last executing test programs: 35m9.663859337s ago: executing program 32 (id=3858): prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000340)={@cgroup=r3, 0xffffffffffffffff, 0x12, 0x0, 0x0, @void, @value=0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000000380)=@filter={'filter\x00', 0xc, 0x4, 0x268, 0xffffffff, 0x130, 0x0, 0x98, 0x98, 0xffffffff, 0x1d0, 0x98, 0x1d0, 0x98, 0x4, 0x0, {[{{@uncond, 0x0, 0x70, 0x98}, @REJECT={0x28}}, {{@uncond, 0x0, 0x70, 0x98}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@ip={@local, @broadcast, 0x0, 0x0, 'ip6tnl0\x00', 'hsr0\x00'}, 0x0, 0x70, 0xa0}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2c8) 30m5.338334677s ago: executing program 33 (id=4076): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x2000000000000013, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xba, &(0x7f0000000140)=""/185, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0xec) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xd0, &(0x7f0000004680)=0x80, 0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) syz_io_uring_setup(0x283d, &(0x7f0000000380)={0x0, 0xb173, 0x200, 0x3, 0xce}, &(0x7f0000000100), &(0x7f0000000400)) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r3, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x42}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f0000000040)='bic', 0xff3d) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000000)=[@mss, @sack_perm, @window={0x3, 0x7}, @mss={0x2, 0xfff}, @window={0x3, 0x0, 0x401}, @window], 0x20000000000000e4) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r3, &(0x7f0000000000), 0xffffffffffffff94, 0xb, 0x0, 0x0) prctl$PR_GET_TSC(0x43, &(0x7f0000000040)) mknod$loop(&(0x7f0000000140)='./file0\x00', 0xfff, 0x0) 26m56.347679701s ago: executing program 3 (id=4230): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100"/259], 0x119) syz_usb_connect$cdc_ecm(0x5, 0x4d, &(0x7f00000011c0)=ANY=[@ANYBLOB="12010000020000402505a1a44000000001010902"], 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000000), 0x0, 0x81) ioctl$HIDIOCSFEATURE(r1, 0xc0404806, &(0x7f0000000040)) 26m55.90266735s ago: executing program 3 (id=4231): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000400)) bpf$PROG_LOAD(0x5, &(0x7f00000015c0)={0x13, 0x0, 0x0, &(0x7f0000000180)='GPL\x00', 0x8423054e, 0x0, 0x0, 0x41100, 0x4a, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffb000/0x3000)=nil, 0x3000, &(0x7f0000000240)='}\x00') ptrace$setregset(0x4205, 0xffffffffffffffff, 0x2, &(0x7f0000000040)={&(0x7f0000000440)="6ddcc5a92fa4327753b749acd8563231d9d34899089c7366dd183975f76b7c4a4479de47295d0f9b3fddaebed2ce522a5fcb29551f60e36e4b4ac245e92e5f29bdf161811e4813d3c6aac2cad4ccaa3f4226", 0x52}) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs={0x0, 0x0, 0x40}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$inet6(0xa, 0x1, 0x6) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000740)=@raw={'raw\x00', 0x3c1, 0x3, 0x408, 0x230, 0x12, 0x60a, 0x0, 0x202, 0x338, 0x2e8, 0x2e8, 0x338, 0x2c0, 0x4, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @dev}, @mcast2, [], [], 'veth1_to_bond\x00', 'xfrm0\x00'}, 0x0, 0x108, 0x230, 0x0, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket2={{0x28}}]}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x57c, 'system_u:object_r:file_context_t:s0\x00'}}}, {{@ipv6={@private2, @loopback, [], [], 'vxcan1\x00', 'geneve0\x00'}, 0x0, 0xa8, 0x108}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv4=@empty, [], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x39e}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x468) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000340)={@private0={0xfc, 0x0, '\x00', 0x1}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast2, 0xc, 0x0, 0xdb, 0x80, 0x5, 0x400110}) 26m43.620687048s ago: executing program 3 (id=4235): r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100"/259], 0x119) syz_usb_connect$cdc_ecm(0x5, 0x4d, &(0x7f00000011c0)=ANY=[@ANYBLOB="12010000020000402505a1a44000000001010902"], 0x0) r1 = syz_open_dev$hidraw(&(0x7f0000000000), 0x0, 0x81) ioctl$HIDIOCSFEATURE(r1, 0xc0404806, &(0x7f0000000040)) 26m43.306312078s ago: executing program 3 (id=4236): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="010000000b000000be00000001"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r0, 