400 audit(1879307456.086:18989): avc: denied { create } for pid=594 comm="syz.4.8510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1983.048575][ T30] audit: type=1400 audit(1879307456.086:18990): avc: denied { map_create } for pid=594 comm="syz.4.8510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1983.089394][ T30] audit: type=1400 audit(1879307456.095:18991): avc: denied { prog_load } for pid=594 comm="syz.4.8510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1983.132753][ T30] audit: type=1400 audit(1879307456.273:18992): avc: denied { create } for pid=596 comm="syz.2.8511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1983.327997][ T30] audit: type=1400 audit(1879307456.273:18993): avc: denied { create } for pid=596 comm="syz.2.8511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 1983.402529][ T30] audit: type=1400 audit(1879307456.423:18994): avc: denied { prog_load } for pid=592 comm="syz.1.8509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1983.514953][ T30] audit: type=1400 audit(1879307456.423:18995): avc: denied { create } for pid=592 comm="syz.1.8509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1988.150216][ T30] kauditd_printk_skb: 104 callbacks suppressed [ 1988.150230][ T30] audit: type=1400 audit(1879307461.062:19100): avc: denied { prog_load } for pid=769 comm="syz.3.8588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1988.244159][ T30] audit: type=1400 audit(1879307461.156:19101): avc: denied { create } for pid=776 comm="syz.0.8592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 1988.432706][ T30] audit: type=1400 audit(1879307461.324:19102): avc: denied { create } for pid=784 comm="syz.2.8595" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1988.472590][ T30] audit: type=1400 audit(1879307461.362:19103): avc: denied { create } for pid=788 comm="syz.0.8597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1988.519277][ T30] audit: type=1400 audit(1879307461.390:19104): avc: denied { read } for pid=788 comm="syz.0.8597" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 1988.563614][ T30] audit: type=1400 audit(1879307461.390:19105): avc: denied { read write } for pid=788 comm="syz.0.8597" name="rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 1988.620480][ T30] audit: type=1400 audit(1879307461.390:19106): avc: denied { read } for pid=788 comm="syz.0.8597" dev="nsfs" ino=4026532880 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 1988.886428][ T30] audit: type=1400 audit(1879307461.436:19107): avc: denied { read write } for pid=792 comm="syz.0.8600" name="video36" dev="devtmpfs" ino=1044 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 1989.032334][ T30] audit: type=1400 audit(1879307461.446:19108): avc: denied { create } for pid=791 comm="syz.1.8598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 1989.076948][ T30] audit: type=1400 audit(1879307461.446:19109): avc: denied { create } for pid=791 comm="syz.1.8598" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 1993.748502][ T30] kauditd_printk_skb: 113 callbacks suppressed [ 1993.748519][ T30] audit: type=1400 audit(1879307466.263:19223): avc: denied { create } for pid=961 comm="syz.4.8660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1993.814973][ T30] audit: type=1400 audit(1879307466.291:19224): avc: denied { map_create } for pid=961 comm="syz.4.8660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1993.877062][ T30] audit: type=1400 audit(1879307466.291:19225): avc: denied { prog_load } for pid=961 comm="syz.4.8660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1994.138103][ T30] audit: type=1400 audit(1879307466.665:19226): avc: denied { create } for pid=966 comm="syz.1.8662" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 1994.206546][ T30] audit: type=1400 audit(1879307466.703:19227): avc: denied { prog_load } for pid=965 comm="syz.0.8663" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1994.249880][ T30] audit: type=1400 audit(1879307466.759:19228): avc: denied { create } for pid=970 comm="syz.1.8664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1994.623238][ T30] audit: type=1400 audit(1879307466.759:19229): avc: denied { map_create } for pid=970 comm="syz.1.8664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1994.688378][ T30] audit: type=1400 audit(1879307466.759:19230): avc: denied { prog_load } for pid=970 comm="syz.1.8664" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1994.740435][ T30] audit: type=1400 audit(1879307466.834:19231): avc: denied { write } for pid=972 comm="syz.0.8665" name="001" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 1994.796488][ T30] audit: type=1400 audit(1879307466.852:19232): avc: denied { prog_load } for pid=961 comm="syz.4.8660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1999.160795][ T30] kauditd_printk_skb: 110 callbacks suppressed [ 1999.160811][ T30] audit: type=1400 audit(1879307471.361:19343): avc: denied { prog_load } for pid=1110 comm="syz.0.8716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1999.207995][ T30] audit: type=1400 audit(1879307471.389:19344): avc: denied { create } for pid=1110 comm="syz.0.8716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 1999.284089][ T30] audit: type=1400 audit(1879307471.389:19345): avc: denied { read } for pid=1110 comm="syz.0.8716" name="cec0" dev="devtmpfs" ino=948 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 1999.384806][ T30] audit: type=1400 audit(1879307471.389:19346): avc: denied { map_create } for pid=1110 comm="syz.0.8716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1999.449720][ T30] audit: type=1400 audit(1879307471.389:19347): avc: denied { prog_load } for pid=1110 comm="syz.0.8716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1999.661970][ T30] audit: type=1400 audit(1879307471.829:19348): avc: denied { create } for pid=1126 comm="syz.1.8721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 1999.746844][ T30] audit: type=1400 audit(1879307471.913:19349): avc: denied { create } for pid=1129 comm="syz.1.8723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 1999.777841][ T30] audit: type=1400 audit(1879307471.932:19350): avc: denied { map_create } for pid=1129 comm="syz.1.8723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1999.828106][ T30] audit: type=1400 audit(1879307471.932:19351): avc: denied { prog_load } for pid=1129 comm="syz.1.8723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1999.864095][ T30] audit: type=1400 audit(1879307471.960:19352): avc: denied { mounton } for pid=1128 comm="syz.2.8722" path="/1705/file0" dev="tmpfs" ino=9149 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 2000.954125][ T1180] CUSE: info not properly terminated [ 2004.710030][ T30] kauditd_printk_skb: 126 callbacks suppressed [ 2004.710061][ T30] audit: type=1400 audit(1879307476.552:19479): avc: denied { create } for pid=1318 