last executing test programs: 24.979152116s ago: executing program 0 (id=2854): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYBLOB="040025bd7000fedbdf2502000000050004000200000005000400010000000000000073797a310000000005000400020000001400020070696d"], 0x58}, 0x1, 0x0, 0x0, 0x20000890}, 0x20008040) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10020a0, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x10, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, 0x0, 0x1, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x30000d0, 0x0, 0x2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000380)='./bus\x00', 0x322020, &(0x7f0000000140)=ANY=[], 0x1, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x2) pwritev2(r3, &(0x7f0000000100)=[{&(0x7f0000000000)="ff", 0x1}], 0x1, 0x40e7f, 0x3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) sendfile(r4, r4, 0x0, 0xffffffff) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x10040d0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) 24.33867145s ago: executing program 0 (id=2858): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) io_uring_setup(0x51d2, &(0x7f0000000140)={0x0, 0x3957, 0x1006, 0x6, 0x402d5}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "fc7771", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x3, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x82}}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x40) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="8c000000", @ANYRES16, @ANYBLOB="000429bd7000fbdbdf250f0000003c0003801400020070696d367265670000000000000000000600040075b50000080001000000000014000600fe8000000000000000000000000000aa08000180060002003e000000060004004e21000008000b007369700008000500010000000800080001ffffff08000500090000"], 0x8c}}, 0x1) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)={0xb0, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x899}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3fed}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xc3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8016}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x719}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40841}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) socket$xdp(0x2c, 0x3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 23.466020695s ago: executing program 0 (id=2867): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) io_uring_setup(0x51d2, &(0x7f0000000140)={0x0, 0x3957, 0x1006, 0x6, 0x402d5}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "fc7771", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x3, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x82}}}}}}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="8c000000", @ANYRES16, @ANYBLOB="000429bd7000fbdbdf250f0000003c0003801400020070696d367265670000000000000000000600040075b50000080001000000000014000600fe8000000000000000000000000000aa08000180060002003e000000060004004e21000008000b007369700008000500010000000800080001ffffff08000500090000"], 0x8c}}, 0x1) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)={0xb0, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x899}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3fed}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xc3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8016}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x719}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40841}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) socket$xdp(0x2c, 0x3, 0x0) wait4(0x0, 0x0, 0x80000000, 0xffffffffffffffff) 22.932835129s ago: executing program 0 (id=2870): socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xb, 0x7fe2, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000006c0)={r0, &(0x7f0000000500), &(0x7f0000000600)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f00000004c0)=""/71}, 0x20) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) madvise(&(0x7f00002e5000/0x400000)=nil, 0x400000, 0xf) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff0000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYRESDEC=r0, @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095", @ANYRES16], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000000c0)={@empty, @remote}, &(0x7f0000000140)=0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x50) r7 = socket(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000002100050125bd700000000000020000000000000001000100", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="b7836f1c1b5be19805e133cc73fc59"], 0x28}}, 0x0) 22.058294534s ago: executing program 0 (id=2879): socket(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x3000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) unshare(0x4040600) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) openat$kvm(0xffffffffffffff9c, 0x0, 0x80e02, 0x0) r4 = openat$kvm(0xffffff9c, &(0x7f0000000040), 0x480, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000c80)=ANY=[@ANYBLOB]) r5 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000cce000/0x18000)=nil, 0x0, 0x0, 0x4d, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 21.503884418s ago: executing program 0 (id=2883): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) io_uring_setup(0x51d2, &(0x7f0000000140)={0x0, 0x3957, 0x1006, 0x6, 0x402d5}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "fc7771", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x3, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x82}}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x40) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="8c000000", @ANYRES16, @ANYBLOB="000429bd7000fbdbdf250f0000003c0003801400020070696d367265670000000000000000000600040075b50000080001000000000014000600fe8000000000000000000000000000aa08000180060002003e000000060004004e21000008000b007369700008000500010000000800080001ffffff08000500090000"], 0x8c}}, 0x1) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)={0xb0, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x899}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3fed}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xc3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8016}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x719}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40841}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) socket$xdp(0x2c, 0x3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0xffffffffffffffff) 9.112303854s ago: executing program 1 (id=2930): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) io_uring_setup(0x51d2, &(0x7f0000000140)={0x0, 0x3957, 0x1006, 0x6, 0x402d5}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "fc7771", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x3, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x82}}}}}}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="8c000000", @ANYRES16, @ANYBLOB="000429bd7000fbdbdf250f0000003c0003801400020070696d367265670000000000000000000600040075b50000080001000000000014000600fe8000000000000000000000000000aa08000180060002003e000000060004004e21000008000b007369700008000500010000000800080001ffffff08000500090000"], 0x8c}}, 0x1) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)={0xb0, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x899}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3fed}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xc3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8016}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x719}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40841}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) socket$xdp(0x2c, 0x3, 0x0) wait4(0x0, 0x0, 0x80000000, 0xffffffffffffffff) 9.111018384s ago: executing program 2 (id=2931): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYRES16=r3, @ANYBLOB="040025bd7000fedbdf2502000000050004000200000005000400010000000000000073797a310000000005000400020000001400020070696d367265673000000000000000000900070000"], 0x58}, 0x1, 0x0, 0x0, 0x20000890}, 0x20008040) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10020a0, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x10, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, &(0x7f0000000700)=ANY=[], 0x1, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x30000d0, 0x0, 0x2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000380)='./bus\x00', 0x322020, &(0x7f0000000140)=ANY=[], 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x2) pwritev2(r4, &(0x7f0000000100)=[{&(0x7f0000000000)="ff", 0x1}], 0x1, 0x40e7f, 0x3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) sendfile(r5, r5, 0x0, 0xffffffff) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x10040d0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x10000, &(0x7f00000002c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './bus'}}], [], 0x2c}) 9.110065574s ago: executing program 3 (id=2932): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) io_uring_setup(0x51d2, &(0x7f0000000140)={0x0, 0x3957, 0x1006, 0x6, 0x402d5}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "fc7771", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x3, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x82}}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x40) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="8c000000", @ANYRES16, @ANYBLOB="000429bd7000fbdbdf250f0000003c0003801400020070696d367265670000000000000000000600040075b50000080001000000000014000600fe8000000000000000000000000000aa08000180060002003e000000060004004e21000008000b007369700008000500010000000800080001ffffff08000500090000"], 0x8c}}, 0x1) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)={0xb0, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x899}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3fed}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xc3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8016}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x719}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40841}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r4}, &(0x7f0000000540), &(0x7f0000000580)=r5}, 0x20) socket$xdp(0x2c, 0x3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0xffffffffffffffff) 9.109291064s ago: executing program 4 (id=2933): socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xb, 0x7fe2, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000006c0)={r0, &(0x7f0000000500), &(0x7f0000000600)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f00000004c0)=""/71}, 0x20) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) madvise(&(0x7f00002e5000/0x400000)=nil, 0x400000, 0xf) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff0000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYRESDEC=r0, @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095", @ANYRES16], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000000c0)={@empty, @remote}, &(0x7f0000000140)=0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x50) r7 = socket(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000002100050125bd700000000000020000000000000001000100", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="b7836f1c1b5be19805e133cc73fc59"], 0x28}}, 0x0) 7.488729994s ago: executing program 1 (id=2934): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="040025bd7000fedbdf2502000000050004000200000005000400010000000000000073797a310000000005000400020000001400020070696d367265673000000000000000000900070000"], 0x58}, 0x1, 0x0, 0x0, 0x20000890}, 0x20008040) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$fuse(0x0, 0x0, 0x10020a0, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x10, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, &(0x7f0000000700)=ANY=[], 0x1, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x30000d0, 0x0, 0x2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000380)='./bus\x00', 0x322020, &(0x7f0000000140)=ANY=[], 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x2) pwritev2(r4, &(0x7f0000000100)=[{&(0x7f0000000000)="ff", 0x1}], 0x1, 0x40e7f, 0x3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) sendfile(r5, r5, 0x0, 0xffffffff) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x10040d0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x10000, &(0x7f00000002c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './bus'}}], [], 0x2c}) 7.486987684s ago: executing program 2 (id=2935): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="040025bd7000fedbdf2502000000050004000200000005000400010000000000000073797a310000000005000400020000001400020070696d367265673000000000000000000900070000"], 0x58}, 0x1, 0x0, 0x0, 0x20000890}, 0x20008040) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10020a0, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000140)='ramfs\x00', 0x10, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, 0x0, 0x1, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x30000d0, 0x0, 0x2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000380)='./bus\x00', 0x322020, &(0x7f0000000140)=ANY=[], 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x2) pwritev2(r4, &(0x7f0000000100)=[{&(0x7f0000000000)="ff", 0x1}], 0x1, 0x40e7f, 0x3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) sendfile(r5, r5, 0x0, 0xffffffff) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x10040d0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x10000, &(0x7f00000002c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './bus'}}], [], 0x2c}) 7.486063174s ago: executing program 3 (id=2936): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) io_uring_setup(0x51d2, &(0x7f0000000140)={0x0, 0x3957, 0x1006, 0x6, 0x402d5}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "fc7771", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x3, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x82}}}}}}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x40) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r4}, 0x18) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="8c000000", @ANYRES16, @ANYBLOB="000429bd7000fbdbdf250f0000003c0003801400020070696d367265670000000000000000000600040075b50000080001000000000014000600fe8000000000000000000000000000aa08000180060002003e000000060004004e21000008000b007369700008000500010000000800080001ffffff08000500090000"], 0x8c}}, 0x1) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)={0xb0, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x899}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3fed}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xc3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8016}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x719}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40841}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) socket$xdp(0x2c, 0x3, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0xffffffffffffffff) 7.485289784s ago: executing program 4 (id=2937): r0 = socket(0x10, 0x803, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000100)) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_mount_image$vfat(&(0x7f0000000100), &(0x7f0000000000)='./file0\x00', 0x800092, &(0x7f0000000500)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c756e695f786c6174653d312c757466383d312c6e6f6e756d7461696c3d302c756e695f786c6174653d312c756e695f786c6174653d302c757466383d312c696f636861727365743d69736f383835392d31332c636865636b3d7374726963742c726f6469722c757466383d302c756e695f786c6174653d312c636f6465706167653d3836362c73686f72746e616d653d6c6f7765722c73686f72746e616d653d6c6f7765722c646d61736b3d30303030303030303030303030303030303030303030312c646d61736b3d30303030303030303030303030303030303030303030362c756e695f786c6174653d302c696f636861727365743d63703835352c73686f72746e616d653d77696e39352c726f6469722c6e6e6f6e756d7461696c3d312c73686f72746e616d653d6d697865642c73686f72746e616d653d6d697865642c757466383d312c757466383d302c756e695f786c6174653d302c0500695f786c6174653d312c696f636861727365743d6370313235352c757466383d302c646566636f6e7465010000006e636f6e66696e65645f752c00"], 0x46, 0x2d1, &(0x7f0000000740)="$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") openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.io_queued_recursive\x00', 0x275a, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) getsockname$packet(r0, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="4c000000100039042abd70000000000000000000", @ANYRES32, @ANYBLOB="01180200031100002c0012800e00010069703665727370616e0000001800028008001500a8bc0d00040012"], 0x4c}}, 0x0) 5.769408734s ago: executing program 1 (id=2938): r0 = syz_mount_image$exfat(&(0x7f00000005c0), &(0x7f0000000240)='./file0\x00', 0x3000050, &(0x7f0000000600)=ANY=[], 0x2, 0x14fe, &(0x7f0000008900)="$eJzs3Au0ztXWMPA511p/NklPkvuaa/55kssiSXJJSCRJkiS5JSRJkoTEJrckJCH3JPeQ3GIn9/st9yQ5kiQJCUnWN3Q6n/e8nfftnO+c7/V9Z8/fGGvsNff/mfNZa889nv9ljL2/7Ti4av1qlesyM/xT8M9fUgEgBQD6AcA1ABABQKlspbIBDoNMGlP/uTcR/1oPTbvSKxBXkvQ/fZP+p2/S//RN+p++Sf/TN+l/+ib9T9+k/0KkZ1un575WRvod/3PP/0Ge//8/R87//0YOFxvz5fpi13f6B1Kk/+mb9D99k/6nb9L/9E36n75J///NRQCV/pvD0v/0TfovRHp2pZ8/y7iy40r//gkhhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGESB/OhcsMAPxlfqXXJYQQQgghhBBCiH+dkPFKr0AIIYQQQgghhBD/9yEo0GAgggyQEVIgE2SGqyALXA1Z4RpIwLWQDa6D7HA95ICckAtyQx7IC/nAAoEDhhjyQwFIwg1QEG6EQlAYikBR8FAMisNNUAJuhpJwC5SCW6E03AZloCyUg/JwO1SAO6AiVILKcCdUgbugKlSDu6E63AM14F6oCfdBLbgfasMDUAcehLrwENSDh6E+PAIN4FFoCI2gMTSBpv9H+S9CV3gJukF3SIUe0BNehl7QG/pAX+gHr0B/eBUGwGswEAbBYHgdhsAbMBTehGEwHEbAWzASRsFoGANjYRyMh7dhArwDE+FdmASTYQpMhWkwHWbAezATZsFseB/mwAcwF+bBfFgAC+FDWASLIQ0+giXwMSyFZbAcVsBKWAWrYQ2shXWwHjbARtgEm2ELbIVPYBtshx2wE3bBbtgDn8Je+Az2weewH774B/PP/qf8TggIqFChQYMZMAOmYApmxsyYBbNgVsyKCUxgNsyG2TE75sAcmAtzYR7Mg/kwHxISMjLmx/yYxCQWxIJYCAthESyCHj0Wx+JYAm/GklgSS2EpLI2lsQyWxbJYHstjBayAFbEiVsbKWAWrYFWsinfj3XgP1sAaWBNrYi2shbWxNtbBOlgX62I9rIf1sT42wAbYEBtiY2yMTbEpNsNm2BybY0tsia2wFbbG1tgG22BbbIvtsB22x/bYATtgR+yInbAzdsYX8UV8CV/C7lhF9cCe2BN7YS/sg32xL76C/fFVfBVfw4E4CAfj6/g6voFD8QwOw+E4AkdgBTUKR+MYZDUOx+N4nIATcCJOxEk4GSfjVJyG03EGzsCZOAtn4fs4Bz/AD3AezsMFuBAX4iJcjGmYhkvwLC7FZbgcV+BKXIUrcQ2uxTW4HjfgetyEm3ALbsFP8BPcjttxJ+7E3bgbP8VP8TP8DAfiftyPB/AAHsSDeAgP4WE8jEfwCB7Fo3gMj+FxPI4n8CSewpN4Gk/jGTyL5/AcnsfzeAGfz/N1vd2F1w0EdYlRRmVQGVSKSlGZVWaVRWVRWVVWlVAJlU1lU9lVdpVD5VC5VC6VR+VR+VQ+RYoUq1jlV/lVUiVVQVVQFVKFVBFVRHnlVXFVXJVQJVRJVVKVUreq0uo2VUaVVS18eVVeVVAtfUVVSVVWlVUVdZeqqqqpaqq6qq5qqBqqpqqpaqlaqrZ6QNVRPbAPPqQudaa+GoQN1GBsqBqpxqqJegMfU83UUGyuWqiW6gk1HIdha9XMt1FPq7ZqNLZTz6ox+JzqoMZhR/WC6qQ6qy7qRdVVNffdMvz2EaimYi/VW/VRfdVMvEtd6lhV9ZoaqAapwep1tQDfUEPVm2qYGq5GqLfUSDVKjVZj1Fg1To1Xb6sJ6h01Ub2rJqnJaoqaqqap6WqGek/NVLPUbPW+mqM+UHPVPDVfLVAL1YdqkVqs0tRHaon6WC1Vy9RytUKtVKvUarVGrVXr1Hq1QW1Um9RmtUVtVZ+obWq72qF2ql1qt9qjPlV71Wdqn/pc7VdfqAPqT+qg+lIdUl+pw+prdUR9o46qb9Ux9Z06rr5XJ9RJdUr9oE6rH9UZdVadUz+p8+pndUH9oi6qoECjVlproyOdQWfUKTqTzqyv0ln01TqrvkYn9LU6m75OZ9fX6xw6p86lc+s8Oq/Op60m7TTrWOfXBXRS36AL6ht1IV1YF9FFtdfFdHF9ky6hb9Yl9S26lL5Vl9a36TK6rC6ny+vbdQV9h66oK+nK+k5dRd+lq+pq+m5dXd+ja+h7dU19n66l79e19QO6jn5Q19UP6Xr6YV1fP6Ib6Ed1Q91IN9ZNdFP9mG6mH9fNdQvdUj+hW+kndWv9lG6jn9Zt9TO6nX5Wt9fP6Q76ed1Rv6A76c66i/5FX9RBd9PddaruoXvql3Uv3Vv30X11P/2K7q9f1QP0a3qgHqQH69f1EP2GHqrf1MP0cD1Cv6VH6lF6tB6jx+pxerx+W0/Q7+iJ+l09SU/WU/RUPU1P131+qzT778h/52/kD/j13bforfoTvU1v1zv0Tr1L79Z79B69V+/V+/Q+vV/v1wf0AX1QH9SH9CF9WB/WR/QRfVQf1cf0MX1cH9cn9En9k/5Bn9Y/6jP6rD6rf9Ln9Xl94befARg0ymhjTGQymIwmxWQymc1VJou52mQ115iEudZkM9eZ7OZ6k8PkNLlMbpPH5DX5jDVknGETm/ymgEmaG0xBc6MpZAqbIqao8aaYKW5u+qfz/2h9TU1T08w0M81Nc9PStDStTCvT2rQ2bUwb09a0Ne1MO9PetDcdTAfT0XQ0nUwn08V0MV1NV9PNdDOpJtX0NC+bXqa36WP6mn7mFdPf9DcDzAAz0Aw0g81gM8QMMUPNUDPMDDMjzAgz0ow0o81oM9aMNePNeDPBTDATzUQzyUwyU8wUM81MMzPMDDPTzDSzzWwzx8wxc81cM9/MNwvNQrPILDJpJs0sMUvMUrPMLDMrzAqzyqwya8was86sMxvMBrPJbDJLzVaz1Wwz28wOs8PsMrvMHrPH7DV7zT6zz+w3+80Bc8AcNAfNIXPIHDaHzRFzxBw1R80xc8wcN8fNCXPCnDKnzGlz2pwxZ8w5c86cN+fNBXPBXDQXL132RSpSkYlMlCHKEKVEKVHmKHOUJcoSZY2yRokoEWWLskXZo+ujHFHOKFeUO8oT5Y1SwUYUuYijOMofFYiS0Q1RwejGqFBUOCoSFY18VCwqHt0UlYhujkpGt0Sloluj0tFtUZmobFQuKh/dHlWI7ogqRpWiytGdUZXorqhqVC26O6oe3RPViO6Nakb3RbWi+6Pa0QNRnejBqG70UFQvejiqHz0SNYgejRpGjaLGUZOo6b+0fghncj7uu9nuNtX2sD3ty7aX7W372L62n33F9rev2gH2NTvQDrKD7et2iH3DDrVv2mF2uB1h37Ij7Sg72o6xY+04O96+bSfYd+xE+66dZCfbKXaqnWan2xn2PTvTzrKz7ft2jv3AzrXz7Hy7wC60H9pFdrFNsx/ZJfZju9Qus8vtCrvSrrKr7Rq71q6z6+0Gu9FuspvtFrvVfmK32e12h91pd9nddo/91O61n9l99nO7335hD9g/2YP2S3vIfmUP26/tEfuNPWq/tcfsd/a4/d6esCftKfuDPW1/tGfsWXvO/mTP25/tBfuLvWjDpYv7S6d3MmQoA2WgFEqhzJSZslAWykpZKUEJykbZKDtlpxyUg3JRLspDeSgf5aNLmJjyU35KUpIKUkEqRIWoCBUhT56KU3EqQSWoJJWkUlSKSlNpKkNlqByVo9vpdrqD7qBKVInupDvpLrqLqlE1qk7VqQbVoJpUk2pRLapNtakO1aG6VJfqUT2qT/WpATWghtSQGlNjakpNqRk1o+bUnFpSS2pFrag1taY21IbaUltqR+2oPbWnDtSBOlJH6kSdqAt1oa7UlbpRN0qlVOpJPakX9aI+1If6UT/qT/1pAA2ggTSQBtNgGkJDaCgNpWE0nEbQWzSSRtFoGkNjaRyNp/E0gSbQRJpIk2gSTaEpNI2m0QyaQTNpJs2m2TSH5tBcmkvzaT4tpIW0iBZRGqXRElpCS2kpLafltJJW0mpaTWtpLa2n9bSRNtJm2kxbaStto220g3bQLtpFe2gP7aW9tI/20X7aTwfoAB2kg3SIDtFhOkxH6AgdpaN0jI7RcTpOJ+gEnaJTdJpO0xk6Q+foHJ2nn+kC/UIXKVCKU5DZXeWyuKtdVneNS3GZ3KU4AoBLcS6X2+VxeV0+Z10Ol/OvYnLOFXKFXRFX1HlXzBV3N/0uLuPKunKuvLvdVXB3uIq/i6u7e1wNd6+r6e5z1dzdfxXXcve72u4RV8c96uq6Rq6ea+Lqu0dcA/eoa+gaucauiWvlnnSt3VOujXvatXXP/C5e5Ba7tW6dW+82uL3uM3fO/eSOum/defez6+a6u37uFdffveoGuNfcQDfod/EI95Yb6Ua50W6MG+vG/S6e4qa6aW66m+HeczPdrN/FC92Hbo5Lc3PdPDffLfg1vrSmNPeRW+I+dkvdMrfcrXAr3Sq32q3532td4Ta5zW6L2+M+ddvcdrfD7XS73O5f40v72Oc+d/vdF+6I+8YddF+6Q+6YO+y+/jW+tL9j7jt33H3vTriT7pT7wZ12P7oz7uyv+7+09x/cL+6iCw4YWbFmwxFn4Iycwpk4M1/FWfhqzsrXcIKv5Wx8HWfn6zkH5+RcnJvzcF7Ox5aJHTPHnJ8LcJJv4IJ8IxfiwlyEi7LnYlycb+ISfDOX5Fu4FN/Kpfk2LsNluRyX59u5At/BFbkSV+Y7uUoIXJWr8d1cne/hGnwv1+T7uBbfz7X5Aa7DD3Jdfojr8cNcnx/hBvwoN+RG3JibcFN+jJvx49ycW3BLfoJb8ZPcmp/iNvw0t+VnuB0/y+35Oe7Az3NHfoE7cWfuwi9yV36Ju3F3TuUe3JNf5l7cm/twX+7Hr3B/fpUH8Gs8kAfxYH6dh/AbPJTf5GE8nEfwWzySR/FoHsNjeRyP57d5Ar/DE/ldnsSTeQpP5Wk8nWfwezyTZ/Fsfp/n8Ac8l+fxfF7AC/lDXsSLOY0/4iX8MS/lZbycV/BKXsWreQ2v5XW8njfwRt7Em3kLb+VPeBtv5x28k3fxbt7Dn/Je/oz38ee8n7/gA/wnPshf8iH+ig/z13yEv+Gj/C0f4+/4OH/PJ/gkn+If+DT/yGf4LJ/jn/g8/8wX+Be+yIEhxljFOjZxFGeIM8YpcaY4c3xVnCW+Os4aXxMn4mvjbPF1cfb4+jhHnDPOFeeO88R543yxjSl2McdxnD8uECfjG+KC8Y1xobhwXCQuGvu4WFw8vikuEd8cl4xviUvFt8al49viMnHZ+JH7yse3xxXiO+KKcaW4cnxnXCW+K64aV4vvjqvH98Q14nvjmvF9ccn4/rh2/EBcJ34wrhs/FNeLH47rx4/EDeJH44Zxo7hx3CRuGj8WN4sfj5vHLeKW8RNxq/jJuHX8VNwmfjpuGz/zh8dT4x5xz/jl+OU4hHv1/OSC5MLkh8lFycXJtORHySXJj5NLk8uSy5MrkiuTq5Krk2uSa5PrkuuTG5Ibk5uSm5NbkiFUywgevfLaGx/5DD6jT/GZfGZ/lc/ir/ZZ/TU+4a/12fx1Pru/3ufwOX0un9vn8Xl9Pm89eefZxz6/L+CT/gZf0N/oC/nCvogv6r0v5ov7Jr6pb+qb+cd9c9/Ct/RP+Cf8k/5J/5R/yj/t2/pnfDv/rG/vn/Md/PP+ef+C7+Q7+y7+Rd/Vv+S7+e4+1af6nr6n7+V7+T6+j+/n+/n+vr8f4Af4gX6gH+wH+yF+iB/qh/phfpgf4Uf4kX6kH+1H+7F+rB/vx/sJfoKf6Cf6SX6Sn+Kn+Gl+mp/hZ/iZfqaf7Wf7OYXm+Ll+rp/v5/uFfqFf5Bf5NJ/ml/glfqlf6pf75X6lX+lX+9V+rV/r1/v1fqPf6Df7zX6r3+q3+W1+h9/hd/ldfo/f4/f6vX6f3+f3+/3+gD/gD/qD/pD/yh/2X/sj/ht/1H/rj/nv/HH/vT/hT/pT/gd/2v/oz/iz/pz/yZ/3P/sL/hd/0Qc/PvF2YkLincTExLuJSYnJiSmJqYlpiemJGYn3EjMTsxKzE+8n5iQ+SMxNzEvMTyxILEx8mFiUWJxIS3yUWJL4OLE0sSyxPLEisTKxKhFC3m1xyB8KhGS4IRQMN4ZCoXAoEooGH4qF4uGmUCLcHEqGW0KpcGsoHW4LZULZUC48GhqGRqFxaBKahsdCs/B4aB5ahJbhidAqPBlah6dCm/B0aBueCe3Cs6F9eC50CM+HjuGF0Cl0Dl3Ci6FreCl0C91DaugReoaXQ6/QO/QJfUO/8EroH14NA8JrYWAYFAaH18OQ8EYYGt4Mw8LwMCK8FUaGUWF0GBPGhnFhfHg7TAjvhInh3TApTA5TwtQwLUwPM8J7YWaYFWaH98Oc8EGYG+aF+WFBWBg+DIvC4pAWPgpLwsdhaVgWlocVYWVYFVaHNWFtWBfWhw1hY9gUNoctYWv4JGwL28OOsDPsCrvDnvBp2Bs+C/vC52F/+CIcCH8KB8OX4VD4KhwOX4cj4ZtwNHwbjoXvwvHwfTgRToZT4YdwOvwYzoSz4Vz4KZwPP4cL4ZdwUf5mTQghhBDi76L/4HiPv/G9DACgfpv3BICrt+c+/J9rbszx53lvladVAgCe7t7xob+MKlVSU1N/e+1SDVGBeQCQ+Ov6f4mXQUt4EtpACyjxN9fXW3U+z39QP3krQOb/kJMCl+PL9W/+L+o/9sSIRaXjc9n+m/rzAAoVuJyTCS7Hl+uX/C/q52z2B+vP9OV4gOb/IScLXI4v1y8Oj8Mz0OavXimEEEIIIYQQQvxZb1Wu/R/dP1+6P89jLudkhMvxH92fCyGEEEIIIYQQ4sp7rnOXpx5r06ZF+79vgr89F/jHsmQiE5n8fza50p9MQgghhBBCiH+1yxf9V3olQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCFE+vU/8e/ErvQehRBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCCCGEEEIIIYQQQgghhBBCiCvtfwUAAP//luw5aQ==") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x44, 0x6, 0x4e0, 0x378, 0x180, 0x0, 0x2e0, 0x180, 0x448, 0x448, 0x448, 0x448, 0x448, 0x6, 0x0, {[{{@uncond, 0x0, 0x158, 0x180, 0x0, {}, [@common=@unspec=@conntrack2={{0xc0}, {{@ipv4=@remote, [], @ipv6=@local, [], @ipv4=@private, [], @ipv6=@private1}}}, @common=@ttl={{0x28}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x218}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@uncond, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@addrtype={{0x30}}]}, @ECN={0x28}}, {{@ip={@rand_addr, @dev, 0x0, 0x0, 'syzkaller0\x00', 'macvlan1\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() syz_genetlink_get_family_id$tipc2(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000cc0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000b40)=ANY=[], 0x108}}, 0x1) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x18) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000680)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x804071, 0x0, 0x0, 0x0, &(0x7f0000000140)) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r6, 0x0, 0x9}, 0x18) timer_create(0x2, 0x0, &(0x7f0000000100)) 5.768245884s ago: executing program 2 (id=2939): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="040025bd7000fedbdf2502000000050004000200000005000400010000000000000073797a310000000005000400020000001400020070696d367265673000000000000000000900070000"], 0x58}, 0x1, 0x0, 0x0, 0x20000890}, 0x20008040) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10020a0, 0x0, 0x1, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000140)='ramfs\x00', 0x10, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, &(0x7f0000000700)=ANY=[], 0x1, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x30000d0, 0x0, 0x2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000380)='./bus\x00', 0x322020, &(0x7f0000000140)=ANY=[], 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x2) pwritev2(r4, &(0x7f0000000100)=[{&(0x7f0000000000)="ff", 0x1}], 0x1, 0x40e7f, 0x3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) sendfile(r5, r5, 0x0, 0xffffffff) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x10040d0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x10000, &(0x7f00000002c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './bus'}}], [], 0x2c}) 5.767324864s ago: executing program 3 (id=2940): socket(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x3000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, 0x0) unshare(0x4040600) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) openat$kvm(0xffffffffffffff9c, 0x0, 0x80e02, 0x0) r4 = openat$kvm(0xffffff9c, &(0x7f0000000040), 0x480, 0x0) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_SET_MSRS(0xffffffffffffffff, 0xc008ae88, &(0x7f0000000c80)=ANY=[@ANYBLOB]) r5 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x1) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000cce000/0x18000)=nil, 0x0, 0x0, 0x4d, 0x0, 0x0) ioctl$KVM_RUN(r5, 0xae80, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 5.766195694s ago: executing program 4 (id=2941): r0 = syz_mount_image$exfat(&(0x7f00000005c0), &(0x7f0000000240)='./file0\x00', 0x3000050, &(0x7f0000000600)=ANY=[], 0x2, 0x14fe, &(0x7f0000008900)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x44, 0x6, 0x4e0, 0x378, 0x180, 0x0, 0x2e0, 0x180, 0x448, 0x448, 0x448, 0x448, 0x448, 0x6, 0x0, {[{{@uncond, 0x0, 0x158, 0x180, 0x0, {}, [@common=@unspec=@conntrack2={{0xc0}, {{@ipv4=@remote, [], @ipv6=@local, [], @ipv4=@private, [], @ipv6=@private1}}}, @common=@ttl={{0x28}}]}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x218}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@uncond, 0x0, 0xa0, 0xc8, 0x0, {}, [@common=@addrtype={{0x30}}]}, @ECN={0x28}}, {{@ip={@rand_addr, @dev, 0x0, 0x0, 'syzkaller0\x00', 'macvlan1\x00'}, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x540) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000880), 0xffffffffffffffff) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000cc0)={&(0x7f0000000640)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000c80)={&(0x7f0000000b40)=ANY=[@ANYBLOB="0801", @ANYRES16=r3, @ANYBLOB="00042cbd7000fbdbdf250f0000003c000980080002000200000008000200a2000000080001000700000008000200ffff0000c37d01000001000008000200810000000800010083288528a000018044000400200001000a004e230000800000000000000000000000ffffac14141b04000000200002000a004e200000008100000000000000000000000000000000070000000800030000010000380004001400010002004e21e00000020000000000000000200002000a004e2180000001fe800000000000000000000000000014a00f000008000300000000000d00010069623a776c616e30000000000c00068008000600cd6900000c0003800800030002000000"], 0x108}}, 0x1) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x18) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000680)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x804071, 0x0, 0x0, 0x0, &(0x7f0000000140)) openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000380)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) connect$unix(r5, &(0x7f0000000800)=@file={0x1, './file0\x00'}, 0x6e) 3.936320146s ago: executing program 4 (id=2942): socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xb, 0x7fe2, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000006c0)={r0, &(0x7f0000000500), &(0x7f0000000600)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f00000004c0)=""/71}, 0x20) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) madvise(&(0x7f00002e5000/0x400000)=nil, 0x400000, 0xf) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff0000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYRESDEC=r0, @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095", @ANYRES16], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000000c0)={@empty, @remote}, &(0x7f0000000140)=0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x50) r7 = socket(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000002100050125bd700000000000020000000000000001000100", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="b7836f1c1b5be19805e133cc73fc59"], 0x28}}, 0x0) 3.935476186s ago: executing program 1 (id=2943): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) io_uring_setup(0x51d2, &(0x7f0000000140)={0x0, 0x3957, 0x1006, 0x6, 0x402d5}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000380)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x94) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @empty, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "fc7771", 0x14, 0x6, 0x0, @remote, @local, {[], {{0x3, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0x82}}}}}}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[], 0x48) sendmsg$IPVS_CMD_GET_INFO(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f0000000440)=ANY=[@ANYBLOB="8c000000", @ANYRES16, @ANYBLOB="000429bd7000fbdbdf250f0000003c0003801400020070696d367265670000000000000000000600040075b50000080001000000000014000600fe8000000000000000000000000000aa08000180060002003e000000060004004e21000008000b007369700008000500010000000800080001ffffff08000500090000"], 0x8c}}, 0x1) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f0000000600)={0xb0, 0x0, 0x20, 0x70bd2a, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x899}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x3fed}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x6, 0x2, 0x1}]}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xc3}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@private2={0xfc, 