last executing test programs: 4m32.086227933s ago: executing program 0 (id=2308): syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r0 = io_uring_setup(0x7, &(0x7f0000000040)={0x0, 0x4d7e, 0xc500, 0x4008, 0xc1}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1600000004"], 0x50) io_uring_enter(r0, 0x2219, 0x7721, 0x16, 0x0, 0x0) 4m31.50127432s ago: executing program 0 (id=2310): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='comm\x00') exit(0x1f52b4ba) read$FUSE(r0, &(0x7f0000000540)={0x2020}, 0x2020) 4m28.193227269s ago: executing program 0 (id=2313): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000380)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x170bd2a, 0xffffffff, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe5, 0x10}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0xfffd}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000005f80)=@newtfilter={0x68, 0x2c, 0xd27, 0x70bd25, 0x2, {0x0, 0x0, 0x0, r2, {0x0, 0x1}, {}, {0x8, 0x6}}, [@filter_kind_options=@f_flow={{0x9}, {0x38, 0x2, [@TCA_FLOW_ACT={0x34, 0x9, 0x0, 0x1, [@m_mirred={0x30, 0x1, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}]}]}}]}, 0x68}}, 0x0) 4m27.745511577s ago: executing program 0 (id=2315): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x100) mount$bind(&(0x7f0000000100)='.\x00', &(0x7f0000000300)='./file0/../file0\x00', 0x0, 0x2151090, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b1098, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2925099, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) 4m27.364231811s ago: executing program 0 (id=2316): socket$inet(0x2, 0x2, 0x1) socket(0x10, 0x3, 0x0) r0 = userfaultfd(0x1) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000080)={r1, 0xffffffbfffffffff, 0x5, 0x2}) writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000080), 0xfffffebe}], 0x1) 4m26.854475613s ago: executing program 0 (id=2317): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000340)=0x152, 0x4) sendmmsg$inet6(r0, &(0x7f00000002c0)=[{{&(0x7f0000000b00)={0xa, 0x4e21, 0x7, @mcast2, 0x4}, 0x1c, 0x0}}], 0x1, 0x24000000) 4m26.854313043s ago: executing program 32 (id=2317): r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000340)=0x152, 0x4) sendmmsg$inet6(r0, &(0x7f00000002c0)=[{{&(0x7f0000000b00)={0xa, 0x4e21, 0x7, @mcast2, 0x4}, 0x1c, 0x0}}], 0x1, 0x24000000) 53.711605317s ago: executing program 1 (id=2563): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mq_open(&(0x7f0000000680)='eth0\x00#~\x02\x00\x00\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+\xbb \xcb\be\xf4\x87\xedl\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\xb0\x88\v8I$\xfd\x05\x00\x00\x00\x00\x00\x80\x00\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94uu_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x9avs\xb2\a\xfe\xb3j*\xad\x18A\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x05\x00\x00\x000\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xce\x00\x00\x00\xe8\vq+\xbb\xc7\xaf\xf3M\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|\xc1m\x17\b\xe4\xb1b\x13\xc74Z#E\x91\xbe\x93\x0f\xaf\xa7\xf9\"\x02\xb2\x12\xc5A\x1e\xe2\xe1\x13\xfey8\xe1\xa8Zu\xf1\x0f\x1dC)T)Z\xec\x1d_)?\xbab\xda\xec\x81\xf7\x97\x1f\xc5\xa1T\xb9\x9e\xa3\xe1\x901[\xfa_Y\xa2\x1f\x1c\x7f\xf0\x0eW(\xdf\xc2\xc0p\xb2\xe4\xe4\xcd\'\x03\xaf\x8d\x1c_\xde\xa6\x9cV\x98\x06\x1e4R\xa0\xc9\xcfC\xf8\xaf\x14P\x15]\xa9#/w\x0elPo\x9c\x8c$\xb2t\b\x9atA1\xa6y\xd0\x19\x9e\x96\xaa\xb5\t\xe6cR~?\xb4T\xc0\xa1\xb2\x8a\xef\xc2|\x18p\x1f\xb7\xf5\xb5\x11{h\x8e\xab\b\x8e)\xc1\x12N\xea\x1a\x9e\xcf\x1f\xe5\xac\x9d\xb0?\xe1*D\xe3\a\x9b\x1el\xa6\xf2.VA\xc5\xef\x8a\xf2R\xd0\x9cu\xdat.U\x8c\xc1m\x14S\x8c%ll\x01\x82\xcc\x88a,n\xf9\xd0F\\', 0x42, 0xa8, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000500)={'batadv_slave_0\x00', &(0x7f0000000200)=@ethtool_per_queue_op={0x4b, 0xf, [0xa, 0x5, 0x80000000, 0x1, 0x4, 0x9, 0xa4, 0x0, 0x7, 0xb69, 0xc1, 0x4, 0x1, 0x6, 0x8, 0x101, 0x1002, 0x9, 0x1, 0x3, 0x1, 0xfffffffa, 0x65, 0x6, 0x9, 0x4, 0x7, 0x5, 0x100000, 0x0, 0x40, 0xd, 0xe, 0x1, 0x100, 0x4, 0x1c00, 0xb, 0x7, 0x10, 0x20000008, 0x8000100, 0x3, 0x0, 0x11000, 0x8, 0x5, 0x79b, 0x2, 0x0, 0x83, 0x4, 0xa, 0x7, 0xf, 0x101, 0xd7, 0x1fa0860a, 0x7, 0xaa, 0x101, 0x2, 0x180000, 0xf, 0x8b, 0x5, 0x2af, 0x6, 0x5, 0x2, 0x6, 0x9, 0x4, 0x7, 0x4009, 0xfffffffe, 0x4, 0x100002, 0x8, 0x752, 0x0, 0x3, 0x0, 0x3, 0xe, 0xffffffff, 0x6, 0x6, 0x9, 0x80000000, 0xfdfffffc, 0x2, 0x2, 0x84, 0x100, 0x6, 0x252, 0x81, 0x5d102cf1, 0x5, 0x20006, 0x5, 0x1, 0xb, 0x2, 0xd9a, 0xd, 0x2a2, 0xfffffffd, 0x3, 0x2, 0x5, 0x8, 0x4000000, 0x4, 0x2, 0x40, 0x8, 0x4, 0x6, 0x100, 0x66cd, 0xc, 0x8, 0x1, 0x1fc, 0xc5c, 0x3ff]}}) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) 52.810650434s ago: executing program 1 (id=2564): pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) socket(0x10, 0x3, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) socket(0x10, 0x3, 0x0) socket(0xa, 0x3, 0xff) socket$nl_route(0x10, 0x3, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x2, 0x3, 0xfffffffffffffffd}, 0x0, &(0x7f0000000240)={0x3ff, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) mremap(&(0x7f0000000000/0x9000)=nil, 0xa00000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) read$FUSE(r0, &(0x7f0000002440)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000180)={0x50, 0x0, r2, {0x7, 0x29, 0x5, 0xffffffffc8001048, 0xffff, 0x6, 0x4, 0x0, 0x0, 0x0, 0x80, 0x3}}, 0x50) 49.55052702s ago: executing program 1 (id=2565): r0 = syz_io_uring_setup(0x12e, &(0x7f0000000340)={0x0, 0x5cb1, 0x2, 0x3, 0xfffffffd}, &(0x7f0000000140)=0x0, &(0x7f0000000280)) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0x200, 0x0, 0x4) io_uring_enter(r0, 0x1e76, 0xf728, 0x5, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/route\x00') pread64(r2, &(0x7f0000000080)=""/102356, 0x18fd4, 0x200) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x19, 0x3, &(0x7f0000000200)=@framed={{0x85, 0x0, 0x0, 0x0, 0x6c, 0x4}}, &(0x7f00000010c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6.173727961s ago: executing program 2 (id=2606): r0 = socket$inet6(0xa, 0x2, 0x3a) sendmmsg$inet6(r0, &(0x7f0000000e40)=[{{&(0x7f00000000c0)={0xa, 0xfffe, 0x400, @loopback={0xff00000000000000}, 0x101}, 0x1c, &(0x7f0000000180)=[{&(0x7f0000000000)="8000102e7577d401", 0x8}], 0x1, &(0x7f0000000e80)=ANY=[@ANYBLOB="160000"], 0x18}}], 0x1, 0x4000880) 5.701006391s ago: executing program 2 (id=2607): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r0, 0x400455c8, 0x0) 4.820739926s ago: executing program 2 (id=2608): openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x40, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000100), 0x10, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002980)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f, 0x6, 0xa68d7c519f800ff1, 0xffbc, 0x6, 0x4, 0x4, 0x0, 0x0, 0x40}}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000008380)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x68cc, {0x0, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x2001, 0x8e) close(r0) ioctl$VHOST_VDPA_GET_DEVICE_ID(r2, 0x8004af70, 0x0) 4.27974954s ago: executing program 2 (id=2609): r0 = socket$inet6(0xa, 0x1, 0x0) r1 = dup2(r0, r0) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f00000000c0)={@remote, @private0, @empty, 0x40003, 0x40, 0x100, 0x100, 0x0, 0x590043}) 3.80193951s ago: executing program 2 (id=2610): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x204000, &(0x7f0000000240), 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000001c0), 0x13f, 0x8}}, 0x20) close(r0) 3.608339323s ago: executing program 1 (id=2570): mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x4) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f000000c3c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f, 0x9, 0x1100, 0x40, 0x0, 0x7, 0x0, 0x0, 0x0, 0x40}}, 0x50) syz_fuse_handle_req(r0, &(0x7f00000021c0)="d56cea33946c0eae3241d3604bfce89adddb2eb96960338db7572fa254eb7c69dc0cb526989630e26224c258c8d70ccacc5564d67723f4756c0399174c5460c4995942d24092c36dc820e97344798b5bb45423f853bf50e374323abacf0388cd091016b7a3d7843f4d3ae1658bd34d967e3323a64908442788dbc99c1f4248da53fb5be2c8001236b994ca594e3b3c588beaf3cb1c32c072d768b9e665e7d87044fdfc1fd6452593e6793963153f3850bf85042a5c139799ba8f6cb8d877fc436c4f1601270d6e29d60a4c80d6315e46f4219494ce897127d0b76f5d681e90f4e9282468ef7993cd92076aed266c1db8b81b93adc4969c9b89b32b8768c9f39f2d148e933dbb651746a9364f49986ef73b4c29f647b82b83216bb8179fe5346fdacdc5fda4bd48875cd2f1cf57a0c9a91e059446bac310a6d68948675c35a8e442168fd84d78d9800e5b05bdbce3a6eac65bee7279a3628f2a08931d3d52ce490652c20f8ae529eaf24bf421dad976c68b234ee6f6210c9f9aac3a55c6939d6aa3805b95619546264ff3ff82d0dc690e8ead61b6ed528c3c117cd771a3b7feb214ce8d720640d97f14b399b7f46dc4aad83117e8e642ccb117d13f345536fc3801c124cfaf8aa7aafff6c8df3fdd4469c077eccbd8ddacad80d9113dfde26ae67b226185743b2d53667fb3016fe114f87484ab614ddf0887c4b2c85351ab21a0ece6c066a154b38b4d7c1792d2db2cc5f8ceb42078187949d354b7a08d1529f3d10814757179c860db031dad4a3dc13ca01d1013238ed5f7a9674fcc77f0d34e2118fb851c970d86ecf9de1cfdb8d3ab197480e263c3207c3d7ebe17f9547c7c56b08e83de875294d0fd68df1926ecac24350b2c70bd73e14122ed480c564353d34049e67c26036fc35d04022cd35d6ac00756d3b8550bb22ae80a4bd630a00268d07fa249b0bf545dfbf01bea2f12b30738c6e13156244eb24e6d69ba7c3acdbbefe8bbc06b821aebf836ca07a3cc7b6b24686ed8f3b23085c893e72188b797651c5ab5cceb1465414a325f793a3af6d06eed7eb734ad05bc1f6619e8485259f570a482a67273ee01fe15dd938afce026f1111c7a38ed6d1aba34f009ce1e99140fd0db2de74150541fd48dd2ec5b1d15669de2ffe3a198184b6186ccda31aa64c585ff8cb65b67fe1455753895a88b6ab4c6bf1bb8329739178147e6f15801bfa707bd9ec9da662573ce07af684bb7c880a7d63b0a0a7300881408c44e95c679ea32b0eab845d0b333f245e8d6006258678704aa8cccdaf80cc46138d5b7a0804fdfa34c91d61a0d2fa6c62e7d1a675e5743f845ab40ea5df0182d6eb9781905c94751c75a411699a76f48433142c5f109d5dfddcc0b1dc6254efd5ea50d6ffbc7b9ca031e1a0123844b63c48b964645c6d24707582825e219bcd61677ed4fc45ee1f4be91b4c1b856d65a86acf22b8b0d588bc473248ac040326b1490c2fea24bc0c0a721e2ed63e39973cd4d38df1001dba9b9d995c229655dd26f3cd3d64077ec111e2c370717cb4cd068e0d3a52f1027d3df953e1f1ac768a7215a3695722b1b6714ce43801451a9532212b651d073c780d61712aebadd145c1cd95c1dc0dcf51850046ae5771e365f45858a36e48afe563ec0afee3803ff6a35bc25217b53eda39bb813b8d3d728c21a0b80d014003143666c0d1398cc46a01aaaf97117edda217f984010e7c5cf32535a669d4f11f6b70e3a3b823987ef7c9f878415063bf05205e13bcf7acb287bd0bb0fce77529a711f0ed145ea2ecf2194658dff17c5681cf8c7ad8521d235a705292af4878b3f124be2df661026c091d6c07aae1a74c919f7478d1083f70b3a0fe00c2e220ab998b4595268b6f7cabbfc85e59dfb6ab7a794cd3fd70d5cc4d70ca933a4452df5a345cb31f3267de53519ba39c915d492cd4652843f1d30a5fb311e3b5d868347969f013c5e3b4841b22240abcb61a14ff567186766ce8f6ae64877f672835dbff4fcf19c8230d8a402397630effb698a8b0c9a28ae028d7938ffde488fd64113085bce504cd0551e0eb3730c3f781cbecf0c41d2338766d3f6096661c1f1bec3162b8a0c4099fccd9480e821df8782c2e070530befb62bccd8539fe9dc7d8d3f9bded1bb34db3f2d6050885c8f1d57f5e603f629de7491f5fd9fafcceb565abeaec838b10a763a00a4607d4330bdcedc066d8cf9790d806e03c219866bb8f053a6e602645436d1f469df1d5008f5dcd4bdb7ce5b76ec015a8f4693cb2a63ceb2be00bcf221f0ca32db4efaf8f7022622b335fa8dea4afdd86be10be6c4d66e5f57416add4480509cb98cf31cdda84644eeb782eea041d4bc0e005a20bccc3c4a08cefcdb91cc2c61d9231c4e36e96f6edd2133f9b34e7da90ce20d1c60ff223c6a204bb942766a359b923573bbbaf2a827d79e4f649e79a840216ac4ddb3409c94e71ff08d109bc3f0cf6583219de7d7131a956f835ecf5c131a0b1e056a86d800a0204243f3b695029578c064306a31db53f28a8f0c0302486cd05970904e9b5c53100ac1aabb3110a89820e4d8307c3d46084999d0456c53fec61a9242b486eb41a90f3300fdfd0d8a472e8da7a842588721d1df1f5e4cc425efebc75a904ef4cc881346a4bc23eef4d492e3efccebab86ae4213f42671370579ee7f8341396e9515619e100a8fae2c5cba0139a088579ece7a603c8b8bab9998223fe862dff8480aeaa5970c90b894e5f71c2784e4dfd50ed3e9ed91036e8356c09464de13b4a95227203133b2c2c71cd6323492f083bda58ad7721b6666b9cd93f93f0288482813fd8aade02cca81cd35257e023504ac4f86be1c7a810b67c6d7077f5cdbd305b618a05c03d196894bfb1a6ff511e59ac8ce45d16cee95e1de0797a543728caaa43e5ae42a12b6bb7910d18d4e1ea89d264491287eb23a76095a12a39c46a7c85349e2969edaed3c1fa6a2150494f63f4c98c65fcdd650ac7424ac1ae64421294356ac1e4dbf9d4c817f081f4f7751ebf56788d799bac29dc0bfe83ead7ab3e338b8b84df4cad2b549aaac4e6048a6fa8f8f6f1f7e0e51c8b3c872f18c466e590222b03230f46bc8e9a0171bbd2096c7a480d6a6f29bd74b60105bebda42e59cc830c4b31f6c52687b4ec2ba869149ae363d711d099f94ceade1ada193e931ed9aea0a280ed5f25ad5ab3b4083f140ca17b43e5f6aef2c24a28a0262c80a040187e052ea7d54a528b6fcc176ed3afc07fe6a661d050fb4a3a6abfa3dac5f3230540b45af060781cb5499c2894d6a4a2bf908ddd48d6b34207f56c31229e206c88db3552ceb6e82a0fa2bf7f97baf603d37d6a8b1f2b1f5f95b251129ed05351681908b7cf5cf6cc86dd854174cc19713b4d262b021952b6da5f20f57bbacca62f5b7124409aa625bbea59819baebc1bc2dd188feba48c998d0dbed60d44b8a4f0ac28f6c1c8c9998f7406f1a34e4ce902be2420f7ff51a5ab3b1faa86ab2ec1edbea2493cae090abde43ff27d685c993dedb24eb255772cc56fbd104f4f5275f10d54d7cacb8cbf188ae1a4d29ea880068fb2696b3ba6e8a7c15939e1f7c394ab4bd4c4bef2383121cbeb18646a8e013d570cee3eeecd7fbe84a619f8aa2e34f2e1e9b99d0c7d7d179d9df8d2e2f1cd7ba2c7e60166dc14e5e4ed9c41195935e2884b5bd0057ed0155a5d4c6482e8f554e4cd0d0aef7d6487801ab54d54eb41755d833ab83883b40f47595063ad2a0fee5c661f86b8ab04ad0047d988ad86b3c520eb78dc3d750a57e777f5d766349f1a687e090f744206cb5d048346061b414060f6826d8a884e93f73f1f1f4cb8bd6e8d1215d436d390dbda35b555f550e11e6d8008fce1c429bd9bbd04a1fbb9de28663c1be4d8d7e506bc681ada28a69014b972919b5f70cbb770349324c9af0b7ee7ff4cc8bfe807fb9faa0a69498448b22192d578a1e82582b943051beb543ddca8b643ee6c76ee32278aa8bc92b44a8439a24ed5040545349ab05e831d4511a8da03ca539659585b2267a73775f1cb7c2c5548d3508c896f99a8e5cb55160ab1267e320ac2d7c8f8b57079dd14d301636a1374e24541f8d453978998ed256b381bcf638bb372ce1ebefb341656c02f4092a7667ffec5505e4938dcb03d404654430e244f9f7f7d0fb4189a93f7c2bd7a4fcb3ccff79e41a98adcac3e4c19eebebaec15bd8cea1df0e509cdef62ae10c66734d162caf35a6e511baa717f769c2e449892224fa8ae78de9138cf6ea1d939998a8cb68b0e83cf604e03b99634796d3d495e4617f8fdd9764631e7ed6eafa797deb1159259777bf2915d48b63286f6d6528ad4ca5783609263d9a03aad41ec8ef1e2e1e77734d27229f801192be238468854945c20dab4e1baff9dd593361efda1de95e04561d33cd73a45dff5f85b2e85b0747a49345ac8d38add8ef9c14685eb3d3432f3f994e3ddd4e45b16005870485253afc4f08d8a6d8023b722284d11d56c6ff9209a5bacb7ce1708244bd21878b8cd5c13ab453bd589f6196322de9faede39ce6f94c75d008d2d7ced27a2375cc62c3d5c15c1c4301a01299d8f4c41e5a44e4130e9555a356d6b19728c7d3c86cb9a1ddf906ab63a9447f8233bcd09bd74cf9749f085