comm="syz.2.8802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2004.756072][ T30] audit: type=1400 audit(1879307476.552:19480): avc: denied { create } for pid=1317 comm="syz.0.8803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2004.777603][ T30] audit: type=1400 audit(1879307476.581:19481): avc: denied { create } for pid=1318 comm="syz.2.8802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2004.817463][ T30] audit: type=1400 audit(1879307476.581:19482): avc: denied { create } for pid=1317 comm="syz.0.8803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2004.841512][ T30] audit: type=1400 audit(1879307476.655:19483): avc: denied { execmem } for pid=1323 comm="syz.2.8806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 2004.863888][ T30] audit: type=1400 audit(1879307476.655:19484): avc: denied { module_request } for pid=1325 comm="syz.0.8807" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 2004.903153][ T30] audit: type=1400 audit(1879307476.655:19485): avc: denied { sys_module } for pid=1325 comm="syz.0.8807" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 2004.929087][ T30] audit: type=1400 audit(1879307476.655:19486): avc: denied { create } for pid=1323 comm="syz.2.8806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 2004.952832][ T30] audit: type=1400 audit(1879307476.758:19487): avc: denied { create } for pid=1327 comm="syz.0.8808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 2004.994379][ T30] audit: type=1400 audit(1879307476.814:19488): avc: denied { create } for pid=1329 comm="syz.0.8810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2010.063125][ T30] kauditd_printk_skb: 120 callbacks suppressed [ 2010.063182][ T30] audit: type=1400 audit(1879307481.547:19609): avc: denied { prog_load } for pid=1478 comm="syz.3.8875" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2010.190703][ T30] audit: type=1400 audit(1879307481.604:19610): avc: denied { create } for pid=1480 comm="syz.1.8876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2010.294795][ T30] audit: type=1400 audit(1879307481.604:19611): avc: denied { create } for pid=1480 comm="syz.1.8876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2010.376226][ T30] audit: type=1400 audit(1879307481.622:19612): avc: denied { create } for pid=1481 comm="syz.2.8874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2010.453710][ T30] audit: type=1400 audit(1879307481.632:19613): avc: denied { create } for pid=1481 comm="syz.2.8874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2010.519343][ T30] audit: type=1400 audit(1879307481.809:19614): avc: denied { create } for pid=1485 comm="syz.2.8879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 2010.813133][ T30] audit: type=1400 audit(1879307481.809:19615): avc: denied { create } for pid=1487 comm="syz.3.8878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 2010.855952][ T30] audit: type=1400 audit(1879307481.819:19616): avc: denied { create } for pid=1487 comm="syz.3.8878" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 2010.885682][ T30] audit: type=1326 audit(1879307481.903:19617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1491 comm="syz.1.8880" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3d7a98e169 code=0x7ffc0000 [ 2010.981770][ T30] audit: type=1326 audit(1879307481.903:19618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1491 comm="syz.1.8880" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3d7a98e169 code=0x7ffc0000 [ 2015.510994][ T30] kauditd_printk_skb: 190 callbacks suppressed [ 2015.511008][ T30] audit: type=1400 audit(1879307486.655:19809): avc: denied { read write } for pid=1634 comm="syz.0.8941" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 2015.600110][ T30] audit: type=1400 audit(1879307486.673:19810): avc: denied { create } for pid=1636 comm="syz.2.8942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2015.662997][ T30] audit: type=1400 audit(1879307486.673:19811): avc: denied { map_create } for pid=1636 comm="syz.2.8942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2015.749743][ T30] audit: type=1400 audit(1879307486.673:19812): avc: denied { prog_load } for pid=1636 comm="syz.2.8942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2015.824483][ T30] audit: type=1400 audit(1879307486.683:19813): avc: denied { allowed } for pid=1634 comm="syz.0.8941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 2015.892625][ T30] audit: type=1400 audit(1879307486.776:19814): avc: denied { read } for pid=1638 comm="syz.0.8943" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 2015.985108][ T30] audit: type=1400 audit(1879307486.889:19815): avc: denied { create } for pid=1640 comm="syz.1.8944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 2016.034538][ T30] audit: type=1400 audit(1879307486.963:19816): avc: denied { create } for pid=1643 comm="syz.0.8945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 2016.086541][ T30] audit: type=1400 audit(1879307486.992:19817): avc: denied { create } for pid=1645 comm="syz.1.8946" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2016.149192][ T30] audit: type=1400 audit(1879307486.992:19818): avc: denied { prog_load } for pid=1630 comm="syz.3.8939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2018.914683][ T1740] IPVS: wrr: UDP 224.0.0.2:0 - no destination available [ 2020.498928][ T1803] dns_resolver: Unsupported content type (152) [ 2020.862290][ T30] kauditd_printk_skb: 148 callbacks suppressed [ 2020.862305][ T30] audit: type=1400 audit(1879307491.659:19967): avc: denied { prog_load } for pid=1819 comm="syz.1.9025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2020.929145][ T30] audit: type=1400 audit(1879307491.687:19968): avc: denied { execmem } for pid=1819 comm="syz.1.9025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 2020.949511][ T30] audit: type=1400 audit(1879307491.687:19969): avc: denied { write } for pid=1819 comm="syz.1.9025" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 2021.013260][ T30] audit: type=1400 audit(1879307491.725:19970): avc: denied { create } for pid=1822 comm="syz.1.9026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=0 [ 2021.035500][ T30] audit: type=1400 audit(1879307491.725:19971): avc: denied { prog_load } for pid=1822 comm="syz.1.9026" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2021.082800][ T30] audit: type=1400 audit(1879307491.856:19972): avc: denied { prog_load } for pid=1807 comm="syz.0.9018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2021.113735][ T30] audit: type=1400 audit(1879307491.856:19973): avc: denied { create } for pid=1807 comm="syz.0.9018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2021.182692][ T30] audit: type=1400 audit(1879307491.856:19974): avc: denied { create } for pid=1807 comm="syz.0.9018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2021.249513][ T30] audit: type=1400 audit(1879307491.865:19975): avc: denied { read } for pid=1807 