0x2, '\x00', 0x1}}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8016}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x719}]}, 0xb0}, 0x1, 0x0, 0x0, 0x40841}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)}, 0x20) socket$xdp(0x2c, 0x3, 0x0) wait4(0x0, 0x0, 0x80000000, 0xffffffffffffffff) 3.934518635s ago: executing program 2 (id=2944): socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xb, 0x7fe2, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000006c0)={r0, &(0x7f0000000500), &(0x7f0000000600)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f00000004c0)=""/71}, 0x20) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) madvise(&(0x7f00002e5000/0x400000)=nil, 0x400000, 0xf) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff0000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYRESDEC=r0, @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095", @ANYRES16], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000000c0)={@empty, @remote}, &(0x7f0000000140)=0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x50) r7 = socket(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000002100050125bd70000000000002000000000000000100010090fd", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="b7836f1c1b5be19805e133cc73fc59"], 0x28}}, 0x0) 3.934155426s ago: executing program 3 (id=2945): socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x5, 0xb, 0x7fe2, 0x2}, 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000006c0)={r0, &(0x7f0000000500), &(0x7f0000000600)=""/155}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000003c0)={r0, &(0x7f00000002c0), &(0x7f00000004c0)=""/71}, 0x20) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) madvise(&(0x7f00002e5000/0x400000)=nil, 0x400000, 0xf) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff0000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000240)=ANY=[@ANYRESDEC=r0, @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095", @ANYRES16], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000000c0)={@empty, @remote}, &(0x7f0000000140)=0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000005c0)={{r5}, &(0x7f0000000540), &(0x7f0000000580)=r6}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r5, &(0x7f0000000780)}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x4}, 0x50) r7 = socket(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f0000000200)) sendmsg$nl_route(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="280000002100050125bd70000000000002000000000000000100010090fd", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="b7836f1c1b5be19805e133cc73fc59"], 0x28}}, 0x0) 2.014478458s ago: executing program 1 (id=2946): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="040025bd7000fedbdf2502000000050004000200000005000400010000000000000073797a310000000005000400020000001400020070696d367265673000000000000000000900070000"], 0x58}, 0x1, 0x0, 0x0, 0x20000890}, 0x20008040) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10020a0, 0x0, 0x1, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000140)='ramfs\x00', 0x10, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, &(0x7f0000000700)=ANY=[], 0x1, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x30000d0, 0x0, 0x2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000380)='./bus\x00', 0x322020, &(0x7f0000000140)=ANY=[], 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x2) pwritev2(r4, &(0x7f0000000100)=[{&(0x7f0000000000)="ff", 0x1}], 0x1, 0x40e7f, 0x3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) sendfile(r5, r5, 0x0, 0xffffffff) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x10040d0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x10000, &(0x7f00000002c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './bus'}}], [], 0x2c}) 2.013088687s ago: executing program 2 (id=2947): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYRES16=r3, @ANYBLOB="040025bd7000fedbdf2502000000050004000200000005000400010000000000000073797a310000000005000400020000001400020070696d367265673000000000000000000900070000"], 0x58}, 0x1, 0x0, 0x0, 0x20000890}, 0x20008040) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10020a0, 0x0, 0x1, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000140)='ramfs\x00', 0x10, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, &(0x7f0000000700)=ANY=[], 0x1, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x30000d0, 0x0, 0x2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000380)='./bus\x00', 0x322020, &(0x7f0000000140)=ANY=[], 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x2) pwritev2(r4, &(0x7f0000000100)=[{&(0x7f0000000000)="ff", 0x1}], 0x1, 0x40e7f, 0x3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) sendfile(r5, r5, 0x0, 0xffffffff) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x10040d0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x10000, &(0x7f00000002c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './bus'}}], [], 0x2c}) 2.012180138s ago: executing program 3 (id=2948): socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/21], 0x48) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x6004c0f5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) r5 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) ioctl$VHOST_VDPA_SET_VRING_ENABLE(r5, 0x4008af75, &(0x7f0000000180)={0x2, 0x100}) bind$netlink(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x7, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000181100"/20, @ANYRES8=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r6}, 0x10) r7 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89101) syz_open_procfs$userns(r0, &(0x7f0000000380)) mount_setattr(r7, &(0x7f0000001d80)='.\x00', 0x8800, &(0x7f0000001dc0)={0x0, 0x70, 0x80000}, 0x20) syz_mount_image$exfat(&(0x7f00000000c0), &(0x7f0000003980)='./file1\x00', 0x800, &(0x7f0000000680)=ANY=[@ANYBLOB='time_offset=0x000000000000000e,utf8,gid=', @ANYRESHEX=0x0, @ANYBLOB="2c696f636861727365743d63703933322c64697363617264eec02c756d61736b3d30303030303030303030303030303030303030373737372c616c6c6f775f7574696d653d30303030303030303030303030303030303030303030302c646d61736b3d30303030303030303030303030303030303034373637312c6b6565705f6c6173745f646f74732c646d61736b3d30303030303030303030303030303030303030303030332c6572080072733d72656d6f756e742d726f2c7569643d", @ANYRESHEX=0x0, @ANYBLOB=',fmask=00000000000000000000005,appraise,\x00'], 0x1, 0x152d, &(0x7f00000039c0)="$eJzs3AucTtX6OPDnWWvtMSbpbZLLsNZ6Nm9yWSZJckmSS5IkSZJbQtIkRxISQ25JQxKSy5BchpBcJiaN+/1+SUiSJklCckvW/6P4O506/9M5p9/x+595vp/P/ljP7P2s/ez32e/77r0x33QeUqNRzaoNiAj+LfjLH8kAEAsAAwDgGgAIAKBsfNn4C+tzSkz+93bC/lwPpV3pCtiVxP3P3rj/2Rv3P3vj/mdv3P/sjfufvXH/szfuP2PZ2aZpBa7lJfsuf/P8H//lE4mf//9/iL///4tklRrzxZpS13cBiPmjKdz/7I37/18r+CMbcf+zN+5/dhV7pQtg/wvw+z87yPF313D/szfuP2PZ2ZV+/nylF4hk79fgSp9/jDHGGGOMMcYYY4wxxhhjjDHGGGOMMcYYY4wxxhhjjDHGGGOMMcYYY4wxxhhjjDHGGGOMMcYYY4wxxhhjjDHGGGOMMcYYY4wxxhhjjDHGGGOMMcYYY4wxxhhjjDHGGGOMMcYYY4wxxhhjjDHGGGOMMcYYY4wxxhhjjDHGGGOMMcayh9P+MgUAl8ZXui7GGGOMMcYYY4z9eXyOK10BY4wxxhhjjDHG/uchCJCgIIAYyAGxkBPiQADA1ZAbroEIXAvxcB3kgeshL+SD/FAAEqAgFAINBiwQhFAYikAUboCicCMUg+JQAkqCg1KQCDdBabgZysAtUBZuhXJwG5SHClARKsHtUBnugCpwJ1SFu6AaVIcaUBPuhlpwD9SGe6EO3Ad14X6oBw9AfXgQGsBD0BAehkbwCDSGR6EJNIVm0Bxa/Ev5L0B3eBF6QE9Ihl7QG16CPtAX+kF/GAAvw0B4BQbBq5ACg2EIvAZD4XUYBm/AcBgBI+FNGAVvwWgYA2NhHKTCeJgAb8NEeAcmwWSYAlMhDabBdHgXZsBMmAXvwWx4H+bAXJgH8yEdPoAFsBAy4ENYBB9BJiyGJbAUlsFyWAErYRWshjWwFtbBetgAG2ETbIYtsBW2wXbYAR/DTvgEdsFu2AOfwl747J/MP/U3+V0QEFCgQIUKYzAGYzEW4zAOc2EuzI25MYIRjMd4zIN5MC/mxfyYHxMwAQthITRokJCwMBbGKEaxKBbFYlgMS2AJdOgwEROxNN6MZbAMlsWyWA7LYXmsgBWwElbCylgZq2AVrIpVsRpWwxpYA+/Gu7EX1sbaWAfrYF2se+nxFDbABtgQG2IjbISNsTE2wSbYDJthC2yBLbEltsJW2AbbYFtsi+2wHSZhErbH9tgBO2BH7IidsBN2xs7YBbti16wXcgC+iC9iT6wmemFv7I19MCVHP+yP/fFlHIiv4Cv4KqbgYByCr+Fr+DoOw5M4HEfgSByJlcVbOBrHIIlxmIqpOAEn4ESciJNwMk7GqZiG03A6TscZOBNn4ns4G9/H93EuzsX5mI7puAAXYgZm4CI8hZm4GJfgUlyGy3EZrsRVuBLX4Fpcg+txPW7EjbgZN+NW3IrbcTt+jAoAP8HduBtTcC/uxX24D/fjfjyABzALs/AgHsRDeAgP42E8gkfwKB7D43gMT+AJPImn8DSexrN4Fs/hcwlfNfy4+OoUEBcooUSMiBGxIlbEiTiRS+QSuUVuERERES/iRR6RR+QVeUV+kV8kiARRSBQSRhhBIowBABEVUVFUFBXFRDFRQpQQTjiRKBJFaVFalBFlRFlxqygnbhPlRQXR2lUSlURl0cZVEXeKqqKqqCaqixqipqgpaolaoraoLeqIOqKuqCvqiQdEfdEL++FD4kJnGonB2FgMwSaiqZAXP8FaimHYSrQWbcQTYgQOx3aipUsST4v2YjR2EH8RY/BZ0UmMw87iedFFdBXdxAuiu2jleoieYhL2Er3FVOwj+op+or+YgdXFezg7Zw3xqkgRg8UQ8ZqYj6+LYeINMVyMECPFm2KUeEuMFmPEWDFOpIrxYoJ4W0wU74hJYrKYIqaKNDFNTBfvihlippgl3hOzxftijpgr5on5Il18IBaIhSJDfCgWiY9EplgsloilYplYLlaIlWKVWC3WiLVinVgvNoiNYpPYLLaIrWKb2C52iI/FTvGJ2CV2iz3iU7FXfCb2ic/FfvGFOCC+FFniK3FQfC0OiW/EYfGtOCK+E0fFMXFcfC9OiB/ESXFKnBZnxFnxozgnfhLnhRcgUQoppZKBjJE5ZKzMKePkVTKXDC6+utfKeHmdzCOvl3llPplfFpAJsqAsJLU00kqSoSwsi8iovEEWlTfKYrK4LCFLSidLyUR5kywtb5Zl5C2yrLxVlpO3yfKygqwoK8nbZWV5h4TIL/uoJqvLGrKmvFsmwz2ytrxX1pH3ybryfllPPiDrywdlA/mQbCgflo3kI7KxfFQ2kU1lM9lctpCPyZbycdlKtpZt5BOyrXxStpNPyST5tGwv/cVT5FnZST4nO8vnZRfZVXaTP8nz0ssesqeEXiB7y5dkH9lX9pP95QD5shwoX5GD5KsyRQ6WQ+Rrcqh8XQ6Tb8jhcoQcKd+Uo+RbcrQcI8fKcTJVjpcT5NtyonxHTpKT5RQ5VabJabLfxZlmSfkP89/+nfxBP+99o9wkN8stcqvcJrfLHfJjuVPulLvkLrlH7pF75V65T+6T++V+eUAekFkySx6UB+UheUgeloflEXlEHpXH5Bn5vTwhf5An5Sl5Sp6RZ+VZee7iawAKlVBSKRWoGJVDxaqcKk5dpXKpq1VudY2KqGtVvLpO5VHXq7wqn8qvCqgEVVAVUloZZRWpUBVWRVRU3YAXTxhVQpVUTpVSieqmfyZfFVU3qmKq+K/yL9WX/Hfqa6FaqJaqpWqlWqk2qo1qq9qqdqqdSlJJqr1qrzqoDqqj6qg6qU6qs+qsuqguqpvqprqr7qqH6qGSVbLqrV5SfVRf1U/1VwPUy2qgGqgGqUEqRaWoIWqIGqqGqmFqmBquhquRaqQapUap0Wq0GqvGqlSVqiaoCWqimqgmqUlqipqi0lSamq6mqxlqhpqlZqnZaraao+aoeWqeSlfpaoFaoDJUhlqkFqlMtVgtVkvVUrVcLVcr1Uq1Wq1Wa9VatV6tV5lqk9qktqgtapvapnaoHWqn2ql2qV1qj9qj9qq9ap/ap/ar/eqAOqCyVJY6qA6qQ+qQOqwOqyPqiDqqjqrj6rg6oU6ok+qkOq1Oq7PqrDqnzqnz6vyFy75ABCJQgQpigpggNogN4oK4IFeQK8gd5A4iQSSID+KDPMH1Qd4gX5A/KBAkBAWDQoEOTGADcbHp0eCGoGhwY1AsKB6UCEoGLigVJAY3BaWDm4MywS1B2eDWoFxwW1A+qBBUDCoFtweVgzuCKsGdQdXgrqBaUD2oEdQM7g5qBfcEtYN7gzrBfUHd4P6gXvBAUD94MGgQPBQ0DB4OGgWPBI2DR4MmQdOgWdA8aPGnzu/9yXyPux66p07WvXRv/ZLuo/vqfrq/HqBf1gP1K3qQflWn6MF6iH5ND9Wv62H6DT1cj9Aj9Zt6lH5Lj9Zj9Fg9Tqfq8XqCfltP1O/oSXqynqKn6jQ9TU/X7+oZeqaepd/Ts/X7eo6eq+fp+Tpdf6AX6IU6Q3+oF+mPdKZerJfopXqZXq5X6JV6lV6t1+i1ep1erzfojXqT3qy36K16m96ud+iP9U79id6ld+s9+lO9V3+m9+nP9X79hT6gv9RZ+it9UH+tD+lv9GH9rT6iv9NH9TF9XH+vT+gf9El9Sp/WZ/RZ/aM+p3/S57W/cHF/4evdKKNMjIkxsSbWxJk4k8vkMrlNbhMxERNv4k0ek8fkNXlNfpPfJJgEU8gUMheQIVPYFDZREzVFTVFTzBQzJUwJ44wziSbRlDalTRlTxpQ1ZU05U86UN+VNRVPR3G5uN3eYO8yd5k5zl7nLVDfVTU1T09QytUxtU9vUMXVMXVPX1DP1TH1T3zQwDUxD09A0Mo1MY9PYNDFNTDPTzLQwLUxL09K0Mq1MG9PGtDVtTTvTziSZJNPetDcdTAfT0XQ0nUwn09l0Nl1MF9PNdDPdTXfTw/QwySbZ9Da9TR/Tx/Qz/cwAM8AMNAPNIDPIpJgUM8QMMUPNUDPMDDPDzQgz8sKFqnnLjDZjzFgzzqSaVDPBTDATzUQzyUwyU8wUk2bSzHQz3cwwM8wsM8vMNrPNHDPHzDPzTLpJNwvMApNhMswis8hkmkyzxCwxy8wys8KsMKvMKrPGrDHrYJ3ZYDaYTWaT2WK2mG1mm9lhdpidZqfZZXaZPWaP2Wv2mn1mn9lv9psD5oDJMlnmoDloDplD5rA5bI6YI+aoOWqOm+PmhDlhTpqT5rQ5bc6afBe/L72JtTltnL3K5rJX29z2Gvu3cX5bwCbYgraQ1Tavzfer2Fhri9nitoQtaZ0tZRPtTb+Jy9sKtqKtZG+3le0dtspv4lr2Hlvb3mvr2PtsTXv3r+K69n5bzz5i6yMC2Ka2oW1uG9lHbGP7qG1im9pmtrlta5+07exTNsk+bdvbZ34TL7AL7Sq72q6xa+0uu9uetmfsIfuNPWt/tD1sTzvAvmwH2lfsIPuqTbGDfxOPtG/aUfYtO9qOsWPtuN/EU+xUm2an2en2XTvDzvxNnG4/sLNthp1j59p5dv7P8YWaMuyHdpH9yGbaAJbYpXaZXW5X2JX/t9aldr3dYDfanfYTu8Vutdvsdrvj0oWw3W332E/tXvuZPWi/tvvtF/aAPWyz7Fc/xxeO77D91h7B097bY/a4/d6esD+oS9kXjv17+5M9b70FQgKSpCigGMpBsZST4ugqykVXU266hiJ0LcXTdZSHrqe8lI/yUwFKoIJUiDQZskQUUmEqQlG6gS6VV4JKkqNSlEg3UWm6mcrQLVSWbqVydBuVpwpUkSrR7VSZ7qAqdCdVpbuoGlWnGlST7qZadA/VpnupDt1Hdel+qkcPUH16kBrQQ9SQHqZG9Ag1pkepCTWlZtScWtBj1JIep1bUmtrQE9SWnqR29BQl0dPUnp6hDvQX6kjPUid6jjrT89SFulI3eoG604vUg3pSMvWi3vQS9aG+1I/60wB6mQbSKzSIXqUUGkxD6DUaSq/TMHqDhtMIGklv0ih6i0bTGBpL4yiVxtMEepsm0js0iSbTFJpKaTSNptO7NINm0ix6j2bT+zSH5tI8mk/p9AEtoIWUQR/SIvqIMmkxLaGltIyW0wpaSatoNa2htbSO1tMG2kibaDNtoa20jbbTDvqYdtIntIt20x76lPbSZ7SPPqf99AUdoC8pi76ig/Q1HaJv6DB963vSd3SUjtFx+p5O0A90kk7RaTpDZ+lHOkc/0XnyBCGGIpShCoMwJswRxoY5w7jwqjBXeHWYO7wmjITXhvHhdWGe8Powb5gvzB8WCBPCgmGhUIcmtCGFYVg4LBJGwxvCouGNYbHY4mGJsGTowlJhYnhTWDq8OSwT3hKWDW8Ny4W3heXDCuEj91UKbw8rh3eEVcI7w6rhXWG1sHpYI6wZ3h3WCu8Ja4f3hnXC+8Iy4f1hvfCBsH74YNggfChsGD4cNgofCRuHj4ZNwqZhs7B52CJ8LGwZPh62CluHbcInwrbhk2G78KkwKXw6bB8+8/P6+xf+/fXJYa+wd/hS+FLo/b1yXnR+ND36QXRBdGE0I/phdFH0o2hmdHF0SXRpdFl0eXRFdGV0VXR1dE10bXRddH10Q3Rj1PuaOcChE0465QIX43K4WJfTxbmrXC53tcvtrnERd62Ld9e5PO56l9flc/ldAZfgCrpCTjvjrCMXusKuiIu6G1xRd6Mr5oq7Eq6kc66US3TNXQvXwrV0j7tWrrVr455wT7gn3ZPuKfeUe9q1d8+4Du4vrqN71nVyz7nn3POui+vqurkXXHc3Pvcv78lk19v1dn1cH9fP9XMD3AA30A10g9wgl+JS3BA3xA11Q90wN8wNd8PdSDfSjXKj3Gg32o11Y12qS3UT3AQ30U10k9wkN8VNcWkuzU13090MN8NVnvnLXua4OW6em+fSXbpb4C5cM2a4RW6Ry3SZbolb4pa5ZW6FW+FWuVVujVvj1rl1boPb4Da5TW6L2+K2uW1uh9vhdrqdbpe/5pdJ3V63z+1z+91+d8B96bLcV+6g+9odct+4w+5bd8R95466Y+64+96dcD+4k+6UO+3OuLPuR3fO/eTOO+9SI+MjEyJvRyZG3olMikyOTIlMjaRFpkWmR96NzIjMjMyKvBeZHXk/MicyNzIvMj+SHvkgsiCyMJIR+TCyKPJRJDOyOLIksjSyLLI84n3BLaEv7Iv4qL/BF/U3+mK+uC/hS3rnS/lEf5Mv7W/2Zfwtvqy/1Zfzt/nyvoKv6B/1TXxT38w39y38Y76lf9y38q19G/+Eb+uf9O38Uz7JP+3b+2d8B/8X39E/6zv553xn/7zv4rv6bv4F392/6Hv4nj7Z9/K9/Uu+j+/r+/n+foB/2Q/0r/hB/lWf4gf7If41P9S/7of5N/xwP8KPjHnTj7p0iwzjfKof7yf4t/1E/46f5Cf7KX6qT/PT/HT/rp/hZ/pZ/j0/27/v5/i5fp6f79P9B36BX+gz/Id+kf/IZ/rFlx4q+xV+pV/lV/s1fq1f59f7DX6j3+Q3+y1+q9/mt/sd/mO/03/id/ndfo//1O/1n/l9/nO/33/hD/gvfZb/yh/0X/tD/ht/2H/rj/jv/FF/zB/33/sT/gd/0p/yp/0Zf9b/6M/5n/x5/j9rjDHGGGN/yPjLQ/HrNb88zu/1OznirzbuDQBXby2Q9dfrL1xRrsv7y7ivSGgbAYCne3Z+6NJSrVpycvLFbTMlBEXmAlz6m6ALYuByvBjawJOQBK2h9O/W31d0PUv/YP7orQBxf5UTC5fjy/N/DoDJvzP/Y0+MXFAuPB3//5h/LkCxIpdzcsLleDG0+fn5Smso83fqz9fyH9Sf84tUgFZ/lZMLLseX60+Ex+EZSPrVlowxxhhjjDHG2C/6ioodL91/XvoXn793f56gLufkgMvxP7o/Z4wxxhhjjDHG2JX3bNduTz2WlNS64z8/qPIvZf3hQWP4n5qZB7878B7g0k8UAPybEwJ07SYB4D94FJv/I/tKufjW+dtVy874AP53tPLPGFzhDybGGGOMMcbYn+7yRf+vf66uVEGMMcYYY4wxxhhjjDHGGGOMMcYYY4wxxhhjjDHGGGOMMcYYY4wxxlg29J/4dWJX+hgZY4wxxhhjjDHGGGOMMcYYY4wxxhhjjDHGGGOMMcYYY4wxxhhjjDHGGGOMMcYYY4yxK+3/BAAA//8mOwLD") mount$cgroup(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) 2.011426698s ago: executing program 4 (id=2949): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="040025bd7000fedbdf2502000000050004000200000005000400010000000000000073797a310000000005000400020000001400020070696d367265673000000000000000000900070000"], 0x58}, 0x1, 0x0, 0x0, 0x20000890}, 0x20008040) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10020a0, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x10, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, &(0x7f0000000700)=ANY=[], 0x1, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x30000d0, 0x0, 0x2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000380)='./bus\x00', 0x322020, &(0x7f0000000140)=ANY=[], 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x2) pwritev2(r4, &(0x7f0000000100)=[{&(0x7f0000000000)="ff", 0x1}], 0x1, 0x40e7f, 0x3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) sendfile(r5, r5, 0x0, 0xffffffff) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x10040d0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x10000, &(0x7f00000002c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './bus'}}], [], 0x2c}) 2.67681ms ago: executing program 1 (id=2950): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="040025bd7000fedbdf2502000000050004000200000005000400010000000000000073797a310000000005000400020000001400020070696d367265673000000000000000000900070000"], 0x58}, 0x1, 0x0, 0x0, 0x20000890}, 0x20008040) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10020a0, 0x0, 0x1, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000140)='ramfs\x00', 0x10, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, &(0x7f0000000700)=ANY=[], 0x1, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x30000d0, 0x0, 0x2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000380)='./bus\x00', 0x322020, &(0x7f0000000140)=ANY=[], 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x2) pwritev2(r4, &(0x7f0000000100)=[{&(0x7f0000000000)="ff", 0x1}], 0x1, 0x40e7f, 0x3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) sendfile(r5, r5, 0x0, 0xffffffff) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x10040d0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x10000, &(0x7f00000002c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './bus'}}], [], 0x2c}) 1.6523ms ago: executing program 2 (id=2951): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB='X\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="040025bd7000fedbdf2502000000050004000200000005000400010000000000000073797a310000000005000400020000001400020070696d367265673000000000000000000900070000"], 0x58}, 0x1, 0x0, 0x0, 0x20000890}, 0x20008040) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10020a0, 0x0, 0x1, 0x0, 0x0) mount(0x0, 0x0, &(0x7f0000000140)='ramfs\x00', 0x10, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, &(0x7f0000000700)=ANY=[], 0x1, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x30000d0, 0x0, 0x2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000380)='./bus\x00', 0x322020, &(0x7f0000000140)=ANY=[], 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x2) pwritev2(r4, &(0x7f0000000100)=[{&(0x7f0000000000)="ff", 0x1}], 0x1, 0x40e7f, 0x3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) sendfile(r5, r5, 0x0, 0xffffffff) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x10040d0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x10000, &(0x7f00000002c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './bus'}}], [], 0x2c}) 861.33µs ago: executing program 3 (id=2952): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x102}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, &(0x7f00000000c0)=0x1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_genetlink_get_family_id$smc(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$SMC_PNETID_ADD(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYRES16=r3, @ANYBLOB="040025bd7000fedbdf2502000000050004000200000005000400010000000000000073797a310000000005000400020000001400020070696d367265673000000000000000000900070000"], 0x58}, 0x1, 0x0, 0x0, 0x20000890}, 0x20008040) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_mount_image$fuse(0x0, &(0x7f0000000040)='./file0\x00', 0x10020a0, 0x0, 0x1, 0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x10, 0x0) syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xa0, &(0x7f0000000700)=ANY=[], 0x1, 0x0, 0x0) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x30000d0, 0x0, 0x2, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000100)='./bus\x00', &(0x7f0000000440), 0x8, &(0x7f0000000200)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './file0'}}]}) syz_mount_image$fuse(&(0x7f00000001c0), &(0x7f0000000380)='./bus\x00', 0x322020, &(0x7f0000000140)=ANY=[], 0x1, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x2) pwritev2(r4, &(0x7f0000000100)=[{&(0x7f0000000000)="ff", 0x1}], 0x1, 0x40e7f, 0x3, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1) sendfile(r5, r5, 0x0, 0xffffffff) syz_mount_image$fuse(0x0, &(0x7f0000000080)='./bus\x00', 0x10040d0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$overlay(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000000), 0x10000, &(0x7f00000002c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@lowerdir={'lowerdir', 0x3d, '.'}}, {@upperdir={'upperdir', 0x3d, './bus'}}], [], 0x2c}) 0s ago: executing program 4 (id=2953): socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x6004c0f5) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$VHOST_VDPA_SET_VRING_ENABLE(0xffffffffffffffff, 0x4008af75, &(0x7f0000000180)={0x2, 0x100}) bind$netlink(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x7, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000181100"/20, @ANYRES8, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mount_setattr(0xffffffffffffffff, &(0x7f0000001d80)='.\x00', 0x8800, &(0x7f0000001dc0)={0x0, 0x70, 0x80000}, 0x20) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.126' (ED25519) to the list of known hosts. [ 24.593101][ T28] audit: type=1400 audit(1762340828.521:64): avc: denied { mounton } for pid=275 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 24.594599][ T275] cgroup: Unknown subsys name 'net' [ 24.615904][ T28] audit: type=1400 audit(1762340828.521:65): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.643218][ T28] audit: type=1400 audit(1762340828.551:66): avc: denied { unmount } for pid=275 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 24.643430][ T275] cgroup: Unknown subsys name 'devices' [ 24.762628][ T275] cgroup: Unknown subsys name 'hugetlb' [ 24.768310][ T275] cgroup: Unknown subsys name 'rlimit' [ 24.872898][ T28] audit: type=1400 audit(1762340828.801:67): avc: denied { setattr } for pid=275 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 24.896161][ T28] audit: type=1400 audit(1762340828.801:68): avc: denied { mounton } for pid=275 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 24.907012][ T277] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 24.921257][ T28] audit: type=1400 audit(1762340828.801:69): avc: denied { mount } for pid=275 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 24.952719][ T28] audit: type=1400 audit(1762340828.851:70): avc: denied { relabelto } for pid=277 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 24.978408][ T28] audit: type=1400 audit(1762340828.851:71): avc: denied { write } for pid=277 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.007754][ T28] audit: type=1400 audit(1762340828.931:72): avc: denied { read } for pid=275 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.033350][ T28] audit: type=1400 audit(1762340828.931:73): avc: denied { open } for pid=275 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 25.033588][ T275] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 26.250100][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.257194][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.264741][ T283] device bridge_slave_0 entered promiscuous mode [ 26.273294][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.280604][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.288025][ T283] device bridge_slave_1 entered promiscuous mode [ 26.303976][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.311059][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.318525][ T284] device bridge_slave_0 entered promiscuous mode [ 26.326524][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.333615][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.341105][ T284] device bridge_slave_1 entered promiscuous mode [ 26.417076][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.424530][ T286] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.432039][ T286] device bridge_slave_0 entered promiscuous mode [ 26.453870][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.461017][ T286] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.468475][ T286] device bridge_slave_1 entered promiscuous mode [ 26.486373][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.493484][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.501016][ T285] device bridge_slave_0 entered promiscuous mode [ 26.521127][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.528382][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.536364][ T285] device bridge_slave_1 entered promiscuous mode [ 26.621358][ T288] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.628448][ T288] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.636025][ T288] device bridge_slave_0 entered promiscuous mode [ 26.656025][ T288] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.663182][ T288] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.670692][ T288] device bridge_slave_1 entered promiscuous mode [ 26.763897][ T286] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.770983][ T286] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.778270][ T286] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.785340][ T286] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.794680][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.801756][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.809052][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.816100][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.831150][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.838200][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.845517][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.852588][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.879509][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.886646][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.893947][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.900990][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.932751][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.940343][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.947618][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.954932][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.962117][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 26.969836][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.977224][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.984489][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.991785][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 27.012267][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.020525][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.027582][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.040498][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.048748][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.055802][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.066075][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.092515][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.101496][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.108531][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.118063][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.126590][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.133654][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.142322][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.173438][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.181814][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.189282][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.197137][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.205531][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.212614][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.220231][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.228416][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.235629][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.243147][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.251194][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.259296][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.280095][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.288497][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.296798][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.304977][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.315289][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.323741][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.332021][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.339145][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.351944][ T284] device veth0_vlan entered promiscuous mode [ 27.377068][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.385707][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.394412][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.402737][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.411569][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.419950][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.428139][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.435212][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.442890][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.451044][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.461024][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.468566][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.476114][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 27.484370][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.499276][ T284] device veth1_macvtap entered promiscuous mode [ 27.508122][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.516343][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.524743][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.532628][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.541438][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.560160][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.568715][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.577268][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.585458][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.593833][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 27.601639][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 27.609134][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 27.617376][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 27.625527][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.633211][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.640929][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 27.648439][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 27.661978][ T283] device veth0_vlan entered promiscuous mode [ 27.675328][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.683715][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.692424][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.701006][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.709312][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 27.717946][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 27.726309][ T10] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.733369][ T10] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.740957][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 27.749285][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 27.757559][ T10] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.764596][ T10] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.772197][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 27.780555][ T286] device veth0_vlan entered promiscuous mode [ 27.802038][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 27.810629][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 27.818800][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 27.819142][ T284] request_module fs-gadgetfs succeeded, but still no fs? [ 27.827230][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.842199][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.851743][ T283] device veth1_macvtap entered promiscuous mode [ 27.876452][ T286] device veth1_macvtap entered promiscuous mode [ 27.883780][ T336] loop1: detected capacity change from 0 to 512 [ 27.890720][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.899396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 27.908673][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 27.918145][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 27.926564][ T336] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: writeback. [ 27.926906][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 27.935841][ T336] ext4 filesystem being mounted at /0/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 27.944575][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 27.963315][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.972151][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 27.980531][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 27.988831][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 27.996701][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.005169][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.024981][ T285] device veth0_vlan entered promiscuous mode [ 28.031496][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.039929][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.048894][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 28.057066][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.065491][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.073193][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.098235][ T342] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.107016][ T342] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.125786][ T344] netlink: 96 bytes leftover after parsing attributes in process `syz.1.2'. [ 28.135338][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.160795][ T285] device veth1_macvtap entered promiscuous mode [ 28.174530][ T288] device veth0_vlan entered promiscuous mode [ 28.181998][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.191811][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.200516][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 28.208140][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 28.216402][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.348247][ T288] device veth1_macvtap entered promiscuous mode [ 28.349875][ T351] loop0: detected capacity change from 0 to 512 [ 28.355953][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.778899][ T351] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 28.817467][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.835743][ T351] ext4 filesystem being mounted at /0/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 28.882280][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.900855][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.909483][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 28.918307][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.927396][ T8] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 28.937287][ T284] EXT4-fs (loop1): unmounting filesystem. [ 28.950624][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.962989][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.991089][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.999579][ T10] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 29.492212][ T359] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.500996][ T359] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.548526][ T364] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1'. [ 29.862397][ T28] kauditd_printk_skb: 35 callbacks suppressed [ 29.862420][ T28] audit: type=1400 audit(1762340833.791:109): avc: denied { unmount } for pid=284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 29.952330][ T28] audit: type=1400 audit(1762340833.851:110): avc: denied { map_create } for pid=375 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 30.026163][ T28] audit: type=1400 audit(1762340833.851:111): avc: denied { map_read map_write } for pid=375 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 30.066390][ T28] audit: type=1400 audit(1762340833.991:112): avc: denied { create } for pid=350 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 30.354843][ T380] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 30.361892][ T380] overlayfs: failed to set xattr on upper [ 30.368308][ T376] netlink: 12 bytes leftover after parsing attributes in process `syz.2.3'. [ 30.390764][ T28] audit: type=1400 audit(1762340834.281:113): avc: denied { remount } for pid=377 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 30.393855][ T383] loop3: detected capacity change from 0 to 512 [ 30.465471][ T28] audit: type=1400 audit(1762340834.281:114): avc: denied { mounton } for pid=377 comm="syz.1.9" path="/2/file0/bus" dev="ramfs" ino=15975 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:ramfs_t tclass=dir permissive=1 [ 30.495134][ T285] EXT4-fs (loop0): unmounting filesystem. [ 30.506177][ T383] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 30.518470][ T28] audit: type=1400 audit(1762340834.311:115): avc: denied { create } for pid=368 comm="syz.4.