f0c4689ef40dbc41a7a299f0f891d9d0d3e39409d4d774da53bfb6e8ce668ce50885558e909add2cb9bda2f7e9232541b1a7f742a99740f486ef4f7c98e4052f2da705c56a18d5a8289ae6cbb9dc7de13a8cf420b7a930abaae813b40517d84ae984dfc94cd1021e0e4a7a9e7de841018d474083ca28a829ee03fe625cafcbedadcdef6621ccd679fcd9c9a9ab2136211f8c9a679895aa39facf2d6668e5098b3dd8e0ad78d8caf250dc38f2c9518bccb353ef3418d3906827514c1959d58344ee11a0ef1c1424495cc1a9910187685a47d6dd91f07e5081c5ac3f1b6e363069694dd9072684c5ab0ba56157c10f5fa8409e5bc43b38b31f24a306ca5f7e3de9a392eac1984e877ecb3dfd044f1449b4ae9b586051b1780c0ce462919f4a4b54ad8011d013c3962fc6697d33c2dc6771fec664c82cb16144619b207deb4391866d6c1976b945c5959d19018f15376ce3b05666747743527f22b54171da4dabee2f4e469a5521067de4f92e2bad02e15e812b6cbd27ec88a9eccf600ce7f5643392da9ff6b6412f8e7c68d8c8b9e0006e41777e2a1363a9556befbbb110dff3a84b179da3838acde0b25f53798733a9fb463d76b630aef7c8a43f6219482b34b893fd99cf3a013ecefde7c5c6528e304c1868ff3fd8dd5aba348a05dc950b1c4c281cbb28b800d6d0da180fdee06ec3bad6f97180295ed1d77078156a885b5b0c501ea563e8871adb97dd6052de0ab369bf2d98f434bb2d172d9967bb73d3eba6b52bb8d55d8963bf58d310afedb51c0f94c7814b6da30fd8056ab7be74ac31b1b75c217e3ab93eadcb2d253e5d8bbe47c0f1a411a9e502cf4301d898d905cd5db828e56a722394fa11cca64a03a42e7fc1b3481b71ca0b6a3d9bd1fc8229f7f9d3e6aa0d48051942579fb759201d4715db9a2d399e0745a66dbbd571accf1f2e15573ce832e91bd1f042ab758d9ec13e354f38454cc42668c8d60358916f7e937015f6c38732bcf6131ecde001892cb20fe47153e7e23b1cd2fc4a22662e7bde09f7df10fcbf475783fe23a0fdcb2c3bd8b28453ce523ac19ff77e68c3e9fa0193b796ea68f44132b3a96adebc04181e503f52be4778ef422ce3e6ca38514fa18b500ca518590479e8c73a7942dc2e237d82cda953ae1b296b97ee8ed62e2e755d6ddea7c0334e1b8d76c278bdc454724003106cb6fdc85340d1e784ac8b6551eaabc33c502163ce0d401627bd22ba6be90089372bfa3f91ee745e45844ef8dc0fe3936bef07f9c1d3aadfa4c8e99be6b038bed6beb9597add881da2acc1a3a471f500d68f639cd2bf6f4afab919a2cf747bcbb42b95684e8741b485c3297cf07c7bd98d6653421b61f701a06b82be0fbeecd32eb00feca9c5732bb5e565bccf8c9feb27a50760a785bbb50402768cbd458811e284a604b3374faf3480e1736743665617de9c32fd10e37105ac6dd5303f1a6dc78950bce56215c2a2f9e0ccbc0bf9fe8ccf7647ed29e2aa4948689d681a7a9fe582631338f3eea3df846f28564038ab75aa2a8ee5416b66ceeda9d8f56ecefe07f6a21ace83a2e15ad408d0a480f56708e3d1c96020b124c58f6ff5247f73aff7f77d389167650b8a0b98c97f87a1e5d6c08fa99874ff144bfa905e9da3812f010eeee00f3c9b594450faab5342e1b6e98fed5714a802b67b3e5b1964a62606aacb8222efd4980823f076675ae859e64de7b08f7a0b3d8bc829e1a93eb3b4975b4761cd7fa743e393da537c91f658ea2b23c94244498cdc4bc32c8b9859b9d9792eeabdce635b2d61c311949204826054dba0880505e2b53cc3521fa8b68bbba2ec05050bd3244c02752af1555625ddf50a3656c0043005c43c26a2dc907d5dd67efa831ad974151067b436a75fe99b8c94c9ca9737279fa1aaa09b0108c48c79c7e4ec1eeccfd43aa8e7ab6cacf5a956fc47d4ce77fe719d6eec1730d3e3b3be71d313f644177b6d16df0180848c28b850fbf71168a1ee4e5639bc46f2555b3984dbb91520538dfa6a1905abfb7238ff344d0a7d760f040718a57cfb56634e7de7584097f69f87630693bcf410796266cc3f50302feacfb556bad2506b7191023817527dfe5973101712bda922472076633133a11a76e8bc7d763a2cdaa53fa8d47d442fcc572f791d66d10d8d6a9058ecbbcd6d3dbe45d67b75e1091dd0368bea33ef0f56ba68885630429c24800922062e1066f2d4c4b795332ab03239548df4e6e01c432fe5eb29e8e63f6c7ba4f2edefa208c69e781786e4717c2f71dc2032a98cf1e6d66c10831e17ee776edc6b060ae20d025dc570a88e17da771acd32b7b93d46e43a917b8e2ba8232ad2707324b9b04dd8ee50c3c5a4372c0b1461ab2b7424faf00c7162bd8e8ffc7fadcb055403b0fa7087226ba4330e746af97a3f915f0b9e105759e81fe94a0df0cd6c324fb0b871491b5516c2fbc82c77b07159e3f4c0b7952b74cb4e203a69f241485191e1afc76d12a56db065b0513a41582f655340603c73cb39b728c97d1e919ecf963b91ec2282d25dc426db873394055beb0f9ba20545e2465ce2d0d962f42e1e4c79bdea4cd2829269ff7ef650bbeb5083d39dc7aad668af0b01c521192c548857473b29991f7bb917b5814fe945f4c3ed9bbe0563f4004b391b76860e9fd6b7c0baae82e4ac033f62a2c6ce6a2311b8700b06b5215e604a9b99d37e00450fc7790e893176e9fecda220f838a078a8ef7da7d499b1fe0eb8780c4b9705a6a10674e61b5c228fae1c13488f98c10c1792fa40229dba44b1cb534f9fab6a14407687761d738c91f4b8d4371a1de1a47bde0563a6fc88c4886be5d48c4cb89078c255eb1639598379daf50a672cbf4d8add2d4af6c02aeb1d0f86b611abd363409c7c7fc0b66f307ad3df24241fe06d0f7617d6c3987bb9e5d8f1712aebf095fad19b3b4fcb9cc4fb39012f333c4b040666259ee7bc43cff299a527a8914d71324e91c774b84e9392e615453e9fc648c539059b66f780c888892fe8b30eba799ed18fab08ebc3b9da8bc12a249456351bc0ebafc9f54d5d24697fb53eeb5e734527d690620989f605f57dc65a15a754d304be592acc616cd528b6986064b4457b96cf1fb0ab383a0585acf9887b18e1d6d3aff1e7f2328ea0313a2b36f6f79d671d9ddc4d34fb8fb55a596b2a16c63757083fb4bd01be2e1d82e47c5a44e052279097c5a18feae9884e102cf087611a3b94467ad61635dae6275974f6e6ca7a42ded0ee4577574d56b142853a8c955d92d1eb780de11dc9289acd193214ed4c9f5f26d0481cb3c0c0b8d4c9ad929c61ffeed66bf2e4f7018049593b99358d93559847d55654cee93da30f6578d2e295909791d227a12c09cd4a0edec25d3155086b64a787997a53265cbffb7fe6a2bfd589e12b4d0e21a600276e920397888443584aa99a06d7cfef8e68eeab8fa739c3d8fb74581ceff295110742e763320bed3a4be982b3ebed15ecde37e849aaa91959327d25149f38854ea1137f870aff99979e5e74cc9e45be12e3f0f9912a0955e718a4917e835bca50f43ce92a6bc60ed006b8f623fbacebbfb3dcb4fabd9941a5487c6f637de9a2005a6bc4062e1210a08a51d6f8a5e3f6f97fe90dc7e2e21d4d2f038c0fbc1918aa00e230a4a0e5c41a4808fb9a731271fcc1e73713c9592aa4b2ddccd0d13c3cb68d51166623153445c9ec955c6870dc8543c0684883186082e34ea5714febf8b46921015c3623220d17529896e1a6edac6e32fea2ba30db203238300353602c17dddad7608cad8170b520f6d9d32cdf0156a1de4e9b9eea78f73255ddc6da6994a6018ff900d9886590602ca6a072d8aa5645e2adac0744e2d5b2e1038c746635d5814692c3498aa9043b68f8ce79c44678c5a7d5bc26c085475853b229b2af3dc822ec58047f313c778aae2b64995148174e42908f3ecacd3921855790c0c5a25814416930293010b4f917979d837f4ef9d2d6dce804f5c0926244097746252124a6e0055559ffab197c38778f717362152af8f6dbf7ee03df050ab9b8909556691c2c2775f0f9c26a545db7ba698a4ce37de877705ea97ac0a002db274ea8360a4aa732c2d5e7417138c60cbea69d3b4993ada6a9d8f51d851543a6500a31bac5a057dbef498001f08a44e3c4141900e18b6d73c28c8c67dca805edeb5376384cefe75be1f127225e4d9724b7047d68fa2ed4629e91711a37c80158a07dbce78918931402b472a98a5d5c6b66a2d116314577e94298c37bc441499a9ecea132d87c5d305a0f8f0b3ed16f3b820941082c73b28391d8482ca0cfa78e1e09aa588b0eb1849c6c7916a6bbe56134a6bd93ea306dec125982628dea1db6d022d210627959e1dc819c841f173ed25f356909222e481a1ebb31185fbaeacbd359d2779efe4554ccdac7f4bcc528f656a45049331e16e9c0c796423ec9c7cba15c69d4a8a7741699910f33cc9798a8bf1e48182f08029a14d0131654fd388225d7509e1d7a484e9c7df34d1680bfc6b8d1f6f3920cc4113509fe42dfbd6b261000da9651f7e18088f6c2564472046e5eb7e8c9f8b5286a7452741a7103ced710bfb8e699fb8b1a85c0ae887cc06ef2ff9e2a2b1a77bb4d44ddd4a4e1ba60afcb92baaef108b60486d409889cbb2b1cc77ddff7e4b6caf8cf3488764d84bf3605eb9df709ac6cb36d1a3de89cdd6657f0e6b4009e6dac5d9be14f4ed997cf61e5aaec932520c321359cf286adf6e2dc3094794ae61a4f16089d06e3dc62c958950e73213c1e865c894fe7b8a30de65f5534a1e9c5d19ed49397980126322cb9c72c46a86d7487571300d85b3b5661555f20ab63a78f846c1b8f51a19610a11ffee44f7ccf0f1d67f4148b2c828d74c7f3993965c9067114467a71d242113a68574e28601fce343a023ecc68a72d75259f9a5dce144a7f61ef327192f6474d2bbd06fde3049fe7fb306ba3f54337008d7dbdeaf28a37a224e38ade23adb076cefd3148efcb62539a96d4dfc53f369e34c3d493ac3a5e8c8881133be630a2a906703da62ce7cc02ace9f666d6c3d4b9763a83548825ee1efb54ee3475b09e2616c5bdde3d193181bf020e8ac9ac25f32604b6c11de8ad1a15b9f908c6d7e79181aad1d741b7434aa92597a835c53b9e4b61d6069fa4ee921824d17c98784a8c04590f8d2cf877662b410cae4ebd1ba3616074c020d8cb6099a095735635490d318821310ddd016150edb80370b8d4e2f05557fd619b17192c13353cdae76d495821c610c8641e5b3dff1e7f2ea77b17810ca7975b8e36b7f501a8710b326ef92672096ef66598510902fe663e2a9ef00c3a052f1cfb1739fccb4371f8f28bb92654de5bf87cc2863e92e6d7e4b45d773f90f434eafc8f8398a48527af829a6cae359e7af5941bef158f53798058351107ce58f79ed21036770f6e10e7da92bbca25f369ee83a0f894bbf366a1361f8125b4ffd8e8b4d47ec68cd6b37c840cc5beb8cf65b2269ea1a0e9c371a571f30458ff8ad9bbf8723c19ddae1de5ca7461a436ffcd103c01a20f3252ba0965ee928cfb0d002b9aa4d4f20c805b77e67c8d991c4d07e5419bec9626a32c115d28253dd5f16c17182c1779edf49bdfe3823d87fec88929801163a27bfaeddfd8cdccae8cc3bfd6a9f2e2fec5971fa560c434debd434ff4d0058dcb05d9f3ac5193c458472d6d1685f9f46c8864900c5edbaeeee08971ee1c087f2e11467ff4766743bccf9e3414feedd6dcb904b92a05eec5de8db95444b920c995c770edcedcf7bffc48836c8f30037dde47f0e66fd79550de0ebc3c0c3eba0b66e2a353542eeb20397800e5f41635c5ec2f9a271461bcee8e570ddf945b186f15ab5cabe2a3123189935c6b9010b31732c425a9b2582b097486a5a7b1880b2f16104484e1ca83fa9c278b87e30e4b0cf6ed66c87a979c05683ac94a295d1c53e6f0975a079dd9a2825fdd6ae0926ba1a69f3f69f408eea9d00fbd43235a52c53d11963a611b81dd9f5e05582e1822398873e883662a64c225be19e0b85e102e23fb73d5dcb11435a5437d7418b0409f2e60793038f55ed54c79882b3a17e74ae2148bd558d131dbf446edeb0d05353492534e216761cfcf6582d066a8235a2bd5eb383350a52d7fc2761514e27b6125cb3e387c103dd62e31f5b789c217811c80ccbe3f10fec7a19ad32dc9271368b6d6ba549c45dfd8018507c40962b6ac6468c3078edb71d8ec7f728be8cc23dea1139ac30c2e8d0fc077280e420fbbffc896863db5f1e76922d7dd8e4479c1be822e74212c6f74765e108f916a1b83f6efc8ea54080e9a28b1ba5813a1fefddbe2d0cda413ee1463985b51b59f818f440c9b6a10e4ebf71d37995ae9694ba5867ca2eb2f7bf4e58d26149f2b25943fba216beb3de1f954bcf1bd32ce358b5d23023ab456ebbc493ead41e25b62b5b4ace6c5c18c9a8d512a9cbb4dd59f33663f6138d6b06bc8eb1ec9caccc0077b2e68e7a09d412dfa352e7e5c3942b710ab1648e16d0adda424d9fc2d15c619f4e8093c2b9521e4cdb3f22e655f52ce0fcc1bfd94e56cba8decadb68214451be53f9286c82d2a4912bd2394d1133be908409d791d6d8c2194ca37a76a38d6d0a1fced6478848891d9264cfc08fa849d720339ce00977cad8d9738372184098a7333dd1564d1d7754b4aa4afd6217585804159d31f53017869cb78b718c837b7fd176ce19e3d6996b6f055ed3ba7cd55b0349676c0c113c33d070081ce4ef29af156c4ac8ce760013688d0295d90271e23ef3ca10ec2b3b889855a153c867ce79297a10a02d21e5e8995fbc10d2f4d4bf521565376053b80937bfafaac688108f9962b7c72cf0111874ac8ae27d024ee2f9d57f15b9910a7486ef7542c6629fb0520c93a445542d", 0x2000, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) io_setup(0x202, &(0x7f0000000200)=0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000000700)=[&(0x7f0000000000)={0xfff0, 0x20000000, 0x4, 0x1, 0xc, 0xffffffffffffffff, &(0x7f0000000900)='!', 0x1, 0xf}]) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) 3.419343064s ago: executing program 2 (id=2611): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af0ff00000000bfa200000000000007020000f5ffffffb703000008000000b704000080000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) connect$llc(r5, &(0x7f0000000180)={0x1a, 0x0, 0x0, 0x8, 0x0, 0x0, @multicast}, 0x10) accept4$llc(r5, 0x0, 0x0, 0x80800) r6 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x9, 0x0, 0x0) write$uinput_user_dev(r6, &(0x7f0000000380)={'syz0\x00', {0xff, 0x6, 0x7fff, 0x8d5}, 0x2, [0x10000, 0xeba, 0x7, 0x9, 0xc, 0x1, 0x6, 0x7ff, 0x0, 0x7fffdfff, 0x2, 0xc, 0x8, 0x1, 0x9, 0xfffffff7, 0x7, 0x3, 0x842, 0x26, 0x4, 0x0, 0x3ff, 0xfffffff4, 0xf9f, 0xda6, 0x3, 0xa7, 0x4, 0x2, 0x9, 0x76c9, 0x200, 0x1, 0x3, 0x1, 0x7, 0x80009, 0x1000f, 0xb, 0x9, 0x7ffffffc, 0xd, 0xb50, 0x0, 0x800, 0x3, 0x0, 0x7, 0xfffffffe, 0xfffffffa, 0x8, 0x24, 0x7fff, 0x8, 0x1, 0x200, 0x0, 0x0, 0x7f, 0x964e, 0x2d5, 0x149, 0x1], [0x266ac, 0xfffffff9, 0x4, 0x3, 0x8e, 0x7, 0x80000001, 0xc, 0x4, 0x85, 0x0, 0x7, 0x6, 0x8001, 0x6, 0x8, 0x2, 0x8, 0x6, 0x7ff, 0x7ff, 0x5, 0x9, 0xc00, 0x89, 0x7ff, 0x0, 0x1, 0x10000, 0x9, 0x9, 0x4d26, 0x10000, 0x8, 0x1, 0x7, 0xfffffffc, 0x4, 0x4c, 0x9, 0x8, 0x5, 0xe66, 0x8, 0x2, 0x81, 0x4b, 0x7d, 0x7fff, 0x8000b, 0x4, 0x9, 0x1, 0x8d1, 0x100008fd, 0x1, 0xe0, 0x8e, 0x10001, 0x4, 0x401, 0xade, 0x7f], [0x80008396, 0xb, 0x10000, 0x9, 0x8000, 0x1000001, 0x9, 0xe, 0x8, 0xff, 0x7f, 0x400, 0x1000, 0x9, 0x6e, 0x8001, 0x7, 0x5, 0x6, 0x5, 0x4, 0xcb, 0x2, 0x3, 0x0, 0x2, 0x8001, 0xc, 0x5, 0xb0f, 0x1e, 0x1, 0x800, 0x80008, 0x9, 0x3, 0x1fe, 0xfc, 0x4, 0xe, 0x464b, 0x6, 0x2e7, 0x7ff, 0x0, 0x6, 0x7f, 0x2, 0x7fffffff, 0xffffffff, 0x4, 0xffff, 0xd5d, 0xa0c787d, 0xffffff4e, 0x9, 0x4, 0x3c, 0x3, 0x0, 0x1fc1, 0x9, 0x1, 0x6], [0x10000010, 0x7, 0x9, 0x2, 0xa62, 0xfe, 0xff, 0x6, 0x80000000, 0x0, 0x10000e, 0x2, 0x4, 0x7, 0x5, 0x0, 0xfffffffd, 0x7ff, 0xdaa, 0x4, 0x3, 0x103, 0x6, 0xcc, 0x6, 0x4000400, 0xffffffff, 0xfffffffb, 0x40, 0x80000000, 0x4, 0x7, 0xfff, 0x1, 0x3, 0x0, 0x9, 0x1, 0x0, 0x7, 0x8ac1, 0x3, 0x1, 0x80000002, 0x80040002, 0xff, 0x6, 0x3, 0xfffff801, 0xffefffff, 0x37d, 0xfffffff8, 0xd, 0x7, 0xd, 0x8, 0x6eaf, 0x6, 0x8, 0x5e02, 0x2, 0x3, 0x5, 0x400]}, 0x45c) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_add_memb(r7, 0x107, 0x1, &(0x7f0000000000)={0x0, 0x1, 0x6, @multicast}, 0x10) 619.431671ms ago: executing program 1 (id=2612): openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x40, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000000c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000100), 0x10, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002980)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f, 0x6, 0xa68d7c519f800ff1, 0xffbc, 0x6, 0x4, 0x4, 0x0, 0x0, 0x40}}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000008380)="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20, 0x0, 0x68cc, {0x0, 0x14}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x2001, 0x8e) close(r0) ioctl$VHOST_VDPA_GET_DEVICE_ID(r2, 0x8004af70, 0x0) 0s ago: executing program 1 (id=2613): sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000480)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) prctl$PR_SET_IO_FLUSHER(0x43, 0x1) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) prctl$PR_SET_IO_FLUSHER(0x43, 0x0) kernel console output (not intermixed with test programs): _u:object_r:device_t tclass=blk_file permissive=1 [ 1555.319271][T12678] fuse: Bad value for 'group_id' [ 1555.330139][T12678] fuse: Bad value for 'group_id' [ 1555.550276][T12680] process 'syz.1.2307' launched './file0' with NULL argv: empty string added [ 1558.684619][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 1558.687641][ T29] audit: type=1400 audit(1558.610:32628): avc: denied { unmount } for pid=7536 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1558.877043][ T29] audit: type=1400 audit(1558.810:32629): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1558.887248][ T29] audit: type=1400 audit(1558.820:32630): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1558.915432][ T29] audit: type=1400 audit(1558.850:32631): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1559.061425][ T29] audit: type=1400 audit(1558.990:32632): avc: denied { read } for pid=12692 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1559.097573][ T29] audit: type=1400 audit(1559.030:32633): avc: denied { write } for pid=12692 comm="syz.1.2311" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1559.178770][ T29] audit: type=1400 audit(1559.110:32634): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1559.190244][ T29] audit: type=1400 audit(1559.110:32635): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1559.215187][ T29] audit: type=1400 audit(1559.150:32636): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1559.368318][ T29] audit: type=1400 audit(1559.300:32637): avc: denied { read write } for pid=12194 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1559.609533][T12696] fuse: Bad value for 'group_id' [ 1559.609896][T12696] fuse: Bad value for 'group_id' [ 1560.396123][ T7692] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1560.466053][ T7692] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1560.562087][ T7692] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1560.626668][ T7692] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1561.094121][ T7692] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1561.111238][ T7692] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1561.127129][ T7692] bond0 (unregistering): Released all slaves [ 1561.229559][ T7692] hsr_slave_0: left promiscuous mode [ 1561.233762][ T7692] hsr_slave_1: left promiscuous mode [ 1561.238475][ T7692] veth1_macvtap: left promiscuous mode [ 1561.238940][ T7692] veth0_macvtap: left promiscuous mode [ 1561.239460][ T7692] veth1_vlan: left promiscuous mode [ 1561.239894][ T7692] veth0_vlan: left promiscuous mode [ 1563.269980][T12734] fuse: Bad value for 'group_id' [ 1563.275701][T12734] fuse: Bad value for 'group_id' [ 1563.874468][ T29] kauditd_printk_skb: 195 callbacks suppressed [ 1563.883073][ T29] audit: type=1400 audit(1563.810:32833): avc: denied { sys_module } for pid=12710 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1563.883469][ T29] audit: type=1400 audit(1563.810:32834): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="rose2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1564.012216][ T29] audit: type=1400 audit(1563.940:32835): avc: denied { search } for pid=12736 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1564.021207][ T29] audit: type=1400 audit(1563.950:32836): avc: denied { read } for pid=12736 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1564.024704][ T29] audit: type=1400 audit(1563.960:32837): avc: denied { read open } for pid=12736 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1564.031050][ T29] audit: type=1400 audit(1563.960:32838): avc: denied { search } for pid=12736 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1564.033460][ T29] audit: type=1400 audit(1563.960:32839): avc: denied { search } for pid=12736 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1564.034982][ T29] audit: type=1400 audit(1563.960:32840): avc: denied { search } for pid=12736 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1564.042789][ T29] audit: type=1400 audit(1563.970:32841): avc: denied { read } for pid=12738 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1564.043176][ T29] audit: type=1400 audit(1563.970:32842): avc: denied { read } for pid=12736 comm="cmp" name="resolv.conf.eth1.link" dev="tmpfs" ino=67 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1568.058384][T12710] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1568.086378][T12710] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1568.960475][ T29] kauditd_printk_skb: 210 callbacks suppressed [ 1568.973305][ T29] audit: type=1400 audit(1568.890:33053): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1569.321854][ T29] audit: type=1400 audit(1569.250:33054): avc: denied { sys_module } for pid=12710 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1569.333132][ T29] audit: type=1400 audit(1569.260:33055): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1569.716161][ T29] audit: type=1400 audit(1569.650:33056): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1569.972904][ T29] audit: type=1400 audit(1569.900:33057): avc: denied { write } for pid=12887 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1569.976283][ T29] audit: type=1400 audit(1569.900:33058): avc: denied { write open } for pid=12887 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1570.057208][ T29] audit: type=1400 audit(1569.990:33059): avc: denied { sys_module } for pid=12710 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1570.063140][ T29] audit: type=1400 audit(1569.990:33060): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1570.216636][ T29] audit: type=1400 audit(1570.150:33061): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1570.408382][ T29] audit: type=1400 audit(1570.340:33062): avc: denied { sys_module } for pid=12710 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1571.039733][T12710] hsr_slave_0: entered promiscuous mode [ 1571.049612][T12710] hsr_slave_1: entered promiscuous mode [ 1572.160528][T12710] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1572.185390][T12710] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1572.229852][T12710] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1572.263847][T12710] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1574.214389][ T29] kauditd_printk_skb: 203 callbacks suppressed [ 1574.226329][ T29] audit: type=1400 audit(1574.150:33266): avc: denied { write } for pid=13023 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1574.229092][ T29] audit: type=1400 audit(1574.150:33267): avc: denied { write open } for pid=13023 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1574.305102][ T29] audit: type=1400 audit(1574.240:33268): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1574.670275][ T29] audit: type=1400 audit(1574.600:33269): avc: denied { write } for pid=13025 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1574.689973][ T29] audit: type=1400 audit(1574.600:33270): avc: denied { write open } for pid=13025 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1574.725281][ T29] audit: type=1400 audit(1574.660:33271): avc: denied { search } for pid=13025 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1574.732675][ T29] audit: type=1400 audit(1574.660:33272): avc: denied { search } for pid=13025 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1574.736048][ T29] audit: type=1400 audit(1574.670:33273): avc: denied { search } for pid=13025 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1574.739036][ T29] audit: type=1400 audit(1574.670:33274): avc: denied { search } for pid=13025 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1574.748473][ T29] audit: type=1400 audit(1574.680:33275): avc: denied { sys_module } for pid=12710 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1575.681517][T12710] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1579.314640][ T29] kauditd_printk_skb: 205 callbacks suppressed [ 1579.316702][ T29] audit: type=1400 audit(1579.250:33481): avc: denied { write } for pid=13065 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1579.334467][ T29] audit: type=1400 audit(1579.270:33482): avc: denied { write open } for pid=13065 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1579.474755][ T29] audit: type=1400 audit(1579.410:33483): avc: denied { sys_module } for pid=12710 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1579.479374][ T29] audit: type=1400 audit(1579.410:33484): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1580.283507][ T29] audit: type=1400 audit(1580.200:33485): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1580.908820][ T29] audit: type=1400 audit(1580.840:33486): avc: denied { sys_module } for pid=12710 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1580.912000][ T29] audit: type=1400 audit(1580.840:33487): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1580.970122][ T29] audit: type=1400 audit(1580.890:33488): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1580.970500][ T29] audit: type=1400 audit(1580.900:33489): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1580.973099][ T29] audit: type=1400 audit(1580.900:33490): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1584.619264][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 1584.620410][ T29] audit: type=1400 audit(1584.550:33502): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1585.322086][ T29] audit: type=1400 audit(1585.250:33503): avc: denied { sys_module } for pid=12710 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1585.337012][ T29] audit: type=1400 audit(1585.270:33504): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1585.953726][ T29] audit: type=1400 audit(1585.890:33505): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1586.867305][ T29] audit: type=1400 audit(1586.800:33506): avc: denied { sys_module } for pid=12710 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1586.872097][ T29] audit: type=1400 audit(1586.800:33507): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1586.974140][ T29] audit: type=1400 audit(1586.910:33508): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1586.979110][ T29] audit: type=1400 audit(1586.910:33509): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1586.994402][ T29] audit: type=1400 audit(1586.930:33510): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1587.399613][ T29] audit: type=1400 audit(1587.330:33511): avc: denied { read } for pid=13092 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1587.779000][T13093] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2324'. [ 1588.670744][T13108] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2325'. [ 1588.683451][T13108] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 1589.625974][ T29] kauditd_printk_skb: 190 callbacks suppressed [ 1589.626974][ T29] audit: type=1400 audit(1589.560:33702): avc: denied { read } for pid=13110 comm="cmp" name="resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=71 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1589.628573][ T29] audit: type=1400 audit(1589.560:33703): avc: denied { read open } for pid=13110 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=71 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1589.631508][ T29] audit: type=1400 audit(1589.560:33704): avc: denied { getattr } for pid=13110 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1589.668539][ T29] audit: type=1400 audit(1589.600:33705): avc: denied { getattr } for pid=13110 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth2.ipv4ll" dev="tmpfs" ino=71 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1589.873692][ T29] audit: type=1400 audit(1589.800:33706): avc: denied { sys_module } for pid=12710 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1589.879184][ T29] audit: type=1400 audit(1589.810:33707): avc: denied { module_request } for pid=12710 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1589.905313][ T29] audit: type=1400 audit(1589.840:33708): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1589.910358][ T29] audit: type=1400 audit(1589.840:33709): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1589.926420][ T29] audit: type=1400 audit(1589.860:33710): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1590.117250][ T29] audit: type=1400 audit(1590.050:33711): avc: denied { read } for pid=13116 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1591.629074][T12710] veth0_vlan: entered promiscuous mode [ 1591.704873][T12710] veth1_vlan: entered promiscuous mode [ 1591.863587][T12710] veth0_macvtap: entered promiscuous mode [ 1591.889092][T12710] veth1_macvtap: entered promiscuous mode [ 1592.027735][ T2655] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1592.034425][ T2655] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1592.035074][ T2655] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1592.035836][ T2655] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1594.065742][T13144] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2334'. [ 1594.066686][T13144] ip_vti0: entered allmulticast mode [ 1594.744029][ T29] kauditd_printk_skb: 273 callbacks suppressed [ 1594.747230][ T29] audit: type=1400 audit(1594.680:33985): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1594.747563][ T29] audit: type=1400 audit(1594.680:33986): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1594.754706][ T29] audit: type=1400 audit(1594.690:33987): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1594.907977][ T29] audit: type=1400 audit(1594.840:33988): avc: denied { read } for pid=13151 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1594.966521][ T29] audit: type=1400 audit(1594.900:33989): avc: denied { write } for pid=13151 comm="syz.1.2337" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1594.991816][ T29] audit: type=1400 audit(1594.920:33990): avc: denied { write } for pid=13148 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1595.005458][ T29] audit: type=1400 audit(1594.930:33991): avc: denied { write open } for pid=13148 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1595.093294][ T29] audit: type=1400 audit(1595.020:33992): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1595.113288][ T29] audit: type=1400 audit(1595.030:33993): avc: denied { search } for pid=13148 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1595.113757][ T29] audit: type=1400 audit(1595.040:33995): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1599.831935][ T29] kauditd_printk_skb: 382 callbacks suppressed [ 1599.833751][ T29] audit: type=1400 audit(1599.760:34377): avc: denied { search } for pid=13182 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1599.835308][ T29] audit: type=1400 audit(1599.760:34378): avc: denied { search } for pid=13182 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1599.835592][ T29] audit: type=1400 audit(1599.760:34379): avc: denied { search } for pid=13182 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1599.846294][ T29] audit: type=1400 audit(1599.780:34380): avc: denied { getattr } for pid=13182 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth4.ipv4ll" dev="tmpfs" ino=74 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1599.852064][ T29] audit: type=1400 audit(1599.780:34381): avc: denied { search } for pid=13182 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1599.856402][ T29] audit: type=1400 audit(1599.780:34382): avc: denied { search } for pid=13182 