0xffffffffffffffff}, &(0x7f0000000100), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r1, &(0x7f00000000c0), 0x0}, 0x20) 26m43.106076671s ago: executing program 3 (id=4237): r0 = syz_open_dev$evdev(&(0x7f000001fa80), 0x20000000, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, 0x0) 26m42.869908897s ago: executing program 3 (id=4238): bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x18, 0x8, 0x40, 0x42, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0) 25m53.988054941s ago: executing program 34 (id=4238): bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x9, 0x18, 0x8, 0x40, 0x42, 0x1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x0, 0x0) 23m51.732969265s ago: executing program 4 (id=4300): quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000300)=@filter={'filter\x00', 0x42, 0x4, 0x2d0, 0xffffffff, 0x1e8, 0x2b8, 0x118, 0xffffffff, 0xffffffff, 0x2b8, 0x2b8, 0x2b8, 0xffffffff, 0x4, 0x0, {[{{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x0, 0x0, 'veth0_to_batadv\x00', 'vlan0\x00', {0xff}, {0xff}, 0x84, 0x0, 0x2}, 0x0, 0x70, 0x98, 0x0, {0x100000000000000}}, @REJECT={0x28}}, {{@ip={@loopback, @rand_addr=0x64010101, 0xffffff00, 0xff000000, 'geneve0\x00', 'macvlan0\x00', {0xff}, {}, 0x2, 0x0, 0x4}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @multicast, 0x3, 0x3, [0x2, 0x2c, 0x4, 0x2, 0x12, 0x22, 0x16, 0x10, 0x35, 0x1a, 0x0, 0x3e, 0x9, 0x30, 0x24, 0x39], 0x1, 0x6, 0x6}}}, {{@ip={@private=0xa010101, @loopback, 0xff, 0xffffff00, 'bond0\x00', 'ipvlan0\x00', {}, {}, 0x2f, 0x2, 0x21}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, 0xd, 0x8, [0xa, 0x26, 0x2a, 0xa, 0x13, 0xd, 0x2d, 0x21, 0x2d, 0x32, 0x40, 0x20, 0x28, 0x18, 0x26, 0x1e], 0x1, 0x0, 0x6}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x330) 23m51.102940126s ago: executing program 4 (id=4301): unshare(0x60040000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4e, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) unshare(0x6a040000) syz_emit_ethernet(0x46, &(0x7f0000000000)={@link_local={0x3}, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x0, 0x0, 0x12, 0x0, 0x3f18, {0x5, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @loopback, @loopback}, "00186371ae9b1c03"}}}}}, 0x0) 23m50.369812433s ago: executing program 4 (id=4303): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0xeffffb, 0x0, 0xfffffffd, 0x1}, 0x10) write(r0, &(0x7f0000000000)="240000001a005f0214f9f407000904001f000040fe000000000000000800040001000000", 0x24) 23m49.997978678s ago: executing program 4 (id=4305): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) recvmmsg(r0, &(0x7f0000009c40)=[{{0x0, 0x0, 0x0}, 0x6}, {{0x0, 0x0, 0x0}, 0x101}], 0x2, 0x0, 0x0) 23m49.610742303s ago: executing program 4 (id=4306): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 23m30.780949244s ago: executing program 4 (id=4315): prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x10, 0x4, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r3, &(0x7f0000000780), 0x0}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) unshare(0x42000000) 22m41.665804983s ago: executing program 35 (id=4315): prlimit64(0x0, 0xe, &(0x7f0000000780)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000240)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0x12, 0x10, 0x4, 0x2}, 0x50) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000040)={r3, &(0x7f0000000780), 0x0}, 0x20) socket$inet_udp(0x2, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) unshare(0x42000000) 20m48.174721065s ago: executing program 2 (id=4416): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x47f2, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x200000b, 0x204031, 0xffffffffffffffff, 0xec776000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x51) lgetxattr(&(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0) setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) 20m43.809119136s ago: executing program 2 (id=4421): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeed, 0x8031, 0xffffffffffffffff, 0xc430e000) setrlimit(0x40000000000008, &(0x7f0000000000)={0x4848, 0xfffffffffffff006}) mlock2(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x0) 20m35.257400123s ago: executing program 2 (id=4424): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) ftruncate(r0, 