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 30.540414][ T383] ext4 filesystem being mounted at /2/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 30.660896][ T389] bridge0: port 1(bridge_slave_0) entered disabled state [ 30.674117][ T389] bridge0: port 2(bridge_slave_1) entered disabled state [ 30.683511][ T28] audit: type=1400 audit(1762340834.311:116): avc: denied { setopt } for pid=368 comm="syz.4.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 30.718655][ T28] audit: type=1400 audit(1762340834.311:117): avc: denied { ioctl } for pid=368 comm="syz.4.8" path="socket:[15980]" dev="sockfs" ino=15980 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.078720][ T28] audit: type=1400 audit(1762340834.311:118): avc: denied { write } for pid=368 comm="syz.4.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.130058][ T391] netlink: 96 bytes leftover after parsing attributes in process `syz.3.10'. [ 31.224803][ T401] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 31.232526][ T401] overlayfs: failed to set xattr on upper [ 32.170567][ T402] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 32.177570][ T402] overlayfs: failed to set xattr on upper [ 32.265998][ T407] loop0: detected capacity change from 0 to 512 [ 33.404732][ T388] syz.4.8 (388) used greatest stack depth: 22176 bytes left [ 33.424057][ T407] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 33.699660][ T372] syz.4.8 (372) used greatest stack depth: 21072 bytes left [ 33.709313][ T418] loop2: detected capacity change from 0 to 256 [ 33.720039][ T407] ext4 filesystem being mounted at /2/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 33.751567][ T283] EXT4-fs (loop3): unmounting filesystem. [ 33.766940][ T418] ======================================================= [ 33.766940][ T418] WARNING: The mand mount option has been deprecated and [ 33.766940][ T418] and is ignored by this kernel. Remove the mand [ 33.766940][ T418] option from the mount to silence this warning. [ 33.766940][ T418] ======================================================= [ 33.994651][ T418] exFAT-fs (loop2): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 34.036009][ T422] netlink: 96 bytes leftover after parsing attributes in process `syz.0.15'. [ 34.279095][ T418] exFAT-fs (loop2): Medium has reported failures. Some data may be lost. [ 34.375515][ T418] exFAT-fs (loop2): failed to load upcase table (idx : 0x00010000, chksum : 0xe62de5da, utbl_chksum : 0xe619d30d) [ 34.586148][ T285] EXT4-fs (loop0): unmounting filesystem. [ 34.621130][ T432] loop1: detected capacity change from 0 to 1024 [ 34.630626][ T432] EXT4-fs: Ignoring removed nobh option [ 34.648472][ T432] EXT4-fs: Ignoring removed bh option [ 34.661116][ T432] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 35.240511][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 35.240559][ T28] audit: type=1400 audit(1762340839.161:132): avc: denied { write } for pid=417 comm="syz.2.18" name="/" dev="loop2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 36.081966][ T28] audit: type=1400 audit(1762340839.161:133): avc: denied { add_name } for pid=417 comm="syz.2.18" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 36.128631][ T440] overlayfs: workdir and upperdir must reside under the same mount [ 36.137722][ T28] audit: type=1400 audit(1762340839.161:134): avc: denied { create } for pid=417 comm="syz.2.18" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 36.285085][ T28] audit: type=1400 audit(1762340839.171:135): avc: denied { associate } for pid=417 comm="syz.2.18" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 36.329418][ T28] audit: type=1400 audit(1762340840.191:136): avc: denied { unmount } for pid=288 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 36.361375][ T432] EXT4-fs (loop1): mounted filesystem without journal. Quota mode: none. [ 36.397520][ T28] audit: type=1400 audit(1762340840.321:137): avc: denied { read write } for pid=453 comm="syz.0.26" name="vhost-vsock" dev="devtmpfs" ino=268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 36.461549][ T458] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 36.519594][ T28] audit: type=1400 audit(1762340840.351:138): avc: denied { open } for pid=453 comm="syz.0.26" path="/dev/vhost-vsock" dev="devtmpfs" ino=268 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 36.560524][ T460] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 36.567749][ T460] overlayfs: failed to set xattr on upper [ 36.634346][ T28] audit: type=1400 audit(1762340840.351:139): avc: denied { ioctl } for pid=453 comm="syz.0.26" path="/dev/vhost-vsock" dev="devtmpfs" ino=268 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 36.742707][ T458] overlayfs: failed to set xattr on upper [ 36.748884][ T28] audit: type=1400 audit(1762340840.351:140): avc: denied { write } for pid=431 comm="syz.1.22" name="/" dev="loop1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 36.810888][ T464] loop0: detected capacity change from 0 to 512 [ 36.816758][ T28] audit: type=1400 audit(1762340840.351:141): avc: denied { add_name } for pid=431 comm="syz.1.22" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 36.862579][ T464] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: writeback. [ 36.882418][ T464] ext4 filesystem being mounted at /5/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 37.044896][ T471] EXT4-fs error (device loop1): ext4_mb_mark_diskspace_used:3836: comm syz.1.22: Allocating blocks 385-513 which overlap fs metadata [ 37.089751][ T470] netlink: 96 bytes leftover after parsing attributes in process `syz.0.27'. [ 37.303260][ T472] EXT4-fs (loop1): pa ffff888115d84f18: logic 16, phys. 129, len 24 [ 37.311393][ T472] EXT4-fs error (device loop1): ext4_mb_release_inode_pa:4876: group 0, free 0, pa_free 8 [ 37.681751][ T285] EXT4-fs (loop0): unmounting filesystem. [ 37.913164][ T485] netlink: 12 bytes leftover after parsing attributes in process `syz.4.30'. [ 39.058733][ T491] netlink: 12 bytes leftover after parsing attributes in process `syz.0.31'. [ 39.509866][ T284] EXT4-fs (loop1): unmounting filesystem. [ 39.661563][ T502] netlink: 12 bytes leftover after parsing attributes in process `syz.3.35'. [ 41.078157][ T514] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 41.085516][ T514] overlayfs: failed to set xattr on upper [ 43.933878][ T519] netlink: 12 bytes leftover after parsing attributes in process `syz.3.38'. [ 44.265510][ T531] loop0: detected capacity change from 0 to 256 [ 45.477342][ T531] exFAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 45.505382][ T531] exFAT-fs (loop0): Medium has reported failures. Some data may be lost. [ 45.541857][ T531] exFAT-fs (loop0): failed to load upcase table (idx : 0x00010000, chksum : 0xe62de5da, utbl_chksum : 0xe619d30d) [ 45.955195][ T548] loop3: detected capacity change from 0 to 256 [ 49.639215][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 49.639231][ T28] audit: type=1400 audit(1762340853.561:149): avc: denied { mount } for pid=528 comm="syz.3.43" name="/" dev="loop3" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 49.733678][ T555] loop2: detected capacity change from 0 to 1024 [ 49.813052][ T555] EXT4-fs: Ignoring removed nobh option [ 49.831571][ T28] audit: type=1400 audit(1762340853.761:150): avc: denied { unmount } for pid=283 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 49.851615][ T555] EXT4-fs: Ignoring removed bh option [ 49.914176][ T555] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 50.886237][ T555] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 50.900982][ T28] audit: type=1400 audit(1762340854.831:151): avc: denied { append } for pid=557 comm="syz.1.49" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 50.901129][ T560] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 52.307782][ T583] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 52.314901][ T583] overlayfs: failed to set xattr on upper [ 52.541251][ T585] EXT4-fs error (device loop2): ext4_mb_mark_diskspace_used:3836: comm syz.2.46: Allocating blocks 385-513 which overlap fs metadata [ 52.921456][ T582] EXT4-fs (loop2): pa ffff888132e7fb28: logic 16, phys. 129, len 24 [ 52.929541][ T582] EXT4-fs error (device loop2): ext4_mb_release_inode_pa:4876: group 0, free 0, pa_free 8 [ 53.080999][ T592] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 53.087992][ T592] overlayfs: failed to set xattr on upper [ 53.174127][ T597] loop4: detected capacity change from 0 to 512 [ 53.226514][ T597] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 53.439058][ T597] ext4 filesystem being mounted at /10/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 53.722872][ T607] loop1: detected capacity change from 0 to 256 [ 53.730381][ T607] exfat: Deprecated parameter 'utf8' [ 53.735822][ T607] exfat: Unknown parameter 'discardîÀ' [ 53.964607][ T523] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 54.123351][ T610] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.128168][ T288] EXT4-fs (loop2): unmounting filesystem. [ 54.132836][ T610] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.688524][ T611] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 54.695688][ T611] overlayfs: failed to set xattr on upper [ 54.721336][ T617] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 54.728598][ T617] overlayfs: failed to set xattr on upper [ 55.414828][ T620] loop3: detected capacity change from 0 to 256 [ 55.475787][ T620] exFAT-fs (loop3): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 55.486867][ T620] exFAT-fs (loop3): Medium has reported failures. Some data may be lost. [ 55.496866][ T612] netlink: 96 bytes leftover after parsing attributes in process `syz.4.54'. [ 55.513134][ T620] exFAT-fs (loop3): failed to load upcase table (idx : 0x00010000, chksum : 0xe62de5da, utbl_chksum : 0xe619d30d) [ 55.608248][ T627] loop2: detected capacity change from 0 to 256 [ 55.823572][ T627] netlink: 8 bytes leftover after parsing attributes in process `syz.2.60'. [ 56.709874][ T286] EXT4-fs (loop4): unmounting filesystem. [ 57.240873][ T647] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 57.247933][ T647] overlayfs: failed to set xattr on upper [ 57.668043][ T649] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 57.675116][ T649] overlayfs: failed to set xattr on upper [ 57.847461][ T655] loop3: detected capacity change from 0 to 512 [ 59.514583][ T655] EXT4-fs (loop3): mounted filesystem without journal. Quota mode: writeback. [ 59.552436][ T655] ext4 filesystem being mounted at /14/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 59.646111][ T672] loop1: detected capacity change from 0 to 256 [ 59.653643][ T672] exfat: Deprecated parameter 'utf8' [ 59.659072][ T672] exfat: Unknown parameter 'discardîÀ' [ 59.724281][ T537] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 2 [ 60.073534][ T676] netlink: 96 bytes leftover after parsing attributes in process `syz.3.67'. [ 61.839821][ T691] loop2: detected capacity change from 0 to 1024 [ 61.862431][ T283] EXT4-fs (loop3): unmounting filesystem. [ 61.868941][ T691] EXT4-fs: Ignoring removed nobh option [ 62.242765][ T687] syz.4.72 (687) used greatest stack depth: 19512 bytes left [ 62.420906][ T691] EXT4-fs: Ignoring removed bh option [ 62.479523][ T701] loop4: detected capacity change from 0 to 256 [ 62.500736][ T701] exFAT-fs (loop4): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 62.512980][ T701] exFAT-fs (loop4): Medium has reported failures. Some data may be lost. [ 62.521539][ T691] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 62.524199][ T701] exFAT-fs (loop4): failed to load upcase table (idx : 0x00010000, chksum : 0xe62de5da, utbl_chksum : 0xe619d30d) [ 62.591622][ T691] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: none. [ 63.563229][ T705] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 63.570243][ T705] overlayfs: failed to set xattr on upper [ 63.705219][ T710] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 63.712256][ T710] overlayfs: failed to set xattr on upper [ 64.334630][ T720] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 64.940139][ T718] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 64.947129][ T718] overlayfs: failed to set xattr on upper [ 64.964326][ T725] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 64.971420][ T725] overlayfs: failed to set xattr on upper [ 65.455636][ T734] EXT4-fs error (device loop2): ext4_mb_mark_diskspace_used:3836: comm syz.2.75: Allocating blocks 385-513 which overlap fs metadata [ 65.476584][ T736] loop0: detected capacity change from 0 to 1024 [ 65.493685][ T736] EXT4-fs: Ignoring removed nobh option [ 65.596904][ T738] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 65.603988][ T738] overlayfs: failed to set xattr on upper [ 65.835815][ T739] netlink: 12 bytes leftover after parsing attributes in process `syz.1.84'. [ 65.925077][ T736] EXT4-fs: Ignoring removed bh option [ 65.940602][ T736] EXT4-fs: Warning: mounting with an experimental mount option 'dioread_nolock' for blocksize < PAGE_SIZE [ 66.110332][ T736] EXT4-fs (loop0): mounted filesystem without journal. Quota mode: none. [ 66.350231][ T45] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 66.563624][ T748] netlink: 12 bytes leftover after parsing attributes in process `syz.1.87'. [ 66.783308][ T752] netlink: 12 bytes leftover after parsing attributes in process `syz.4.88'. [ 66.945447][ T726] EXT4-fs (loop2): pa ffff888132e7fc78: logic 16, phys. 129, len 24 [ 66.953591][ T726] EXT4-fs error (device loop2): ext4_mb_release_inode_pa:4876: group 0, free 0, pa_free 8 [ 67.211063][ T288] EXT4-fs (loop2): unmounting filesystem. [ 69.516551][ T760] EXT4-fs error (device loop0): ext4_mb_mark_diskspace_used:3836: comm syz.0.85: Allocating blocks 385-513 which overlap fs metadata [ 69.562487][ T762] netlink: 12 bytes leftover after parsing attributes in process `syz.1.89'. [ 69.750341][ T735] EXT4-fs (loop0): pa ffff888132e7fd20: logic 16, phys. 129, len 24 [ 69.758534][ T735] EXT4-fs error (device loop0): ext4_mb_release_inode_pa:4876: group 0, free 0, pa_free 8 [ 69.777097][ T773] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 69.784123][ T773] overlayfs: failed to set xattr on upper [ 69.898737][ T778] loop2: detected capacity change from 0 to 512 [ 69.982295][ T285] EXT4-fs (loop0): unmounting filesystem. [ 70.029650][ T778] EXT4-fs (loop2): mounted filesystem without journal. Quota mode: writeback. [ 70.106008][ T784] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 70.113171][ T784] overlayfs: failed to set xattr on upper [ 70.211645][ T778] ext4 filesystem being mounted at /19/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 70.351364][ T788] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.364306][ T788] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.401072][ T790] netlink: 96 bytes leftover after parsing attributes in process `syz.2.94'. [ 70.616388][ T795] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 70.623487][ T795] overlayfs: failed to set xattr on upper [ 70.936796][ T797] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 71.050372][ T288] EXT4-fs (loop2): unmounting filesystem. [ 71.565117][ T810] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 71.572186][ T810] overlayfs: failed to set xattr on upper [ 71.801988][ T812] loop4: detected capacity change from 0 to 512 [ 71.838910][ T812] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 71.857932][ T812] ext4 filesystem being mounted at /20/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 72.005674][ T816] netlink: 96 bytes leftover after parsing attributes in process `syz.4.102'. [ 72.549277][ T822] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 72.556473][ T822] overlayfs: failed to set xattr on upper [ 73.263453][ T45] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 73.309829][ T286] EXT4-fs (loop4): unmounting filesystem. [ 73.892654][ T839] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 73.900262][ T839] overlayfs: failed to set xattr on upper [ 74.631784][ T845] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 74.638943][ T845] overlayfs: failed to set xattr on upper [ 74.650656][ T850] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 74.657693][ T850] overlayfs: failed to set xattr on upper [ 74.873450][ T851] netlink: 12 bytes leftover after parsing attributes in process `syz.0.110'. [ 75.585655][ T866] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 75.592937][ T866] overlayfs: failed to set xattr on upper [ 78.381751][ T869] netlink: 12 bytes leftover after parsing attributes in process `syz.0.116'. [ 78.963986][ T889] loop3: detected capacity change from 0 to 256 [ 78.971184][ T889] exfat: Deprecated parameter 'utf8' [ 78.976597][ T889] exfat: Unknown parameter 'discardîÀ' [ 79.800599][ T899] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 79.807591][ T899] overlayfs: failed to set xattr on upper [ 80.210060][ T904] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 80.217311][ T904] overlayfs: failed to set xattr on upper [ 80.879248][ T909] loop3: detected capacity change from 0 to 256 [ 81.002237][ T912] netlink: 12 bytes leftover after parsing attributes in process `syz.4.123'. [ 81.418368][ T909] exFAT-fs (loop3): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 81.462748][ T909] exFAT-fs (loop3): Medium has reported failures. Some data may be lost. [ 81.649031][ T909] exFAT-fs (loop3): failed to load upcase table (idx : 0x00010000, chksum : 0xe62de5da, utbl_chksum : 0xe619d30d) [ 81.760836][ T919] loop4: detected capacity change from 0 to 512 [ 81.778130][ T921] loop0: detected capacity change from 0 to 256 [ 81.797512][ T921] exFAT-fs (loop0): Volume was not properly unmounted. Some data may be corrupt. Please run fsck. [ 81.839009][ T921] exFAT-fs (loop0): Medium has reported failures. Some data may be lost. [ 81.848365][ T919] EXT4-fs (loop4): mounted filesystem without journal. Quota mode: writeback. [ 81.856786][ T921] exFAT-fs (loop0): failed to load upcase table (idx : 0x00010000, chksum : 0xe62de5da, utbl_chksum : 0xe619d30d) [ 81.857426][ T919] ext4 filesystem being mounted at /26/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 82.077035][ T929] netlink: 12 bytes leftover after parsing attributes in process `syz.2.130'. [ 82.431550][ T930] netlink: 96 bytes leftover after parsing attributes in process `syz.4.129'. [ 82.676541][ T286] EXT4-fs (loop4): unmounting filesystem. [ 82.762837][ T937] overlayfs: upper fs does not support RENAME_WHITEOUT. [ 82.769831][ T937] overlayfs: failed to set xattr on upper [ 82.839256][ T28] audit: type=1400 audit(1762340886.761:152): avc: denied { create } for pid=940 comm="syz.4.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 82.890000][ T28] audit: type=1404 audit(1762340886.771:153): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 82.915289][ T28] audit: type=1400 audit(1762340886.781:154): avc: denied { read write } for pid=941 comm="syz.2.135" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 82.966867][ T28] audit: type=1400 audit(1762340886.791:155): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 83.031986][ T28] audit: type=1400 audit(1762340886.801:156): avc: denied { execmem } for pid=943 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 83.068058][ T28] audit: type=1400 audit(1762340886.801:157): avc: denied { create } for pid=940 comm="syz.4.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 83.088141][ T28] audit: type=1400 audit(1762340886.801:158): avc: denied { create } for pid=940 comm="syz.4.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=0 [ 83.141793][ T28] audit: type=1400 audit(1762340886.871:159): avc: denied { bpf } for pid=943 comm="syz.0.134" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 83.183990][ T28] audit: type=1400 audit(1762340886.871:160): avc: denied { prog_load } for pid=943 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 83.243875][ T28] audit: type=1400 audit(1762340886.871:161): avc: denied { create } for pid=943 comm="syz.0.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 83.754239][ T972] netlink: 96 bytes leftover after parsing attributes in process `syz.4.142'. [ 83.829671][ T977] netlink: 96 bytes leftover after parsing attributes in process `syz.2.143'. [ 84.934146][ T1020] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 86.990005][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 88.141310][ T28] kauditd_printk_skb: 571 callbacks suppressed [ 88.141326][ T28] audit: type=1400 audit(1762340892.071:733): avc: denied { read write } for pid=284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 88.180196][ T28] audit: type=1400 audit(1762340892.101:734): avc: denied { execmem } for pid=1116 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 88.232437][ T28] audit: type=1400 audit(1762340892.151:735): avc: denied { read write } for pid=285 comm="syz-executor" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 88.302378][ T1120] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 88.331658][ T28] audit: type=1400 audit(1762340892.181:736): avc: denied { bpf } for pid=1116 comm="syz.1.189" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 88.355995][ T28] audit: type=1400 audit(1762340892.181:737): avc: denied { prog_load } for pid=1116 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 88.376444][ T28] audit: type=1400 audit(1762340892.181:738): avc: denied { create } for pid=1116 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 88.399260][ T28] audit: type=1400 audit(1762340892.181:739): avc: denied { mounton } for pid=1116 comm="syz.1.189" path="/40/file0" dev="tmpfs" ino=257 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 88.422552][ T28] audit: type=1400 audit(1762340892.181:740): avc: denied { remount } for pid=1116 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 88.443174][ T28] audit: type=1400 audit(1762340892.181:741): avc: denied { mounton } for pid=1116 comm="syz.1.189" path="/40/bus" dev="tmpfs" ino=258 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 88.466866][ T28] audit: type=1400 audit(1762340892.181:742): avc: denied { remount } for pid=1116 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 88.842124][ T1140] netlink: 8 bytes leftover after parsing attributes in process `syz.1.196'. [ 90.350117][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 90.465209][ T1183] netlink: 8 bytes leftover after parsing attributes in process `syz.0.211'. [ 91.621311][ T1207] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 92.098409][ T1232] netlink: 96 bytes leftover after parsing attributes in process `syz.1.229'. [ 93.063705][ T1258] netlink: 12 bytes leftover after parsing attributes in process `syz.3.238'. [ 93.215609][ T28] kauditd_printk_skb: 471 callbacks suppressed [ 93.215624][ T28] audit: type=1400 audit(1762340897.141:1214): avc: denied { read write } for pid=285 comm="syz-executor" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.270365][ T28] audit: type=1400 audit(1762340897.201:1215): avc: denied { execmem } for pid=1259 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 93.312283][ T28] audit: type=1400 audit(1762340897.201:1216): avc: denied { mounton } for pid=1259 comm="syz.0.239" path="/47/bus" dev="tmpfs" ino=316 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 93.340466][ T28] audit: type=1400 audit(1762340897.201:1217): avc: denied { remount } for pid=1259 comm="syz.0.239" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 93.371508][ T28] audit: type=1400 audit(1762340897.221:1218): avc: denied { read write } for pid=285 comm="syz-executor" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 93.396034][ T28] audit: type=1400 audit(1762340897.231:1219): avc: denied { create } for pid=1261 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 93.417036][ T28] audit: type=1400 audit(1762340897.231:1220): avc: denied { bpf } for pid=1261 comm="syz.0.240" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 93.438386][ T28] audit: type=1400 audit(1762340897.231:1221): avc: denied { bpf } for pid=1261 comm="syz.0.240" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 93.459382][ T28] audit: type=1400 audit(1762340897.231:1222): avc: denied { bpf } for pid=1261 comm="syz.0.240" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 93.480289][ T28] audit: type=1400 audit(1762340897.231:1223): avc: denied { prog_load } for pid=1261 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 93.630016][ T45] Bluetooth: hci0: command 0x1003 tx timeout [ 93.636124][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 95.137096][ T1338] netlink: 12 bytes leftover after parsing attributes in process `syz.0.262'. [ 95.819826][ T1360] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 97.870032][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 97.876415][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 97.988431][ T1426] netlink: 8 bytes leftover after parsing attributes in process `syz.1.292'. [ 98.233762][ T28] kauditd_printk_skb: 506 callbacks suppressed [ 98.233778][ T28] audit: type=1400 audit(1762340902.161:1730): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.271613][ T28] audit: type=1400 audit(1762340902.201:1731): avc: denied { execmem } for pid=1431 comm="syz.3.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 98.310645][ T28] audit: type=1400 audit(1762340902.231:1732): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 98.337907][ T28] audit: type=1400 audit(1762340902.261:1733): avc: denied { execmem } for pid=1433 comm="syz.4.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 98.363568][ T28] audit: type=1400 audit(1762340902.281:1734): avc: denied { bpf } for pid=1431 comm="syz.3.295" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 98.384477][ T28] audit: type=1400 audit(1762340902.281:1735): avc: denied { prog_load } for pid=1431 comm="syz.3.