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1599.857620][ T29] audit: type=1400 audit(1599.780:34383): avc: denied { search } for pid=13182 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1599.874255][ T29] audit: type=1400 audit(1599.810:34384): avc: denied { search } for pid=13182 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1599.885696][ T29] audit: type=1400 audit(1599.810:34385): avc: denied { remove_name search } for pid=13182 comm="rm" name="resolv.conf.eth4.ipv4ll" dev="tmpfs" ino=74 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1599.886168][ T29] audit: type=1400 audit(1599.810:34386): avc: denied { unlink } for pid=13182 comm="rm" name="resolv.conf.eth4.ipv4ll" dev="tmpfs" ino=74 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1609.951119][ T29] kauditd_printk_skb: 35 callbacks suppressed [ 1609.962965][ T29] audit: type=1400 audit(1609.880:34422): avc: denied { unmount } for pid=12710 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1610.220372][ T29] audit: type=1400 audit(1610.150:34423): avc: denied { read write } for pid=13203 comm="syz.2.2350" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1610.232943][ T29] audit: type=1400 audit(1610.160:34424): avc: denied { read write open } for pid=13203 comm="syz.2.2350" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1610.236357][ T29] audit: type=1400 audit(1610.170:34425): avc: denied { mounton } for pid=13203 comm="syz.2.2350" path="/9/file0" dev="tmpfs" ino=65 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1610.239814][T13204] fuse: Unknown parameter 'grou00000000000000000000' [ 1610.469296][ T29] audit: type=1400 audit(1610.400:34426): avc: denied { map_create } for pid=13205 comm="syz.2.2351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1610.484889][ T29] audit: type=1400 audit(1610.420:34427): avc: denied { map_read map_write } for pid=13205 comm="syz.2.2351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1611.080624][ T29] audit: type=1326 audit(1611.010:34428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13209 comm="syz.2.2353" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1611.081074][ T29] audit: type=1326 audit(1611.010:34429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13209 comm="syz.2.2353" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 1611.084041][ T29] audit: type=1326 audit(1611.010:34430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13209 comm="syz.2.2353" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 1611.088670][ T29] audit: type=1400 audit(1611.020:34431): avc: denied { read } for pid=13209 comm="syz.2.2353" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1612.565838][T13215] fuse: Unknown parameter 'grou00000000000000000000' [ 1614.857349][T13225] fuse: Unknown parameter 'group_i00000000000000000000' [ 1615.298914][ T29] kauditd_printk_skb: 61 callbacks suppressed [ 1615.302659][ T29] audit: type=1400 audit(1615.230:34493): avc: denied { prog_load } for pid=13226 comm="syz.2.2361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1615.306359][ T29] audit: type=1400 audit(1615.240:34494): avc: denied { bpf } for pid=13226 comm="syz.2.2361" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1615.797379][ T29] audit: type=1400 audit(1615.730:34495): avc: denied { execmem } for pid=13228 comm="syz.2.2362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1620.941871][ T29] audit: type=1400 audit(1620.870:34496): avc: denied { prog_load } for pid=13232 comm="syz.2.2363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1620.947966][ T29] audit: type=1400 audit(1620.880:34497): avc: denied { bpf } for pid=13232 comm="syz.2.2363" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1620.952180][ T29] audit: type=1400 audit(1620.880:34498): avc: denied { perfmon } for pid=13232 comm="syz.2.2363" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1620.960410][ T29] audit: type=1400 audit(1620.890:34499): avc: denied { read write } for pid=13232 comm="syz.2.2363" name="event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1620.964126][ T29] audit: type=1400 audit(1620.900:34500): avc: denied { read open } for pid=13232 comm="syz.2.2363" path="/dev/input/event0" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1620.973748][ T29] audit: type=1400 audit(1620.910:34501): avc: denied { ioctl } for pid=13232 comm="syz.2.2363" path="/dev/input/event0" dev="devtmpfs" ino=703 ioctlcmd=0x4592 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1621.401057][ T29] audit: type=1400 audit(1621.330:34502): avc: denied { write } for pid=13234 comm="syz.2.2364" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1621.417557][ T29] audit: type=1400 audit(1621.350:34503): avc: denied { write open } for pid=13234 comm="syz.2.2364" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1621.496663][ T29] audit: type=1400 audit(1621.420:34504): avc: denied { ioctl } for pid=13234 comm="syz.2.2364" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5408 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1622.112891][ T29] audit: type=1400 audit(1622.040:34505): avc: denied { ioctl } for pid=13234 comm="syz.2.2364" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1624.624282][T13238] fuse: Unknown parameter 'group_i00000000000000000000' [ 1627.094592][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 1627.095772][ T29] audit: type=1400 audit(1627.030:34510): avc: denied { create } for pid=13243 comm="syz.2.2368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1627.117915][ T29] audit: type=1400 audit(1627.050:34511): avc: denied { getopt } for pid=13243 comm="syz.2.2368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1628.547485][ T29] audit: type=1400 audit(1628.480:34512): avc: denied { read write } for pid=13248 comm="syz.2.2370" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1628.598275][ T29] audit: type=1400 audit(1628.530:34513): avc: denied { read write open } for pid=13248 comm="syz.2.2370" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1628.632933][ T29] audit: type=1400 audit(1628.560:34514): avc: denied { mounton } for pid=13248 comm="syz.2.2370" path="/25/file0" dev="tmpfs" ino=149 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1628.636998][T13249] fuse: Unknown parameter 'group_i00000000000000000000' [ 1629.508487][ T29] audit: type=1400 audit(1629.440:34515): avc: denied { create } for pid=13250 comm="syz.2.2371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1629.527758][ T29] audit: type=1400 audit(1629.460:34516): avc: denied { create } for pid=13250 comm="syz.2.2371" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1629.570356][ T29] audit: type=1400 audit(1629.500:34517): avc: denied { ioctl } for pid=13250 comm="syz.2.2371" path="socket:[29748]" dev="sockfs" ino=29748 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1629.659106][T13251] vlan2: entered promiscuous mode [ 1629.659493][T13251] bond0: entered promiscuous mode [ 1629.659932][T13251] bond_slave_0: entered promiscuous mode [ 1629.660398][T13251] bond_slave_1: entered promiscuous mode [ 1630.193192][ T29] audit: type=1400 audit(1630.110:34518): avc: denied { prog_load } for pid=13262 comm="syz.2.2372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1630.198212][ T29] audit: type=1400 audit(1630.130:34519): avc: denied { bpf } for pid=13262 comm="syz.2.2372" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1632.114335][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 1632.146326][ T29] audit: type=1400 audit(1632.050:34529): avc: denied { mounton } for pid=13266 comm="syz.2.2374" path="/29/file0" dev="tmpfs" ino=170 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1632.146723][ T29] audit: type=1400 audit(1632.070:34530): avc: denied { mount } for pid=13266 comm="syz.2.2374" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1632.885161][ T29] audit: type=1400 audit(1632.820:34531): avc: denied { unmount } for pid=12710 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1633.483187][ T29] audit: type=1400 audit(1633.410:34532): avc: denied { read write } for pid=13271 comm="syz.2.2375" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1633.574955][ T29] audit: type=1400 audit(1633.510:34533): avc: denied { read write open } for pid=13271 comm="syz.2.2375" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1633.585504][T13272] fuse: Unknown parameter 'group_id00000000000000000000' [ 1633.586608][ T29] audit: type=1400 audit(1633.520:34534): avc: denied { mounton } for pid=13271 comm="syz.2.2375" path="/30/file0" dev="tmpfs" ino=176 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1634.444629][ T29] audit: type=1400 audit(1634.370:34535): avc: denied { execmem } for pid=13273 comm="syz.2.2376" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1634.685523][ T29] audit: type=1400 audit(1634.620:34536): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.693145][ T29] audit: type=1400 audit(1634.620:34537): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1634.705709][ T29] audit: type=1400 audit(1634.640:34538): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1635.771918][T13282] fuse: Unknown parameter 'group_id00000000000000000000' [ 1636.639809][T13289] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2384'. [ 1637.418459][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 1637.419424][ T29] audit: type=1400 audit(1637.350:34565): avc: denied { read } for pid=13291 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1637.539093][ T29] audit: type=1400 audit(1637.470:34566): avc: denied { create } for pid=13291 comm="syz.1.2385" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1637.595877][ T29] audit: type=1400 audit(1637.530:34567): avc: denied { ioctl } for pid=13291 comm="syz.1.2385" path="socket:[29440]" dev="sockfs" ino=29440 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1637.811818][ T29] audit: type=1400 audit(1637.740:34568): avc: denied { read write } for pid=13292 comm="syz.2.2386" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1637.818134][ T29] audit: type=1400 audit(1637.750:34569): avc: denied { read write open } for pid=13292 comm="syz.2.2386" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1637.840624][ T29] audit: type=1400 audit(1637.770:34570): avc: denied { mounton } for pid=13292 comm="syz.2.2386" path="/36/file0" dev="tmpfs" ino=207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1637.842009][T13294] fuse: Unknown parameter 'group_id00000000000000000000' [ 1638.068657][ T29] audit: type=1400 audit(1638.000:34571): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1638.083161][ T29] audit: type=1400 audit(1638.010:34572): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1638.089170][ T29] audit: type=1400 audit(1638.020:34573): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1638.527146][ T29] audit: type=1400 audit(1638.460:34574): avc: denied { read } for pid=13295 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1642.866215][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 1642.873285][ T29] audit: type=1400 audit(1642.800:34619): avc: denied { read } for pid=13304 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1643.276011][ T29] audit: type=1400 audit(1643.210:34620): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1643.278682][ T29] audit: type=1400 audit(1643.210:34621): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1643.323815][ T29] audit: type=1400 audit(1643.260:34622): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1643.957244][ T29] audit: type=1400 audit(1643.890:34623): avc: denied { read } for pid=13307 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1644.129186][ T29] audit: type=1400 audit(1644.060:34624): avc: denied { read write } for pid=13306 comm="syz.2.2393" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1644.157150][T13309] fuse: Bad value for 'user_id' [ 1644.157690][T13309] fuse: Bad value for 'user_id' [ 1644.173632][ T29] audit: type=1400 audit(1644.080:34625): avc: denied { read write open } for pid=13306 comm="syz.2.2393" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1644.174199][ T29] audit: type=1400 audit(1644.090:34626): avc: denied { mounton } for pid=13306 comm="syz.2.2393" path="/39/file0" dev="tmpfs" ino=223 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1644.191841][ T29] audit: type=1400 audit(1644.120:34627): avc: denied { read write } for pid=13307 comm="syz.1.2392" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1644.197270][ T29] audit: type=1400 audit(1644.130:34628): avc: denied { read write open } for pid=13307 comm="syz.1.2392" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1647.734116][T13324] fuse: Bad value for 'user_id' [ 1647.734471][T13324] fuse: Bad value for 'user_id' [ 1647.884865][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 1647.887947][ T29] audit: type=1400 audit(1647.820:34660): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1647.890121][ T29] audit: type=1400 audit(1647.820:34661): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1648.503244][ T29] audit: type=1400 audit(1648.420:34662): avc: denied { read } for pid=13327 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1648.761487][ T29] audit: type=1400 audit(1648.690:34663): avc: denied { read write } for pid=13327 comm="syz.1.2401" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1648.795384][ T29] audit: type=1400 audit(1648.730:34664): avc: denied { read write open } for pid=13327 comm="syz.1.2401" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1648.829185][ T29] audit: type=1400 audit(1648.760:34665): avc: denied { mounton } for pid=13327 comm="syz.1.2401" path="/536/file0" dev="tmpfs" ino=2807 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1648.904805][ T29] audit: type=1400 audit(1648.840:34666): avc: denied { mount } for pid=13327 comm="syz.1.2401" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1649.706737][ T29] audit: type=1400 audit(1649.640:34667): avc: denied { module_request } for pid=13333 comm="syz.2.2403" kmod="bpf_preload" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1650.338302][ T29] audit: type=1400 audit(1650.270:34668): avc: denied { mount } for pid=13333 comm="syz.2.2403" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 1650.370594][ T29] audit: type=1400 audit(1650.300:34669): avc: denied { create } for pid=13333 comm="syz.2.2403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1660.366680][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 