comm="syz.0.9018" name="cec0" dev="devtmpfs" ino=948 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 2021.336698][ T30] audit: type=1400 audit(1879307491.865:19976): avc: denied { map_create } for pid=1807 comm="syz.0.9018" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2026.219370][ T30] kauditd_printk_skb: 155 callbacks suppressed [ 2026.219385][ T30] audit: type=1400 audit(1879307496.673:20132): avc: denied { prog_load } for pid=2061 comm="syz.2.9137" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2026.300225][ T30] audit: type=1400 audit(1879307496.748:20133): avc: denied { create } for pid=2063 comm="syz.4.9138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2026.352957][ T30] audit: type=1400 audit(1879307496.748:20134): avc: denied { prog_load } for pid=2058 comm="syz.3.9136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2026.410359][ T30] audit: type=1400 audit(1879307496.748:20135): avc: denied { create } for pid=2058 comm="syz.3.9136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2026.434447][ T30] audit: type=1400 audit(1879307496.748:20136): avc: denied { map_create } for pid=2058 comm="syz.3.9136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2026.456215][ T30] audit: type=1400 audit(1879307496.748:20137): avc: denied { prog_load } for pid=2058 comm="syz.3.9136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2026.514104][ T30] audit: type=1400 audit(1879307496.785:20138): avc: denied { module_request } for pid=2066 comm="syz.1.9139" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 2026.549976][ T30] audit: type=1400 audit(1879307496.785:20139): avc: denied { sys_module } for pid=2066 comm="syz.1.9139" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 2026.592782][ T30] audit: type=1400 audit(1879307496.823:20140): avc: denied { create } for pid=2063 comm="syz.4.9138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2026.617357][ T30] audit: type=1400 audit(1879307496.823:20141): avc: denied { create } for pid=2063 comm="syz.4.9138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2031.578260][ T30] kauditd_printk_skb: 125 callbacks suppressed [ 2031.578276][ T30] audit: type=1400 audit(1879307501.687:20267): avc: denied { read write } for pid=2227 comm="syz.0.9209" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 2031.669741][ T30] audit: type=1400 audit(1879307501.715:20268): avc: denied { mounton } for pid=2227 comm="syz.0.9209" path="/1774/file0" dev="tmpfs" ino=9470 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 2031.870494][ T30] audit: type=1400 audit(1879307501.902:20269): avc: denied { read write } for pid=2233 comm="syz.0.9212" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 2031.917374][ T30] audit: type=1400 audit(1879307501.902:20270): avc: denied { create } for pid=2233 comm="syz.0.9212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 2031.956439][ T30] audit: type=1400 audit(1879307501.902:20271): avc: denied { prog_load } for pid=2233 comm="syz.0.9212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2032.018835][ T30] audit: type=1400 audit(1879307501.920:20272): avc: denied { prog_load } for pid=2221 comm="syz.3.9206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2032.078779][ T30] audit: type=1400 audit(1879307501.920:20273): avc: denied { create } for pid=2221 comm="syz.3.9206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2032.121772][ T30] audit: type=1400 audit(1879307501.920:20274): avc: denied { create } for pid=2221 comm="syz.3.9206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2032.168561][ T30] audit: type=1400 audit(1879307501.920:20275): avc: denied { map_create } for pid=2221 comm="syz.3.9206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2032.191481][ T30] audit: type=1400 audit(1879307501.920:20276): avc: denied { prog_load } for pid=2221 comm="syz.3.9206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2036.975832][ T30] kauditd_printk_skb: 149 callbacks suppressed [ 2036.975847][ T30] audit: type=1400 audit(1879307506.738:20426): avc: denied { create } for pid=2365 comm="syz.0.9265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2037.038357][ T30] audit: type=1400 audit(1879307506.747:20427): avc: denied { create } for pid=2367 comm="syz.4.9264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2037.114502][ T30] audit: type=1400 audit(1879307506.747:20428): avc: denied { map_create } for pid=2367 comm="syz.4.9264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2037.176335][ T30] audit: type=1400 audit(1879307506.747:20429): avc: denied { prog_load } for pid=2367 comm="syz.4.9264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2037.240654][ T30] audit: type=1400 audit(1879307506.766:20430): avc: denied { map_create } for pid=2365 comm="syz.0.9265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2037.287587][ T30] audit: type=1400 audit(1879307506.766:20431): avc: denied { prog_load } for pid=2365 comm="syz.0.9265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2037.334392][ T30] audit: type=1400 audit(1879307507.009:20432): avc: denied { create } for pid=2369 comm="syz.2.9266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 2037.464041][ T30] audit: type=1400 audit(1879307507.028:20433): avc: denied { mounton } for pid=2370 comm="syz.1.9267" path="/1824/file1" dev="tmpfs" ino=9756 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 2037.988507][ T30] audit: type=1400 audit(1879307507.028:20434): avc: denied { mounton } for pid=2370 comm="syz.1.9267" path="/1824/file1/bus" dev="tmpfs" ino=9760 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 2038.046378][ T30] audit: type=1400 audit(1879307507.112:20435): avc: denied { create } for pid=2375 comm="syz.1.9269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2042.353261][ T30] kauditd_printk_skb: 158 callbacks suppressed [ 2042.353277][ T30] audit: type=1400 audit(1879307511.761:20594): avc: denied { create } for pid=2560 comm="syz.4.9331" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 2042.400911][ T30] audit: type=1400 audit(1879307511.761:20595): avc: denied { create } for pid=2560 comm="syz.4.9331" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 2042.464658][ T30] audit: type=1400 audit(1879307511.770:20596): avc: denied { create } for pid=2562 comm="syz.2.9332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2042.504393][ T30] audit: type=1400 audit(1879307511.770:20597): avc: denied { map_create } for pid=2562 comm="syz.2.9332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2042.546121][ T30] audit: type=1400 audit(1879307511.770:20598): avc: denied { prog_load } for pid=2562 comm="syz.2.9332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2042.634129][ T30] audit: type=1400 audit(1879307511.817:20599): avc: denied { create } for pid=2564 comm="syz.4.9333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 2042.710761][ T30] audit: type=1400 audit(1879307511.920:20600): avc: denied { map_create } for pid=2564 comm="syz.4.9333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2042.760616][ T30] audit: type=1400 audit(1879307511.920:20601): avc: denied { prog_load } for pid=2564 comm="syz.4.9333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2043.055447][ T30] audit: type=1400 audit(1879307512.163:20602): avc: denied { create } for pid=2571 comm="syz.0.9334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2043.075374][ T30] audit: type=1400 audit(1879307512.313:20603): avc: denied { read } for pid=2571 comm="syz.0.9334" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 2043.157047][ T2581] lo speed is unknown, defaulting to 1000 [ 2043.180324][ T2581] lo speed is unknown, defaulting to 1000 [ 2047.740722][ T30] kauditd_printk_skb: 150 callbacks suppressed [ 2047.740738][ T30] audit: type=1400 audit(1879307516.803:20754): avc: denied { prog_load } for pid=2747 comm="syz.3.9395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2047.798540][ T30] audit: type=1400 audit(1879307516.821:20755): avc: denied { create } for pid=2747 comm="syz.3.9395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2047.848389][ T30] audit: type=1400 audit(1879307516.821:20756): avc: denied { create } for pid=2747 comm="syz.3.9395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2048.263596][ T30] audit: type=1400 audit(1879307516.831:20757): avc: denied { map_create } for pid=2747 comm="syz.3.9395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2048.293822][ T30] audit: type=1400 audit(1879307516.831:20758): avc: denied { prog_load } for pid=2747 comm="syz.3.9395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2048.359658][ T30] audit: type=1400 audit(1879307517.121:20759): avc: denied { create } for pid=2755 comm="syz.1.9397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 2048.450373][ T30] audit: type=1400 audit(1879307517.121:20760): avc: denied { create } for pid=2755 comm="syz.1.9397" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 2048.523435][ T30] audit: type=1400 audit(1879307517.121:20761): avc: denied { execmem } for pid=2755 comm="syz.1.9397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 2048.611722][ T30] audit: type=1400 audit(1879307517.177:20762): avc: denied { prog_load } for pid=2736 comm="syz.2.9392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2048.693600][ T30] audit: type=1400 audit(1879307517.177:20763): avc: denied { create } for pid=2736 comm="syz.2.9392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2050.419170][ T2822] lo speed is unknown, defaulting to 1000 [ 2050.436841][ T2822] lo speed is unknown, defaulting to 1000 [ 2051.067760][ T2826] lo speed is unknown, defaulting to 1000 [ 2051.166697][ T2826] lo speed is unknown, defaulting to 1000 [ 2053.145582][ T30] kauditd_printk_skb: 156 callbacks suppressed [ 2053.145596][ T30] audit: type=1400 audit(1879307521.854:20920): avc: denied { prog_load } for pid=2903 comm="syz.1.9448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2053.234045][ T30] audit: type=1400 audit(1879307521.929:20921): avc: denied { create } for pid=2905 comm="syz.2.9449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2053.296500][ T30] audit: type=1400 audit(1879307521.929:20922): avc: denied { create } for pid=2909 comm="syz.4.9450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 2053.337647][ T30] audit: type=1400 audit(1879307521.929:20923): avc: denied { prog_load } for pid=2908 comm="syz.0.9451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2053.376160][ T30] audit: type=1400 audit(1879307521.947:20924): avc: denied { prog_load } for pid=2908 comm="syz.0.9451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2053.433788][ T30] audit: type=1400 audit(1879307521.947:20925): avc: denied { create } for pid=2903 comm="syz.1.9448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=0 [ 2053.473582][ T30] audit: type=1400 audit(1879307521.947:20926): avc: denied { prog_load } for pid=2903 comm="syz.1.9448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2053.493396][ T30] audit: type=1400 audit(1879307521.966:20927): avc: denied { map_create } for pid=2908 comm="syz.0.9451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2053.514439][ T30] audit: type=1400 audit(1879307522.004:20928): avc: denied { mounton } for pid=2908 comm="syz.0.9451" path="/proc/5671/task" dev="proc" ino=93168 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=0 [ 2053.541778][ T30] audit: type=1400 audit(1879307522.022:20929): avc: denied { allowed } for pid=2914 comm="syz.4.9452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 2058.614898][ T30] kauditd_printk_skb: 183 callbacks suppressed [ 2058.614909][ T30] audit: type=1400 audit(1879307526.952:21113): avc: denied { name_bind } for pid=3087 comm="syz.4.9529" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 2058.692038][ T30] audit: type=1400 audit(1879307527.045:21114): avc: denied { create } for pid=3089 comm="syz.4.9530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=0 [ 2058.718050][ T30] audit: type=1400 audit(1879307527.045:21115): avc: denied { map_create } for pid=3089 comm="syz.4.9530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2058.739353][ T30] audit: type=1400 audit(1879307527.045:21116): avc: denied { prog_load } for pid=3089 comm="syz.4.9530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2058.760610][ T30] audit: type=1400 audit(1879307527.111:21117): avc: denied { map_create } for pid=3091 comm="syz.0.9531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2058.782695][ T30] audit: type=1400 audit(1879307527.130:21118): avc: denied { prog_load } for pid=3091 comm="syz.0.9531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2058.830813][ T30] audit: type=1400 audit(1879307527.158:21119): avc: denied { allowed } for pid=3091 comm="syz.0.9531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 2058.864652][ T30] audit: type=1400 audit(1879307527.158:21120): avc: denied { execute } for pid=3091 comm="syz.0.9531" path="/1836/cpu.stat" dev="tmpfs" ino=9795 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 2058.889574][ T30] audit: type=1400 audit(1879307527.176:21121): avc: denied { create } for pid=3094 comm="syz.3.9532" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 2058.926413][ T30] audit: type=1400 audit(1879307527.260:21122): avc: denied { create } for pid=3098 comm="syz.3.9534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2061.047533][ T3161] futex_wake_op: syz.1.9561 tries to shift op by -1; fix this program [ 2063.979393][ T30] kauditd_printk_skb: 144 callbacks suppressed [ 2063.979408][ T30] audit: type=1400 audit(1879307531.984:21267): avc: denied { mounton } for pid=3245 comm="syz.3.9596" path="/2002/bus" dev="tmpfs" ino=10761 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 2064.090749][ T30] audit: type=1400 audit(1879307532.059:21268): avc: denied { prog_load } for pid=3231 comm="syz.0.9590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2064.137098][ T30] audit: type=1400 audit(1879307532.059:21269): avc: denied { create } for pid=3231 comm="syz.0.9590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2064.182019][ T30] audit: type=1400 audit(1879307532.059:21270): avc: denied { create } for pid=3231 comm="syz.0.9590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2064.223422][ T30] audit: type=1400 audit(1879307532.059:21271): avc: denied { read } for pid=3231 comm="syz.0.9590" name="cec0" dev="devtmpfs" ino=948 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 2064.267884][ T30] audit: type=1400 audit(1879307532.059:21272): avc: denied { map_create } for pid=3231 comm="syz.0.9590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2064.298375][ T30] audit: type=1400 audit(1879307532.059:21273): avc: denied { prog_load } for pid=3231 comm="syz.0.9590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2064.364306][ T30] audit: type=1400 audit(1879307532.087:21274): avc: denied { name_bind } for pid=3251 comm="syz.4.9599" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 2064.407592][ T30] audit: type=1400 audit(1879307532.087:21275): avc: denied { name_bind } for pid=3251 comm="syz.4.9599" src=24098 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 2064.484920][ T30] audit: type=1400 audit(1879307532.181:21276): avc: denied { create } for pid=3253 comm="syz.4.9600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 2066.616651][T30213] libceph: connect (1)[c::]:6789 error -101 [ 2066.624245][T30213] libceph: mon0 (1)[c::]:6789 connect error [ 2066.640268][ T3359] ceph: No mds server is up or the cluster is laggy [ 2069.360943][ T30] kauditd_printk_skb: 152 callbacks suppressed [ 2069.360954][ T30] audit: type=1400 audit(1879307537.026:21429): avc: denied { create } for pid=3441 comm="syz.0.9679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2069.414193][ T30] audit: type=1400 audit(1879307537.063:21430): avc: denied { prog_load } for pid=3427 comm="syz.1.9675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2069.551736][ T30] audit: type=1400 audit(1879307537.063:21431): avc: denied { create } for pid=3427 comm="syz.1.9675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2069.634085][ T30] audit: type=1400 audit(1879307537.063:21432): avc: denied { create } for pid=3427 comm="syz.1.9675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2069.707945][ T30] audit: type=1400 audit(1879307537.063:21433): avc: denied { map_create } for pid=3427 comm="syz.1.9675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2069.780003][ T30] audit: type=1400 audit(1879307537.063:21434): avc: denied { prog_load } for pid=3427 comm="syz.1.9675" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2069.850805][ T30] audit: type=1400 audit(1879307537.101:21435): avc: denied { create } for pid=3438 comm="syz.2.9678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 2069.916420][ T30] audit: type=1400 audit(1879307537.316:21436): avc: denied { create } for pid=3448 comm="syz.4.9680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=0 [ 2069.969633][ T30] audit: type=1400 audit(1879307537.353:21437): avc: denied { create } for pid=3450 comm="syz.2.9681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 2070.022957][ T30] audit: type=1400 audit(1879307537.541:21438): avc: denied { mounton } for pid=3452 comm="syz.2.9682" path="/1881/bus" dev="tmpfs" ino=10053 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 2074.814688][ T30] kauditd_printk_skb: 153 callbacks suppressed [ 2074.814701][ T30] audit: type=1400 audit(1879307542.124:21592): avc: denied { prog_load } for pid=3598 comm="syz.1.9747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2074.864471][ T30] audit: type=1400 audit(1879307542.161:21593): avc: denied { mounton } for pid=3598 comm="syz.1.9747" path="/1914/file0" dev="tmpfs" ino=10239 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 2074.981247][ T30] audit: type=1400 audit(1879307542.171:21594): avc: denied { prog_load } for pid=3600 comm="syz.4.9746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2075.129935][ T30] audit: type=1400 audit(1879307542.171:21595): avc: denied { execmem } for pid=3600 comm="syz.4.9746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 2075.153296][ T30] audit: type=1400 audit(1879307542.227:21596): avc: denied { mounton } for pid=3600 comm="syz.4.9746" path="/2034/file0" dev="tmpfs" ino=10908 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 2075.185958][ T30] audit: type=1400 audit(1879307542.311:21597): avc: denied { prog_load } for pid=3603 comm="syz.1.9748" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2075.214040][ T30] audit: type=1400 audit(1879307542.423:21598): avc: denied { allowed } for pid=3605 comm="syz.1.9749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 2075.252644][ T30] audit: type=1400 audit(1879307542.526:21599): avc: denied { mounton } for pid=3607 comm="syz.3.9750" path="/2041/file0" dev="tmpfs" ino=10975 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 2075.314142][ T30] audit: type=1400 audit(1879307542.592:21600): avc: denied { prog_load } for pid=3609 comm="syz.3.9751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2075.345590][ T30] audit: type=1400 audit(1879307542.592:21601): avc: denied { create } for pid=3609 comm="syz.3.9751" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 2080.451316][ T30] kauditd_printk_skb: 78 callbacks suppressed [ 2080.451332][ T30] audit: type=1400 audit(1879307547.400:21680): avc: denied { create } for pid=3716 comm="syz.0.9794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2080.511851][ T30] audit: type=1400 audit(1879307547.400:21681): avc: denied { map_create } for pid=3716 comm="syz.0.9794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2080.542339][ T30] audit: type=1400 audit(1879307547.400:21682): avc: denied { prog_load } for pid=3716 comm="syz.0.9794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2080.607583][ T30] audit: type=1400 audit(1879307547.503:21683): avc: denied { create } for pid=3719 comm="syz.1.9796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2080.654864][ T30] audit: type=1400 audit(1879307547.512:21684): avc: denied { create } for pid=3718 comm="syz.2.9795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 2080.683682][ T30] audit: type=1400 audit(1879307547.512:21685): avc: denied { map_create } for pid=3719 comm="syz.1.9796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2080.753186][ T30] audit: type=1400 audit(1879307547.521:21686): avc: denied { prog_load } for pid=3719 comm="syz.1.9796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2080.800382][ T30] audit: type=1400 audit(1879307547.615:21687): avc: denied { mounton } for pid=3722 comm="syz.3.9797" path="/2050/file0" dev="tmpfs" ino=11022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=0 [ 2080.828320][ T30] audit: type=1400 audit(1879307547.690:21688): avc: denied { create } for pid=3718 comm="syz.2.9795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 2081.361249][ T30] audit: type=1400 audit(1879307548.251:21689): avc: denied { prog_load } for pid=3716 comm="syz.0.9794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2081.918383][ T3741] xt_nat: multiple ranges no longer supported [ 2085.858546][ T30] kauditd_printk_skb: 138 callbacks suppressed [ 2085.858562][ T30] audit: type=1400 audit(1879307552.451:21828): avc: denied { create } for pid=3858 comm="syz.2.9854" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2085.943475][ T30] audit: type=1400 audit(1879307552.535:21829): avc: denied { create } for pid=3861 comm="syz.4.9856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 2085.987231][ T30] audit: type=1400 audit(1879307552.535:21830): avc: denied { create } for pid=3861 comm="syz.4.9856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2086.019026][ T30] audit: type=1400 audit(1879307552.535:21831): avc: denied { allowed } for pid=3861 comm="syz.4.9856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 2086.087208][ T30] audit: type=1400 audit(1879307552.544:21832): avc: denied { execmem } for pid=3861 comm="syz.4.9856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 2086.142019][ T30] audit: type=1400 audit(1879307552.563:21833): avc: denied { prog_load } for pid=3863 comm="syz.0.9855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2086.190946][ T30] audit: type=1400 audit(1879307552.563:21834): avc: denied { create } for pid=3863 comm="syz.0.9855" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2086.244345][ T30] audit: type=1400 audit(1879307552.563:21835): avc: denied { read } for pid=3863 comm="syz.0.9855" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 2086.302337][ T30] audit: type=1400 audit(1879307552.638:21836): avc: denied { prog_load } for pid=3848 comm="syz.1.9850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2086.396097][ T30] audit: type=1400 audit(1879307552.638:21837): avc: denied { create } for pid=3848 comm="syz.1.9850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2091.251318][ T30] kauditd_printk_skb: 174 callbacks suppressed [ 2091.251353][ T30] audit: type=1400 audit(1879307557.493:22012): avc: denied { create } for pid=3998 comm="syz.1.9914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 2091.438395][ T30] audit: type=1400 audit(1879307557.595:22013): avc: denied { map_create } for pid=3998 comm="syz.1.9914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2091.503211][ T30] audit: type=1400 audit(1879307557.595:22014): avc: denied { prog_load } for pid=3998 comm="syz.1.9914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2091.788275][ T30] audit: type=1400 audit(1879307557.624:22015): avc: denied { execmem } for pid=4004 comm="syz.0.9916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 2091.932869][ T30] audit: type=1400 audit(1879307557.633:22016): avc: denied { create } for pid=4004 comm="syz.0.9916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=0 [ 2091.991537][ T30] audit: type=1400 audit(1879307557.717:22017): avc: denied { prog_load } for pid=4002 comm="syz.4.9915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2092.078424][ T30] audit: type=1400 audit(1879307557.717:22018): avc: denied { prog_load } for pid=4002 comm="syz.4.9915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2092.134738][ T30] audit: type=1400 audit(1879307557.717:22019): avc: denied { map_create } for pid=4002 comm="syz.4.9915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2092.219746][ T30] audit: type=1400 audit(1879307558.129:22020): avc: denied { map_create } for pid=4006 comm="syz.0.9917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2092.305260][ T30] audit: type=1400 audit(1879307558.129:22021): avc: denied { create } for pid=4006 comm="syz.0.9917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2096.724264][ T30] kauditd_printk_skb: 146 callbacks suppressed [ 2096.724280][ T30] audit: type=1400 audit(1879307562.591:22168): avc: denied { create } for pid=4131 comm="syz.0.9969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 2096.845796][ T30] audit: type=1400 audit(1879307562.684:22169): avc: denied { execmem } for pid=4133 comm="syz.2.9970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 2096.873348][ T30] audit: type=1400 audit(1879307562.759:22170): avc: denied { allowed } for pid=4133 comm="syz.2.9970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 2097.043845][ T30] audit: type=1400 audit(1879307562.927:22171): avc: denied { create } for pid=4140 comm="syz.1.9972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2097.481421][ T30] audit: type=1400 audit(1879307562.946:22172): avc: denied { map_create } for pid=4140 comm="syz.1.9972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2097.598069][ T30] audit: type=1400 audit(1879307562.946:22173): avc: denied { prog_load } for pid=4140 comm="syz.1.9972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2097.641248][ T30] audit: type=1400 audit(1879307563.264:22174): avc: denied { prog_load } for pid=4142 comm="syz.3.9973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2097.695733][ T30] audit: type=1400 audit(1879307563.526:22175): avc: denied { create } for pid=4144 comm="syz.2.9974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2097.757489][ T30] audit: type=1400 audit(1879307563.582:22176): avc: denied { create } for pid=4144 comm="syz.2.9974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 2097.917455][ T30] audit: type=1400 audit(1879307563.732:22177): avc: denied { prog_load } for pid=4148 comm="syz.4.9975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2102.292238][ T30] kauditd_printk_skb: 149 callbacks suppressed [ 2102.292253][ T30] audit: type=1400 audit(1879307567.829:22327): avc: denied { prog_load } for pid=4261 comm="syz.4.10020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2102.333646][ T30] audit: type=1400 audit(1879307567.829:22328): avc: denied { prog_load } for pid=4261 comm="syz.4.10020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2102.363038][ T30] audit: type=1400 audit(1879307567.829:22329): avc: denied { map_create } for pid=4261 comm="syz.4.10020" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2102.612465][ T30] audit: type=1400 audit(1879307568.119:22330): avc: denied { create } for pid=4268 comm="syz.2.10023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 2102.700232][ T30] audit: type=1400 audit(1879307568.166:22331): avc: denied { execmem } for pid=4268 comm="syz.2.10023" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 2102.766796][ T30] audit: type=1400 audit(1879307568.278:22332): avc: denied { create } for pid=4270 comm="syz.1.10024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 2103.010495][ T30] audit: type=1400 