0xc17a) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000004280)) sendmmsg(0xffffffffffffffff, &(0x7f0000001280)=[{{&(0x7f00000022c0)=@can, 0x80, 0x0}}], 0x1, 0x0) lseek(r0, 0x2000, 0x4) 20m34.807296322s ago: executing program 2 (id=4425): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) chroot(&(0x7f0000000440)='./file0/../file0/../file0/../file0\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000080)='./file0/../file0/../file0/../file0/file0\x00') 20m34.037227912s ago: executing program 2 (id=4426): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=@allocspi={0xf8, 0x16, 0x629, 0x70bd2a, 0x25dfdbff, {{{@in6=@ipv4={'\x00', '\xff\xff', @broadcast}, @in=@local, 0x4e22, 0xd64c, 0x4e23, 0x4, 0x2, 0x20, 0x0, 0x73}, {@in=@loopback, 0x4d2, 0x33}, @in=@remote, {0x401, 0xd, 0x2, 0xffff, 0x4, 0x6, 0x0, 0xfffffffffffffffa}, {0x4554, 0x0, 0xffffffffffffffff, 0x1000}, {0x5, 0x8, 0x3}, 0x70bd2a, 0x0, 0xa, 0x3, 0xdf, 0x14}, 0x1, 0x6}}, 0xf8}}, 0x4040840) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000300)={0x2, 0x9, 0x6, 0x2, 0x2, 0x0, 0x70bd0b, 0x25dfdbff}, 0x10}}, 0x10) 20m33.44555551s ago: executing program 2 (id=4427): r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x13, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x7000001, 0x12, r1, 0x0) r2 = userfaultfd(0x1) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000180)={0xaa, 0x4a4}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa07, &(0x7f0000000280)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}}) 20m33.415944832s ago: executing program 36 (id=4427): r0 = openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x13, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x7000001, 0x12, r1, 0x0) r2 = userfaultfd(0x1) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000180)={0xaa, 0x4a4}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f00000000c0)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) ioctl$UFFDIO_ZEROPAGE(r2, 0xc020aa07, &(0x7f0000000280)={{&(0x7f0000ffc000/0x1000)=nil, 0x1000}}) 20m14.671895972s ago: executing program 5 (id=4437): epoll_create1(0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/bus/input/devices\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000100)={0x5, 0xffffffffffffffff, 0x20000000000000, 0x4, 0x8}, &(0x7f0000000000)={0x1f, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xd, 0xfffffffffffffffc, 0xfffffffff7fffff8}, 0x0, 0x0, 0x0) 20m13.930581049s ago: executing program 5 (id=4438): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e21, 0x3, @ipv4={'\x00', '\xff\xff', @empty}, 0x4}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x31, &(0x7f0000000000)=0x7fffffff, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e21, 0x659, @empty, 0xfb}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_opts(r1, 0x0, 0xd, &(0x7f0000000100)="ac", 0x1) recvmmsg$unix(r1, &(0x7f0000003b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10203, 0x0) 20m13.325026839s ago: executing program 5 (id=4439): mknod$loop(&(0x7f0000000140)='./file0\x00', 0xfff, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[]) read$FUSE(r0, &(0x7f000000c3c0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(r0, &(0x7f0000004200)="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", 0x2000, &(0x7f0000000c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x78, 0x0, 0x5af, {0xfeffffffffffffff, 0x4, 0x0, {0x0, 0x2000000000000001, 0x0, 0x0, 0x8000000000000, 0x0, 0x21, 0x7, 0x1, 0x8000, 0x0, r1, r2, 0x1000003, 0x7d1d}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='blkio.bfq.avg_queue_size\x00', 0x275a, 0x0) fcntl$lock(r3, 0x26, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f00000000c0)={0x0, 0x8, 0x100, 0xfffa, 0x5, "c0dc83e01f2ab32f"}) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x2, 