1660.371038][ T29] audit: type=1400 audit(1660.300:34675): avc: denied { unmount } for pid=12710 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1660.443993][ T29] audit: type=1400 audit(1660.380:34676): avc: denied { unmount } for pid=7536 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1660.582712][ T29] audit: type=1400 audit(1660.500:34677): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1660.599000][ T29] audit: type=1400 audit(1660.530:34678): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1660.616124][ T29] audit: type=1400 audit(1660.550:34679): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1660.748035][ T29] audit: type=1400 audit(1660.680:34680): avc: denied { read } for pid=13347 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1660.783944][ T29] audit: type=1400 audit(1660.720:34681): avc: denied { read write } for pid=13346 comm="syz.2.2406" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1660.788278][ T29] audit: type=1400 audit(1660.720:34682): avc: denied { execmem } for pid=13347 comm="syz.1.2407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1660.790653][ T29] audit: type=1400 audit(1660.720:34683): avc: denied { read write open } for pid=13346 comm="syz.2.2406" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1660.797930][ T29] audit: type=1400 audit(1660.730:34684): avc: denied { mounton } for pid=13346 comm="syz.2.2406" path="/49/file0" dev="tmpfs" ino=275 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1664.490229][T13379] fuse: Bad value for 'fd' [ 1665.546022][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 1665.546458][ T29] audit: type=1400 audit(1665.480:34729): avc: denied { create } for pid=13385 comm="syz.2.2420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1665.556683][ T29] audit: type=1400 audit(1665.490:34730): avc: denied { ioctl } for pid=13385 comm="syz.2.2420" path="socket:[29982]" dev="sockfs" ino=29982 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1665.604631][T13386] vlan3: entered promiscuous mode [ 1666.115848][ T29] audit: type=1400 audit(1666.050:34731): avc: denied { read write } for pid=13398 comm="syz.2.2422" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1666.121025][ T29] audit: type=1400 audit(1666.050:34732): avc: denied { read write open } for pid=13398 comm="syz.2.2422" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1666.131062][ T29] audit: type=1400 audit(1666.060:34733): avc: denied { mounton } for pid=13398 comm="syz.2.2422" path="/62/file0" dev="tmpfs" ino=342 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1666.136129][T13399] fuse: Bad value for 'fd' [ 1666.424069][ T29] audit: type=1400 audit(1666.360:34734): avc: denied { name_bind } for pid=13400 comm="syz.2.2423" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1666.428546][ T29] audit: type=1400 audit(1666.360:34735): avc: denied { node_bind } for pid=13400 comm="syz.2.2423" saddr=::e0:0:0:0:1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1669.178906][ T29] audit: type=1400 audit(1669.110:34736): avc: denied { create } for pid=13403 comm="syz.2.2424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1669.212801][T13404] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2424'. [ 1669.216374][ T29] audit: type=1400 audit(1669.150:34737): avc: denied { module_request } for pid=13403 comm="syz.2.2424" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1669.519288][ T29] audit: type=1400 audit(1669.450:34738): avc: denied { write } for pid=13403 comm="syz.2.2424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1671.655464][ T29] audit: type=1400 audit(1671.590:34739): avc: denied { name_bind } for pid=13410 comm="syz.2.2426" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1671.661210][ T29] audit: type=1400 audit(1671.590:34740): avc: denied { node_bind } for pid=13410 comm="syz.2.2426" saddr=fe80::aa src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1671.953688][ T29] audit: type=1400 audit(1671.890:34741): avc: denied { read write } for pid=13412 comm="syz.2.2427" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1671.958207][ T29] audit: type=1400 audit(1671.890:34742): avc: denied { read write open } for pid=13412 comm="syz.2.2427" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1671.966884][ T29] audit: type=1400 audit(1671.900:34743): avc: denied { mounton } for pid=13412 comm="syz.2.2427" path="/67/file0" dev="tmpfs" ino=368 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1671.970921][T13413] fuse: Bad value for 'fd' [ 1672.199361][ T29] audit: type=1400 audit(1672.130:34744): avc: denied { create } for pid=13414 comm="syz.2.2428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1672.220062][ T29] audit: type=1400 audit(1672.150:34745): avc: denied { setopt } for pid=13414 comm="syz.2.2428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1672.511138][ T29] audit: type=1400 audit(1672.440:34746): avc: denied { name_bind } for pid=13416 comm="syz.2.2429" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1673.206218][ T29] audit: type=1400 audit(1673.140:34747): avc: denied { create } for pid=13419 comm="syz.2.2430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1673.216133][ T29] audit: type=1400 audit(1673.150:34748): avc: denied { write } for pid=13419 comm="syz.2.2430" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1673.654762][T13424] fuse: Bad value for 'fd' [ 1676.707777][ T29] kauditd_printk_skb: 35 callbacks suppressed [ 1676.713677][ T29] audit: type=1400 audit(1676.640:34784): avc: denied { create } for pid=13434 comm="syz.1.2436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1676.758168][ T29] audit: type=1400 audit(1676.690:34785): avc: denied { create } for pid=13434 comm="syz.1.2436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1676.856656][ T29] audit: type=1400 audit(1676.790:34786): avc: denied { create } for pid=13434 comm="syz.1.2436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1676.919356][ T29] audit: type=1400 audit(1676.850:34787): avc: denied { read write } for pid=13434 comm="syz.1.2436" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1676.935877][ T29] audit: type=1400 audit(1676.870:34788): avc: denied { read write open } for pid=13434 comm="syz.1.2436" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1676.983595][ T29] audit: type=1400 audit(1676.870:34789): avc: denied { mounton } for pid=13434 comm="syz.1.2436" path="/541/file0" dev="tmpfs" ino=2835 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1676.984302][ T29] audit: type=1400 audit(1676.900:34790): avc: denied { mount } for pid=13434 comm="syz.1.2436" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1677.608441][T13435] fuse: root generation should be zero [ 1677.757326][ T29] audit: type=1400 audit(1677.690:34791): avc: denied { mount } for pid=13434 comm="syz.1.2436" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1677.894369][ T29] audit: type=1400 audit(1677.830:34792): avc: denied { create } for pid=13434 comm="syz.1.2436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1677.945442][ T29] audit: type=1400 audit(1677.880:34793): avc: denied { prog_load } for pid=13434 comm="syz.1.2436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1678.715820][T13440] fuse: Bad value for 'fd' [ 1690.444791][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 1690.445866][ T29] audit: type=1400 audit(1690.380:34813): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1690.456981][ T29] audit: type=1400 audit(1690.390:34814): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1690.460772][ T29] audit: type=1400 audit(1690.390:34815): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1690.631189][ T29] audit: type=1400 audit(1690.560:34816): avc: denied { read } for pid=13450 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1690.692026][ T29] audit: type=1400 audit(1690.620:34817): avc: denied { read write } for pid=13450 comm="syz.1.2440" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1690.696998][ T29] audit: type=1400 audit(1690.630:34818): avc: denied { read write open } for pid=13450 comm="syz.1.2440" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1690.720084][ T29] audit: type=1400 audit(1690.650:34819): avc: denied { mounton } for pid=13450 comm="syz.1.2440" path="/543/file0" dev="tmpfs" ino=2847 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1690.745488][ T29] audit: type=1400 audit(1690.680:34820): avc: denied { mount } for pid=13450 comm="syz.1.2440" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1692.326415][ T29] audit: type=1400 audit(1692.260:34821): avc: denied { unmount } for pid=12710 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1692.331787][ T29] audit: type=1400 audit(1692.260:34822): avc: denied { unmount } for pid=7536 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1692.925979][T13461] fuse: Invalid rootmode [ 1695.666927][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 1695.668181][ T29] audit: type=1400 audit(1695.600:34847): avc: denied { unmount } for pid=7536 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1695.757551][ T29] audit: type=1400 audit(1695.690:34848): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1695.764819][ T29] audit: type=1400 audit(1695.700:34849): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1695.771178][ T29] audit: type=1400 audit(1695.700:34850): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1695.948173][ T29] audit: type=1400 audit(1695.880:34851): avc: denied { read } for pid=13469 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1695.991744][ T29] audit: type=1400 audit(1695.920:34852): avc: denied { create } for pid=13469 comm="syz.1.2446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1696.006356][ T29] audit: type=1400 audit(1695.940:34853): avc: denied { setopt } for pid=13469 comm="syz.1.2446" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1696.018207][ T29] audit: type=1400 audit(1695.950:34854): avc: denied { setopt } for pid=13469 comm="syz.1.2446" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1696.100892][ T29] audit: type=1400 audit(1696.020:34855): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1696.108675][ T29] audit: type=1400 audit(1696.040:34856): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1699.168426][T13478] fuse: Invalid rootmode [ 1702.716734][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 1702.717587][ T29] audit: type=1400 audit(1702.650:34879): avc: denied { unmount } for pid=7536 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1702.881398][ T29] audit: type=1400 audit(1702.810:34880): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1702.884662][ T29] audit: type=1400 audit(1702.820:34881): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1702.887358][ T29] audit: type=1400 audit(1702.820:34882): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1703.167417][ T29] audit: type=1400 audit(1703.100:34883): avc: denied { read } for pid=13486 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1703.528974][ T29] audit: type=1400 audit(1703.460:34884): avc: denied { bpf } for pid=13486 comm="syz.1.2451" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1703.623878][ T29] audit: type=1400 audit(1703.560:34885): avc: denied { create } for pid=13486 comm="syz.1.2451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1706.254463][ T29] audit: type=1400 audit(1706.190:34886): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1706.257370][ T29] audit: type=1400 audit(1706.190:34887): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1706.262164][ T29] audit: type=1400 audit(1706.190:34888): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1706.808131][T13514] fuse: Invalid rootmode [ 1707.677292][T13518] bond1 (unregistering): Released all slaves [ 1707.979434][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 1707.980475][ T29] audit: type=1400 audit(1707.910:34908): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1707.982133][ T29] audit: type=1400 audit(1707.910:34909): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1708.039930][ T29] audit: type=1400 audit(1707.970:34910): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1708.476423][ T29] audit: type=1400 audit(1708.410:34911): avc: denied { read } for pid=13591 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1708.868017][ T29] audit: type=1400 audit(1708.800:34912): avc: denied { read write } for pid=13591 comm="syz.1.2456" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1708.869554][ T29] audit: type=1400 audit(1708.800:34913): avc: denied { read write open } for pid=13591 comm="syz.1.2456" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1708.993922][ T29] audit: type=1400 audit(1708.930:34914): avc: denied { mounton } for pid=13591 comm="syz.1.2456" path="/554/file0" dev="tmpfs" ino=2906 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1709.064768][ T29] audit: type=1400 audit(1709.000:34915): avc: denied { mount } for pid=13591 comm="syz.1.2456" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1709.269858][ T29] audit: type=1400 audit(1709.200:34916): avc: denied { read } for pid=13595 comm="syz.2.2458" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1709.271852][ T29] audit: type=1400 audit(1709.200:34917): avc: denied { read open } for pid=13595 comm="syz.2.2458" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1710.544831][T13604] fuse: Bad value for 'rootmode' [ 1713.438550][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 1713.439639][ T29] audit: type=1400 audit(1713.370:34941): avc: denied { create } for pid=13616 comm="syz.2.2462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1713.497734][ T29] audit: type=1400 audit(1713.430:34942): avc: denied { write } for pid=13616 comm="syz.2.2462" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1713.626815][ T29] audit: type=1400 audit(1713.560:34943): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1713.641970][ T29] audit: type=1400 audit(1713.570:34944): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1713.661484][ T29] audit: type=1400 audit(1713.590:34945): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1714.523545][ T29] audit: type=1400 audit(1714.450:34946): avc: denied { read write } for pid=13619 comm="syz.2.2464" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1714.546098][ T29] audit: type=1400 