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 98.403901][ T28] audit: type=1400 audit(1762340902.281:1736): avc: denied { create } for pid=1431 comm="syz.3.295" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 98.427329][ T28] audit: type=1400 audit(1762340902.291:1737): avc: denied { mounton } for pid=1431 comm="syz.3.295" path="/53/file0" dev="tmpfs" ino=355 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 98.450274][ T28] audit: type=1400 audit(1762340902.291:1738): avc: denied { remount } for pid=1431 comm="syz.3.295" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 98.480082][ T28] audit: type=1400 audit(1762340902.291:1739): avc: denied { mounton } for pid=1431 comm="syz.3.295" path="/53/bus" dev="tmpfs" ino=356 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 99.554124][ T1462] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 100.574289][ T1495] netlink: 96 bytes leftover after parsing attributes in process `syz.3.316'. [ 100.627119][ T1501] netlink: 8 bytes leftover after parsing attributes in process `syz.1.317'. [ 101.389589][ T1514] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 101.537274][ T1522] netlink: 12 bytes leftover after parsing attributes in process `syz.2.324'. [ 101.630077][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 101.636179][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 101.992742][ T1534] netlink: 96 bytes leftover after parsing attributes in process `syz.0.329'. [ 103.249700][ T28] kauditd_printk_skb: 456 callbacks suppressed [ 103.249715][ T28] audit: type=1400 audit(1762340907.171:2196): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.286897][ T28] audit: type=1400 audit(1762340907.211:2197): avc: denied { bpf } for pid=1571 comm="syz.4.342" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 103.308089][ T28] audit: type=1400 audit(1762340907.211:2198): avc: denied { prog_load } for pid=1571 comm="syz.4.342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 103.327818][ T28] audit: type=1400 audit(1762340907.211:2199): avc: denied { create } for pid=1571 comm="syz.4.342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 103.348870][ T28] audit: type=1400 audit(1762340907.211:2200): avc: denied { mounton } for pid=1571 comm="syz.4.342" path="/69/file0" dev="tmpfs" ino=464 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 103.371824][ T28] audit: type=1400 audit(1762340907.211:2201): avc: denied { remount } for pid=1571 comm="syz.4.342" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 103.392108][ T721] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 103.416995][ T28] audit: type=1400 audit(1762340907.211:2202): avc: denied { mounton } for pid=1571 comm="syz.4.342" path="/69/bus" dev="tmpfs" ino=465 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 103.439521][ T28] audit: type=1400 audit(1762340907.211:2203): avc: denied { remount } for pid=1571 comm="syz.4.342" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 103.459910][ T28] audit: type=1400 audit(1762340907.211:2204): avc: denied { mounton } for pid=1571 comm="syz.4.342" path="/69/file0" dev="tmpfs" ino=464 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 103.497640][ T28] audit: type=1400 audit(1762340907.221:2205): avc: denied { read write } for pid=1574 comm="syz.2.343" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 103.519817][ T1586] netlink: 12 bytes leftover after parsing attributes in process `syz.3.346'. [ 103.590430][ T1587] netlink: 12 bytes leftover after parsing attributes in process `syz.1.347'. [ 105.244929][ T1635] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 107.310043][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 107.316142][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 107.435513][ T1707] netlink: 8 bytes leftover after parsing attributes in process `syz.4.385'. [ 108.221002][ T1727] netlink: 12 bytes leftover after parsing attributes in process `syz.3.391'. [ 108.267721][ T28] kauditd_printk_skb: 480 callbacks suppressed [ 108.267738][ T28] audit: type=1400 audit(1762340912.191:2686): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 108.318729][ T28] audit: type=1400 audit(1762340912.231:2687): avc: denied { module_request } for pid=1728 comm="syz.2.392" kmod="ipt_addrtype" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 108.357247][ T28] audit: type=1400 audit(1762340912.231:2688): avc: denied { create } for pid=1728 comm="syz.2.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 108.391701][ T28] audit: type=1400 audit(1762340912.231:2689): avc: denied { execmem } for pid=1728 comm="syz.2.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 108.428923][ T28] audit: type=1400 audit(1762340912.231:2690): avc: denied { bpf } for pid=1728 comm="syz.2.392" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 108.464757][ T28] audit: type=1400 audit(1762340912.231:2691): avc: denied { prog_load } for pid=1728 comm="syz.2.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 108.506581][ T28] audit: type=1400 audit(1762340912.231:2692): avc: denied { bpf } for pid=1728 comm="syz.2.392" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 108.531501][ T28] audit: type=1400 audit(1762340912.231:2693): avc: denied { bpf } for pid=1728 comm="syz.2.392" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 108.552455][ T28] audit: type=1400 audit(1762340912.231:2694): avc: denied { map_create } for pid=1728 comm="syz.2.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 108.576016][ T28] audit: type=1400 audit(1762340912.231:2695): avc: denied { bpf } for pid=1728 comm="syz.2.392" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 110.191457][ T1781] netlink: 12 bytes leftover after parsing attributes in process `syz.3.406'. [ 110.679503][ T1791] netlink: 96 bytes leftover after parsing attributes in process `syz.4.410'. [ 110.805480][ T1796] netlink: 8 bytes leftover after parsing attributes in process `syz.1.411'. [ 111.051456][ T1805] netlink: 12 bytes leftover after parsing attributes in process `syz.3.414'. [ 111.802579][ T1820] netlink: 12 bytes leftover after parsing attributes in process `syz.4.418'. [ 112.412794][ T1838] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 113.094891][ T1862] netlink: 8 bytes leftover after parsing attributes in process `syz.4.431'. [ 113.388484][ T28] kauditd_printk_skb: 466 callbacks suppressed [ 113.388500][ T28] audit: type=1400 audit(1762340917.311:3162): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 113.444168][ T28] audit: type=1400 audit(1762340917.321:3163): avc: denied { bpf } for pid=1863 comm="syz.2.433" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 113.481085][ T28] audit: type=1400 audit(1762340917.321:3164): avc: denied { map_create } for pid=1863 comm="syz.2.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 113.516205][ T28] audit: type=1400 audit(1762340917.321:3165): avc: denied { bpf } for pid=1863 comm="syz.2.433" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 113.554110][ T28] audit: type=1400 audit(1762340917.321:3166): avc: denied { prog_load } for pid=1863 comm="syz.2.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 113.589545][ T28] audit: type=1400 audit(1762340917.321:3167): avc: denied { bpf } for pid=1863 comm="syz.2.433" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 113.623138][ T28] audit: type=1400 audit(1762340917.351:3168): avc: denied { read write } for pid=1868 comm="syz.3.434" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 113.665206][ T28] audit: type=1400 audit(1762340917.371:3169): avc: denied { execmem } for pid=1868 comm="syz.3.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 113.700903][ T28] audit: type=1400 audit(1762340917.371:3170): avc: denied { bpf } for pid=1868 comm="syz.3.434" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 113.735596][ T28] audit: type=1400 audit(1762340917.371:3171): avc: denied { map_create } for pid=1868 comm="syz.3.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 114.429950][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 114.429961][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 115.308230][ T1924] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 115.984222][ T1945] netlink: 96 bytes leftover after parsing attributes in process `syz.1.459'. [ 116.852514][ T1976] netlink: 96 bytes leftover after parsing attributes in process `syz.1.471'. [ 117.309974][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 117.320054][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 118.350785][ T2019] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 118.401019][ T28] kauditd_printk_skb: 534 callbacks suppressed [ 118.401034][ T28] audit: type=1400 audit(1762340922.331:3706): avc: denied { bpf } for pid=2012 comm="syz.4.483" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 118.468391][ T28] audit: type=1400 audit(1762340922.331:3707): avc: denied { read write } for pid=2021 comm="syz.3.486" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 118.532927][ T28] audit: type=1400 audit(1762340922.331:3708): avc: denied { bpf } for pid=2016 comm="syz.0.484" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 118.573951][ T28] audit: type=1400 audit(1762340922.331:3709): avc: denied { prog_load } for pid=2016 comm="syz.0.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 118.609996][ T28] audit: type=1400 audit(1762340922.331:3710): avc: denied { create } for pid=2016 comm="syz.0.484" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 118.649985][ T28] audit: type=1400 audit(1762340922.351:3711): avc: denied { module_request } for pid=2021 comm="syz.3.486" kmod="ipt_addrtype" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 118.689976][ T28] audit: type=1400 audit(1762340922.351:3712): avc: denied { create } for pid=2021 comm="syz.3.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 118.737978][ T28] audit: type=1400 audit(1762340922.351:3713): avc: denied { execmem } for pid=2021 comm="syz.3.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 118.777597][ T28] audit: type=1400 audit(1762340922.351:3714): avc: denied { bpf } for pid=2021 comm="syz.3.486" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 118.829158][ T28] audit: type=1400 audit(1762340922.351:3715): avc: denied { prog_load } for pid=2021 comm="syz.3.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 120.430034][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 120.430081][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 121.404169][ T2112] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 123.429238][ T28] kauditd_printk_skb: 484 callbacks suppressed [ 123.429253][ T28] audit: type=1400 audit(1762340927.351:4200): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 123.470030][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 123.470103][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 123.514162][ T28] audit: type=1400 audit(1762340927.361:4201): avc: denied { sqpoll } for pid=2176 comm="syz.0.540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 123.569437][ T28] audit: type=1400 audit(1762340927.361:4202): avc: denied { bpf } for pid=2176 comm="syz.0.540" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 123.633176][ T28] audit: type=1400 audit(1762340927.361:4203): avc: denied { prog_load } for pid=2176 comm="syz.0.540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 123.653353][ T28] audit: type=1400 audit(1762340927.361:4204): avc: denied { bpf } for pid=2176 comm="syz.0.540" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 123.675674][ T28] audit: type=1400 audit(1762340927.361:4205): avc: denied { bpf } for pid=2176 comm="syz.0.540" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 123.698886][ T28] audit: type=1400 audit(1762340927.361:4206): avc: denied { map_create } for pid=2176 comm="syz.0.540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 123.718551][ T28] audit: type=1400 audit(1762340927.361:4207): avc: denied { bpf } for pid=2176 comm="syz.0.540" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 123.771967][ T28] audit: type=1400 audit(1762340927.361:4208): avc: denied { prog_load } for pid=2176 comm="syz.0.540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 123.811148][ T28] audit: type=1400 audit(1762340927.361:4209): avc: denied { bpf } for pid=2176 comm="syz.0.540" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 124.461832][ T2215] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 124.698560][ T2226] netlink: 96 bytes leftover after parsing attributes in process `syz.4.556'. [ 126.509966][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 126.509975][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 126.797098][ T2293] netlink: 8 bytes leftover after parsing attributes in process `syz.0.579'. [ 127.544079][ T2315] netlink: 96 bytes leftover after parsing attributes in process `syz.1.586'. [ 128.271133][ T2333] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 128.432587][ T28] kauditd_printk_skb: 561 callbacks suppressed [ 128.432603][ T28] audit: type=1400 audit(1762340932.361:4771): avc: denied { read } for pid=2334 comm="syz.1.594" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 128.489982][ T28] audit: type=1400 audit(1762340932.391:4772): avc: denied { read write } for pid=2334 comm="syz.1.594" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 128.538381][ T28] audit: type=1400 audit(1762340932.391:4773): avc: denied { create } for pid=2342 comm="syz.0.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 128.578669][ T28] audit: type=1400 audit(1762340932.391:4774): avc: denied { bpf } for pid=2342 comm="syz.0.597" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 128.614214][ T2348] netlink: 12 bytes leftover after parsing attributes in process `syz.0.597'. [ 128.631063][ T28] audit: type=1400 audit(1762340932.391:4775): avc: denied { map_create } for pid=2342 comm="syz.0.597" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 128.671170][ T28] audit: type=1400 audit(1762340932.401:4776): avc: denied { bpf } for pid=2342 comm="syz.0.597" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 128.720300][ T28] audit: type=1400 audit(1762340932.401:4777): avc: denied { bpf } for pid=2342 comm="syz.0.597" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 128.767745][ T28] audit: type=1400 audit(1762340932.401:4778): avc: denied { bpf } for pid=2339 comm="syz.4.596" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 128.818443][ T28] audit: type=1400 audit(1762340932.401:4779): avc: denied { prog_load } for pid=2339 comm="syz.4.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 128.879976][ T28] audit: type=1400 audit(1762340932.401:4780): avc: denied { create } for pid=2339 comm="syz.4.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 130.349974][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 130.356138][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 131.454277][ T2431] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 131.878093][ T2443] netlink: 12 bytes leftover after parsing attributes in process `syz.0.626'. [ 133.464563][ T28] kauditd_printk_skb: 452 callbacks suppressed [ 133.464580][ T28] audit: type=1400 audit(1762340937.391:5233): avc: denied { execmem } for pid=2482 comm="syz.0.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 133.490189][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 133.496439][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 133.517792][ T28] audit: type=1400 audit(1762340937.441:5234): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 133.566051][ T28] audit: type=1400 audit(1762340937.471:5235): avc: denied { execmem } for pid=2484 comm="syz.3.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 133.603817][ T28] audit: type=1400 audit(1762340937.511:5236): avc: denied { sqpoll } for pid=2482 comm="syz.0.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 133.651418][ T28] audit: type=1400 audit(1762340937.511:5237): avc: denied { bpf } for pid=2482 comm="syz.0.640" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 133.692598][ T28] audit: type=1400 audit(1762340937.511:5238): avc: denied { prog_load } for pid=2482 comm="syz.0.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 133.750282][ T28] audit: type=1400 audit(1762340937.511:5239): avc: denied { bpf } for pid=2482 comm="syz.0.640" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 133.797535][ T28] audit: type=1400 audit(1762340937.521:5240): avc: denied { bpf } for pid=2484 comm="syz.3.641" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 133.876471][ T28] audit: type=1400 audit(1762340937.521:5241): avc: denied { prog_load } for pid=2484 comm="syz.3.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 133.917575][ T28] audit: type=1400 audit(1762340937.521:5242): avc: denied { create } for pid=2484 comm="syz.3.641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 134.045653][ T2501] netlink: 96 bytes leftover after parsing attributes in process `syz.3.646'. [ 134.362921][ T2509] netlink: 12 bytes leftover after parsing attributes in process `syz.4.648'. [ 134.840296][ T2522] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 136.338632][ T2572] netlink: 96 bytes leftover after parsing attributes in process `syz.2.665'. [ 136.409154][ T2575] netlink: 12 bytes leftover after parsing attributes in process `syz.0.668'. [ 136.909946][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 136.909961][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 137.984235][ T2615] netlink: 96 bytes leftover after parsing attributes in process `syz.3.680'. [ 138.137374][ T2621] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 138.475289][ T28] kauditd_printk_skb: 515 callbacks suppressed [ 138.475305][ T28] audit: type=1400 audit(1762340942.401:5758): avc: denied { create } for pid=2623 comm="syz.2.683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 138.670371][ T28] audit: type=1400 audit(1762340942.601:5759): avc: denied { read write } for pid=285 comm="syz-executor" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 138.700175][ T28] audit: type=1400 audit(1762340942.601:5760): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 138.725041][ T28] audit: type=1400 audit(1762340942.651:5761): avc: denied { execmem } for pid=2630 comm="syz.0.685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 138.765082][ T28] audit: type=1400 audit(1762340942.681:5762): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 138.790353][ T28] audit: type=1400 audit(1762340942.691:5763): avc: denied { execmem } for pid=2634 comm="syz.3.687" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 138.816520][ T28] audit: type=1400 audit(1762340942.741:5764): avc: denied { bpf } for pid=2630 comm="syz.0.685" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 138.837367][ T28] audit: type=1400 audit(1762340942.741:5765): avc: denied { prog_load } for pid=2630 comm="syz.0.685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 138.856710][ T28] audit: type=1400 audit(1762340942.741:5766): avc: denied { create } for pid=2630 comm="syz.0.685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 138.885162][ T28] audit: type=1400 audit(1762340942.741:5767): avc: denied { mounton } for pid=2630 comm="syz.0.685" path="/144/file0" dev="tmpfs" ino=932 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 139.736660][ T2662] netlink: 96 bytes leftover after parsing attributes in process `syz.0.695'. [ 140.199958][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 140.206069][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 141.559948][ T2717] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 141.770277][ T2728] netlink: 12 bytes leftover after parsing attributes in process `syz.1.714'. [ 142.451491][ T2745] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 143.543944][ T28] kauditd_printk_skb: 461 callbacks suppressed [ 143.543960][ T28] audit: type=1400 audit(1762340947.471:6229): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 143.579054][ T28] audit: type=1400 audit(1762340947.501:6230): avc: denied { bpf } for pid=2774 comm="syz.3.731" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 143.599786][ T28] audit: type=1400 audit(1762340947.501:6231): avc: denied { prog_load } for pid=2774 comm="syz.3.731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 143.619370][ T28] audit: type=1400 audit(1762340947.511:6232): avc: denied { bpf } for pid=2774 comm="syz.3.731" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 143.640157][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 143.646225][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 143.668021][ T28] audit: type=1400 audit(1762340947.511:6233): avc: denied { create } for pid=2774 comm="syz.3.731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 143.688671][ T28] audit: type=1400 audit(1762340947.601:6234): avc: denied { read write } for pid=285 comm="syz-executor" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 143.719241][ T28] audit: type=1400 audit(1762340947.601:6235): avc: denied { execmem } for pid=2777 comm="syz.0.732" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 143.773740][ T28] audit: type=1400 audit(1762340947.701:6236): avc: denied { bpf } for pid=2774 comm="syz.3.731" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 143.830004][ T28] audit: type=1400 audit(1762340947.721:6237): avc: denied { create } for pid=2777 comm="syz.0.732" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 143.882351][ T28] audit: type=1400 audit(1762340947.721:6238): avc: denied { bpf } for pid=2777 comm="syz.0.732" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 143.911057][ T2785] netlink: 96 bytes leftover after parsing attributes in process `syz.2.733'. [ 144.519980][ T721] Bluetooth: hci1: command 0x1003 tx timeout [ 144.526172][ T1515] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 145.073572][ T2813] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 145.927286][ T2837] netlink: 96 bytes leftover after parsing attributes in process `syz.0.749'. [ 146.022628][ T2840] netlink: 96 bytes leftover after parsing attributes in process `syz.2.750'. [ 147.149974][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 147.156076][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 148.295625][ T2910] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 148.554789][ T28] kauditd_printk_skb: 484 callbacks suppressed [ 148.554804][ T28] audit: type=1400 audit(1762340952.481:6723): avc: denied { bpf } for pid=2915 comm="syz.1.774" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 148.598030][ T28] audit: type=1400 audit(1762340952.481:6724): avc: denied { prog_load } for pid=2915 comm="syz.1.774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 148.627101][ T28] audit: type=1400 audit(1762340952.511:6725): avc: denied { create } for pid=2915 comm="syz.1.774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 148.660515][ T28] audit: type=1400 audit(1762340952.521:6726): avc: denied { mounton } for pid=2915 comm="syz.1.774" path="/150/file0" dev="tmpfs" ino=951 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 148.697103][ T28] audit: type=1400 audit(1762340952.521:6727): avc: denied { remount } for pid=2915 comm="syz.1.774" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 148.730887][ T28] audit: type=1400 audit(1762340952.521:6728): avc: denied { mounton } for pid=2915 comm="syz.1.774" path="/150/bus" dev="tmpfs" ino=952 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 148.769373][ T28] audit: type=1400 audit(1762340952.521:6729): avc: denied { remount } for pid=2915 comm="syz.1.774" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 148.803187][ T28] audit: type=1400 audit(1762340952.531:6730): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 148.845745][ T28] audit: type=1400 audit(1762340952.541:6731): avc: denied { mounton } for pid=2915 comm="syz.1.774" path="/150/file0" dev="tmpfs" ino=951 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 148.876189][ T28] audit: type=1400 audit(1762340952.651:6732): avc: denied { bpf } for pid=2918 comm="syz.3.775" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 149.669761][ T2946] netlink: 12 bytes leftover after parsing attributes in process `syz.2.783'. [ 150.349953][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 150.350097][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 150.613731][ T2969] netlink: 12 bytes leftover after parsing attributes in process `syz.4.790'. [ 151.305268][ T2988] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 151.578799][ T2999] netlink: 12 bytes leftover after parsing attributes in process `syz.0.799'. [ 152.896004][ T3029] netlink: 12 bytes leftover after parsing attributes in process `syz.0.808'. [ 153.110666][ T3035] netlink: 96 bytes leftover after parsing attributes in process `syz.3.809'. [ 153.309956][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 153.309965][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 153.601641][ T28] kauditd_printk_skb: 451 callbacks suppressed [ 153.601656][ T28] audit: type=1400 audit(1762340957.531:7184): avc: denied { bpf } for pid=3041 comm="syz.1.813" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 153.654394][ T3048] Zero length message leads to an empty skb [ 153.667409][ T28] audit: type=1400 audit(1762340957.571:7185): avc: denied { map_create } for pid=3041 comm="syz.1.813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 153.711528][ T28] audit: type=1400 audit(1762340957.581:7186): avc: denied { bpf } for pid=3041 comm="syz.1.813" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 153.752271][ T28] audit: type=1400 audit(1762340957.581:7187): avc: denied { prog_load } for pid=3041 comm="syz.1.813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 153.801642][ T28] audit: type=1400 audit(1762340957.581:7188): avc: denied { bpf } for pid=3041 comm="syz.1.813" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 153.844975][ T28] audit: type=1400 audit(1762340957.611:7189): avc: denied { read write } for pid=285 comm="syz-executor" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 153.912407][ T28] audit: type=1400 audit(1762340957.631:7190): avc: denied { execmem } for pid=3049 comm="syz.0.815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 153.969698][ T28] audit: type=1400 audit(1762340957.641:7191): avc: denied { bpf } for pid=3044 comm="syz.4.814" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 154.040702][ T28] audit: type=1400 audit(1762340957.641:7192): avc: denied { map_create } for pid=3044 comm="syz.4.814" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 154.106994][ T28] audit: type=1400 audit(1762340957.641:7193): avc: denied { bpf } for pid=3044 comm="syz.4.814" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 154.472043][ T3076] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 154.981238][ T3089] netlink: 12 bytes leftover after parsing attributes in process `syz.4.827'. [ 155.152205][ T3093] netlink: 12 bytes leftover after parsing attributes in process `syz.2.828'. [ 155.371237][ T3098] netlink: 8 bytes leftover after parsing attributes in process `syz.1.829'. [ 156.520002][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 156.526085][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 157.617348][ T3156] netlink: 8 bytes leftover after parsing attributes in process `syz.3.846'. [ 157.958441][ T3164] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 158.617394][ T28] kauditd_printk_skb: 411 callbacks suppressed [ 158.617412][ T28] audit: type=1400 audit(1762340962.541:7605): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 158.665489][ T28] audit: type=1400 audit(1762340962.591:7606): avc: denied { execmem } for pid=3174 comm="syz.2.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 158.689635][ T28] audit: type=1400 audit(1762340962.611:7607): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 158.741191][ T28] audit: type=1400 audit(1762340962.671:7608): avc: denied { sqpoll } for pid=3174 comm="syz.2.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 158.760666][ T28] audit: type=1400 audit(1762340962.681:7609): avc: denied { bpf } for pid=3174 comm="syz.2.853" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 158.790453][ T28] audit: type=1400 audit(1762340962.681:7610): avc: denied { prog_load } for pid=3174 comm="syz.2.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.823786][ T28] audit: type=1400 audit(1762340962.681:7611): avc: denied { bpf } for pid=3174 comm="syz.2.853" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 158.867700][ T28] audit: type=1400 audit(1762340962.681:7612): avc: denied { bpf } for pid=3174 comm="syz.2.853" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 158.933381][ T28] audit: type=1400 audit(1762340962.681:7613): avc: denied { map_create } for pid=3174 comm="syz.2.853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 158.998446][ T28] audit: type=1400 audit(1762340962.681:7614): avc: denied { bpf } for pid=3174 comm="syz.2.853" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 160.029974][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 160.036080][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 160.841084][ T3231] netlink: 8 bytes leftover after parsing attributes in process `syz.1.868'. [ 161.194083][ T3245] netlink: 12 bytes leftover after parsing attributes in process `syz.4.870'. [ 161.741189][ T3254] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 162.945388][ T3287] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 163.665689][ T28] kauditd_printk_skb: 450 callbacks suppressed [ 163.665705][ T28] audit: type=1400 audit(1762340967.591:8065): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 163.729965][ T28] audit: type=1400 audit(1762340967.641:8066): avc: denied { execmem } for pid=3304 comm="syz.2.891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 163.759404][ T28] audit: type=1400 audit(1762340967.651:8067): avc: denied { read write } for pid=284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 163.789953][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 163.796042][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 163.811183][ T28] audit: type=1400 audit(1762340967.681:8068): avc: denied { execmem } for pid=3306 comm="syz.1.