0xe, &(0x7f0000001880)=ANY=[@ANYBLOB="b7000000ecffffffbca30000000000002403000020feffff720af0fff8ffffff71a4f2ff000000001f030000000000002e100200000000002604fdffff02000014010000000000001d130000000000007a0a00fe0000001f0f14000000000000b503f7fff80000009500000000000000033bc065b78111c6dfa041b63af4a3912435f1a864a7aad58db6a693002e7f3be361917adef6ee1c8a2a4f8ef1e50becb19bc461e91a7168e5181554a090f300020000fe275daf51efd601b6bf01c8e8b1b526375ee4dd6fcd82e4fee5bef7af9aa0d7d600c095199fe3ff3128e599b0eaebbdbd732c9cc00eec363e4a8f6456e2cc21557c0afc646cb7798b3e6440c2fbdb00a3e35208b0bb0d2cd829e65440000000000000000028610643a98d9ec21ead2ed51b104d4d91af25b845b9f7d08d123deda88c658d42ecbf28bf7076c15b463bebc72f526dd70252e79166d858fcd0e06dd31af9612fa402d0b11008e59a5923906f88b53987ad1714e72ba7a54f0c33d39000d06a59ff61623604000000000000006a89adaf17b0a6041bdeebdfd1f5089048ddff6da40f9411fe7226a40409d6e37c4f46756d31cb467600ade70063e5291569b33d21dae356e1c51f03a801be8189679a16da18ec0ae564163427afea62d84f3a10076443d643649393bf52d2105bd901128c7e0ec82701c8204a1deeed4155617572652d950ad31928b0b036dc2869f478341d02d0f5ad94b081fcd507acb4b9c67382f13d000000225d85ae49cee383dc5049076b98fb6853ab39a21514da60d2ae20cfb91d6a49964757cdf538f9ce2bdbb9893a5de817101ab062cd54e67051d355d84ce97bb0c6b6a595e487a2cc47c0efbb2d71cde2c10f0bc6980fe78683ac5c0c31032599dd273863be9261eee52216d009f4c52048ef8c126aeef5f510a8f1aded94a129e4aec6e8d9ab06faffc3a15d91c2ea3e2e04cfe031b287539d0540059fe6c7fe7cd8697502c7596566d674e425da5e7f009602a9f61d3804b3e0a1053abdc31282dfb15eb6841bb64a1b3045024a982f3c48153baae244e7bf573eac34b781337ad5905c6bbf1137548c7f1a4cad2422ee965a38f7defbd2960242b104e20dc2d9b0c35608d402ccdd9069bd50b994fda7a90144022a579dfc0229cc0dc98816106dec28eaeb883418f562ae00003ea96d10f172c0374d6eed826416050000000bfe9b4a9c5a90ff59d54d1f92ecc48899b212c55318294270a1ad10c80fef7c24d47afcc829ba0f85da6d888f18ea40ab959f6074ab2a40d85d1501783a7ab540b8d7b4ead35a385e0b4a26b702396df7e0c1e02b88c114f244a9bf93f04bf072f0861f5c0b000000000000eedcf2ba1a9508f9d6aba582a896a9f1ffa968eacea75caf822a7a63ba3401e6a52acb11883ad2a3b1832371fe5bc621426d1ed01b389708165b9cdbae2ed9dc7358f0ebadde0b727f27feeb7464dcd857ab15e355713767c536cbae2f5c7d951680f6f2f9a6a8346962a350845ffa0d82884f79adc287906943408e6df3c391e97ba48db0a5adbfd03aac93df8866fb010ae20e92bed1fe39af169d2a466f0db6f3d9436a7d55fc30511d00000000c95265b2bd83d64a532869d701723fedcbada1ee7baa19faf67256b56a41fd355b6a686b50f0937f778af083e055f6138a757ebd0ed91124a6b244f9acf41ac5d73a008364e0606a594817031fc2f52c8785fe0721719b3d654026c6ea08b83b123145ab5703dad844ced301efeb6dc5f6a9037d2283c42efc54fa84323afc4c10eff462c8843187f1dd48ef0981000000000000ff0f40b1888e1cdba94a6ea80c33ead5722c3293a493f1479531dd88261458f40d31fe8df15efaaeea831555877f9538c6ee6ba65893ff1f908ba7554ba583ec7932f5954f31a878e2fae6691d1aee1da02ba516467df3e7d1daac43738612e4fee18a22da19fc08001011e32f80fb60e14b9eee094277bbc170882c8890205f3a6da2819d2f9e77c7c64affa54fec0136cbafa5f62e3f753b639a924599c1f69219927ea5301fff0a6063d427180d61542c2571f983e96635600000554f327a3535e7c7542799493c31ac05a7b57f03ca91a01ba2a30ca99e969d6fd09dc28ebc15edb4d91675767999d146aef7799738b292fd64bb25b2969e2b15f36b788bce5ccdbaf75c94cb93499f6947a967a794963342aece449a0d80010f5c653d22d49030a8c2a4ab595bf4238f18ca428dafc7ac96d404607a0000000051a2104f22e6db5a62b5089c1b45282d38864daa3ae81d6b0968d1d2867b6ef9d12096833d6864da40b54783a17aaeb6737c323f9f98e354cc98dcfe23ad01bd1c61563e69ffe1c2c73e1661261173f359e93d2c5e424c17998809ec8f0232b3955e052a4cecd89008f70314a0bdd491ec035d232f89fe0120f64c62e8e3ed8bcb45202c204bbec8d722824c0ebca8db1ea4a05e41f6016ab5bbe4fe7ff5d785d0128171c90d9900ca2532b0f9d01c4b45294fbba468df3e1b393cb4e62e753b4172ba7ac1f2b51c94bc5d047899fd219f448bf9189c65c9d91eda6b52a373803a9efe44f86909bc90addb7b9aee813df534aac4b3093c91b8068cd849904568916694d461b76a58d88cf0f520310a1e9fdc18cde98d662eee077515d0a881192292ffff5392ab3d1311b82432662806add87047f601fa888400000000000000000000000000006acc19808d7cf29bc974b0ea92499a41b9b9a7c2bca311a28ee4952f2d325a56397c78f12205db653a536f9f3322405d1efd78e578dc6b3fb84f3738a4b6caa800000087efa51c5d95ecba4e50e529d1e8c89600e809dc3d0a2f65579e23457949a50f2d0455cf79a43746979f99f6a1527f004f1e37a3926937e84fb478199dc1020f4beb98b8074bf7df8b5e783637da740800000000000000c55a4385e9a617aa6c8e10d4202c5afeb06e2f9115558ea12f92d7ae633d44086b3f03b20d546fa66a72e38207c9d20035abc46271a30f1240de52536941242d23896ab74a3c6670fdc49c14f34fc4eadd6db8d80eba439772bf60a1db18c472dafc5569adc282928d2a1ffe29f1a57d3f18f4edaeb5d37918e6fddcd821da67a0785585a4443440dc65600e64a6a274000000000000000000000000000000000000000000000009dd14b38f2f4426d7cf5075047c31f6ce6adddfe3ac649c0643c8bfbeb14ba1fd7a485aa893915cf81e29aaf375e904bbe52691a4100260ffcd8f1d04166d291ebcef893e1b9ccb6797d0646fe0e7274434f28efb43e06e64f0698caca42f4e6018a455736c482a017e2b13dac4a90faa109f0e87cc94e3efb649692456463ca74aa6ad4bf50c1acb0000000000000005375e528285544d0064b98646f3109e9a4942ce42c6e7ec84b664f6c2770803f10baa804a707f0a1fcbfc