audit(1714.480:34947): avc: denied { read } for pid=13618 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1714.674539][ T29] audit: type=1400 audit(1714.570:34948): avc: denied { read write open } for pid=13619 comm="syz.2.2464" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1714.688838][ T29] audit: type=1400 audit(1714.620:34949): avc: denied { mounton } for pid=13619 comm="syz.2.2464" path="/87/file0" dev="tmpfs" ino=476 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1714.720093][ T29] audit: type=1400 audit(1714.650:34951): avc: denied { module_request } for pid=13618 comm="syz.1.2463" kmod="net-pf-2-proto-0-type-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1715.827848][T13631] fuse: Bad value for 'rootmode' [ 1718.780473][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 1718.781635][ T29] audit: type=1400 audit(1718.710:35011): avc: denied { read } for pid=13651 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1719.134548][T13654] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2477'. [ 1719.157470][ T29] audit: type=1400 audit(1719.090:35012): avc: denied { read write } for pid=13655 comm="syz.2.2479" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1719.159432][ T29] audit: type=1400 audit(1719.090:35013): avc: denied { read write open } for pid=13655 comm="syz.2.2479" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1719.171857][ T29] audit: type=1400 audit(1719.090:35014): avc: denied { module_request } for pid=13651 comm="syz.1.2477" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1719.179002][ T29] audit: type=1400 audit(1719.100:35015): avc: denied { mounton } for pid=13655 comm="syz.2.2479" path="/95/file0" dev="tmpfs" ino=518 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1719.179839][T13656] fuse: Unknown parameter 'use00000000000000000000' [ 1720.423307][ T29] audit: type=1400 audit(1720.340:35016): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1720.441903][ T29] audit: type=1400 audit(1720.370:35017): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1720.527435][ T29] audit: type=1400 audit(1720.460:35018): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1721.421220][ T29] audit: type=1400 audit(1721.350:35019): avc: denied { read } for pid=13662 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1721.684812][ T29] audit: type=1400 audit(1721.610:35020): avc: denied { read write } for pid=13662 comm="syz.1.2481" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1724.093728][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 1724.094111][ T29] audit: type=1400 audit(1724.020:35031): avc: denied { unmount } for pid=7536 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1724.404965][ T29] audit: type=1400 audit(1724.340:35032): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1724.423470][ T29] audit: type=1400 audit(1724.350:35033): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1724.423909][ T29] audit: type=1400 audit(1724.350:35034): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1725.266801][ T29] audit: type=1400 audit(1725.200:35035): avc: denied { read } for pid=13676 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1725.548413][ T29] audit: type=1400 audit(1725.480:35036): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1725.551907][ T29] audit: type=1400 audit(1725.480:35037): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1725.567342][ T29] audit: type=1400 audit(1725.500:35038): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1725.889125][ T29] audit: type=1400 audit(1725.820:35039): avc: denied { read } for pid=13678 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1725.974386][ T29] audit: type=1400 audit(1725.910:35040): avc: denied { create } for pid=13678 comm="syz.1.2486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 1726.610863][T13683] fuse: Bad value for 'fd' [ 1730.033460][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 1730.034553][ T29] audit: type=1400 audit(1729.960:35070): avc: denied { unmount } for pid=7536 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1730.211004][ T29] audit: type=1400 audit(1730.140:35071): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1730.212927][ T29] audit: type=1400 audit(1730.140:35072): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1730.256188][ T29] audit: type=1400 audit(1730.190:35073): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1730.277425][ T29] audit: type=1400 audit(1730.210:35074): avc: denied { prog_load } for pid=13696 comm="syz.2.2492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1730.279944][ T29] audit: type=1400 audit(1730.210:35075): avc: denied { bpf } for pid=13696 comm="syz.2.2492" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1730.294059][ T29] audit: type=1400 audit(1730.230:35076): avc: denied { allowed } for pid=13696 comm="syz.2.2492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1730.300563][ T29] audit: type=1400 audit(1730.230:35077): avc: denied { map_create } for pid=13696 comm="syz.2.2492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1730.312989][ T29] audit: type=1400 audit(1730.240:35078): avc: denied { perfmon } for pid=13696 comm="syz.2.2492" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1730.318537][ T29] audit: type=1400 audit(1730.250:35079): avc: denied { map_read map_write } for pid=13696 comm="syz.2.2492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1731.035527][T13701] fuse: Bad value for 'fd' [ 1736.378168][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 1736.379271][ T29] audit: type=1400 audit(1736.310:35096): avc: denied { unmount } for pid=7536 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1736.524777][ T29] audit: type=1400 audit(1736.460:35097): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1736.533736][ T29] audit: type=1400 audit(1736.460:35098): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1736.538870][ T29] audit: type=1400 audit(1736.470:35099): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1736.713121][ T29] audit: type=1400 audit(1736.640:35100): avc: denied { read } for pid=13718 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1736.747080][ T29] audit: type=1400 audit(1736.680:35101): avc: denied { mounton } for pid=13717 comm="syz.2.2499" path="/proc/249/task" dev="proc" ino=30305 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 1736.752094][ T29] audit: type=1400 audit(1736.680:35102): avc: denied { mounton } for pid=13718 comm="syz.1.2500" path="/572/file0" dev="tmpfs" ino=3006 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1736.756254][T13721] fuse: Bad value for 'fd' [ 1736.783031][ T29] audit: type=1400 audit(1736.710:35103): avc: denied { mount } for pid=13717 comm="syz.2.2499" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1736.794951][ T29] audit: type=1400 audit(1736.730:35104): avc: denied { execmem } for pid=13717 comm="syz.2.2499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1736.953782][ T29] audit: type=1400 audit(1736.890:35105): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1739.381769][T13742] netlink: 32 bytes leftover after parsing attributes in process `syz.2.2507'. [ 1741.410806][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 1741.413503][ T29] audit: type=1400 audit(1741.340:35153): avc: denied { read write } for pid=13759 comm="syz.2.2515" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1741.429809][ T29] audit: type=1400 audit(1741.360:35154): avc: denied { read write open } for pid=13759 comm="syz.2.2515" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1741.806119][ T29] audit: type=1400 audit(1741.740:35155): avc: denied { unmount } for pid=7536 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1741.886051][ T29] audit: type=1400 audit(1741.820:35156): avc: denied { read write } for pid=13763 comm="syz.2.2517" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1741.890763][ T29] audit: type=1400 audit(1741.820:35157): avc: denied { read write open } for pid=13763 comm="syz.2.2517" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1741.904884][ T29] audit: type=1400 audit(1741.840:35158): avc: denied { mounton } for pid=13763 comm="syz.2.2517" path="/121/file0" dev="tmpfs" ino=656 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1741.915664][ T29] audit: type=1400 audit(1741.850:35159): avc: denied { mount } for pid=13763 comm="syz.2.2517" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1741.923916][ T29] audit: type=1400 audit(1741.860:35160): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1741.928750][ T29] audit: type=1400 audit(1741.860:35161): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1741.933947][ T29] audit: type=1400 audit(1741.870:35162): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1744.684308][T13785] fuse: Bad value for 'fd' [ 1746.188171][T13797] fuse: Bad value for 'fd' [ 1746.461918][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 1746.465563][ T29] audit: type=1400 audit(1746.390:35216): avc: denied { read } for pid=13799 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1746.539044][T13800] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2529'. [ 1746.658249][ T29] audit: type=1400 audit(1746.590:35217): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1746.670503][ T29] audit: type=1400 audit(1746.600:35218): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1746.684998][ T29] audit: type=1400 audit(1746.610:35219): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1746.890541][ T29] audit: type=1400 audit(1746.820:35220): avc: denied { read } for pid=13801 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1746.948362][ T29] audit: type=1400 audit(1746.880:35221): avc: denied { read write } for pid=13801 comm="syz.1.2530" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1746.953725][ T29] audit: type=1400 audit(1746.890:35222): avc: denied { read write open } for pid=13801 comm="syz.1.2530" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1746.967762][ T29] audit: type=1400 audit(1746.900:35223): avc: denied { module_request } for pid=13801 comm="syz.1.2530" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1747.275214][ T29] audit: type=1400 audit(1747.210:35224): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1747.280136][ T29] audit: type=1400 audit(1747.210:35225): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1748.645431][T13811] fuse: Bad value for 'fd' [ 1751.623213][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 1751.624214][ T29] audit: type=1400 audit(1751.550:35260): avc: denied { read } for pid=13823 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1751.698430][ T29] audit: type=1400 audit(1751.630:35261): avc: denied { read write } for pid=13823 comm="syz.1.2538" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1751.707326][ T29] audit: type=1400 audit(1751.640:35262): avc: denied { read write open } for pid=13823 comm="syz.1.2538" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1751.960355][ T29] audit: type=1400 audit(1751.890:35263): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1751.980945][ T29] audit: type=1400 audit(1751.910:35264): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1751.997585][ T29] audit: type=1400 audit(1751.930:35265): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1752.383454][ T29] audit: type=1400 audit(1752.310:35266): avc: denied { read } for pid=13825 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1752.433960][ T29] audit: type=1400 audit(1752.370:35267): avc: denied { create } for pid=13825 comm="syz.1.2539" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1752.439092][ T29] audit: type=1400 audit(1752.370:35268): avc: denied { ioctl } for pid=13825 comm="syz.1.2539" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=30449 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1752.457104][ T29] audit: type=1400 audit(1752.390:35269): avc: denied { ioctl } for pid=13825 comm="syz.1.2539" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=30449 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1756.946194][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 1756.947215][ T29] audit: type=1400 audit(1756.880:35298): avc: denied { mounton } for pid=13838 comm="syz.1.2543" path="/589/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 1756.958343][ T29] audit: type=1400 audit(1756.890:35299): avc: denied { mount } for pid=13838 comm="syz.1.2543" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1757.037368][ T29] audit: type=1400 audit(1756.970:35300): avc: denied { read write } for pid=13842 comm="syz.2.2544" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1757.041228][ T29] audit: type=1400 audit(1756.970:35301): avc: denied { read write open } for pid=13842 comm="syz.2.2544" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1757.057783][ T29] audit: type=1400 audit(1756.990:35302): avc: denied { mounton } for pid=13842 comm="syz.2.2544" path="/134/file0" dev="tmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1757.089341][ T29] audit: type=1400 audit(1757.020:35303): avc: denied { mount } for pid=13842 comm="syz.2.2544" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1759.663059][ T29] audit: type=1400 audit(1759.590:35304): avc: denied { unmount } for pid=12710 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1759.966823][ T29] audit: type=1400 audit(1759.900:35305): avc: denied { bpf } for pid=13848 comm="syz.2.2545" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1759.987091][ T29] audit: type=1400 audit(1759.920:35306): avc: denied { allowed } for pid=13848 comm="syz.2.2545" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1760.650586][ T29] audit: type=1400 audit(1760.580:35307): avc: denied { execmem } for pid=13852 comm="syz.2.2547" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1760.680622][T13853] tmpfs: Unsupported parameter 'huge' [ 1763.528237][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 1763.529222][ T29] audit: type=1400 audit(1763.460:35317): avc: denied { unmount } for pid=12710 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1764.101505][ T29] audit: type=1400 audit(1764.030:35318): avc: denied { create } for pid=13861 comm="syz.2.2550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1764.118768][ T29] audit: type=1400 audit(1764.050:35319): avc: denied { write } for pid=13861 comm="syz.2.2550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1764.432759][ T29] audit: type=1400 audit(1764.360:35320): avc: denied { name_bind } for pid=13863 comm="syz.2.2551" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1764.437576][ T29] audit: type=1400 audit(1764.370:35321): avc: denied { node_bind } for pid=13863 comm="syz.2.2551" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1767.188509][ T29] audit: type=1400 audit(1767.120:35322): avc: denied { unmount } for pid=7536 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1767.245978][T13868] ip6gre1: entered allmulticast mode [ 1767.250101][ T2655] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 1767.293034][ T29] audit: type=1400 audit(1767.220:35323): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1767.293240][ T29] audit: type=1400 audit(1767.220:35324): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1767.296175][ T29] audit: type=1400 audit(1767.220:35325): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1767.456740][ T29] audit: type=1400 audit(1767.390:35326): avc: denied { read } for pid=13871 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1768.570281][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 1768.573924][ T29] audit: type=1400 audit(1768.500:35348): avc: denied { mounton } for pid=13877 comm="syz.2.2557" path="/145/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 1768.587077][ T29] audit: type=1400 audit(1768.520:35349): avc: denied { mount } for pid=13877 comm="syz.2.2557" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1768.651482][ T29] audit: type=1400 audit(1768.580:35350): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1768.657226][ T29] audit: type=1400 audit(1768.590:35351): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1768.663406][ T29] audit: type=1400 audit(1768.590:35352): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1769.065861][ T29] audit: type=1400 audit(1768.970:35353): avc: denied { read } for pid=13885 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1769.190848][ T29] audit: type=1400 audit(1769.120:35354): avc: denied { create } for pid=13885 comm="syz.1.2559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1769.255322][ T29] audit: type=1400 audit(1769.190:35355): avc: denied { map_create } for pid=13885 comm="syz.1.2559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1769.261341][ T29] audit: type=1400 audit(1769.190:35356): avc: denied { map_read map_write } for pid=13885 comm="syz.1.2559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1769.297581][ T29] audit: type=1400 audit(1769.230:35357): avc: denied { map_create } for pid=13885 comm="syz.1.2559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1771.343080][ C0] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 1773.584920][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 1773.593567][ T29] audit: type=1400 audit(1773.520:35388): avc: denied { read } for pid=13891 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1773.844244][ T29] audit: type=1400 audit(1773.780:35389): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1773.894221][ T29] audit: type=1400 audit(1773.830:35390): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1773.900066][ T29] audit: type=1400 audit(1773.830:35391): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1774.411863][ T29] audit: type=1400 audit(1774.340:35392): avc: denied { read } for pid=13893 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1774.987269][ T29] audit: type=1400 audit(1774.890:35393): avc: denied { read write } for pid=7536 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1775.064824][ T29] audit: type=1400 audit(1775.000:35394): avc: denied { read write open } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1775.070197][ T29] audit: type=1400 audit(1775.000:35395): avc: denied { ioctl } for pid=7536 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1775.404707][ T29] audit: type=1400 audit(1775.340:35396): avc: denied { read } for pid=13895 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1775.453780][ T29] audit: type=1400 audit(1775.390:35397): avc: denied { read write } for pid=13895 comm="syz.1.2564" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1778.741211][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 1778.741668][ T29] audit: type=1400 audit(1778.670:35411): avc: denied { write } for pid=13899 comm="syz.1.2565" name="route" dev="proc" ino=4026532759 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1778.757307][ T29] audit: type=1400 audit(1778.690:35412): avc: denied { write } for pid=13899 comm="syz.1.2565" path="/proc/1469/net/route" dev="proc" ino=4026532759 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1778.782613][ T29] audit: type=1400 audit(1778.710:35413): avc: denied { prog_load } for pid=13899 comm="syz.1.2565" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1778.788215][ T29] audit: type=1400 audit(1778.720:35414): avc: denied { bpf } for pid=13899 comm="syz.1.2565" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1778.863403][ T29] audit: type=1400 audit(1778.790:35415): avc: denied { unmount } for pid=12710 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 1779.360106][ T29] audit: type=1400 audit(1779.290:35416): avc: denied { create } for pid=13907 comm="syz.2.2567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1779.381088][ T29] audit: type=1400 audit(1779.310:35417): avc: denied { setopt } for pid=13907 comm="syz.2.2567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1779.582176][ T29] audit: type=1400 audit(1779.510:35418): avc: denied { prog_load } for pid=13909 comm="syz.2.2568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1779.587642][ T29] audit: type=1400 audit(1779.520:35419): avc: denied { bpf } for pid=13909 comm="syz.2.2568" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1779.597027][ T29] audit: type=1400 audit(1779.530:35420): avc: denied { create } for pid=13909 comm="syz.2.2568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1780.392907][ C0] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 1781.263747][T13542] bond2 (unregistering): (slave macvlan2): Removing an active aggregator [ 1781.267484][T13542] bond2 (unregistering): (slave macvlan2): Releasing backup interface [ 1781.390622][T13542] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1781.454696][T13542] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1781.458316][T13542] bond0 (unregistering): Released all slaves [ 1781.495839][T13542] bond1 (unregistering): Released all slaves [ 1781.528460][T13542] bond2 (unregistering): Released all slaves [ 1781.756155][T13542] hsr_slave_0: left promiscuous mode [ 1781.766042][T13542] hsr_slave_1: left promiscuous mode [ 1781.824768][T13542] pim6reg (unregistering): left allmulticast mode [ 1784.067488][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 1784.068044][ T29] audit: type=1400 audit(1784.000:35464): avc: denied { write } for pid=13937 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1784.076539][ T29] audit: type=1400 audit(1784.010:35465): avc: denied { write open } for pid=13937 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1784.277903][ T29] audit: type=1400 audit(1784.210:35466): avc: denied { read write } for pid=13939 comm="syz.2.2573" name="vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 1784.336304][ T29] audit: type=1400 audit(1784.270:35467): avc: denied { read write open } for pid=13939 comm="syz.2.2573" path="/dev/vhost-net" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 1784.340315][ T29] audit: type=1400 audit(1784.270:35468): avc: denied { ioctl } for pid=13939 comm="syz.2.2573" path="/dev/vhost-net" dev="devtmpfs" ino=709 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:syslogd_initrc_exec_t:s0" [ 1784.463362][ T29] audit: type=1400 audit(1784.400:35469): avc: denied { module_request } for pid=13916 comm="syz-executor" kmod="netdev-rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1785.118669][ T29] audit: type=1400 audit(1785.050:35470): avc: denied { sys_module } for pid=13916 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1785.135295][ T29] audit: type=1400 audit(1785.070:35471): avc: denied { module_request } for pid=13916 comm="syz-executor" kmod="rose1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1785.354276][ T29] audit: type=1400 audit(1785.290:35472): avc: denied { write } for pid=13941 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1785.356945][ T29] audit: type=1400 audit(1785.290:35473): avc: denied { write open } for pid=13941 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1789.287009][ T29] kauditd_printk_skb: 198 callbacks suppressed [ 1789.293132][ T29] audit: type=1400 audit(1789.220:35672): avc: denied { module_request } for pid=13916 comm="syz-executor" kmod="rtnl-link-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1789.721360][ T29] audit: type=1400 audit(1789.650:35673): avc: denied { search } for pid=13995 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1789.721950][ T29] audit: type=1400 audit(1789.650:35674): avc: denied { search } for pid=13995 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1789.722049][ T29] audit: type=1400 audit(1789.650:35675): avc: denied { search } for pid=13995 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1789.735734][ T29] audit: type=1400 audit(1789.670:35676): avc: denied { getattr } for pid=13995 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth5.link" dev="tmpfs" ino=75 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1789.807010][ T29] audit: type=1400 audit(1789.680:35677): avc: denied { search } for pid=13995 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1789.848503][ T29] audit: type=1400 audit(1789.680:35678): avc: denied { search } for pid=13995 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1789.883488][ T29] audit: type=1400 audit(1789.680:35679): avc: denied { search } for pid=13995 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1789.885160][ T29] audit: type=1400 audit(1789.680:35680): avc: denied { search } for pid=13995 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1789.886669][ T29] audit: type=1400 audit(1789.680:35681): avc: denied { remove_name search } for pid=13995 comm="rm" name="resolv.conf.eth5.link" dev="tmpfs" ino=75 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1794.473187][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 1794.479880][ T29] audit: type=1400 audit(1794.410:35714): avc: denied { sys_module } for pid=13916 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1794.481154][ T29] audit: type=1400 audit(1794.410:35715): avc: denied { module_request } for pid=13916 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1794.732286][ T29] audit: type=1400 audit(1794.660:35716): avc: denied { write } for pid=14023 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1794.743618][ T29] audit: type=1400 audit(1794.680:35717): avc: denied { write open } for pid=14023 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1795.369714][ T29] audit: type=1400 audit(1795.300:35718): avc: denied { write } for pid=14074 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1795.371710][ T29] audit: type=1400 audit(1795.300:35719): avc: denied { write open } for pid=14074 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1795.577222][ T29] audit: type=1400 audit(1795.510:35720): avc: denied { search } for pid=14074 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1795.579468][ T29] audit: type=1400 audit(1795.510:35721): avc: denied { search } for pid=14074 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1795.591534][ T29] audit: type=1400 audit(1795.510:35722): avc: denied { search } for pid=14074 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1795.614254][ T29] audit: type=1400 audit(1795.510:35723): avc: denied { search } for pid=14074 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1797.589624][T13916] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1797.625333][T13916] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1798.302870][ C0] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 1799.547847][ T29] kauditd_printk_skb: 232 callbacks suppressed [ 1799.554940][ T29] audit: type=1400 audit(1799.480:35956): avc: denied { module_request } for pid=13916 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1799.562871][ T29] audit: type=1400 audit(1799.490:35957): avc: denied { search } for pid=14121 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1799.563885][ T29] audit: type=1400 audit(1799.490:35958): avc: denied { search } for pid=14121 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1799.564748][ T29] audit: type=1400 audit(1799.490:35959): avc: denied { search } for pid=14121 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1799.851629][ T29] audit: type=1400 audit(1799.780:35960): avc: denied { search } for pid=14074 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1800.064164][ T29] audit: type=1400 audit(1799.990:35961): avc: denied { allowed } for pid=14126 comm="syz.2.2587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1800.095366][ T29] audit: type=1400 audit(1800.030:35962): avc: denied { create } for pid=14126 comm="syz.2.2587" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1800.173448][ T29] audit: type=1400 audit(1800.100:35963): avc: denied { allowed } for pid=14126 comm="syz.2.2587" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1800.217178][ T29] audit: type=1400 audit(1800.150:35964): avc: denied { create } for pid=14126 comm="syz.2.2587" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1800.590679][ T29] audit: type=1400 audit(1800.520:35965): avc: denied { sys_module } for pid=13916 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1800.937563][T14131] fuse: Bad value for 'fd' [ 1803.267657][T14157] fuse: Unknown parameter 'group_id00000000000000000000' [ 1804.104922][T14160] fuse: Bad value for 'fd' [ 1804.559763][ T29] kauditd_printk_skb: 80 callbacks suppressed [ 1804.560935][ T29] audit: type=1400 audit(1804.490:36046): avc: denied { search } for pid=14161 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1804.563267][ T29] audit: type=1400 audit(1804.490:36047): avc: denied { search } for pid=14161 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1804.564923][ T29] audit: type=1400 audit(1804.490:36048): avc: denied { search } for pid=14161 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1804.566572][ T29] audit: type=1400 audit(1804.490:36049): avc: denied { search } for pid=14161 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1804.610019][ T29] audit: type=1400 audit(1804.540:36050): avc: denied { search } for pid=14161 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1804.616945][ T29] audit: type=1400 audit(1804.540:36051): avc: denied { search } for pid=14161 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1804.618395][ T29] audit: type=1400 audit(1804.540:36052): avc: denied { search } for pid=14161 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1804.619769][ T29] audit: type=1400 audit(1804.540:36053): avc: denied { read open } for pid=14161 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1804.661413][ T29] audit: type=1400 audit(1804.590:36054): avc: denied { getattr } for pid=14161 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1804.732934][ T29] audit: type=1400 audit(1804.660:36055): avc: denied { search } for pid=14161 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1805.540239][T13916] hsr_slave_0: entered promiscuous mode [ 1805.555402][T13916] hsr_slave_1: entered promiscuous mode [ 1805.564127][T13916] debugfs: 'hsr0' already exists in 'hsr' [ 1805.564965][T13916] Cannot create hsr debugfs directory [ 1808.044319][T13916] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 1808.079631][T13916] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 1808.139004][T13916] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 1808.267209][T13916] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 1809.629381][ T29] kauditd_printk_skb: 168 callbacks suppressed [ 1809.633402][ T29] audit: type=1400 audit(1809.560:36224): avc: denied { module_request } for pid=14292 comm="syz.2.2597" kmod="net-pf-10-proto-0-type-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1809.805472][ T29] audit: type=1400 audit(1809.730:36225): avc: denied { search } for pid=14294 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1809.813567][ T29] audit: type=1400 audit(1809.740:36226): avc: denied { search } for pid=14294 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1809.814044][ T29] audit: type=1400 audit(1809.750:36227): avc: denied { search } for pid=14294 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1810.131227][ T29] audit: type=1400 audit(1810.050:36228): avc: denied { search } for pid=14156 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1810.315379][ T29] audit: type=1400 audit(1810.250:36229): avc: denied { module_request } for pid=14292 comm="syz.2.2597" kmod="net-pf-10-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1810.449306][ T29] audit: type=1400 audit(1810.380:36230): avc: denied { module_request } for pid=13916 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1810.577538][ T29] audit: type=1400 audit(1810.510:36231): avc: denied { module_request } for pid=14292 comm="syz.2.2597" kmod="net-pf-10-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1811.175449][ T29] audit: type=1400 audit(1811.110:36232): avc: denied { sys_module } for pid=13916 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1811.187346][ T29] audit: type=1400 audit(1811.120:36233): avc: denied { module_request } for pid=13916 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1812.699214][T13916] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1814.735515][ T29] kauditd_printk_skb: 242 callbacks suppressed [ 1814.741835][ T29] audit: type=1400 audit(1814.670:36476): avc: denied { module_request } for pid=13916 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1814.914950][ T29] audit: type=1400 audit(1814.850:36477): avc: denied { write } for pid=14329 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1814.918102][ T29] audit: type=1400 audit(1814.850:36478): avc: denied { write open } for pid=14329 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1814.949766][ T29] audit: type=1400 audit(1814.880:36479): avc: denied { search } for pid=14329 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1814.953410][ T29] audit: type=1400 audit(1814.880:36480): avc: denied { search } for pid=14329 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1814.955884][ T29] audit: type=1400 audit(1814.890:36481): avc: denied { search } for pid=14329 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1814.958193][ T29] audit: type=1400 audit(1814.890:36482): avc: denied { search } for pid=14329 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1815.099932][ T29] audit: type=1400 audit(1815.030:36483): avc: denied { search } for pid=14331 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1815.114743][ T29] audit: type=1400 audit(1815.030:36484): avc: denied { search } for pid=14331 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1815.117343][ T29] audit: type=1400 audit(1815.030:36485): avc: denied { search } for pid=14331 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1819.793270][ T29] kauditd_printk_skb: 623 callbacks suppressed [ 1819.796953][ T29] audit: type=1400 audit(1819.720:37109): avc: denied { module_request } for pid=13916 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1819.963871][ T29] audit: type=1400 audit(1819.890:37110): avc: denied { search } for pid=14366 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1819.969548][ T29] audit: type=1400 audit(1819.900:37111): avc: denied { read } for pid=14366 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1819.971570][ T29] audit: type=1400 audit(1819.900:37112): avc: denied { read open } for pid=14366 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1819.980459][ T29] audit: type=1400 audit(1819.910:37113): avc: denied { search } for pid=14366 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1819.993097][ T29] audit: type=1400 audit(1819.910:37114): avc: denied { search } for pid=14366 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1819.997120][ T29] audit: type=1400 audit(1819.910:37115): avc: denied { search } for pid=14366 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1820.005346][ T29] audit: type=1400 audit(1819.940:37116): avc: denied { read } for pid=14366 comm="cmp" name="resolv.conf.eth6.dhcp" dev="tmpfs" ino=81 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1820.008150][ T29] audit: type=1400 audit(1819.940:37117): avc: denied { read open } for pid=14366 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth6.dhcp" dev="tmpfs" ino=81 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1820.011926][ T29] audit: type=1400 audit(1819.940:37118): avc: denied { getattr } for pid=14366 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1821.044894][T14382] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2605'. [ 1821.056148][T14382] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2605'. [ 1822.350878][T13916] veth0_vlan: entered promiscuous mode [ 1822.474740][T13916] veth1_vlan: entered promiscuous mode [ 1822.842279][T13916] veth0_macvtap: entered promiscuous mode [ 1822.891924][T13916] veth1_macvtap: entered promiscuous mode [ 1823.128305][T13565] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1823.130078][T13565] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1823.136984][T13565] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1823.139231][T13565] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1824.808131][ T29] kauditd_printk_skb: 289 callbacks suppressed [ 1824.808605][ T29] audit: type=1400 audit(1824.740:37408): avc: denied { search } for pid=14409 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1824.809216][ T29] audit: type=1400 audit(1824.740:37409): avc: denied { search } for pid=14409 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1824.809556][ T29] audit: type=1400 audit(1824.740:37410): avc: denied { search } for pid=14409 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1824.813505][ T29] audit: type=1400 audit(1824.740:37411): avc: denied { read open } for pid=14409 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1824.818527][ T29] audit: type=1400 audit(1824.750:37412): avc: denied { getattr } for pid=14409 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1824.826729][ T29] audit: type=1400 audit(1824.760:37413): avc: denied { search } for pid=14409 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1824.833181][ T29] audit: type=1400 audit(1824.760:37414): avc: denied { search } for pid=14409 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1824.833576][ T29] audit: type=1400 audit(1824.760:37415): avc: denied { search } for pid=14409 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1824.833691][ T29] audit: type=1400 audit(1824.760:37416): avc: denied { search } for pid=14409 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1824.836299][ T29] audit: type=1400 audit(1824.770:37417): avc: denied { search } for pid=14409 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1827.393547][T14420] fuse: Unknown parameter 'grou00000000000000000000' [ 1829.833529][ T29] kauditd_printk_skb: 418 callbacks suppressed [ 1829.835390][ T29] audit: type=1400 audit(1829.760:37836): avc: denied { search } for pid=14428 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1829.844688][ T29] audit: type=1400 audit(1829.780:37837): avc: denied { search } for pid=14428 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1829.847616][ T29] audit: type=1400 audit(1829.780:37838): avc: denied { search } for pid=14428 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1829.849472][ T29] audit: type=1400 audit(1829.780:37839): avc: denied { search } for pid=14428 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1829.851232][ T29] audit: type=1400 audit(1829.780:37840): avc: denied { search } for pid=14428 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1829.855883][ T29] audit: type=1400 audit(1829.780:37841): avc: denied { search } for pid=14428 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1829.858507][ T29] audit: type=1400 audit(1829.780:37842): avc: denied { search } for pid=14428 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1829.867106][ T29] audit: type=1400 audit(1829.800:37843): avc: denied { read open } for pid=14428 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1829.870191][ T29] audit: type=1400 audit(1829.800:37844): avc: denied { getattr } for pid=14428 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1829.885997][ T29] audit: type=1400 audit(1829.820:37845): avc: denied { search } for pid=14428 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1831.357059][T14432] ------------[ cut here ]------------ [ 1831.357931][T14432] WARNING: mm/highmem.c:622 at kunmap_local_indexed+0x294/0x2e8, CPU#0: syz.1.2613/14432 [ 1831.361401][T14432] Modules linked in: [ 1831.365388][T14432] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1831.366751][T14432] CPU: 0 UID: 0 PID: 14432 Comm: syz.1.2613 Tainted: G L syzkaller #0 PREEMPT [ 1831.367396][T14432] Tainted: [L]=SOFTLOCKUP [ 1831.367612][T14432] Hardware name: ARM-Versatile Express [ 1831.367889][T14432] Call trace: [ 1831.368128][T14432] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 1831.368680][T14432] r7:82283ac4 r6:83ea4800 r5:00000000 r4:82295878 [ 1831.369131][T14432] [<80201b58>] (show_stack) from [<8021ee18>] (dump_stack_lvl+0x54/0x7c) [ 1831.369446][T14432] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 1831.369815][T14432] r5:00000000 r4:82a7bd14 [ 1831.370013][T14432] [<8021ee40>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 1831.370322][T14432] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 1831.370669][T14432] r7:804d0480 [ 1831.370855][T14432] [<80202850>] (panic) from [<802520b0>] (get_taint+0x0/0x1c) [ 1831.371264][T14432] r3:8280c704 r2:00000001 r1:8227c02c r0:82283ac4 [ 1831.371499][T14432] [<80252038>] (check_panic_on_warn) from [<80252228>] (__warn+0x94/0x1a4) [ 1831.371822][T14432] [<80252194>] (__warn) from [<802524b0>] (warn_slowpath_fmt+0x178/0x1f4) [ 1831.372304][T14432] r8:00000009 r7:822b04e0 r6:e0189d34 r5:83ea4800 r4:00000000 [ 1831.372763][T14432] [<8025233c>] (warn_slowpath_fmt) from [<804d0480>] (kunmap_local_indexed+0x294/0x2e8) [ 1831.373279][T14432] r10:8280ca28 r9:e0189e68 r8:00200000 r7:ffefe000 r6:00000001 r5:83ea4800 [ 1831.373617][T14432] r4:ffefe000 [ 1831.373801][T14432] [<804d01ec>] (kunmap_local_indexed) from [<80534e58>] (break_ksm_pmd_entry+0x168/0x270) [ 1831.374231][T14432] r7:ffefe000 r6:00200000 r5:04600000 r4:00000000 [ 1831.374464][T14432] [<80534cf0>] (break_ksm_pmd_entry) from [<804e9f0c>] (walk_pgd_range+0x3dc/0x63c) [ 1831.374832][T14432] r10:81c1f394 r9:001ee000 r8:e0189e68 r7:80534cf0 r6:8cd01000 r5:00200000 [ 1831.375160][T14432] r4:002e8000 [ 1831.375369][T14432] [<804e9b30>] (walk_pgd_range) from [<804ea1b0>] (__walk_page_range+0x44/0x64) [ 1831.375925][T14432] r10:00000000 r9:83ea4800 r8:81c1f394 r7:002e8000 r6:001ee000 r5:e0189e68 [ 1831.376316][T14432] r4:8cdb1500 [ 1831.376488][T14432] [<804ea16c>] (__walk_page_range) from [<804ea894>] (walk_page_range_vma_unsafe+0xb4/0x24c) [ 1831.376903][T14432] r9:83ea4800 r8:00000000 r7:81c1f394 r6:002e8000 r5:001ee000 r4:8cdb1500 [ 1831.377223][T14432] [<804ea7e0>] (walk_page_range_vma_unsafe) from [<804eaa58>] (walk_page_range_vma+0x2c/0x34) [ 1831.377635][T14432] r7:e0189ecc r6:002e8000 r5:81c1f394 r4:8cdb1500 [ 1831.377921][T14432] [<804eaa2c>] (walk_page_range_vma) from [<80533c9c>] (break_ksm+0x5c/0x9c) [ 1831.378329][T14432] [<80533c40>] (break_ksm) from [<80534914>] (ksm_del_vmas+0x7c/0x108) [ 1831.378700][T14432] r7:00000000 r6:00000000 r5:00000043 r4:8cdb1500 [ 1831.378971][T14432] [<80534898>] (ksm_del_vmas) from [<80539368>] (ksm_disable_merge_any+0x2c/0x54) [ 1831.379350][T14432] r4:84f07840 [ 1831.379509][T14432] [<8053933c>] (ksm_disable_merge_any) from [<802705f8>] (sys_prctl+0xa14/0xb8c) [ 1831.379885][T14432] r5:00000043 r4:84f07840 [ 1831.380115][T14432] [<8026fbe4>] (sys_prctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1831.380459][T14432] Exception stack(0xe0189fa8 to 0xe0189ff0) [ 1831.380735][T14432] 9fa0: 00000000 00000000 00000043 00000000 00000000 00000000 [ 1831.381089][T14432] 9fc0: 00000000 00000000 0031644c 000000ac 00300000 00000000 00006364 76f9e0bc [ 1831.381418][T14432] 9fe0: 76f9dec0 76f9deb0 0001929c 00132320 [ 1831.381692][T14432] r10:000000ac r9:83ea4800 r8:8020029c r7:000000ac r6:0031644c r5:00000000 [ 1831.382006][T14432] r4:00000000 [ 1831.384761][T14432] Rebooting in 86400 seconds..