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 163.852221][ T28] audit: type=1400 audit(1762340967.721:8069): avc: denied { sqpoll } for pid=3304 comm="syz.2.891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 163.872180][ T28] audit: type=1400 audit(1762340967.721:8070): avc: denied { bpf } for pid=3304 comm="syz.2.891" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 163.916479][ T28] audit: type=1400 audit(1762340967.721:8071): avc: denied { prog_load } for pid=3304 comm="syz.2.891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 163.935614][ T28] audit: type=1400 audit(1762340967.721:8072): avc: denied { bpf } for pid=3304 comm="syz.2.891" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 163.969982][ T28] audit: type=1400 audit(1762340967.721:8073): avc: denied { bpf } for pid=3304 comm="syz.2.891" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 164.000886][ T28] audit: type=1400 audit(1762340967.721:8074): avc: denied { map_create } for pid=3304 comm="syz.2.891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 164.989973][ T1515] Bluetooth: hci1: command 0x1003 tx timeout [ 164.996068][ T721] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 165.069452][ T3345] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 165.641579][ T3361] netlink: 96 bytes leftover after parsing attributes in process `syz.4.907'. [ 166.921214][ T3405] netlink: 12 bytes leftover after parsing attributes in process `syz.2.922'. [ 167.069967][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 167.076050][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 167.880516][ T3427] netlink: 96 bytes leftover after parsing attributes in process `syz.4.928'. [ 168.512396][ T3441] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 168.688925][ T28] kauditd_printk_skb: 582 callbacks suppressed [ 168.688941][ T28] audit: type=1400 audit(1762340972.611:8657): avc: denied { bpf } for pid=3447 comm="syz.4.937" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 168.734618][ T3451] netlink: 12 bytes leftover after parsing attributes in process `syz.1.936'. [ 168.753470][ T28] audit: type=1400 audit(1762340972.641:8658): avc: denied { prog_load } for pid=3447 comm="syz.4.937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 168.797629][ T28] audit: type=1400 audit(1762340972.641:8659): avc: denied { create } for pid=3447 comm="syz.4.937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 168.842878][ T28] audit: type=1400 audit(1762340972.641:8660): avc: denied { mounton } for pid=3447 comm="syz.4.937" path="/190/file0" dev="tmpfs" ino=1233 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 168.886818][ T28] audit: type=1400 audit(1762340972.641:8661): avc: denied { remount } for pid=3447 comm="syz.4.937" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 168.925970][ T28] audit: type=1400 audit(1762340972.641:8662): avc: denied { mounton } for pid=3447 comm="syz.4.937" path="/190/bus" dev="tmpfs" ino=1234 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 168.955585][ T28] audit: type=1400 audit(1762340972.661:8663): avc: denied { bpf } for pid=3445 comm="syz.1.936" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 168.976388][ T28] audit: type=1400 audit(1762340972.661:8664): avc: denied { prog_load } for pid=3445 comm="syz.1.936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 169.013300][ T28] audit: type=1400 audit(1762340972.661:8665): avc: denied { bpf } for pid=3445 comm="syz.1.936" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 169.060525][ T28] audit: type=1400 audit(1762340972.661:8666): avc: denied { bpf } for pid=3445 comm="syz.1.936" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 169.110366][ T3460] netlink: 8 bytes leftover after parsing attributes in process `syz.4.940'. [ 169.426622][ T3465] netlink: 96 bytes leftover after parsing attributes in process `syz.3.941'. [ 170.056603][ T3479] netlink: 12 bytes leftover after parsing attributes in process `syz.1.946'. [ 170.589944][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 170.596061][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 171.098323][ T3512] netlink: 12 bytes leftover after parsing attributes in process `syz.2.955'. [ 171.339502][ T3520] netlink: 8 bytes leftover after parsing attributes in process `syz.1.959'. [ 171.742797][ T3527] netlink: 12 bytes leftover after parsing attributes in process `syz.3.961'. [ 171.854759][ T3532] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 172.833869][ T3558] netlink: 12 bytes leftover after parsing attributes in process `syz.1.971'. [ 173.750085][ T28] kauditd_printk_skb: 487 callbacks suppressed [ 173.750101][ T28] audit: type=1400 audit(1762340977.681:9154): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 173.800190][ T3579] netlink: 12 bytes leftover after parsing attributes in process `syz.1.976'. [ 173.823193][ T28] audit: type=1400 audit(1762340977.711:9155): avc: denied { execmem } for pid=3577 comm="syz.4.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 173.868935][ T28] audit: type=1400 audit(1762340977.721:9156): avc: denied { bpf } for pid=3574 comm="syz.1.976" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 173.869976][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 173.889780][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 173.948458][ T28] audit: type=1400 audit(1762340977.721:9157): avc: denied { prog_load } for pid=3574 comm="syz.1.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 174.020689][ T28] audit: type=1400 audit(1762340977.721:9158): avc: denied { bpf } for pid=3574 comm="syz.1.976" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 174.079958][ T28] audit: type=1400 audit(1762340977.721:9159): avc: denied { bpf } for pid=3574 comm="syz.1.976" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 174.140402][ T28] audit: type=1400 audit(1762340977.721:9160): avc: denied { map_create } for pid=3574 comm="syz.1.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 174.196166][ T28] audit: type=1400 audit(1762340977.721:9161): avc: denied { bpf } for pid=3574 comm="syz.1.976" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 174.253382][ T28] audit: type=1400 audit(1762340977.721:9162): avc: denied { prog_load } for pid=3574 comm="syz.1.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 174.314659][ T28] audit: type=1400 audit(1762340977.721:9163): avc: denied { bpf } for pid=3574 comm="syz.1.976" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 175.165529][ T3614] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 175.201230][ T3615] netlink: 12 bytes leftover after parsing attributes in process `syz.4.987'. [ 175.663812][ T3638] netlink: 12 bytes leftover after parsing attributes in process `syz.2.995'. [ 177.229940][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 177.236036][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 178.667124][ T3718] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 178.781147][ T28] kauditd_printk_skb: 496 callbacks suppressed [ 178.781163][ T28] audit: type=1400 audit(1762340982.711:9660): avc: denied { sqpoll } for pid=3719 comm="syz.4.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 178.807035][ T28] audit: type=1400 audit(1762340982.711:9661): avc: denied { bpf } for pid=3719 comm="syz.4.1022" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 178.837996][ T28] audit: type=1400 audit(1762340982.711:9662): avc: denied { prog_load } for pid=3719 comm="syz.4.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 178.869954][ T28] audit: type=1400 audit(1762340982.711:9663): avc: denied { bpf } for pid=3719 comm="syz.4.1022" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 178.908897][ T28] audit: type=1400 audit(1762340982.711:9664): avc: denied { bpf } for pid=3719 comm="syz.4.1022" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 178.946977][ T28] audit: type=1400 audit(1762340982.711:9665): avc: denied { map_create } for pid=3719 comm="syz.4.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 178.982510][ T28] audit: type=1400 audit(1762340982.711:9666): avc: denied { bpf } for pid=3719 comm="syz.4.1022" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 179.019353][ T28] audit: type=1400 audit(1762340982.711:9667): avc: denied { prog_load } for pid=3719 comm="syz.4.1022" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 179.053774][ T28] audit: type=1400 audit(1762340982.711:9668): avc: denied { bpf } for pid=3719 comm="syz.4.1022" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 179.107069][ T28] audit: type=1400 audit(1762340982.711:9669): avc: denied { bpf } for pid=3719 comm="syz.4.1022" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 179.504135][ T3739] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1027'. [ 179.594455][ T3743] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1028'. [ 179.985993][ T3750] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1030'. [ 180.669950][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 180.676052][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 180.871444][ T3777] netlink: 96 bytes leftover after parsing attributes in process `syz.4.1038'. [ 180.926214][ T3779] netlink: 96 bytes leftover after parsing attributes in process `syz.2.1039'. [ 181.070299][ T3782] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1040'. [ 181.646205][ T3800] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1044'. [ 181.720341][ T3801] netlink: 96 bytes leftover after parsing attributes in process `syz.4.1045'. [ 182.165535][ T3821] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1052'. [ 183.274827][ T3852] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 183.852457][ T28] kauditd_printk_skb: 561 callbacks suppressed [ 183.852473][ T28] audit: type=1400 audit(1762340987.781:10231): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 183.889441][ T28] audit: type=1400 audit(1762340987.811:10232): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 183.915769][ T28] audit: type=1400 audit(1762340987.841:10233): avc: denied { read write } for pid=3869 comm="syz.2.1066" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 183.940733][ T28] audit: type=1400 audit(1762340987.871:10234): avc: denied { execmem } for pid=3867 comm="syz.3.1065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 183.991632][ T28] audit: type=1400 audit(1762340987.921:10235): avc: denied { bpf } for pid=3869 comm="syz.2.1066" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 184.029567][ T28] audit: type=1400 audit(1762340987.921:10236): avc: denied { prog_load } for pid=3869 comm="syz.2.1066" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 184.046733][ T3871] netlink: 96 bytes leftover after parsing attributes in process `syz.2.1066'. [ 184.068435][ T28] audit: type=1400 audit(1762340987.951:10237): avc: denied { sqpoll } for pid=3867 comm="syz.3.1065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 184.109406][ T28] audit: type=1400 audit(1762340987.951:10238): avc: denied { bpf } for pid=3867 comm="syz.3.1065" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 184.152160][ T28] audit: type=1400 audit(1762340987.951:10239): avc: denied { prog_load } for pid=3867 comm="syz.3.1065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 184.175737][ T28] audit: type=1400 audit(1762340987.951:10240): avc: denied { bpf } for pid=3867 comm="syz.3.1065" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 184.767908][ T3895] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1073'. [ 185.309936][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 185.316055][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 186.633677][ T3944] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1086'. [ 186.992170][ T3952] netlink: 96 bytes leftover after parsing attributes in process `syz.4.1088'. [ 187.171016][ T3958] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1090'. [ 187.774416][ T3968] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 188.866993][ T28] kauditd_printk_skb: 461 callbacks suppressed [ 188.867009][ T28] audit: type=1400 audit(1762340992.791:10702): avc: denied { sqpoll } for pid=3993 comm="syz.1.1101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 188.909007][ T28] audit: type=1400 audit(1762340992.791:10703): avc: denied { bpf } for pid=3993 comm="syz.1.1101" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 188.939276][ T28] audit: type=1400 audit(1762340992.791:10704): avc: denied { prog_load } for pid=3993 comm="syz.1.1101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 188.958779][ T28] audit: type=1400 audit(1762340992.791:10705): avc: denied { bpf } for pid=3993 comm="syz.1.1101" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 188.980063][ T28] audit: type=1400 audit(1762340992.791:10706): avc: denied { bpf } for pid=3993 comm="syz.1.1101" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 189.001157][ T28] audit: type=1400 audit(1762340992.791:10707): avc: denied { map_create } for pid=3993 comm="syz.1.1101" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 189.032188][ T28] audit: type=1400 audit(1762340992.791:10708): avc: denied { bpf } for pid=3993 comm="syz.1.1101" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 189.053326][ T28] audit: type=1400 audit(1762340992.791:10709): avc: denied { bpf } for pid=3993 comm="syz.1.1101" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 189.077864][ T28] audit: type=1400 audit(1762340992.861:10710): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 189.112384][ T28] audit: type=1400 audit(1762340992.871:10711): avc: denied { bpf } for pid=3997 comm="syz.2.1102" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 189.338714][ T4012] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1105'. [ 189.801054][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 189.807128][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 189.848173][ T4020] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 190.010466][ T4025] netlink: 96 bytes leftover after parsing attributes in process `syz.2.1109'. [ 190.948052][ T4055] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1118'. [ 191.869951][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 191.876092][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 194.065500][ T28] kauditd_printk_skb: 456 callbacks suppressed [ 194.065518][ T28] audit: type=1400 audit(1762340997.991:11168): avc: denied { read write } for pid=284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 194.123617][ T28] audit: type=1400 audit(1762340998.031:11169): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 194.190262][ T28] audit: type=1400 audit(1762340998.051:11170): avc: denied { execmem } for pid=4126 comm="syz.2.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 194.210311][ T4131] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1139'. [ 194.271115][ T28] audit: type=1400 audit(1762340998.081:11171): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 194.335384][ T28] audit: type=1400 audit(1762340998.101:11172): avc: denied { execmem } for pid=4129 comm="syz.4.1140" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 194.400054][ T28] audit: type=1400 audit(1762340998.111:11173): avc: denied { bpf } for pid=4126 comm="syz.2.1139" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 194.442257][ T28] audit: type=1400 audit(1762340998.111:11174): avc: denied { read } for pid=4126 comm="syz.2.1139" dev="nsfs" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 194.480915][ T28] audit: type=1400 audit(1762340998.121:11175): avc: denied { bpf } for pid=4126 comm="syz.2.1139" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 194.540171][ T28] audit: type=1400 audit(1762340998.121:11176): avc: denied { prog_load } for pid=4126 comm="syz.2.1139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 194.592931][ T28] audit: type=1400 audit(1762340998.121:11177): avc: denied { bpf } for pid=4126 comm="syz.2.1139" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 194.825993][ T4143] netlink: 96 bytes leftover after parsing attributes in process `syz.4.1143'. [ 195.793582][ T4164] netlink: 96 bytes leftover after parsing attributes in process `syz.2.1148'. [ 196.135300][ T4173] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1150'. [ 196.385535][ T4178] netlink: 96 bytes leftover after parsing attributes in process `syz.3.1152'. [ 196.895586][ T4198] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1158'. [ 197.030286][ T4203] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1159'. [ 197.725348][ T4210] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1161'. [ 198.069244][ T4218] netlink: 96 bytes leftover after parsing attributes in process `syz.3.1164'. [ 198.225262][ T4222] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 198.399552][ T4227] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1166'. [ 198.867007][ T4239] netlink: 96 bytes leftover after parsing attributes in process `syz.1.1169'. [ 199.088673][ T28] kauditd_printk_skb: 466 callbacks suppressed [ 199.088689][ T28] audit: type=1400 audit(1762341003.011:11644): avc: denied { bpf } for pid=4242 comm="syz.0.1171" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 199.157359][ T28] audit: type=1400 audit(1762341003.011:11645): avc: denied { map_create } for pid=4242 comm="syz.0.1171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 199.198250][ T28] audit: type=1400 audit(1762341003.041:11646): avc: denied { bpf } for pid=4242 comm="syz.0.1171" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 199.226782][ T28] audit: type=1400 audit(1762341003.041:11647): avc: denied { prog_load } for pid=4242 comm="syz.0.1171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 199.254310][ T28] audit: type=1400 audit(1762341003.051:11648): avc: denied { bpf } for pid=4242 comm="syz.0.1171" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 199.280558][ T28] audit: type=1400 audit(1762341003.051:11649): avc: denied { prog_load } for pid=4242 comm="syz.0.1171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 199.327628][ T28] audit: type=1400 audit(1762341003.051:11650): avc: denied { bpf } for pid=4242 comm="syz.0.1171" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 199.362019][ T28] audit: type=1400 audit(1762341003.051:11651): avc: denied { map_create } for pid=4242 comm="syz.0.1171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 199.381659][ T28] audit: type=1400 audit(1762341003.051:11652): avc: denied { bpf } for pid=4242 comm="syz.0.1171" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 199.433056][ T28] audit: type=1400 audit(1762341003.051:11653): avc: denied { prog_load } for pid=4242 comm="syz.0.1171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 200.107030][ T4265] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1176'. [ 200.269993][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 200.276086][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 201.459710][ T4300] __nla_validate_parse: 1 callbacks suppressed [ 201.459729][ T4300] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1186'. [ 201.580711][ T4303] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1187'. [ 201.754683][ T4309] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1188'. [ 202.336734][ T4321] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1192'. [ 202.674236][ T4332] netlink: 96 bytes leftover after parsing attributes in process `syz.1.1195'. [ 204.167248][ T28] kauditd_printk_skb: 432 callbacks suppressed [ 204.167264][ T28] audit: type=1400 audit(1762341008.091:12086): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 204.224106][ T28] audit: type=1400 audit(1762341008.131:12087): avc: denied { bpf } for pid=4364 comm="syz.3.1205" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 204.282567][ T28] audit: type=1400 audit(1762341008.131:12088): avc: denied { prog_load } for pid=4364 comm="syz.3.1205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 204.345727][ T28] audit: type=1400 audit(1762341008.131:12089): avc: denied { bpf } for pid=4364 comm="syz.3.1205" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 204.404764][ T28] audit: type=1400 audit(1762341008.131:12090): avc: denied { create } for pid=4364 comm="syz.3.1205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 204.454533][ T28] audit: type=1400 audit(1762341008.241:12091): avc: denied { read write } for pid=284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 204.510782][ T28] audit: type=1400 audit(1762341008.261:12092): avc: denied { execmem } for pid=4367 comm="syz.1.1206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 204.574649][ T28] audit: type=1400 audit(1762341008.311:12093): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 204.646968][ T28] audit: type=1400 audit(1762341008.331:12094): avc: denied { execmem } for pid=4371 comm="syz.4.1207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 204.692678][ T28] audit: type=1400 audit(1762341008.361:12095): avc: denied { bpf } for pid=4367 comm="syz.1.1206" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 205.448285][ T4395] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 205.612719][ T4400] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1214'. [ 205.780088][ T4410] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1216'. [ 207.470253][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 207.476340][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 208.354772][ T4467] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1232'. [ 208.683006][ T4473] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1234'. [ 209.178480][ T28] kauditd_printk_skb: 405 callbacks suppressed [ 209.178495][ T28] audit: type=1400 audit(1762341013.101:12501): avc: denied { bpf } for pid=4485 comm="syz.2.1238" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 209.263190][ T28] audit: type=1400 audit(1762341013.101:12502): avc: denied { prog_load } for pid=4485 comm="syz.2.1238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 209.305714][ T4491] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 209.328630][ T28] audit: type=1400 audit(1762341013.101:12503): avc: denied { bpf } for pid=4485 comm="syz.2.1238" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 209.383357][ T28] audit: type=1400 audit(1762341013.101:12504): avc: denied { create } for pid=4485 comm="syz.2.1238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 209.430155][ T28] audit: type=1400 audit(1762341013.101:12505): avc: denied { create } for pid=4485 comm="syz.2.1238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 209.470709][ T28] audit: type=1400 audit(1762341013.201:12506): avc: denied { read write } for pid=284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 209.525000][ T28] audit: type=1400 audit(1762341013.221:12507): avc: denied { create } for pid=4490 comm="syz.1.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 209.565101][ T28] audit: type=1400 audit(1762341013.221:12508): avc: denied { create } for pid=4490 comm="syz.1.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 209.625641][ T28] audit: type=1400 audit(1762341013.221:12509): avc: denied { create } for pid=4490 comm="syz.1.1239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 209.666107][ T28] audit: type=1400 audit(1762341013.221:12510): avc: denied { bpf } for pid=4490 comm="syz.1.1239" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 210.040670][ T4506] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1242'. [ 210.945933][ T4526] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1250'. [ 211.319941][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 211.320267][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 211.492476][ T4543] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 212.956834][ T4586] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1267'. [ 213.312343][ T4590] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1269'. [ 213.549958][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 213.728453][ T4601] netlink: 96 bytes leftover after parsing attributes in process `syz.3.1272'. [ 213.867953][ T4604] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1273'. [ 214.320210][ T28] kauditd_printk_skb: 469 callbacks suppressed [ 214.320228][ T28] audit: type=1400 audit(1762341018.241:12980): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 214.380036][ T28] audit: type=1400 audit(1762341018.291:12981): avc: denied { execmem } for pid=4613 comm="syz.4.1276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 214.400305][ T28] audit: type=1400 audit(1762341018.291:12982): avc: denied { create } for pid=4605 comm="syz.1.1274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 214.462838][ T28] audit: type=1400 audit(1762341018.351:12983): avc: denied { sqpoll } for pid=4613 comm="syz.4.1276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 214.505316][ T28] audit: type=1400 audit(1762341018.351:12984): avc: denied { bpf } for pid=4613 comm="syz.4.1276" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 214.544360][ T28] audit: type=1400 audit(1762341018.351:12985): avc: denied { prog_load } for pid=4613 comm="syz.4.1276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 214.563811][ T28] audit: type=1400 audit(1762341018.371:12986): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 214.626002][ T4626] netlink: 96 bytes leftover after parsing attributes in process `syz.2.1279'. [ 214.637266][ T28] audit: type=1400 audit(1762341018.381:12987): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 214.667339][ T28] audit: type=1400 audit(1762341018.381:12988): avc: denied { bpf } for pid=4613 comm="syz.4.1276" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 214.689464][ T28] audit: type=1400 audit(1762341018.381:12989): avc: denied { map_create } for pid=4613 comm="syz.4.1276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 215.062098][ T4640] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1283'. [ 215.155567][ T4641] netlink: 96 bytes leftover after parsing attributes in process `syz.3.1284'. [ 215.930418][ T4655] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1287'. [ 216.152947][ T4666] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1291'. [ 218.780268][ T4734] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1311'. [ 219.348587][ T28] kauditd_printk_skb: 455 callbacks suppressed [ 219.348603][ T28] audit: type=1400 audit(1762341023.271:13445): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 219.476998][ T28] audit: type=1400 audit(1762341023.401:13446): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 219.530985][ T4750] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 219.560060][ T28] audit: type=1400 audit(1762341023.431:13447): avc: denied { bpf } for pid=4745 comm="syz.4.1316" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 219.609950][ T28] audit: type=1400 audit(1762341023.431:13448): avc: denied { map_create } for pid=4745 comm="syz.4.1316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 219.659608][ T28] audit: type=1400 audit(1762341023.431:13449): avc: denied { bpf } for pid=4745 comm="syz.4.1316" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 219.700942][ T28] audit: type=1400 audit(1762341023.431:13450): avc: denied { prog_load } for pid=4745 comm="syz.4.1316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 219.737772][ T28] audit: type=1400 audit(1762341023.431:13451): avc: denied { bpf } for pid=4745 comm="syz.4.1316" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 219.789429][ T28] audit: type=1400 audit(1762341023.431:13452): avc: denied { bpf } for pid=4745 comm="syz.4.1316" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 219.840173][ T28] audit: type=1400 audit(1762341023.431:13453): avc: denied { bpf } for pid=4745 comm="syz.4.1316" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 219.881959][ T28] audit: type=1400 audit(1762341023.431:13454): avc: denied { map_create } for pid=4745 comm="syz.4.1316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 221.128792][ T4792] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1330'. [ 221.391375][ T4799] netlink: 96 bytes leftover after parsing attributes in process `syz.2.1331'. [ 221.549966][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 221.556072][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 221.669863][ T4806] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1334'. [ 223.560962][ T4849] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 223.572866][ T4850] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1345'. [ 224.122289][ T4867] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1350'. [ 224.373358][ T28] kauditd_printk_skb: 456 callbacks suppressed [ 224.373373][ T28] audit: type=1400 audit(1762341028.301:13911): avc: denied { bpf } for pid=4869 comm="syz.4.1352" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 224.427444][ T4873] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1352'. [ 224.451641][ T28] audit: type=1400 audit(1762341028.331:13912): avc: denied { read } for pid=4869 comm="syz.4.1352" dev="nsfs" ino=4026532483 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 224.523187][ T28] audit: type=1400 audit(1762341028.331:13913): avc: denied { bpf } for pid=4869 comm="syz.4.1352" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 224.564834][ T28] audit: type=1400 audit(1762341028.331:13914): avc: denied { prog_load } for pid=4869 comm="syz.4.1352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 224.596414][ T28] audit: type=1400 audit(1762341028.331:13916): avc: denied { bpf } for pid=4869 comm="syz.4.1352" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 224.618008][ T28] audit: type=1400 audit(1762341028.331:13917): avc: denied { map_create } for pid=4869 comm="syz.4.1352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 224.637754][ T28] audit: type=1400 audit(1762341028.331:13915): avc: denied { bpf } for pid=4871 comm="syz.2.1353" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 224.658919][ T28] audit: type=1400 audit(1762341028.331:13918): avc: denied { prog_load } for pid=4871 comm="syz.2.1353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 224.679789][ T28] audit: type=1400 audit(1762341028.331:13919): avc: denied { create } for pid=4871 comm="syz.2.1353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 224.700694][ T28] audit: type=1400 audit(1762341028.331:13920): avc: denied { bpf } for pid=4869 comm="syz.4.1352" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 225.537143][ T4894] netlink: 96 bytes leftover after parsing attributes in process `syz.1.1358'. [ 225.629940][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 225.636028][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 225.773177][ T4900] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1360'. [ 225.887743][ T4907] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1361'. [ 226.243301][ T4915] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1363'. [ 226.800469][ T4931] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1368'. [ 227.145866][ T4943] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1372'. [ 227.641582][ T4955] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1374'. [ 227.752475][ T4960] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1375'. [ 228.181079][ T4963] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 229.460378][ T28] kauditd_printk_skb: 468 callbacks suppressed [ 229.460394][ T28] audit: type=1400 audit(1762341033.391:14389): avc: denied { create } for pid=4988 comm="syz.2.1385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 229.544525][ T28] audit: type=1400 audit(1762341033.471:14390): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 229.585312][ T28] audit: type=1400 audit(1762341033.501:14391): avc: denied { create } for pid=4995 comm="syz.3.1386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 229.650462][ T28] audit: type=1400 audit(1762341033.501:14392): avc: denied { bpf } for pid=4995 comm="syz.3.1386" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 229.702713][ T28] audit: type=1400 audit(1762341033.501:14393): avc: denied { map_create } for pid=4995 comm="syz.3.1386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 229.724471][ T4998] __nla_validate_parse: 1 callbacks suppressed [ 229.724488][ T4998] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1386'. [ 229.743584][ T28] audit: type=1400 audit(1762341033.501:14394): avc: denied { bpf } for pid=4995 comm="syz.3.1386" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 229.766967][ T28] audit: type=1400 audit(1762341033.501:14395): avc: denied { bpf } for pid=4995 