309381aeba191950bae71f37f1eb7ceeffb3c0547ac6571603adbfde4c8b5f8d7f4b854441613633b48865b65bdc415e1e0dcf672d68cf4cebf04f4bc1eebf560a26d34d3757b1450fdb0a9a69f432e277f3a0386eb2bd3305c821c64757f786b79fef54dbe64c67d73934bc80b2133fb3c04cc7ea48bf97a6243c9f95dcbddecf45f008f1822c7868e1ff5a3cff5d6b6898335792749df7b1f51e91f8c1c3b1b93b33aaa3fab69cef08a9f6f6cf39dea3d878b2ed42545421970cc426e644332bc956d1c6adefdf0ede2c5c94aa632646ae225accdf031f611d01622921f1b922a5ac887cca3136133dce8d9f5f4da7bed2ea5d94362200000000000000000000f296b0c1484e5f781ad26bff696b05ff0a5e2270e07618b04273bd4075ea38ab463bfa6a38e7c537498ba3e4df8dfc9e040000003c3ffad44d2a376def42e41e9fc31678257e040fa7cf32c221aaac08000000000000001a00000000000000000000173570f0c11ae694b0f7a4f9c2f6790044a357e785af6e153d5f1ea460af92c7cbbd6295afe740f5e154346d483e0d641ef02e4d5295d756e110522a7a945b93fb705b95b6aae27a8fb33732ce1da1c0b1af8eb9222a06e984ab1e6984c8bdc12360627137ab67b6b68ab08acb29a74dc36b51209cfbc87f61182bbeb2772e9d5a1ffc477179be481efe46a4ce86be0b1d8eee42a611a3d44ca450b14586ed63dd92005c79e4a8ab8a94f0c6cb4bed8594a39bd76d3ef8a7ab014e787596db796bd93a36c2880423291e3bccc86f66ba792ff4d87b3f80e5908779e51c5e9055fc5b23605cd000c723187ef09dcf4b07b06a9342f3f62ee7acddff292082c1f4d8eb9561f80873a09a1ae0c9af1121175e5600f43a1179484502009759264a5729f07c2b218fa36ba2316a99aaad0130df83d0bda1e711290f78c143ea143967b00adcd77e6ad5e48d839ea61aadb83e4d071c54691924a3830d3e7b5c198bb0ed623153590000000000000000004b985ea1702f34f2f85b168c083e810ed567e3f1979b9ed1a4bf6a10dac825c96a0828b335de445a4880bb6474157efd1a72ca46ae4cbe3ab648c9bc4867a5a4cb87d7d6d55475b34b3cb6aa9e2337d4e04a37e35109752522ac9b186ddd80c47da6a2f4ef7bb909c975520000000000000000000000219cf5c1376ab33786f6b856d354e90a2733f78f2d188057cead3480eade49d55b770fad7fa000d23da6275768810b6b2df91d3a991ea98d929d271696c258d5b735d5db11df434e7dd1b7c1ca05cea3977df564115f4ec6ffab1d"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xfffffffffffffd27}, 0x48) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000005240)=[{{0x0, 0x0, 0x0}, 0xfffffdef}], 0x300, 0x401eb94) write$FUSE_NOTIFY_RETRIEVE(0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, r0) setresgid(0xee00, 0xee01, 0x0) keyctl$chown(0x4, 0x0, 0xee01, 0x0) request_key(&(0x7f0000000040)='cifs.idmap\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0) pwrite64(r0, &(0x7f00000003c0)='@', 0x1, 0x400) r4 = syz_usb_connect$hid(0x5, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0x20, 0x458, 0x501b, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0xe0, 0x10, [{{0x9, 0x4, 0x0, 0xc, 0x1, 0x3, 0x0, 0x3, 0x0, {0x9, 0x21, 0x3, 0x8, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x7, 0x6, 0x20}}}}}]}}]}}, 0x0) syz_usb_control_io$hid(r4, 0x0, 0x0) syz_usb_control_io$hid(r4, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="00220500000067101d1cab080024c1e3ceddf6f381064dd6d5ab3a0e39709fe5dd5ec5c1cfbe632731acc07c955adfc09ed61d46dc3ff9cc95d8a25cdc46bf99d23bb09d349ed210e448e9cb8728a7166f3888c1fea5e542211055d667e9c779997b88f47ec4b4dce1bef844e2bd6faadc39d34b113bae8596403794c09310a38549845050d7f9be12275736eb84abf5fc80f12cc2d0f291991ab67ca79768f8c7b0"], 0x0}, 0x0) 20m11.850201885s ago: executing program 5 (id=4440): r0 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f0000000000)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x989680}}, 0x0) fsopen(&(0x7f0000000100)='configfs\x00', 0x0) 20m9.762332421s ago: executing program 5 (id=4441): r0 = syz_usb_connect$cdc_ncm(0x2, 0x7a, &(0x7f0000000140)=ANY=[@ANYBLOB="12010000020000402505a1a44000010203010902680002010040000904000001020e0000052406000105240000000d370f0100000000000000000006241a0000000c241b4800f3ff00050080050905810300020000000904010000020d00000904010102020d00000905820200040000"], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000740)={0x84, &(0x7f0000000340)={0x20, 0x17, 0x3, "c4544c"}, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)={0x40, 0x7, 0x2}, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x40, 0x13, 0x6}, &(0x7f00000005c0)={0x40, 0x17, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x140800) setsockopt$sock_int(r1, 0x1, 0x26, &(0x7f0000000040)=0x24f1, 0x4) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000680)='/sys/power/sync_on_suspend', 0x149a82, 0x0) sendfile(r2, r2, 0x0, 0x6) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 20m9.084789255s ago: executing program 5 (id=4442): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x244}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x442, 0x1ff) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000000c0)={'syz0\x00', {0x2, 0x2, 0x8, 0x7}, 0x3b, [0x401, 0x7ff, 0x401, 0x8, 0x10000, 0x45, 0x200, 0x401, 0x7, 0x293, 0xfc, 0x80000000, 0x8, 0x3, 0xfffffd05, 0x9, 0x50d6, 0x7ff, 0xa, 0x0, 0xd4, 0x4, 0x5, 0x1d231da2, 0x6, 0x5, 0x0, 0x9, 0x0, 0x3, 0x101, 0xfffffffd, 0x800, 0xfffffffa, 0x9, 0x7, 0x8, 0x9, 0xf94d, 0x7, 0x3, 0x9, 0x0, 0x575c, 0x2, 0x5a, 0x2, 0x0, 0x5, 0x5, 0x1, 0x2, 0x1, 0x3, 0x6, 0x670, 0x9, 0x8000, 0x2, 0x9b2, 0x0, 0x2, 0x1, 0x1], [0x4, 0x8000, 0xa, 0xfffff2e1, 0x9ca4, 0xffffffff, 0x0, 0x7f, 0x72a8, 0x400, 0x86, 0x2, 0x4, 0x56e, 0x6, 0x4, 0x1100, 0x88a, 0x2, 0x8, 0xb2, 0x106c, 0xa2b8, 0xc60, 0x6740, 0xf2f1, 0x5, 0x1, 0x5, 0xfffffffd, 0x3, 0x0, 0x7fffffff, 0x1, 0x81, 0x6, 0x6, 0x0, 0x183, 0x401, 0x6, 0xf, 0xd349, 0x9, 0x6, 0x0, 0x9, 0x0, 0x7fff, 0x2, 0xffffffb1, 0x4, 0x6, 0x6, 0x9, 0x1, 0x2, 0x800, 0x4, 0x3, 0x4, 0x7fffffff, 0xc2577131, 0x7], [0x4, 0x5, 0x8, 0x2, 0x5, 0x80, 0xfffffff7, 0x3, 0x7, 0xb5, 0xfffffffa, 0x100, 0x0, 0x1, 0x1, 0x7, 0x8a85, 0x4, 0x430fb4df, 0x7, 0x7, 0x8, 0x8, 0x2, 0x2, 0x9, 0x1000, 0x54e934b9, 0x37, 0x10001, 0x0, 0x8000, 0x32, 0x4, 0x6, 0x6, 0x5, 0xcf9, 0x1000006, 0x9, 0x2, 0xe, 0x0, 0x7f, 0xffffffff, 0x0, 0xfffffffd, 0x5, 0x0, 0xa, 0x7fffffff, 0xffffffc0, 0x5, 0x6, 0xfff, 0x101, 0x400007, 0x8, 0x2, 0x3, 0x5, 0x83, 0xfffffff8, 0xb6], [0x4, 0x2, 0x4, 0x1, 0x6, 0x7, 0x2, 0x9, 0x16, 0x0, 0x7fff, 0x7fff, 0xd, 0x1, 0x5, 0x5, 0x4, 0x0, 0x20000005, 0x8, 0x7, 0x2, 0x4689, 0xe97f, 0x80000000, 0x5, 0xcd3, 0x80000000, 0x5, 0xfffff800, 0xe, 0x26419275, 0x80000001, 0x3, 0xfff, 0x8, 0xef7, 0x4ff, 0x1, 0xfffffff0, 0x7, 0x7b9, 0x52a, 0x5, 0x0, 0x6, 0x7fff, 0x7, 0x3ff, 0x0, 0x2, 0xb2a, 0x3, 0x189f, 0x9, 0x9, 0xffff, 0xd, 0xfb9, 0x77, 0x5, 0xfffffffa, 0x6e, 0x1]}, 0x45c) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/12], 0x48) socket$nl_route(0x10, 0x3, 0x0) 19m19.781004153s ago: executing program 37 (id=4442): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x244}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x442, 0x1ff) write$uinput_user_dev(0xffffffffffffffff, &(0x7f00000000c0)={'syz0\x00', {0x2, 0x2, 0x8, 0x7}, 0x3b, [0x401, 0x7ff, 0x401, 0x8, 0x10000, 0x45, 0x200, 0x401, 0x7, 0x293, 0xfc, 0x80000000, 0x8, 0x3, 0xfffffd05, 0x9, 0x50d6, 0x7ff, 0xa, 0x0, 0xd4, 0x4, 0x5, 0x1d231da2, 0x6, 0x5, 0x0, 0x9, 0x0, 0x3, 0x101, 0xfffffffd, 0x800, 0xfffffffa, 0x9, 0x7, 0x8, 0x9, 0xf94d, 0x7, 0x3, 0x9, 0x0, 0x575c, 0x2, 0x5a, 0x2, 0x0, 0x5, 0x5, 0x1, 0x2, 0x1, 0x3, 0x6, 0x670, 0x9, 0x8000, 0x2, 0x9b2, 0x0, 0x2, 0x1, 0x1], [0x4, 0x8000, 0xa, 0xfffff2e1, 0x9ca4, 0xffffffff, 0x0, 0x7f, 0x72a8, 0x400, 0x86, 0x2, 0x4, 0x56e, 0x6, 0x4, 0x1100, 0x88a, 0x2, 0x8, 0xb2, 0x106c, 0xa2b8, 0xc60, 0x6740, 0xf2f1, 0x5, 0x1, 0x5, 0xfffffffd, 0x3, 0x0, 0x7fffffff, 0x1, 0x81, 0x6, 0x6, 0x0, 0x183, 0x401, 0x6, 0xf, 0xd349, 0x9, 0x6, 0x0, 0x9, 0x0, 0x7fff, 0x2, 0xffffffb1, 0x4, 0x6, 0x6, 0x9, 0x1, 0x2, 0x800, 0x4, 0x3, 0x4, 0x7fffffff, 0xc2577131, 0x7], [0x4, 0x5, 0x8, 0x2, 0x5, 0x80, 0xfffffff7, 0x3, 0x7, 0xb5, 0xfffffffa, 0x100, 0x0, 0x1, 0x1, 0x7, 0x8a85, 0x4, 0x430fb4df, 0x7, 0x7, 0x8, 0x8, 0x2, 0x2, 0x9, 0x1000, 0x54e934b9, 0x37, 0x10001, 0x0, 0x8000, 0x32, 0x4, 0x6, 0x6, 0x5, 0xcf9, 0x1000006, 0x9, 0x2, 0xe, 0x0, 0x7f, 0xffffffff, 0x0, 0xfffffffd, 0x5, 0x0, 0xa, 0x7fffffff, 0xffffffc0, 0x5, 0x6, 0xfff, 0x101, 0x400007, 0x8, 0x2, 0x3, 0x5, 0x83, 0xfffffff8, 0xb6], [0x4, 0x2, 0x4, 0x1, 0x6, 0x7, 0x2, 0x9, 0x16, 0x0, 0x7fff, 0x7fff, 0xd, 0x1, 0x5, 0x5, 0x4, 0x0, 0x20000005, 0x8, 0x7, 0x2, 0x4689, 0xe97f, 0x80000000, 0x5, 0xcd3, 0x80000000, 0x5, 0xfffff800, 0xe, 0x26419275, 0x80000001, 0x3, 0xfff, 0x8, 0xef7, 0x4ff, 0x1, 0xfffffff0, 0x7, 0x7b9, 0x52a, 0x5, 0x0, 0x6, 0x7fff, 0x7, 0x3ff, 0x0, 0x2, 0xb2a, 0x3, 0x189f, 0x9, 0x9, 0xffff, 0xd, 0xfb9, 0x77, 0x5, 0xfffffffa, 0x6e, 0x1]}, 0x45c) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/12], 0x48) socket$nl_route(0x10, 0x3, 0x0) 17m33.724785783s ago: executing program 6 (id=4524): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x14d) prctl$PR_GET_SPECULATION_CTRL(0x23, 0xb, 0x7fffffffeff3) sched_setscheduler(0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, 0x0, 