audit(1879307568.427:22333): avc: denied { create } for pid=4270 comm="syz.1.10024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2103.558780][ T30] audit: type=1400 audit(1879307568.446:22334): avc: denied { create } for pid=4273 comm="syz.0.10025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 2103.609329][ T30] audit: type=1400 audit(1879307568.455:22335): avc: denied { execmem } for pid=4273 comm="syz.0.10025" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 2103.660115][ T30] audit: type=1400 audit(1879307568.502:22336): avc: denied { create } for pid=4275 comm="syz.4.10027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2108.149546][ T30] kauditd_printk_skb: 100 callbacks suppressed [ 2108.149562][ T30] audit: type=1400 audit(1879307573.301:22437): avc: denied { create } for pid=4365 comm="syz.0.10059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2108.216564][ T30] audit: type=1400 audit(1879307573.329:22438): avc: denied { map_create } for pid=4365 comm="syz.0.10059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2108.271291][ T30] audit: type=1400 audit(1879307573.329:22439): avc: denied { prog_load } for pid=4365 comm="syz.0.10059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2108.328459][ T30] audit: type=1400 audit(1879307573.366:22440): avc: denied { map_create } for pid=4367 comm="syz.1.10058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2108.384134][ T30] audit: type=1400 audit(1879307573.366:22441): avc: denied { prog_load } for pid=4367 comm="syz.1.10058" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2108.443941][ T30] audit: type=1400 audit(1879307573.432:22442): avc: denied { create } for pid=4369 comm="syz.2.10060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2108.499088][ T30] audit: type=1400 audit(1879307573.441:22443): avc: denied { map_create } for pid=4369 comm="syz.2.10060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2108.538270][ T30] audit: type=1400 audit(1879307573.441:22444): avc: denied { prog_load } for pid=4369 comm="syz.2.10060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2108.558684][ T30] audit: type=1400 audit(1879307573.507:22445): avc: denied { prog_load } for pid=4369 comm="syz.2.10060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2108.580454][ T30] audit: type=1400 audit(1879307573.507:22446): avc: denied { create } for pid=4369 comm="syz.2.10060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 2113.523588][ T30] kauditd_printk_skb: 134 callbacks suppressed [ 2113.523598][ T30] audit: type=1400 audit(1879307578.333:22581): avc: denied { read } for pid=4466 comm="syz.0.10095" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 2113.960550][ T30] audit: type=1400 audit(1879307578.371:22582): avc: denied { write } for pid=4466 comm="syz.0.10095" path="/dev/vhci" dev="devtmpfs" ino=1268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=0 [ 2114.090086][ T30] audit: type=1400 audit(1879307578.773:22583): avc: denied { create } for pid=4472 comm="syz.1.10097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2114.156829][ T30] audit: type=1400 audit(1879307578.773:22584): avc: denied { map_create } for pid=4472 comm="syz.1.10097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2114.218543][ T30] audit: type=1400 audit(1879307578.773:22585): avc: denied { prog_load } for pid=4472 comm="syz.1.10097" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2114.264285][ T30] audit: type=1400 audit(1879307578.820:22586): avc: denied { create } for pid=4474 comm="syz.3.10099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 2114.317247][ T30] audit: type=1400 audit(1879307578.820:22587): avc: denied { create } for pid=4474 comm="syz.3.10099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2114.359470][ T30] audit: type=1400 audit(1879307578.820:22588): avc: denied { create } for pid=4474 comm="syz.3.10099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2114.392229][ T30] audit: type=1400 audit(1879307578.820:22589): avc: denied { execute } for pid=4474 comm="syz.3.10099" path=2F6D656D66643A1A6A7E97C1202864656C6574656429 dev="tmpfs" ino=970 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 2114.417904][ T30] audit: type=1400 audit(1879307578.857:22590): avc: denied { create } for pid=4476 comm="syz.0.10098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 2119.183056][ T30] kauditd_printk_skb: 106 callbacks suppressed [ 2119.183071][ T30] audit: type=1400 audit(1879307583.637:22697): avc: denied { mounton } for pid=4561 comm="syz.1.10132" path="/1995/file0" dev="tmpfs" ino=10661 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 2119.281193][ T30] audit: type=1400 audit(1879307583.721:22698): avc: denied { execmem } for pid=4563 comm="syz.1.10133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 2119.346671][ T30] audit: type=1400 audit(1879307583.759:22699): avc: denied { create } for pid=4565 comm="syz.3.10134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 2119.416461][ T30] audit: type=1400 audit(1879307583.759:22700): avc: denied { create } for pid=4565 comm="syz.3.10134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2119.474448][ T30] audit: type=1400 audit(1879307583.759:22701): avc: denied { prog_load } for pid=4565 comm="syz.3.10134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 2119.532380][ T30] audit: type=1400 audit(1879307583.787:22702): avc: denied { create } for pid=4563 comm="syz.1.10133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 2119.609042][ T30] audit: type=1400 audit(1879307583.805:22703): avc: denied { create } for pid=4570 comm="syz.3.10136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 2119.703179][ T30] audit: type=1400 audit(1879307583.805:22704): avc: denied { create } for pid=4570 comm="syz.3.10136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 2119.747991][ T30] audit: type=1400 audit(1879307583.805:22705): avc: denied { create } for pid=4570 comm="syz.3.10136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 2119.801446][ T30] audit: type=1400 audit(1879307583.815:22706): avc: denied { create } for pid=4567 comm="syz.4.10135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 2121.856466][ T4623] lo speed is unknown, defaulting to 1000 [ 2121.863454][ T4623] lo speed is unknown, defaulting to 1000 [ 2123.671628][ T31] INFO: task kworker/0:1:26201 blocked for more than 143 seconds. [ 2123.679903][ T31] Not tainted 6.15.0-rc2-syzkaller-00404-g8560697b23dc #0 [ 2123.717261][ T31] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2123.740483][ T31] task:kworker/0:1 state:D stack:27048 pid:26201 tgid:26201 ppid:2 task_flags:0x4208060 flags:0x00004000 [ 2123.785272][ T31] Workqueue: usb_hub_wq hub_event [ 2123.799922][ T31] Call Trace: [ 2123.803236][ T31] [ 2123.806198][ T31] __schedule+0x116f/0x5de0 [ 2123.831830][ T31] ? __lock_acquire+0xa91/0x1ba0 [ 2123.836841][ T31] ? __pfx___schedule+0x10/0x10 [ 2123.841735][ T31] ? find_held_lock+0x2b/0x80 [ 2123.854127][ T31] ? schedule+0x2d7/0x3a0 [ 2123.863912][ T31] schedule+0xe7/0x3a0 [ 2123.868024][ T31] usb_kill_urb+0x253/0x320 [ 2123.894124][ T31] ? __pfx_usb_kill_urb+0x10/0x10 [ 2123.904901][ T31] ? __pfx_autoremove_wake_function+0x10/0x10 [ 2123.958821][ T31] usb_start_wait_urb+0x250/0x4b0 [ 2123.964002][ T31] ? __pfx_usb_start_wait_urb+0x10/0x10 [ 2123.991224][ T31] ? __asan_memset+0x23/0x50 [ 2123.996251][ T31] usb_control_msg+0x326/0x4a0 [ 2124.001063][ T31] ? __pfx_usb_control_msg+0x10/0x10 [ 2124.018784][ T31] get_bMaxPacketSize0.constprop.0+0xd0/0x1f0 [ 2124.039172][ T31] hub_port_init+0x690/0x3a70 [ 2124.055369][ T31] hub_event+0x2c67/0x4fa0 [ 2124.068692][ T31] ? __pfx_hub_event+0x10/0x10 [ 2124.096320][ T31] ? debug_object_deactivate+0x1ec/0x3a0 [ 2124.134956][ T31] ? rcu_is_watching+0x12/0xc0 [ 2124.156350][ T31] process_one_work+0x9cc/0x1b70 [ 2124.176235][ T31] ? __pfx_hcd_resume_work+0x10/0x10 [ 2124.197314][ T31] ? __pfx_process_one_work+0x10/0x10 [ 2124.219898][ T31] ? assign_work+0x1a0/0x250 [ 2124.253941][ T31] worker_thread+0x6c8/0xf10 [ 2124.265522][ T31] ? __kthread_parkme+0x19e/0x250 [ 2124.280154][ T31] ? __pfx_worker_thread+0x10/0x10 [ 2124.292313][ T31] kthread+0x3c2/0x780 [ 2124.303372][ T31] ? __pfx_kthread+0x10/0x10 [ 2124.318385][ T31] ? __pfx_kthread+0x10/0x10 [ 2124.345045][ T31] ? __pfx_kthread+0x10/0x10 [ 2124.349711][ T31] ? __pfx_kthread+0x10/0x10 [ 2124.365011][ T31] ? rcu_is_watching+0x12/0xc0 [ 2124.379092][ T31] ? __pfx_kthread+0x10/0x10 [ 2124.392908][ T31] ret_from_fork+0x45/0x80 [ 2124.406553][ T31] ? __pfx_kthread+0x10/0x10 [ 2124.420125][ T31] ret_from_fork_asm+0x1a/0x30 [ 2124.424957][ T31] [ 2124.428041][ T31] [ 2124.428041][ T31] Showing all locks held in the system: [ 2124.453161][ T31] 1 lock held by khungtaskd/31: [ 2124.468854][ T31] #0: ffffffff8e3bf5c0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x36/0x1c0 [ 2124.505398][ T31] 2 locks held by getty/5584: [ 2124.510119][ T31] #0: ffff88814d55d0a0 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x24/0x80 [ 2124.548406][ T31] #1: ffffc9000334b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x41b/0x14f0 [ 2124.558609][ T31] 5 locks held by kworker/0:1/26201: [ 2124.590877][ T31] #0: ffff888021ac5148 ((wq_completion)usb_hub_wq){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 2124.612550][ T31] #1: ffffc90002f57d18 ((work_completion)(&hub->events)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 2124.655021][ T31] #2: ffff88802a58b198 (&dev->mutex){....}-{4:4}, at: hub_event+0x1c0/0x4fa0 [ 2124.663975][ T31] #3: ffff88802a104510 (&port_dev->status_lock){+.+.}-{4:4}, at: hub_event+0x2906/0x4fa0 [ 2124.708704][ T31] #4: ffff88802a295668 (hcd->address0_mutex){+.+.}-{4:4}, at: hub_event+0x292b/0x4fa0 [ 2124.718451][ T31] 2 locks held by syz.4.10160/4635: [ 2124.740799][ T31] 3 locks held by syz.3.10165/4649: [ 2124.746044][ T31] [ 2124.748384][ T31] ============================================= [ 2124.748384][ T31] [ 2124.772869][ T31] NMI backtrace for cpu 0 [ 2124.772883][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.15.0-rc2-syzkaller-00404-g8560697b23dc #0 PREEMPT(full) [ 2124.772903][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 2124.772913][ T31] Call Trace: [ 2124.772919][ T31] [ 2124.772926][ T31] dump_stack_lvl+0x116/0x1f0 [ 2124.772952][ T31] nmi_cpu_backtrace+0x27b/0x390 [ 2124.772971][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 2124.772988][ T31] nmi_trigger_cpumask_backtrace+0x29c/0x300 [ 2124.773008][ T31] watchdog+0xf70/0x12c0 [ 2124.773031][ T31] ? __pfx_watchdog+0x10/0x10 [ 2124.773050][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 2124.773073][ T31] ? __kthread_parkme+0x19e/0x250 [ 2124.773099][ T31] ? __pfx_watchdog+0x10/0x10 [ 2124.773116][ T31] kthread+0x3c2/0x780 [ 2124.773133][ T31] ? __pfx_kthread+0x10/0x10 [ 2124.773149][ T31] ? __pfx_kthread+0x10/0x10 [ 2124.773165][ T31] ? __pfx_kthread+0x10/0x10 [ 2124.773179][ T31] ? __pfx_kthread+0x10/0x10 [ 2124.773195][ T31] ? rcu_is_watching+0x12/0xc0 [ 2124.773222][ T31] ? __pfx_kthread+0x10/0x10 [ 2124.773239][ T31] ret_from_fork+0x45/0x80 [ 2124.773256][ T31] ? __pfx_kthread+0x10/0x10 [ 2124.773273][ T31] ret_from_fork_asm+0x1a/0x30 [ 2124.773309][ T31] [ 2124.773329][ T31] Sending NMI from CPU 0 to CPUs 1: [ 2124.907545][ C1] NMI backtrace for cpu 1 [ 2124.907558][ C1] CPU: 1 UID: 0 PID: 19656 Comm: syz.2.3578 Not tainted 6.15.0-rc2-syzkaller-00404-g8560697b23dc #0 PREEMPT(full) [ 2124.907573][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 2124.907581][ C1] RIP: 0033:0x7f873ce4f78b [ 2124.907593][ C1] Code: 74 2a 89 fe 31 c0 bf 3c 00 00 00 e8 df e9 13 00 31 c0 89 44 24 0c 66 0f 1f 84 00 00 00 00 00 8b 44 24 0c 83 c0 01 89 44 24 0c f3 48 8b 76 10 64 8b 14 25 90 ff ff ff 48 8d 86 00 00 f0 ff 48 [ 2124.907604][ C1] RSP: 002b:00007f873dd27260 EFLAGS: 00000282 [ 2124.907615][ C1] RAX: 000000008b6fee8f RBX: 0000000000000007 RCX: ffffffffffffffa8 [ 2124.907623][ C1] RDX: 00007f873cfc0a25 RSI: 00007f873dd27280 RDI: 0000000000000007 [ 2124.907631][ C1] RBP: 00007f873d010a68 R08: 0000000000000000 R09: 0000000000000000 [ 2124.907639][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2124.907646][ C1] R13: 0000000000000001 R14: 00007f873d1b5fa0 R15: 00007ffc103d8358 [ 2124.907654][ C1] FS: 00007f873dd286c0 GS: 0000000000000000 [ 2124.908726][ T31] Kernel panic - not syncing: hung_task: blocked tasks [ 2125.017678][ T31] CPU: 0 UID: 0 PID: 31 Comm: khungtaskd Not tainted 6.15.0-rc2-syzkaller-00404-g8560697b23dc #0 PREEMPT(full) [ 2125.029463][ T31] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 2125.039498][ T31] Call Trace: [ 2125.042755][ T31] [ 2125.045668][ T31] dump_stack_lvl+0x3d/0x1f0 [ 2125.050259][ T31] panic+0x71c/0x800 [ 2125.054147][ T31] ? __pfx_panic+0x10/0x10 [ 2125.058543][ T31] ? preempt_schedule_thunk+0x16/0x30 [ 2125.063897][ T31] ? __pfx_nmi_raise_cpu_backtrace+0x10/0x10 [ 2125.069856][ T31] ? preempt_schedule_thunk+0x16/0x30 [ 2125.075214][ T31] ? watchdog+0xdda/0x12c0 [ 2125.079610][ T31] ? watchdog+0xdcd/0x12c0 [ 2125.084009][ T31] watchdog+0xdeb/0x12c0 [ 2125.088237][ T31] ? __pfx_watchdog+0x10/0x10 [ 2125.092895][ T31] ? lockdep_hardirqs_on+0x7c/0x110 [ 2125.098079][ T31] ? __kthread_parkme+0x19e/0x250 [ 2125.103092][ T31] ? __pfx_watchdog+0x10/0x10 [ 2125.107749][ T31] kthread+0x3c2/0x780 [ 2125.111799][ T31] ? __pfx_kthread+0x10/0x10 [ 2125.116367][ T31] ? __pfx_kthread+0x10/0x10 [ 2125.120936][ T31] ? __pfx_kthread+0x10/0x10 [ 2125.125508][ T31] ? __pfx_kthread+0x10/0x10 [ 2125.130083][ T31] ? rcu_is_watching+0x12/0xc0 [ 2125.134831][ T31] ? __pfx_kthread+0x10/0x10 [ 2125.139403][ T31] ret_from_fork+0x45/0x80 [ 2125.143799][ T31] ? __pfx_kthread+0x10/0x10 [ 2125.148369][ T31] ret_from_fork_asm+0x1a/0x30 [ 2125.153129][ T31] [ 2125.156338][ T31] Kernel Offset: disabled [ 2125.160638][ T31] Rebooting in 86400 seconds..