comm="syz.3.1386" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 229.788414][ T28] audit: type=1400 audit(1762341033.651:14396): avc: denied { bpf } for pid=4995 comm="syz.3.1386" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 229.824873][ T28] audit: type=1400 audit(1762341033.651:14397): avc: denied { prog_load } for pid=4995 comm="syz.3.1386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 229.866522][ T28] audit: type=1400 audit(1762341033.651:14398): avc: denied { bpf } for pid=4995 comm="syz.3.1386" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 230.189917][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 230.196003][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 230.345438][ T5014] netlink: 96 bytes leftover after parsing attributes in process `syz.1.1391'. [ 230.557590][ T5018] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1392'. [ 230.718737][ T5023] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 231.121446][ T5033] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1396'. [ 231.608445][ T5041] netlink: 96 bytes leftover after parsing attributes in process `syz.1.1399'. [ 231.888867][ T5051] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1401'. [ 232.140751][ T5056] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1403'. [ 232.749978][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 232.756443][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 233.029380][ T5080] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1410'. [ 233.110873][ T5083] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1411'. [ 233.373002][ T5088] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1412'. [ 234.473305][ T28] kauditd_printk_skb: 483 callbacks suppressed [ 234.473322][ T28] audit: type=1400 audit(1762341038.401:14882): avc: denied { bpf } for pid=5104 comm="syz.0.1418" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 234.535984][ T28] audit: type=1400 audit(1762341038.401:14883): avc: denied { prog_load } for pid=5104 comm="syz.0.1418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 234.580393][ T28] audit: type=1400 audit(1762341038.401:14884): avc: denied { bpf } for pid=5104 comm="syz.0.1418" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 234.629035][ T28] audit: type=1400 audit(1762341038.401:14885): avc: denied { bpf } for pid=5104 comm="syz.0.1418" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 234.671805][ T28] audit: type=1400 audit(1762341038.401:14886): avc: denied { prog_load } for pid=5104 comm="syz.0.1418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 234.711312][ T28] audit: type=1400 audit(1762341038.401:14887): avc: denied { bpf } for pid=5104 comm="syz.0.1418" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 234.754984][ T28] audit: type=1400 audit(1762341038.401:14888): avc: denied { prog_load } for pid=5104 comm="syz.0.1418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 234.800007][ T28] audit: type=1400 audit(1762341038.401:14889): avc: denied { bpf } for pid=5104 comm="syz.0.1418" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 234.848545][ T28] audit: type=1400 audit(1762341038.401:14890): avc: denied { bpf } for pid=5104 comm="syz.0.1418" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 234.889539][ T28] audit: type=1400 audit(1762341038.401:14891): avc: denied { prog_load } for pid=5104 comm="syz.0.1418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.330484][ T5136] __nla_validate_parse: 2 callbacks suppressed [ 235.330503][ T5136] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1426'. [ 236.411800][ T5164] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1435'. [ 237.232184][ T5181] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 237.475397][ T5192] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1442'. [ 238.242130][ T5203] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1446'. [ 239.099952][ T5229] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1453'. [ 239.319915][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 239.326024][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 239.374673][ T5234] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 239.490666][ T28] kauditd_printk_skb: 475 callbacks suppressed [ 239.490682][ T28] audit: type=1400 audit(1762341043.421:15367): avc: denied { bpf } for pid=5237 comm="syz.3.1458" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 239.548828][ T28] audit: type=1400 audit(1762341043.421:15368): avc: denied { map_create } for pid=5237 comm="syz.3.1458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 239.568796][ T28] audit: type=1400 audit(1762341043.421:15369): avc: denied { sqpoll } for pid=5241 comm="syz.2.1460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 239.589007][ T28] audit: type=1400 audit(1762341043.421:15370): avc: denied { bpf } for pid=5241 comm="syz.2.1460" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 239.609957][ T28] audit: type=1400 audit(1762341043.421:15371): avc: denied { prog_load } for pid=5241 comm="syz.2.1460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 239.629295][ T28] audit: type=1400 audit(1762341043.431:15372): avc: denied { bpf } for pid=5241 comm="syz.2.1460" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 239.660820][ T28] audit: type=1400 audit(1762341043.431:15373): avc: denied { map_create } for pid=5241 comm="syz.2.1460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 239.689908][ T28] audit: type=1400 audit(1762341043.431:15374): avc: denied { bpf } for pid=5241 comm="syz.2.1460" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 239.719920][ T28] audit: type=1400 audit(1762341043.431:15375): avc: denied { prog_load } for pid=5241 comm="syz.2.1460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 239.759595][ T28] audit: type=1400 audit(1762341043.431:15376): avc: denied { bpf } for pid=5241 comm="syz.2.1460" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 241.136106][ T5292] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1474'. [ 241.230606][ T5295] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1475'. [ 241.389958][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 241.396054][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 242.014373][ T5308] netlink: 96 bytes leftover after parsing attributes in process `syz.4.1478'. [ 242.101534][ T5310] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1479'. [ 243.453548][ T5347] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 243.473784][ T5348] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1490'. [ 243.696705][ T5351] netlink: 96 bytes leftover after parsing attributes in process `syz.0.1492'. [ 244.156890][ T5357] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1494'. [ 244.535061][ T28] kauditd_printk_skb: 483 callbacks suppressed [ 244.535078][ T28] audit: type=1400 audit(1762341048.461:15860): avc: denied { bpf } for pid=5367 comm="syz.0.1498" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 244.564450][ T5370] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1498'. [ 244.577846][ T28] audit: type=1400 audit(1762341048.461:15861): avc: denied { prog_load } for pid=5367 comm="syz.0.1498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 244.608025][ T28] audit: type=1400 audit(1762341048.491:15862): avc: denied { bpf } for pid=5367 comm="syz.0.1498" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 244.648811][ T28] audit: type=1400 audit(1762341048.491:15863): avc: denied { bpf } for pid=5367 comm="syz.0.1498" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 244.685821][ T28] audit: type=1400 audit(1762341048.491:15864): avc: denied { map_create } for pid=5367 comm="syz.0.1498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 244.726787][ T28] audit: type=1400 audit(1762341048.491:15865): avc: denied { bpf } for pid=5367 comm="syz.0.1498" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 244.763801][ T28] audit: type=1400 audit(1762341048.491:15866): avc: denied { prog_load } for pid=5367 comm="syz.0.1498" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 244.801027][ T28] audit: type=1400 audit(1762341048.491:15867): avc: denied { bpf } for pid=5367 comm="syz.0.1498" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 244.857163][ T28] audit: type=1400 audit(1762341048.491:15868): avc: denied { bpf } for pid=5367 comm="syz.0.1498" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 244.899046][ T28] audit: type=1400 audit(1762341048.491:15869): avc: denied { bpf } for pid=5367 comm="syz.0.1498" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 245.469985][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 245.476085][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 246.612857][ T5424] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1512'. [ 246.671159][ T5427] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1513'. [ 246.899970][ T5432] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1515'. [ 247.732056][ T5448] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1520'. [ 247.875355][ T5453] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1521'. [ 248.571710][ T5463] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 248.750953][ T5474] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1526'. [ 249.642332][ T28] kauditd_printk_skb: 438 callbacks suppressed [ 249.642349][ T28] audit: type=1400 audit(1762341053.571:16308): avc: denied { bpf } for pid=5493 comm="syz.2.1533" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 249.683389][ T28] audit: type=1400 audit(1762341053.591:16309): avc: denied { prog_load } for pid=5493 comm="syz.2.1533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 249.713615][ T28] audit: type=1400 audit(1762341053.601:16310): avc: denied { bpf } for pid=5493 comm="syz.2.1533" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 249.746420][ T28] audit: type=1400 audit(1762341053.601:16311): avc: denied { prog_load } for pid=5493 comm="syz.2.1533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 249.776583][ T28] audit: type=1400 audit(1762341053.601:16312): avc: denied { bpf } for pid=5493 comm="syz.2.1533" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 249.808154][ T28] audit: type=1400 audit(1762341053.601:16313): avc: denied { bpf } for pid=5493 comm="syz.2.1533" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 249.849111][ T28] audit: type=1400 audit(1762341053.601:16314): avc: denied { create } for pid=5493 comm="syz.2.1533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 249.889948][ T28] audit: type=1400 audit(1762341053.811:16315): avc: denied { create } for pid=5493 comm="syz.2.1533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=0 [ 249.993826][ T28] audit: type=1400 audit(1762341053.921:16316): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 250.052597][ T28] audit: type=1400 audit(1762341053.931:16317): avc: denied { create } for pid=5497 comm="syz.4.1534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 250.125060][ T5503] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1534'. [ 250.510641][ T5510] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1536'. [ 250.589934][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 250.596032][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 252.031814][ T5549] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1548'. [ 252.270365][ T5552] netlink: 96 bytes leftover after parsing attributes in process `syz.1.1549'. [ 252.356067][ T5562] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1550'. [ 252.380071][ T5564] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 252.905298][ T5579] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1558'. [ 253.742974][ T5599] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1564'. [ 254.429910][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 254.436030][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 254.733294][ T28] kauditd_printk_skb: 515 callbacks suppressed [ 254.733310][ T28] audit: type=1400 audit(1762341058.661:16833): avc: denied { sqpoll } for pid=5626 comm="syz.2.1573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 254.759636][ T28] audit: type=1400 audit(1762341058.661:16834): avc: denied { bpf } for pid=5626 comm="syz.2.1573" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 254.786524][ T28] audit: type=1400 audit(1762341058.661:16835): avc: denied { prog_load } for pid=5626 comm="syz.2.1573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 254.818266][ T28] audit: type=1400 audit(1762341058.681:16836): avc: denied { bpf } for pid=5626 comm="syz.2.1573" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 254.859997][ T28] audit: type=1400 audit(1762341058.681:16837): avc: denied { bpf } for pid=5626 comm="syz.2.1573" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 254.901262][ T28] audit: type=1400 audit(1762341058.681:16838): avc: denied { map_create } for pid=5626 comm="syz.2.1573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 254.940989][ T28] audit: type=1400 audit(1762341058.681:16839): avc: denied { bpf } for pid=5626 comm="syz.2.1573" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 254.990159][ T28] audit: type=1400 audit(1762341058.681:16840): avc: denied { prog_load } for pid=5626 comm="syz.2.1573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 255.029830][ T28] audit: type=1400 audit(1762341058.681:16841): avc: denied { bpf } for pid=5626 comm="syz.2.1573" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 255.075055][ T28] audit: type=1400 audit(1762341058.681:16842): avc: denied { bpf } for pid=5626 comm="syz.2.1573" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 255.422116][ T5644] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1576'. [ 255.987811][ T5662] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 256.681643][ T5684] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1589'. [ 257.057366][ T5689] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1591'. [ 258.030437][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 258.036527][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 259.296149][ T5751] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1610'. [ 259.759496][ T28] kauditd_printk_skb: 554 callbacks suppressed [ 259.759515][ T28] audit: type=1400 audit(1762341063.681:17397): avc: denied { bpf } for pid=5765 comm="syz.1.1616" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 259.829929][ T28] audit: type=1400 audit(1762341063.681:17398): avc: denied { prog_load } for pid=5765 comm="syz.1.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 259.887202][ T28] audit: type=1400 audit(1762341063.681:17399): avc: denied { bpf } for pid=5765 comm="syz.1.1616" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 259.953894][ T28] audit: type=1400 audit(1762341063.681:17400): avc: denied { prog_load } for pid=5765 comm="syz.1.1616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 260.006940][ T28] audit: type=1400 audit(1762341063.681:17401): avc: denied { bpf } for pid=5765 comm="syz.1.1616" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 260.074485][ T28] audit: type=1400 audit(1762341063.821:17402): avc: denied { bpf } for pid=5763 comm="syz.4.1615" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 260.136334][ T28] audit: type=1400 audit(1762341063.821:17403): avc: denied { prog_load } for pid=5763 comm="syz.4.1615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 260.204269][ T28] audit: type=1400 audit(1762341063.841:17404): avc: denied { bpf } for pid=5763 comm="syz.4.1615" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 260.273520][ T28] audit: type=1400 audit(1762341063.841:17405): avc: denied { prog_load } for pid=5763 comm="syz.4.1615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 260.343301][ T28] audit: type=1400 audit(1762341063.841:17406): avc: denied { bpf } for pid=5763 comm="syz.4.1615" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 262.094318][ T5821] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1630'. [ 262.765738][ T5838] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1635'. [ 262.871689][ T5842] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1636'. [ 263.677448][ T5859] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1640'. [ 264.744304][ T5884] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1648'. [ 264.857750][ T28] kauditd_printk_skb: 419 callbacks suppressed [ 264.857767][ T28] audit: type=1400 audit(1762341068.781:17826): avc: denied { bpf } for pid=5885 comm="syz.2.1649" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 264.891573][ T5888] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1649'. [ 264.928597][ T28] audit: type=1400 audit(1762341068.781:17827): avc: denied { prog_load } for pid=5885 comm="syz.2.1649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 264.999924][ T28] audit: type=1400 audit(1762341068.801:17828): avc: denied { read write } for pid=285 comm="syz-executor" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 265.071386][ T28] audit: type=1400 audit(1762341068.811:17829): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 265.135144][ T28] audit: type=1400 audit(1762341068.821:17830): avc: denied { bpf } for pid=5885 comm="syz.2.1649" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 265.199929][ T28] audit: type=1400 audit(1762341068.821:17831): avc: denied { bpf } for pid=5885 comm="syz.2.1649" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 265.239516][ T28] audit: type=1400 audit(1762341068.821:17832): avc: denied { map_create } for pid=5885 comm="syz.2.1649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 265.294356][ T28] audit: type=1400 audit(1762341068.821:17833): avc: denied { bpf } for pid=5885 comm="syz.2.1649" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 265.359893][ T28] audit: type=1400 audit(1762341068.821:17834): avc: denied { prog_load } for pid=5885 comm="syz.2.1649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 265.409916][ T28] audit: type=1400 audit(1762341068.821:17835): avc: denied { bpf } for pid=5885 comm="syz.2.1649" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 265.939058][ T5920] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1658'. [ 267.911841][ T5971] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1671'. [ 268.393240][ T5982] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1675'. [ 268.848691][ T5998] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1679'. [ 269.095147][ T6002] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1681'. [ 269.297416][ T6005] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1682'. [ 269.873738][ T28] kauditd_printk_skb: 473 callbacks suppressed [ 269.873757][ T28] audit: type=1400 audit(1762341073.791:18309): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 269.970824][ T28] audit: type=1400 audit(1762341073.831:18310): avc: denied { bpf } for pid=6014 comm="syz.4.1685" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 270.031983][ T28] audit: type=1400 audit(1762341073.831:18311): avc: denied { prog_load } for pid=6014 comm="syz.4.1685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 270.089936][ T28] audit: type=1400 audit(1762341073.831:18312): avc: denied { bpf } for pid=6014 comm="syz.4.1685" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 270.150010][ T28] audit: type=1400 audit(1762341073.831:18313): avc: denied { bpf } for pid=6014 comm="syz.4.1685" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 270.199938][ T28] audit: type=1400 audit(1762341073.831:18314): avc: denied { create } for pid=6014 comm="syz.4.1685" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 270.249918][ T28] audit: type=1400 audit(1762341073.851:18315): avc: denied { execmem } for pid=6019 comm="syz.3.1686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 270.301651][ T28] audit: type=1400 audit(1762341073.851:18316): avc: denied { sqpoll } for pid=6019 comm="syz.3.1686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 270.350731][ T28] audit: type=1400 audit(1762341073.851:18317): avc: denied { bpf } for pid=6019 comm="syz.3.1686" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 270.396057][ T28] audit: type=1400 audit(1762341073.851:18318): avc: denied { prog_load } for pid=6019 comm="syz.3.1686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 270.798021][ T6038] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 271.449199][ T6058] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1695'. [ 271.490144][ T6059] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1696'. [ 272.390101][ T6077] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1700'. [ 272.717890][ T6085] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1704'. [ 272.829922][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 272.836034][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 273.279780][ T6099] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1708'. [ 274.113796][ T6116] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1712'. [ 274.885281][ T28] kauditd_printk_skb: 473 callbacks suppressed [ 274.885297][ T28] audit: type=1400 audit(1762341078.811:18792): avc: denied { bpf } for pid=6140 comm="syz.3.1722" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 274.922837][ T28] audit: type=1400 audit(1762341078.811:18793): avc: denied { map_create } for pid=6140 comm="syz.3.1722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 274.925108][ T6144] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1721'. [ 274.953963][ T28] audit: type=1400 audit(1762341078.811:18794): avc: denied { bpf } for pid=6140 comm="syz.3.1722" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 274.983212][ T28] audit: type=1400 audit(1762341078.811:18795): avc: denied { prog_load } for pid=6140 comm="syz.3.1722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 275.008088][ T28] audit: type=1400 audit(1762341078.811:18796): avc: denied { bpf } for pid=6140 comm="syz.3.1722" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 275.044152][ T28] audit: type=1400 audit(1762341078.811:18797): avc: denied { prog_load } for pid=6140 comm="syz.3.1722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 275.072137][ T28] audit: type=1400 audit(1762341078.811:18798): avc: denied { bpf } for pid=6140 comm="syz.3.1722" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 275.112826][ T28] audit: type=1400 audit(1762341078.811:18799): avc: denied { bpf } for pid=6140 comm="syz.3.1722" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 275.162348][ T28] audit: type=1400 audit(1762341078.841:18800): avc: denied { bpf } for pid=6140 comm="syz.3.1722" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 275.197581][ T28] audit: type=1400 audit(1762341078.841:18801): avc: denied { map_create } for pid=6140 comm="syz.3.1722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 275.695202][ T6164] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1727'. [ 275.801143][ T6170] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1728'. [ 276.432099][ T6182] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1732'. [ 276.503629][ T6184] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1733'. [ 277.175246][ T6197] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1736'. [ 277.635928][ T6214] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1741'. [ 278.872888][ T6242] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 279.191965][ T6255] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 279.389483][ T6263] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1756'. [ 279.440897][ T6265] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1757'. [ 279.951113][ T28] kauditd_printk_skb: 506 callbacks suppressed [ 279.951129][ T28] audit: type=1400 audit(1762341083.881:19308): avc: denied { sqpoll } for pid=6268 comm="syz.0.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 279.977096][ T28] audit: type=1400 audit(1762341083.881:19309): avc: denied { bpf } for pid=6268 comm="syz.0.1759" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 279.998118][ T28] audit: type=1400 audit(1762341083.881:19310): avc: denied { prog_load } for pid=6268 comm="syz.0.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 280.017799][ T28] audit: type=1400 audit(1762341083.881:19311): avc: denied { bpf } for pid=6268 comm="syz.0.1759" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 280.038793][ T28] audit: type=1400 audit(1762341083.881:19312): avc: denied { bpf } for pid=6268 comm="syz.0.1759" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 280.059524][ T28] audit: type=1400 audit(1762341083.881:19313): avc: denied { map_create } for pid=6268 comm="syz.0.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 280.078917][ T28] audit: type=1400 audit(1762341083.881:19314): avc: denied { bpf } for pid=6268 comm="syz.0.1759" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 280.099622][ T28] audit: type=1400 audit(1762341083.881:19315): avc: denied { prog_load } for pid=6268 comm="syz.0.1759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 280.118863][ T28] audit: type=1400 audit(1762341083.881:19316): avc: denied { bpf } for pid=6268 comm="syz.0.1759" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 280.139594][ T28] audit: type=1400 audit(1762341083.881:19317): avc: denied { bpf } for pid=6268 comm="syz.0.1759" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 280.697096][ T6293] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1765'. [ 280.909921][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 280.916370][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 281.229896][ T722] Bluetooth: hci1: command 0x1003 tx timeout [ 281.236004][ T1515] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 281.656819][ T6320] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1773'. [ 282.440212][ T6337] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1777'. [ 283.059314][ T6361] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1784'. [ 283.728154][ T6381] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1790'. [ 284.255156][ T6394] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1794'. [ 284.427259][ T6406] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1798'. [ 284.602436][ T6410] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1799'. [ 284.999328][ T28] kauditd_printk_skb: 507 callbacks suppressed [ 284.999344][ T28] audit: type=1400 audit(1762341088.921:19825): avc: denied { read write } for pid=284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 285.044903][ T28] audit: type=1400 audit(1762341088.971:19826): avc: denied { read write } for pid=6419 comm="syz.1.1802" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 285.076454][ T28] audit: type=1400 audit(1762341089.001:19827): avc: denied { execmem } for pid=6419 comm="syz.1.1802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 285.100016][ T28] audit: type=1400 audit(1762341089.001:19828): avc: denied { bpf } for pid=6419 comm="syz.1.1802" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 285.135330][ T6422] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 285.145416][ T28] audit: type=1400 audit(1762341089.001:19829): avc: denied { prog_load } for pid=6419 comm="syz.1.1802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 285.167383][ T28] audit: type=1400 audit(1762341089.001:19830): avc: denied { bpf } for pid=6419 comm="syz.1.1802" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 285.188779][ T28] audit: type=1400 audit(1762341089.001:19831): avc: denied { bpf } for pid=6419 comm="syz.1.1802" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 285.214551][ T28] audit: type=1400 audit(1762341089.001:19832): avc: denied { prog_load } for pid=6419 comm="syz.1.1802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 285.238002][ T28] audit: type=1400 audit(1762341089.001:19833): avc: denied { bpf } for pid=6419 comm="syz.1.1802" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 285.259566][ T28] audit: type=1400 audit(1762341089.001:19834): avc: denied { prog_load } for pid=6419 comm="syz.1.1802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 286.889961][ T6474] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1819'. [ 287.149896][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 287.149908][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 289.812926][ T6549] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1843'. [ 290.010607][ T28] kauditd_printk_skb: 509 callbacks suppressed [ 290.010623][ T28] audit: type=1400 audit(1762341093.941:20344): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 290.048867][ T28] audit: type=1400 audit(1762341093.971:20345): avc: denied { execmem } for pid=6554 comm="syz.3.1846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 290.134288][ T28] audit: type=1400 audit(1762341094.061:20346): avc: denied { bpf } for pid=6554 comm="syz.3.1846" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 290.168146][ T28] audit: type=1400 audit(1762341094.061:20347): avc: denied { prog_load } for pid=6554 comm="syz.3.1846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.208717][ T28] audit: type=1400 audit(1762341094.061:20348): avc: denied { bpf } for pid=6554 comm="syz.3.1846" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 290.230650][ T28] audit: type=1400 audit(1762341094.061:20349): avc: denied { prog_load } for pid=6554 comm="syz.3.1846" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 290.250702][ T28] audit: type=1400 audit(1762341094.061:20350): avc: denied { bpf } for pid=6554 comm="syz.3.1846" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 290.275989][ T28] audit: type=1400 audit(1762341094.061:20351): avc: denied { read append } for pid=6554 comm="syz.3.1846" name="kvm" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 290.300229][ T28] audit: type=1400 audit(1762341094.131:20352): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 290.332015][ T28] audit: type=1400 audit(1762341094.161:20353): avc: denied { execmem } for pid=6558 comm="syz.2.1847" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 290.685516][ T6567] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1849'. [ 293.123077][ T6631] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1869'. [ 293.959628][ T6654] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1875'. [ 294.343752][ T6662] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1879'. [ 295.056438][ T28] kauditd_printk_skb: 441 callbacks suppressed [ 295.056454][ T28] audit: type=1400 audit(1762341098.981:20795): avc: denied { bpf } for pid=6675 comm="syz.2.1884" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 295.099968][ T28] audit: type=1400 audit(1762341098.981:20796): avc: denied { prog_load } for pid=6675 comm="syz.2.1884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 295.119778][ T28] audit: type=1400 audit(1762341098.981:20797): avc: denied { create } for pid=6675 comm="syz.2.1884" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 295.141017][ T28] audit: type=1400 audit(1762341099.011:20798): avc: denied { mounton } for pid=6675 comm="syz.2.1884" path="/397/file0" dev="tmpfs" ino=2436 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 