0x0, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = getpgid(r0) kcmp(r3, r0, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) 17m29.207508657s ago: executing program 6 (id=4526): r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0xfff, 0x1) openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x280000, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000100000,user_id=', @ANYRESDEC=0x0]) 17m28.69542767s ago: executing program 6 (id=4527): unshare(0x6020400) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x1000}, 0x4) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x1000}, 0x4) 17m28.146597566s ago: executing program 6 (id=4528): r0 = syz_open_dev$loop(&(0x7f00000001c0), 0xfdf, 0x800) r1 = socket$key(0xf, 0x3, 0x2) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x80, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind$netlink(r6, &(0x7f00000000c0)={0x10, 0x0, 0x25dfdbfe, 0x800000}, 0xc) socket$unix(0x1, 0x1, 0x0) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000100)) sendmsg$nl_xfrm(r7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x880}, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, 0x0) 17m6.143830608s ago: executing program 6 (id=4530): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) munlock(&(0x7f0000713000/0x1000)=nil, 0x1000) r0 = socket$inet(0x2, 0x6000000000000001, 0x0) mmap(&(0x7f0000001000/0x200000)=nil, 0x200000, 0x2000001, 0x2011, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) 17m5.656173509s ago: executing program 6 (id=4531): ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x7995}, 0xfff7, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURB(r0, 0x4004550c, &(0x7f00000001c0)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/tcp6\x00') prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = inotify_init() inotify_add_watch(r5, &(0x7f00000001c0)='.\x00', 0x4000423) r6 = open(&(0x7f0000000040)='./file1\x00', 0x80242, 0x0) sendmsg$AUDIT_USER(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) sendfile(r6, r6, &(0x7f0000000080)=0x2, 0x7f03) unlinkat(0xffffffffffffff9c, 0x0, 0x200) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x8c, 0x0, 0x1, 0x505, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @empty}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @broadcast}}}}]}]}, 0x8c}}, 0x0) 16m16.866626234s ago: executing program 38 (id=4531): ioctl$UI_DEV_CREATE(0xffffffffffffffff, 0x5501) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x7995}, 0xfff7, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) ioctl$USBDEVFS_REAPURB(r0, 0x4004550c, &(0x7f00000001c0)) openat$fuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/tcp6\x00') prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r5 = inotify_init() inotify_add_watch(r5, &(0x7f00000001c0)='.\x00', 0x4000423) r6 = open(&(0x7f0000000040)='./file1\x00', 0x80242, 0x0) sendmsg$AUDIT_USER(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x800) sendfile(r6, r6, &(0x7f0000000080)=0x2, 0x7f03) unlinkat(0xffffffffffffff9c, 0x0, 0x200) sendmsg$IPCTNL_MSG_CT_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x8c, 0x0, 0x1, 0x505, 0x0, 0x0, {0xa}, [@CTA_TUPLE_ORIG={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @empty}}, {0x14, 0x4, @mcast2}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @ipv4={'\x00', '\xff\xff', @broadcast}}}}]}]}, 0x8c}}, 0x0) 15m29.324303467s ago: executing program 8 (id=4548): syz_usb_connect(0x5, 0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="1201000092ecc620ac05c2773aeb010203010902240001000020000904599902fffd0180"], 0x0) 15m28.602408944s ago: executing program 8 (id=4596): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockname$packet(r3, 0x0, 0x0) r4 = io_uring_setup(0x2c49, &(0x7f00000000c0)={0x0, 0x8000002, 0x1000, 0x1000000, 0x1a6}) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x18, &(0x7f0000000000), 0x1) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_int(r5, 0x29, 0x19, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002003, 0x0) 14m52.351281292s ago: executing program 7 (id=4622): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000003, 0x31, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000200)={0x0, 0x0}, 0x6) r1 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=r0, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000000)={r1, 0x20, &(0x7f0000000280)={&(0x7f0000000080)=""/238, 