295.180544][ T6681] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1883'. [ 295.197933][ T28] audit: type=1400 audit(1762341099.011:20799): avc: denied { remount } for pid=6675 comm="syz.2.1884" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 295.224387][ T28] audit: type=1400 audit(1762341099.011:20800): avc: denied { mounton } for pid=6675 comm="syz.2.1884" path="/397/bus" dev="tmpfs" ino=2437 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 295.255673][ T28] audit: type=1400 audit(1762341099.011:20801): avc: denied { remount } for pid=6675 comm="syz.2.1884" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 295.288115][ T28] audit: type=1400 audit(1762341099.011:20802): avc: denied { read write } for pid=285 comm="syz-executor" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 295.324366][ T28] audit: type=1400 audit(1762341099.011:20803): avc: denied { mounton } for pid=6675 comm="syz.2.1884" path="/397/file0" dev="tmpfs" ino=2436 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 295.363445][ T28] audit: type=1400 audit(1762341099.021:20804): avc: denied { bpf } for pid=6673 comm="syz.4.1883" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 295.851994][ T6705] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1892'. [ 296.346978][ T6721] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1896'. [ 296.499664][ T6733] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1899'. [ 298.839278][ T6810] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1925'. [ 298.864605][ T6811] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1927'. [ 299.775872][ T6844] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1934'. [ 300.122499][ T28] kauditd_printk_skb: 627 callbacks suppressed [ 300.122515][ T28] audit: type=1400 audit(1762341104.051:21432): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 300.163631][ T28] audit: type=1400 audit(1762341104.091:21433): avc: denied { execmem } for pid=6846 comm="syz.2.1939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 300.206474][ T28] audit: type=1400 audit(1762341104.131:21434): avc: denied { read write } for pid=284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 300.239364][ T28] audit: type=1400 audit(1762341104.161:21435): avc: denied { bpf } for pid=6846 comm="syz.2.1939" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 300.260569][ T28] audit: type=1400 audit(1762341104.161:21436): avc: denied { prog_load } for pid=6846 comm="syz.2.1939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 300.280874][ T28] audit: type=1400 audit(1762341104.161:21437): avc: denied { create } for pid=6846 comm="syz.2.1939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 300.301994][ T28] audit: type=1400 audit(1762341104.161:21438): avc: denied { mounton } for pid=6846 comm="syz.2.1939" path="/410/file0" dev="tmpfs" ino=2519 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 300.330072][ T28] audit: type=1400 audit(1762341104.161:21439): avc: denied { remount } for pid=6846 comm="syz.2.1939" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 300.359899][ T28] audit: type=1400 audit(1762341104.161:21440): avc: denied { mounton } for pid=6846 comm="syz.2.1939" path="/410/bus" dev="tmpfs" ino=2520 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 300.395560][ T28] audit: type=1400 audit(1762341104.161:21441): avc: denied { remount } for pid=6846 comm="syz.2.1939" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 300.613723][ T6864] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 301.477430][ T6886] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1950'. [ 302.669926][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 302.676023][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 303.517144][ T6952] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 304.054212][ T6967] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1978'. [ 305.103676][ T7004] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1988'. [ 305.390170][ T28] kauditd_printk_skb: 591 callbacks suppressed [ 305.390187][ T28] audit: type=1400 audit(1762341109.311:22033): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 305.433000][ T28] audit: type=1400 audit(1762341109.351:22034): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 305.468923][ T28] audit: type=1400 audit(1762341109.351:22035): avc: denied { execmem } for pid=7006 comm="syz.3.1991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 305.492557][ T28] audit: type=1400 audit(1762341109.391:22036): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 305.519656][ T28] audit: type=1400 audit(1762341109.391:22037): avc: denied { bpf } for pid=7006 comm="syz.3.1991" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 305.541809][ T28] audit: type=1400 audit(1762341109.391:22038): avc: denied { prog_load } for pid=7006 comm="syz.3.1991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 305.562416][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 305.584965][ T28] audit: type=1400 audit(1762341109.391:22039): avc: denied { create } for pid=7006 comm="syz.3.1991" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 305.607656][ T28] audit: type=1400 audit(1762341109.421:22040): avc: denied { mounton } for pid=7006 comm="syz.3.1991" path="/381/file0" dev="tmpfs" ino=2355 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 305.630575][ T28] audit: type=1400 audit(1762341109.421:22041): avc: denied { mounton } for pid=7006 comm="syz.3.1991" path="/381/bus" dev="tmpfs" ino=2356 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 305.653447][ T28] audit: type=1400 audit(1762341109.421:22042): avc: denied { remount } for pid=7006 comm="syz.3.1991" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 305.677466][ T7019] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1994'. [ 306.941745][ T7048] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 308.253145][ T7091] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2018'. [ 308.418799][ T7097] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2021'. [ 308.989897][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 308.989923][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 310.369210][ T7143] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 310.473375][ T28] kauditd_printk_skb: 498 callbacks suppressed [ 310.473389][ T28] audit: type=1400 audit(1762341114.401:22541): avc: denied { read write } for pid=285 comm="syz-executor" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.512863][ T28] audit: type=1400 audit(1762341114.441:22542): avc: denied { execmem } for pid=7144 comm="syz.0.2037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 310.560534][ T28] audit: type=1400 audit(1762341114.491:22543): avc: denied { read write } for pid=284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 310.596644][ T28] audit: type=1400 audit(1762341114.521:22544): avc: denied { bpf } for pid=7144 comm="syz.0.2037" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 310.617821][ T28] audit: type=1400 audit(1762341114.521:22545): avc: denied { prog_load } for pid=7144 comm="syz.0.2037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 310.637702][ T28] audit: type=1400 audit(1762341114.541:22546): avc: denied { create } for pid=7144 comm="syz.0.2037" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 310.664461][ T28] audit: type=1400 audit(1762341114.541:22547): avc: denied { mounton } for pid=7144 comm="syz.0.2037" path="/412/file0" dev="tmpfs" ino=2532 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 310.691223][ T28] audit: type=1400 audit(1762341114.541:22548): avc: denied { remount } for pid=7144 comm="syz.0.2037" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 310.711714][ T28] audit: type=1400 audit(1762341114.541:22549): avc: denied { mounton } for pid=7144 comm="syz.0.2037" path="/412/bus" dev="tmpfs" ino=2533 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 310.734916][ T28] audit: type=1400 audit(1762341114.541:22550): avc: denied { remount } for pid=7144 comm="syz.0.2037" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 311.005443][ T7159] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2041'. [ 311.371407][ T7173] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2046'. [ 312.250726][ T7192] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2051'. [ 312.439893][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 312.446009][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 313.211161][ T7229] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2064'. [ 313.445327][ T7232] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 315.469883][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 315.469919][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 315.490543][ T28] kauditd_printk_skb: 532 callbacks suppressed [ 315.490559][ T28] audit: type=1400 audit(1762341119.421:23083): avc: denied { execmem } for pid=7281 comm="syz.4.2083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 315.520994][ T28] audit: type=1400 audit(1762341119.441:23084): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 315.555191][ T28] audit: type=1400 audit(1762341119.471:23085): avc: denied { execmem } for pid=7283 comm="syz.2.2084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 315.574911][ T28] audit: type=1400 audit(1762341119.501:23086): avc: denied { bpf } for pid=7281 comm="syz.4.2083" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 315.596259][ T28] audit: type=1400 audit(1762341119.501:23087): avc: denied { prog_load } for pid=7281 comm="syz.4.2083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 315.617351][ T28] audit: type=1400 audit(1762341119.531:23088): avc: denied { create } for pid=7281 comm="syz.4.2083" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 315.644272][ T28] audit: type=1400 audit(1762341119.531:23089): avc: denied { mounton } for pid=7281 comm="syz.4.2083" path="/415/file0" dev="tmpfs" ino=2592 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 315.669621][ T28] audit: type=1400 audit(1762341119.531:23090): avc: denied { remount } for pid=7281 comm="syz.4.2083" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 315.692250][ T28] audit: type=1400 audit(1762341119.531:23091): avc: denied { remount } for pid=7281 comm="syz.4.2083" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 315.712506][ T28] audit: type=1400 audit(1762341119.541:23092): avc: denied { bpf } for pid=7279 comm="syz.3.2082" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 316.510687][ T7314] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2091'. [ 316.833512][ T7320] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 316.953725][ T7325] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2095'. [ 318.909887][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 318.916007][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 319.131602][ T7388] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2114'. [ 320.013747][ T7414] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 320.506537][ T28] kauditd_printk_skb: 546 callbacks suppressed [ 320.506553][ T28] audit: type=1400 audit(1762341124.431:23639): avc: denied { read write } for pid=285 comm="syz-executor" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.544832][ T28] audit: type=1400 audit(1762341124.471:23640): avc: denied { read write } for pid=7430 comm="syz.0.2129" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 320.570370][ T28] audit: type=1400 audit(1762341124.491:23641): avc: denied { module_request } for pid=7430 comm="syz.0.2129" kmod="ipt_addrtype" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 320.596379][ T28] audit: type=1400 audit(1762341124.521:23642): avc: denied { create } for pid=7430 comm="syz.0.2129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 320.617662][ T28] audit: type=1400 audit(1762341124.541:23643): avc: denied { execmem } for pid=7430 comm="syz.0.2129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 320.637707][ T28] audit: type=1400 audit(1762341124.561:23644): avc: denied { bpf } for pid=7430 comm="syz.0.2129" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 320.659027][ T28] audit: type=1400 audit(1762341124.561:23645): avc: denied { prog_load } for pid=7430 comm="syz.0.2129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 320.678705][ T28] audit: type=1400 audit(1762341124.581:23646): avc: denied { bpf } for pid=7430 comm="syz.0.2129" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 320.731557][ T28] audit: type=1400 audit(1762341124.621:23647): avc: denied { bpf } for pid=7430 comm="syz.0.2129" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 320.760133][ T28] audit: type=1400 audit(1762341124.621:23648): avc: denied { map_create } for pid=7430 comm="syz.0.2129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 322.030473][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 322.036653][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 322.916475][ T7505] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 323.164492][ T7511] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 323.358419][ T7517] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2158'. [ 324.250980][ T7534] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2161'. [ 324.989919][ T722] Bluetooth: hci0: command 0x1003 tx timeout [ 324.996038][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 325.229923][ T721] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 325.230418][ T1515] Bluetooth: hci1: command 0x1003 tx timeout [ 325.348285][ T7568] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2174'. [ 325.697396][ T28] kauditd_printk_skb: 543 callbacks suppressed [ 325.697411][ T28] audit: type=1400 audit(1762341129.621:24192): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.739191][ T28] audit: type=1400 audit(1762341129.661:24193): avc: denied { execmem } for pid=7572 comm="syz.4.2176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 325.805657][ T28] audit: type=1400 audit(1762341129.731:24194): avc: denied { read write } for pid=285 comm="syz-executor" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 325.839751][ T28] audit: type=1400 audit(1762341129.751:24195): avc: denied { sqpoll } for pid=7572 comm="syz.4.2176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 325.895391][ T28] audit: type=1400 audit(1762341129.751:24196): avc: denied { bpf } for pid=7572 comm="syz.4.2176" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 325.917030][ T28] audit: type=1400 audit(1762341129.751:24197): avc: denied { prog_load } for pid=7572 comm="syz.4.2176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 325.939906][ T28] audit: type=1400 audit(1762341129.751:24198): avc: denied { bpf } for pid=7572 comm="syz.4.2176" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 325.968174][ T28] audit: type=1400 audit(1762341129.751:24199): avc: denied { bpf } for pid=7572 comm="syz.4.2176" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 325.991726][ T28] audit: type=1400 audit(1762341129.751:24200): avc: denied { map_create } for pid=7572 comm="syz.4.2176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 326.011322][ T28] audit: type=1400 audit(1762341129.751:24201): avc: denied { bpf } for pid=7572 comm="syz.4.2176" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 326.682354][ T7594] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 328.394823][ T7637] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2195'. [ 328.547957][ T7640] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2196'. [ 328.749866][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 328.749875][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 330.572069][ T7695] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 330.744407][ T28] kauditd_printk_skb: 505 callbacks suppressed [ 330.744422][ T28] audit: type=1400 audit(1762341134.671:24707): avc: denied { sqpoll } for pid=7699 comm="syz.4.2216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 330.770824][ T28] audit: type=1400 audit(1762341134.671:24708): avc: denied { bpf } for pid=7699 comm="syz.4.2216" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 330.781431][ T7705] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2217'. [ 330.791850][ T28] audit: type=1400 audit(1762341134.671:24709): avc: denied { prog_load } for pid=7699 comm="syz.4.2216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.821270][ T28] audit: type=1400 audit(1762341134.671:24710): avc: denied { bpf } for pid=7699 comm="syz.4.2216" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 330.842312][ T28] audit: type=1400 audit(1762341134.671:24711): avc: denied { bpf } for pid=7699 comm="syz.4.2216" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 330.863376][ T28] audit: type=1400 audit(1762341134.671:24712): avc: denied { map_create } for pid=7699 comm="syz.4.2216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.882798][ T28] audit: type=1400 audit(1762341134.671:24713): avc: denied { bpf } for pid=7699 comm="syz.4.2216" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 330.903674][ T28] audit: type=1400 audit(1762341134.671:24714): avc: denied { prog_load } for pid=7699 comm="syz.4.2216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 330.923045][ T28] audit: type=1400 audit(1762341134.671:24715): avc: denied { bpf } for pid=7699 comm="syz.4.2216" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 330.943863][ T28] audit: type=1400 audit(1762341134.671:24716): avc: denied { bpf } for pid=7699 comm="syz.4.2216" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 331.554086][ T7716] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 331.869897][ T7718] Bluetooth: hci0: command 0x1003 tx timeout [ 331.875998][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 332.313593][ T7741] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2229'. [ 332.510587][ T7745] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2230'. [ 332.589930][ T721] Bluetooth: hci1: command 0x1003 tx timeout [ 332.596043][ T1515] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 333.557087][ T7771] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 333.629962][ T7718] Bluetooth: hci2: command 0x1003 tx timeout [ 333.636292][ T722] Bluetooth: hci2: Opcode 0x1003 failed: -110 [ 334.051777][ T7787] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 334.181478][ T7791] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2246'. [ 335.309902][ T7718] Bluetooth: hci0: command 0x1003 tx timeout [ 335.315993][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 335.629903][ T1515] Bluetooth: hci1: command 0x1003 tx timeout [ 335.635993][ T721] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 335.760256][ T28] kauditd_printk_skb: 515 callbacks suppressed [ 335.760272][ T28] audit: type=1400 audit(1762341139.691:25232): avc: denied { remount } for pid=7824 comm="syz.3.2257" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 335.790327][ T28] audit: type=1400 audit(1762341139.721:25233): avc: denied { mounton } for pid=7824 comm="syz.3.2257" path="/434/bus" dev="tmpfs" ino=2713 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 335.813048][ T28] audit: type=1400 audit(1762341139.721:25234): avc: denied { remount } for pid=7824 comm="syz.3.2257" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 335.833243][ T28] audit: type=1400 audit(1762341139.721:25235): avc: denied { mounton } for pid=7824 comm="syz.3.2257" path="/434/file0" dev="tmpfs" ino=2712 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 335.939796][ T28] audit: type=1400 audit(1762341139.861:25236): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 335.972314][ T28] audit: type=1400 audit(1762341139.891:25237): avc: denied { read write } for pid=285 comm="syz-executor" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 335.997146][ T28] audit: type=1400 audit(1762341139.891:25238): avc: denied { execmem } for pid=7828 comm="syz.3.2258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 336.045252][ T28] audit: type=1400 audit(1762341139.891:25239): avc: denied { bpf } for pid=7828 comm="syz.3.2258" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 336.058118][ T7835] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2260'. [ 336.069467][ T28] audit: type=1400 audit(1762341139.891:25240): avc: denied { prog_load } for pid=7828 comm="syz.3.2258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 336.102194][ T28] audit: type=1400 audit(1762341139.891:25241): avc: denied { bpf } for pid=7828 comm="syz.3.2258" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 336.128059][ T721] Bluetooth: hci2: command 0x1003 tx timeout [ 336.134190][ T722] Bluetooth: hci2: Opcode 0x1003 failed: -110 [ 337.248454][ T7872] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 337.590621][ T7878] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 338.269895][ T722] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 338.662067][ T7912] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2286'. [ 339.309885][ T7718] Bluetooth: hci1: command 0x1003 tx timeout [ 339.309911][ T1515] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 339.629865][ T1515] Bluetooth: hci2: command 0x1003 tx timeout [ 339.630146][ T721] Bluetooth: hci2: Opcode 0x1003 failed: -110 [ 340.260955][ T7957] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 340.343839][ T7966] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2304'. [ 340.853385][ T28] kauditd_printk_skb: 666 callbacks suppressed [ 340.853400][ T28] audit: type=1400 audit(1762341144.781:25908): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 340.891251][ T28] audit: type=1400 audit(1762341144.821:25909): avc: denied { execmem } for pid=7976 comm="syz.3.2308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 340.963672][ T28] audit: type=1400 audit(1762341144.891:25910): avc: denied { sqpoll } for pid=7976 comm="syz.3.2308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 341.009885][ T28] audit: type=1400 audit(1762341144.891:25911): avc: denied { bpf } for pid=7976 comm="syz.3.2308" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 341.049873][ T28] audit: type=1400 audit(1762341144.891:25912): avc: denied { prog_load } for pid=7976 comm="syz.3.2308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 341.079268][ T28] audit: type=1400 audit(1762341144.891:25913): avc: denied { bpf } for pid=7976 comm="syz.3.2308" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 341.120640][ T28] audit: type=1400 audit(1762341144.891:25914): avc: denied { map_create } for pid=7976 comm="syz.3.2308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 341.159899][ T28] audit: type=1400 audit(1762341144.891:25915): avc: denied { bpf } for pid=7976 comm="syz.3.2308" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 341.209863][ T28] audit: type=1400 audit(1762341144.891:25916): avc: denied { prog_load } for pid=7976 comm="syz.3.2308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 341.254168][ T28] audit: type=1400 audit(1762341144.891:25917): avc: denied { bpf } for pid=7976 comm="syz.3.2308" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 342.269899][ T7718] Bluetooth: hci0: command 0x1003 tx timeout [ 342.275988][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 342.617753][ T8025] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2321'. [ 345.246411][ T8103] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2347'. [ 345.874529][ T28] kauditd_printk_skb: 557 callbacks suppressed [ 345.874543][ T28] audit: type=1400 audit(1762341149.801:26475): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 345.912724][ T28] audit: type=1400 audit(1762341149.841:26476): avc: denied { read write } for pid=8119 comm="syz.2.2353" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 345.938685][ T28] audit: type=1400 audit(1762341149.861:26477): avc: denied { module_request } for pid=8119 comm="syz.2.2353" kmod="ipt_addrtype" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 345.961732][ T28] audit: type=1400 audit(1762341149.891:26478): avc: denied { create } for pid=8119 comm="syz.2.2353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 345.982834][ T28] audit: type=1400 audit(1762341149.891:26479): avc: denied { execmem } for pid=8119 comm="syz.2.2353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 346.010105][ T28] audit: type=1400 audit(1762341149.941:26480): avc: denied { bpf } for pid=8119 comm="syz.2.2353" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 346.045005][ T28] audit: type=1400 audit(1762341149.941:26481): avc: denied { prog_load } for pid=8119 comm="syz.2.2353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 346.064969][ T28] audit: type=1400 audit(1762341149.941:26482): avc: denied { bpf } for pid=8119 comm="syz.2.2353" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 346.086137][ T28] audit: type=1400 audit(1762341149.961:26483): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 346.110881][ T28] audit: type=1400 audit(1762341149.971:26484): avc: denied { execmem } for pid=8121 comm="syz.2.2354" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 347.905305][ T8175] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2371'. [ 348.113304][ T8180] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 350.190087][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 350.190102][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 350.555834][ T8250] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2395'. [ 350.890172][ T28] kauditd_printk_skb: 525 callbacks suppressed [ 350.890186][ T28] audit: type=1400 audit(1762341154.821:27010): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 350.950049][ T28] audit: type=1400 audit(1762341154.851:27011): avc: denied { sqpoll } for pid=8259 comm="syz.1.2400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 350.986808][ T28] audit: type=1400 audit(1762341154.851:27012): avc: denied { bpf } for pid=8259 comm="syz.1.2400" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 351.012599][ T28] audit: type=1400 audit(1762341154.851:27013): avc: denied { prog_load } for pid=8259 comm="syz.1.2400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 351.032106][ T28] audit: type=1400 audit(1762341154.851:27014): avc: denied { bpf } for pid=8259 comm="syz.1.2400" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 351.053060][ T28] audit: type=1400 audit(1762341154.861:27015): avc: denied { map_create } for pid=8259 comm="syz.1.2400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 351.072709][ T28] audit: type=1400 audit(1762341154.861:27016): avc: denied { bpf } for pid=8259 comm="syz.1.2400" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 351.093624][ T28] audit: type=1400 audit(1762341154.861:27017): avc: denied { prog_load } for pid=8259 comm="syz.1.2400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 351.120719][ T28] audit: type=1400 audit(1762341154.861:27018): avc: denied { bpf } for pid=8259 comm="syz.1.2400" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 351.141852][ T28] audit: type=1400 audit(1762341154.861:27019): avc: denied { bpf } for pid=8259 comm="syz.1.2400" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 351.295883][ T8270] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 352.107858][ T8288] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2408'. [ 353.309916][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 353.310328][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 353.457720][ T8333] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2423'. [ 354.402166][ T8355] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 354.885442][ T8368] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2434'. [ 355.900676][ T28] kauditd_printk_skb: 494 callbacks suppressed [ 355.900692][ T28] audit: type=1400 audit(1762341159.831:27514): avc: denied { read } for pid=8394 comm="syz.0.2443" dev="nsfs" ino=4026532488 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 355.961951][ T28] audit: type=1400 audit(1762341159.851:27515): avc: denied { bpf } for pid=8394 comm="syz.0.2443" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 356.008148][ T28] audit: type=1400 audit(1762341159.851:27516): avc: denied { prog_load } for pid=8394 comm="syz.0.2443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 356.029882][ T28] audit: type=1400 audit(1762341159.861:27517): avc: denied { read write } for pid=8394 comm="syz.0.2443" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 356.067286][ T28] audit: type=1400 audit(1762341159.871:27518): avc: denied { bpf } for pid=8394 comm="syz.0.2443" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 356.119883][ T28] audit: type=1400 audit(1762341159.871:27519): avc: denied { prog_load } for pid=8394 comm="syz.0.2443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 356.149579][ T28] audit: type=1400 audit(1762341159.871:27520): avc: denied { bpf } for pid=8394 comm="syz.0.2443" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 356.181728][ T8409] audit: audit_backlog=65 > audit_backlog_limit=64 [ 356.188289][ T8409] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 356.196316][ T28] audit: type=1400 audit(1762341159.871:27521): avc: denied { bpf } for pid=8394 comm="syz.0.2443" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 356.250650][ T8409] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2447'. [ 356.429862][ T7718] Bluetooth: hci0: command 0x1003 tx timeout [ 356.436058][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 356.930797][ T8429] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2452'. [ 357.639299][ T8445] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 358.193447][ T8466] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2466'. [ 358.902783][ T8482] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2471'. [ 359.709895][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 359.715989][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 360.702057][ T8537] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 360.938836][ T28] kauditd_printk_skb: 613 callbacks suppressed [ 360.938852][ T28] audit: type=1400 audit(1762341164.861:28086): avc: denied { read write } for pid=284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 360.987902][ T28] audit: type=1400 audit(1762341164.911:28087): avc: denied { execmem } for pid=8541 comm="syz.1.2492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 361.008345][ T28] audit: type=1400 audit(1762341164.911:28088): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 361.032990][ T28] audit: type=1400 audit(1762341164.931:28089): avc: denied { bpf } for pid=8539 comm="syz.3.2491" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 361.058399][ T28] audit: type=1400 audit(1762341164.931:28091): avc: denied { execmem } for pid=8543 comm="syz.4.2493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 361.081034][ T28] audit: type=1400 audit(1762341164.941:28092): avc: denied { sqpoll } for pid=8543 comm="syz.4.2493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 361.100823][ T28] audit: type=1400 audit(1762341164.941:28093): avc: denied { bpf } for pid=8543 comm="syz.4.2493" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 361.121958][ T28] audit: type=1400 audit(1762341164.941:28094): avc: denied { prog_load } for pid=8543 comm="syz.4.2493" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 361.141401][ T28] audit: type=1400 audit(1762341164.941:28095): avc: denied { bpf } for pid=8543 comm="syz.4.2493" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 361.162481][ T28] audit: type=1400 audit(1762341164.941:28096): avc: denied { bpf } for pid=8543 comm="syz.4.2493" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 361.267808][ T8552] netlink: 8 bytes leftover after parsing attributes in process `syz.2.2494'. [ 361.763533][ T8566] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 362.749917][ T7718] Bluetooth: hci0: command 0x1003 tx timeout [ 362.756309][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 362.813280][ T8587] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2506'. [ 363.789947][ T7718] Bluetooth: hci1: command 0x1003 tx timeout [ 363.796061][ T1515] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 363.937251][ T8621] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 364.112588][ T8633] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2522'. [ 365.123988][ T8661] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 365.925046][ T8689] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2539'. [ 365.949950][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 365.956052][ T1515] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 365.969902][ T28] kauditd_printk_skb: 604 callbacks suppressed [ 365.969917][ T28] audit: type=1400 audit(1762341169.891:28700): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 366.023838][ T28] audit: type=1400 audit(1762341169.941:28701): avc: denied { execmem } for pid=8690 comm="syz.2.2541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 366.053970][ T28] audit: type=1400 audit(1762341169.951:28702): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 366.100074][ T28] audit: type=1400 audit(1762341169.971:28703): avc: denied { execmem } for pid=8692 comm="syz.4.2542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 366.134189][ T28] audit: type=1400 audit(1762341170.001:28704): avc: denied { bpf } for pid=8690 comm="syz.2.2541" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 366.171093][ T28] audit: type=1400 audit(1762341170.001:28705): avc: denied { prog_load } for pid=8690 comm="syz.2.2541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 366.205488][ T28] audit: type=1400 audit(1762341170.001:28706): avc: denied { create } for pid=8690 comm="syz.2.2541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 366.250364][ T28] audit: type=1400 audit(1762341170.011:28707): avc: denied { mounton } for pid=8690 comm="syz.2.2541" path="/533/file0" dev="tmpfs" ino=3323 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 366.276997][ T28] audit: type=1400 audit(1762341170.011:28708): avc: denied { remount } for pid=8690 comm="syz.2.2541" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 366.309264][ T28] audit: type=1400 audit(1762341170.011:28709): avc: denied { mounton } for pid=8690 comm="syz.2.2541" path="/533/bus" dev="tmpfs" ino=3324 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 367.149901][ T1515] Bluetooth: hci1: command 0x1003 tx timeout [ 367.155992][ T7718] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 367.189935][ T8724] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 369.229864][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 369.239842][ T7718] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 369.513018][ T8800] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2576'. [ 370.228378][ T8826] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 370.982762][ T28] kauditd_printk_skb: 625 callbacks suppressed [ 370.982778][ T28] audit: type=1400 audit(1762341174.911:29335): avc: denied { create } for pid=8854 comm="syz.1.2596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 371.011722][ T28] audit: type=1400 audit(1762341174.941:29336): avc: denied { bpf } for pid=8854 comm="syz.1.2596" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 371.033000][ T28] audit: type=1400 audit(1762341174.941:29337): avc: denied { map_create } for pid=8854 comm="syz.1.2596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 371.052810][ T28] audit: type=1400 audit(1762341174.961:29338): avc: denied { bpf } for pid=8854 comm="syz.1.2596" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 371.074125][ T28] audit: type=1400 audit(1762341174.961:29339): avc: denied { bpf } for pid=8854 comm="syz.1.2596" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 371.182170][ T28] audit: type=1400 audit(1762341175.111:29340): avc: denied { bpf } for pid=8854 comm="syz.1.2596" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 371.212082][ T8857] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2596'. [ 371.225475][ T28] audit: type=1400 audit(1762341175.111:29341): avc: denied { prog_load } for pid=8854 comm="syz.1.2596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 371.269583][ T28] audit: type=1400 audit(1762341175.141:29342): avc: denied { bpf } for pid=8854 comm="syz.1.2596" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 371.302007][ T28] audit: type=1400 audit(1762341175.141:29343): avc: denied { bpf } for pid=8854 comm="syz.1.2596" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 371.348000][ T28] audit: type=1400 audit(1762341175.141:29344): avc: denied { map_create } for pid=8854 comm="syz.1.2596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 371.452749][ T8867] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2599'. [ 372.269857][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 372.269865][ T7718] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 373.648696][ T8926] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 374.361524][ T8938] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2619'. [ 374.930478][ T8954] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2624'. [ 375.385337][ T8962] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2626'. [ 375.709930][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 375.716237][ T7718] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 376.094280][ T28] kauditd_printk_skb: 464 callbacks suppressed [ 376.094294][ T28] audit: type=1400 audit(1762341180.021:29809): avc: denied { bpf } for pid=8980 comm="syz.0.2632" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 376.165881][ T28] audit: type=1400 audit(1762341180.051:29810): avc: denied { map_create } for pid=8980 comm="syz.0.2632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 376.199865][ T28] audit: type=1400 audit(1762341180.051:29811): avc: denied { bpf } for pid=8980 comm="syz.0.2632" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 376.237008][ T28] audit: type=1400 audit(1762341180.051:29812): avc: denied { prog_load } for pid=8980 comm="syz.0.2632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 376.296234][ T28] audit: type=1400 audit(1762341180.051:29813): avc: denied { bpf } for pid=8980 comm="syz.0.2632" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 376.355860][ T28] audit: type=1400 audit(1762341180.051:29814): avc: denied { prog_load } for pid=8980 comm="syz.0.2632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 376.390423][ T28] audit: type=1400 audit(1762341180.051:29815): avc: denied { bpf } for pid=8980 comm="syz.0.2632" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 376.460700][ T28] audit: type=1400 audit(1762341180.051:29816): avc: denied { bpf } for pid=8980 comm="syz.0.2632" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 376.522059][ T28] audit: type=1400 audit(1762341180.061:29817): avc: denied { bpf } for pid=8980 comm="syz.0.2632" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 376.559848][ T28] audit: type=1400 audit(1762341180.061:29818): avc: denied { map_create } for pid=8980 comm="syz.0.2632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 376.911540][ T9004] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2638'. [ 377.034776][ T9010] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 377.152459][ T9016] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2642'. [ 379.069853][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 379.075981][ T7718] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 379.230527][ T9073] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2659'. [ 380.234823][ T9102] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 381.248307][ T28] kauditd_printk_skb: 570 callbacks suppressed [ 381.248322][ T28] audit: type=1400 audit(1762341185.171:30389): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 381.303063][ T28] audit: type=1400 audit(1762341185.211:30390): avc: denied { execmem } for pid=9125 comm="syz.2.2677" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 381.347877][ T28] audit: type=1400 audit(1762341185.241:30391): avc: denied { read write } for pid=284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 381.392297][ T28] audit: type=1400 audit(1762341185.251:30392): avc: denied { read write } for pid=9127 comm="syz.1.2678" name="loop1" dev="devtmpfs" ino=119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 381.439358][ T28] audit: type=1400 audit(1762341185.261:30393): avc: denied { module_request } for pid=9127 comm="syz.1.2678" kmod="ipt_addrtype" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 381.482337][ T28] audit: type=1400 audit(1762341185.261:30394): avc: denied { create } for pid=9127 comm="syz.1.2678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 381.508969][ T28] audit: type=1400 audit(1762341185.261:30395): avc: denied { execmem } for pid=9127 comm="syz.1.2678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 381.528889][ T28] audit: type=1400 audit(1762341185.261:30396): avc: denied { bpf } for pid=9127 comm="syz.1.2678" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 381.568459][ T28] audit: type=1400 audit(1762341185.261:30397): avc: denied { prog_load } for pid=9127 comm="syz.1.2678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 381.599874][ T28] audit: type=1400 audit(1762341185.261:30398): avc: denied { bpf } for pid=9127 comm="syz.1.2678" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 382.013708][ T9148] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2683'. [ 382.269859][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 382.275958][ T7718] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 383.541296][ T9189] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 385.061588][ T9232] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2711'. [ 385.549872][ T721] Bluetooth: hci0: command 0x1003 tx timeout [ 385.555994][ T7718] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 386.076339][ T9262] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 386.209348][ T9267] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2723'. [ 386.276149][ T28] kauditd_printk_skb: 592 callbacks suppressed [ 386.276167][ T28] audit: type=1400 audit(1762341190.201:30991): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 386.316827][ T28] audit: type=1400 audit(1762341190.241:30992): avc: denied { read write } for pid=9268 comm="syz.4.2724" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 386.359878][ T28] audit: type=1400 audit(1762341190.241:30993): avc: denied { read write } for pid=285 comm="syz-executor" name="loop0" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 386.399874][ T28] audit: type=1400 audit(1762341190.241:30994): avc: denied { execmem } for pid=9270 comm="syz.0.2725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 386.446124][ T28] audit: type=1400 audit(1762341190.271:30995): avc: denied { module_request } for pid=9268 comm="syz.4.2724" kmod="ipt_addrtype" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 386.483466][ T28] audit: type=1400 audit(1762341190.271:30996): avc: denied { create } for pid=9268 comm="syz.4.2724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 386.510608][ T28] audit: type=1400 audit(1762341190.271:30997): avc: denied { execmem } for pid=9268 comm="syz.4.2724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 386.531113][ T28] audit: type=1400 audit(1762341190.271:30998): avc: denied { bpf } for pid=9268 comm="syz.4.2724" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 386.552305][ T28] audit: type=1400 audit(1762341190.271:30999): avc: denied { prog_load } for pid=9268 comm="syz.4.2724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 386.585419][ T28] audit: type=1400 audit(1762341190.271:31000): avc: denied { bpf } for pid=9268 comm="syz.4.2724" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 386.985488][ T9288] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 387.751389][ T9305] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2736'. [ 388.109948][ T1515] Bluetooth: hci0: command 0x1003 tx timeout [ 388.116199][ T7718] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 388.999858][ T7718] Bluetooth: hci1: command 0x1003 tx timeout [ 389.005962][ T721] Bluetooth: hci1: Opcode 0x1003 failed: -110 [ 390.164067][ T9373] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2758'. [ 391.547693][ T28] kauditd_printk_skb: 539 callbacks suppressed [ 391.547709][ T28] audit: type=1400 audit(1762341195.471:31540): avc: denied { read write } for pid=286 comm="syz-executor" name="loop4" dev="devtmpfs" ino=122 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 391.619708][ T28] audit: type=1400 audit(1762341195.491:31541): avc: denied { execmem } for pid=9404 comm="syz.4.2768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 391.670193][ T28] audit: type=1400 audit(1762341195.541:31542): avc: denied { bpf } for pid=9404 comm="syz.4.2768" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 391.742378][ T28] audit: type=1400 audit(1762341195.541:31543): avc: denied { prog_load } for pid=9404 comm="syz.4.2768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 391.792010][ T28] audit: type=1400 audit(1762341195.541:31544): avc: denied { create } for pid=9404 comm="syz.4.2768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 391.843016][ T28] audit: type=1400 audit(1762341195.551:31545): avc: denied { mounton } for pid=9404 comm="syz.4.2768" path="/550/file0" dev="tmpfs" ino=3463 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 391.896278][ T28] audit: type=1400 audit(1762341195.551:31546): avc: denied { remount } for pid=9404 comm="syz.4.2768" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 391.945714][ T28] audit: type=1400 audit(1762341195.551:31547): avc: denied { mounton } for pid=9404 comm="syz.4.2768" path="/550/bus" dev="tmpfs" ino=3464 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 392.013085][ T28] audit: type=1400 audit(1762341195.551:31548): avc: denied { remount } for pid=9404 comm="syz.4.2768" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 392.065282][ T28] audit: type=1400 audit(1762341195.561:31549): avc: denied { mounton } for pid=9404 comm="syz.4.2768" path="/550/file0" dev="tmpfs" ino=3463 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 392.642519][ T9436] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2775'. [ 393.324613][ T9457] netlink: 8 bytes leftover after parsing attributes in process `syz.0.2782'. [ 394.517861][ T9483] Bluetooth: received HCILL_WAKE_UP_ACK in state 2 [ 395.907854][ T9521] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2801'. [ 396.578651][ T28] kauditd_printk_skb: 483 callbacks suppressed [ 396.578667][ T28] audit: type=1400 audit(1762341200.501:32033): avc: denied { bpf } for pid=9531 comm="syz.4.2804" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 396.606979][ T7718] Bluetooth: hci0: command 0x1003 tx timeout [ 396.613121][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 396.681812][ T28] audit: type=1400 audit(1762341200.501:32034): avc: denied { map_create } for pid=9531 comm="syz.4.2804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 396.719869][ T28] audit: type=1400 audit(1762341200.551:32035): avc: denied { bpf } for pid=9531 comm="syz.4.2804" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 396.740760][ T28] audit: type=1400 audit(1762341200.551:32036): avc: denied { prog_load } for pid=9531 comm="syz.4.2804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 396.760153][ T28] audit: type=1400 audit(1762341200.551:32037): avc: denied { bpf } for pid=9531 comm="syz.4.2804" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 396.781085][ T28] audit: type=1400 audit(1762341200.551:32038): avc: denied { prog_load } for pid=9531 comm="syz.4.2804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 396.829968][ T28] audit: type=1400 audit(1762341200.551:32039): avc: denied { bpf } for pid=9531 comm="syz.4.2804" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 396.870975][ T28] audit: type=1400 audit(1762341200.551:32040): avc: denied { bpf } for pid=9531 comm="syz.4.2804" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 396.925271][ T28] audit: type=1400 audit(1762341200.551:32041): avc: denied { bpf } for pid=9531 comm="syz.4.2804" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 396.975089][ T28] audit: type=1400 audit(1762341200.551:32042): avc: denied { map_create } for pid=9531 comm="syz.4.2804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 398.537549][ T9589] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2820'. [ 401.628160][ T28] kauditd_printk_skb: 494 callbacks suppressed [ 401.628177][ T28] audit: type=1400 audit(1762341205.551:32537): avc: denied { bpf } for pid=9666 comm="syz.1.2845" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 401.658772][ T28] audit: type=1400 audit(1762341205.551:32538): avc: denied { read } for pid=9666 comm="syz.1.2845" dev="nsfs" ino=4026532375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 401.683405][ T9668] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2845'. [ 401.692597][ T28] audit: type=1400 audit(1762341205.551:32539): avc: denied { bpf } for pid=9666 comm="syz.1.2845" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 401.730735][ T28] audit: type=1400 audit(1762341205.551:32540): avc: denied { prog_load } for pid=9666 comm="syz.1.2845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 401.759048][ T28] audit: type=1400 audit(1762341205.551:32541): avc: denied { bpf } for pid=9666 comm="syz.1.2845" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 401.799996][ T28] audit: type=1400 audit(1762341205.551:32542): avc: denied { map_create } for pid=9666 comm="syz.1.2845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 401.819876][ T28] audit: type=1400 audit(1762341205.551:32543): avc: denied { bpf } for pid=9666 comm="syz.1.2845" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 401.841018][ T28] audit: type=1400 audit(1762341205.551:32544): avc: denied { prog_load } for pid=9666 comm="syz.1.2845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 401.860518][ T28] audit: type=1400 audit(1762341205.551:32545): avc: denied { bpf } for pid=9666 comm="syz.1.2845" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 401.887570][ T28] audit: type=1400 audit(1762341205.551:32546): avc: denied { prog_load } for pid=9666 comm="syz.1.2845" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 403.244797][ T9714] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2859'. [ 404.570483][ T9755] netlink: 8 bytes leftover after parsing attributes in process `syz.3.2872'. [ 404.609925][ T9757] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2870'. [ 406.634410][ T28] kauditd_printk_skb: 542 callbacks suppressed [ 406.634426][ T28] audit: type=1400 audit(1762341210.561:33089): avc: denied { execmem } for pid=9814 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 406.693472][ T28] audit: type=1400 audit(1762341210.611:33090): avc: denied { execmem } for pid=9815 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 406.749958][ T28] audit: type=1400 audit(1762341210.611:33091): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 406.803857][ T28] audit: type=1400 audit(1762341210.641:33092): avc: denied { execmem } for pid=9816 comm="syz.3.2891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 406.823504][ T28] audit: type=1400 audit(1762341210.641:33093): avc: denied { sqpoll } for pid=9816 comm="syz.3.2891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 406.846074][ T28] audit: type=1400 audit(1762341210.641:33094): avc: denied { bpf } for pid=9816 comm="syz.3.2891" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 406.867081][ T28] audit: type=1400 audit(1762341210.641:33095): avc: denied { prog_load } for pid=9816 comm="syz.3.2891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.886648][ T28] audit: type=1400 audit(1762341210.641:33096): avc: denied { bpf } for pid=9816 comm="syz.3.2891" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 406.916205][ T28] audit: type=1400 audit(1762341210.641:33097): avc: denied { map_create } for pid=9816 comm="syz.3.2891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 406.935729][ T28] audit: type=1400 audit(1762341210.641:33098): avc: denied { bpf } for pid=9816 comm="syz.3.2891" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 407.171775][ T9829] netlink: 8 bytes leftover after parsing attributes in process `syz.4.2895'. [ 407.370613][ T338] device bridge_slave_1 left promiscuous mode [ 407.377976][ T338] bridge0: port 2(bridge_slave_1) entered disabled state [ 407.391002][ T338] device bridge_slave_0 left promiscuous mode [ 407.399385][ T338] bridge0: port 1(bridge_slave_0) entered disabled state [ 407.407976][ T338] device veth1_macvtap left promiscuous mode [ 407.414139][ T338] device veth0_vlan left promiscuous mode [ 408.375081][ T9849] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2897'. [ 410.818080][ T9884] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2909'. [ 410.843371][ T9885] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2906'. [ 411.691660][ T28] kauditd_printk_skb: 264 callbacks suppressed [ 411.691675][ T28] audit: type=1400 audit(1762341215.621:33363): avc: denied { execmem } for pid=9886 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 411.723215][ T28] audit: type=1400 audit(1762341215.621:33364): avc: denied { read write } for pid=9887 comm="syz.2.2911" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 411.747591][ T28] audit: type=1400 audit(1762341215.621:33365): avc: denied { module_request } for pid=9887 comm="syz.2.2911" kmod="ipt_addrtype" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 411.769754][ T28] audit: type=1400 audit(1762341215.621:33366): avc: denied { create } for pid=9887 comm="syz.2.2911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 411.809859][ T28] audit: type=1400 audit(1762341215.621:33367): avc: denied { execmem } for pid=9887 comm="syz.2.2911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 411.839873][ T28] audit: type=1400 audit(1762341215.621:33368): avc: denied { bpf } for pid=9887 comm="syz.2.2911" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 411.879852][ T28] audit: type=1400 audit(1762341215.621:33369): avc: denied { prog_load } for pid=9887 comm="syz.2.2911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 411.909170][ T28] audit: type=1400 audit(1762341215.621:33370): avc: denied { bpf } for pid=9887 comm="syz.2.2911" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 411.939832][ T28] audit: type=1400 audit(1762341215.621:33371): avc: denied { bpf } for pid=9887 comm="syz.2.2911" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 411.969832][ T28] audit: type=1400 audit(1762341215.621:33372): avc: denied { map_create } for pid=9887 comm="syz.2.2911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 412.953864][ T9913] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2916'. [ 412.979989][ T9914] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2915'. [ 414.172450][ T9929] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2918'. [ 416.770622][ T28] kauditd_printk_skb: 235 callbacks suppressed [ 416.770637][ T28] audit: type=1400 audit(1762341220.701:33608): avc: denied { execmem } for pid=9944 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 416.800037][ T28] audit: type=1400 audit(1762341220.711:33609): avc: denied { create } for pid=9949 comm="syz.3.2927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 416.820005][ T28] audit: type=1400 audit(1762341220.711:33610): avc: denied { create } for pid=9949 comm="syz.3.2927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 416.840082][ T28] audit: type=1400 audit(1762341220.711:33611): avc: denied { bpf } for pid=9949 comm="syz.3.2927" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 416.879854][ T28] audit: type=1400 audit(1762341220.711:33612): avc: denied { map_create } for pid=9949 comm="syz.3.2927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 416.899929][ T28] audit: type=1400 audit(1762341220.711:33613): avc: denied { bpf } for pid=9949 comm="syz.3.2927" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 416.922666][ T28] audit: type=1400 audit(1762341220.711:33614): avc: denied { map_create } for pid=9949 comm="syz.3.2927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 416.941953][ T28] audit: type=1400 audit(1762341220.711:33615): avc: denied { bpf } for pid=9949 comm="syz.3.2927" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 416.979828][ T28] audit: type=1400 audit(1762341220.711:33616): avc: denied { prog_load } for pid=9949 comm="syz.3.2927" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 417.009824][ T28] audit: type=1400 audit(1762341220.711:33617): avc: denied { create } for pid=9949 comm="syz.3.2927" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 417.390143][ T7718] Bluetooth: hci0: command 0x1003 tx timeout [ 417.390256][ T721] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 418.426482][ T9973] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2933'. [ 421.910974][ T28] kauditd_printk_skb: 191 callbacks suppressed [ 421.910989][ T28] audit: type=1400 audit(1762341225.841:33809): avc: denied { read write } for pid=283 comm="syz-executor" name="loop3" dev="devtmpfs" ino=121 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 421.951868][ T28] audit: type=1400 audit(1762341225.881:33810): avc: denied { read write } for pid=288 comm="syz-executor" name="loop2" dev="devtmpfs" ino=120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 423.487147][ T28] audit: type=1400 audit(1762341227.411:33811): avc: denied { create } for pid=10001 comm="syz.4.2942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 423.508335][ T28] audit: type=1400 audit(1762341227.411:33812): avc: denied { create } for pid=10002 comm="syz.2.2944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 423.529970][ T28] audit: type=1400 audit(1762341227.411:33813): avc: denied { create } for pid=10004 comm="syz.3.2945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 423.569845][ T28] audit: type=1400 audit(1762341227.411:33814): avc: denied { bpf } for pid=10002 comm="syz.2.2944" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 423.593173][T10012] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2944'. [ 423.602488][ T28] audit: type=1400 audit(1762341227.411:33816): avc: denied { bpf } for pid=10001 comm="syz.4.2942" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 423.642168][T10013] netlink: 12 bytes leftover after parsing attributes in process `syz.4.2942'. [ 423.659847][ T28] audit: type=1400 audit(1762341227.411:33817): avc: denied { map_create } for pid=10001 comm="syz.4.2942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 423.699846][ T28] audit: type=1400 audit(1762341227.411:33815): avc: denied { map_create } for pid=10002 comm="syz.2.2944" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 423.721743][T10015] netlink: 12 bytes leftover after parsing attributes in process `syz.3.2945'. [ 423.759828][ T28] audit: type=1400 audit(1762341227.411:33818): avc: denied { bpf } for pid=10002 comm="syz.2.2944" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 427.419395][ T28] kauditd_printk_skb: 103 callbacks suppressed [ 427.419411][ T28] audit: type=1400 audit(1762341231.341:33922): avc: denied { execmem } for pid=10033 comm="syz.1.2950" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 427.510150][ T28] audit: type=1400 audit(1762341231.351:33923): avc: denied { execmem } for pid=10030 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 427.550229][ T28] audit: type=1400 audit(1762341231.351:33924): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[14594]" dev="pipefs" ino=14594 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 427.617050][ T28] audit: type=1400 audit(1762341231.351:33925): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[14594]" dev="pipefs" ino=14594 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 427.645444][ T28] audit: type=1400 audit(1762341231.351:33926): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[14594]" dev="pipefs" ino=14594 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 427.674951][ T28] audit: type=1400 audit(1762341231.351:33927): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[14594]" dev="pipefs" ino=14594 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 427.699572][ T28] audit: type=1400 audit(1762341231.351:33928): avc: denied { write } for pid=275 comm="syz-executor" path="pipe:[14594]" dev="pipefs" ino=14594 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=0 [ 428.260538][ T337] device bridge_slave_1 left promiscuous mode [ 428.266668][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 428.274324][ T337] device bridge_slave_0 left promiscuous mode [ 428.280463][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.288280][ T337] device veth1_macvtap left promiscuous mode [ 428.294343][ T337] device veth0_vlan left promiscuous mode [ 429.060972][ T337] device bridge_slave_1 left promiscuous mode [ 429.067124][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.074625][ T337] device bridge_slave_0 left promiscuous mode [ 429.080809][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.088840][ T337] device bridge_slave_1 left promiscuous mode [ 429.095052][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.102502][ T337] device bridge_slave_0 left promiscuous mode [ 429.108628][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.116743][ T337] device bridge_slave_1 left promiscuous mode [ 429.122931][ T337] bridge0: port 2(bridge_slave_1) entered disabled state [ 429.130485][ T337] device bridge_slave_0 left promiscuous mode [ 429.136611][ T337] bridge0: port 1(bridge_slave_0) entered disabled state [ 429.145167][ T337] device veth1_macvtap left promiscuous mode [ 429.151243][ T337] device veth0_vlan left promiscuous mode [ 429.157403][ T337] device veth1_macvtap left promiscuous mode [ 429.163545][ T337] device veth0_vlan left promiscuous mode [ 429.169680][ T337] device veth1_macvtap left promiscuous mode [ 429.175806][ T337] device veth0_vlan left promiscuous mode