0xffffffffffffff80, 0x0, 0x0}}, 0x1e) 14m51.625864009s ago: executing program 7 (id=4623): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000040)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x12, r0, 0x0) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000504000000002e"], 0x0, 0x37}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000000c0)={r1, 0x20, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000001500)=""/4081, 0xff1}}, 0x10) 14m50.726479218s ago: executing program 7 (id=4624): r0 = syz_usb_connect(0x2, 0x2d, &(0x7f0000000240)=ANY=[@ANYBLOB="12010000459bb2405804035000000000000109021b000111000000090400000195699b0009058b", @ANYRES8], 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) getpid() 14m50.23181516s ago: executing program 7 (id=4625): setsockopt$inet_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000005200)={'syztnl1\x00', &(0x7f0000005180)={'syztnl1\x00', 0x0, 0x4, 0xf, 0x7, 0x4, 0x51, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @loopback, 0x7, 0x7800, 0x4, 0x4}}) tee(0xffffffffffffffff, 0xffffffffffffffff, 0xaa2, 0x2) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000005800)={0xb, {'syz1\x00', 'syz0\x00', 'syz0\x00', 0x0, 0x6, 0x9, 0xffff, 0x4, 0xa257}}, 0x118) 14m48.156518705s ago: executing program 7 (id=4626): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x3, &(0x7f0000001300)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x90) r1 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r2, 0x3, 0x0, @val=@perf_event={0x3}}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) 14m47.221235586s ago: executing program 7 (id=4627): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) 14m39.523775847s ago: executing program 39 (id=4596): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, 0x0) r3 = socket(0x10, 0x2, 0x0) getsockname$packet(r3, 0x0, 0x0) r4 = io_uring_setup(0x2c49, &(0x7f00000000c0)={0x0, 0x8000002, 0x1000, 0x1000000, 0x1a6}) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r4, 0x18, &(0x7f0000000000), 0x1) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) r5 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$inet6_int(r5, 0x29, 0x19, 0x0, 0x0) recvmmsg(r5, 0x0, 0x0, 0x40002003, 0x0) 13m57.872998127s ago: executing program 40 (id=4627): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) 13m35.598776666s ago: executing program 9 (id=4642): r0 = socket$kcm(0x11, 0x200000000000003, 0x300) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f00000003c0), 0x4) recvmsg$kcm(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/4096, 0x1000}, {0x0}], 0x2}, 0x0) 13m34.820002837s ago: executing program 9 (id=4643): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="22000000040000001000000012"], 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000007c0)={r0, &(0x7f0000000cc0)="b5f461aaf47f8d", 0x0}, 0x20) 13m33.897408927s ago: executing program 9 (id=4644): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0xe, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000001800000000000000000000000000000095"], &(0x7f0000000200)='syzkaller\x00', 0x9, 0x1006, &(0x7f0000002080)=""/4102}, 0x94) 13m33.069774571s ago: executing program 9 (id=4645): r0 = socket$kcm(0x11, 0x3, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0xf, &(0x7f0000000000), 0x4) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000100)=@phonet={0x23, 0x0, 0x0, 0x37}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000180)="27050200590200000600002fb96dbcf706e1050007008100000081", 0x1b}, {&(0x7f00000002c0)="88", 0x1}], 0x2}, 0x0) 13m32.240545864s ago: executing program 9 (id=4646): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="400000001400010004000000000000000a0000000400000014000100ff01"], 0x40}, 0x1, 0x0, 0x0, 0x20000804}, 0x8018) 13m31.295978776s ago: executing program 9 (id=4647): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa, &(0x7f00000004c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000100), &(0x7f0000000200), 0x8, 0x1c, 0x8, 0x0, 0x0}}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x18, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="8510000004000000950080000000000018000000000000000000000000000002950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00'}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xa0, 0x0}}, 0x10) 12m41.646654046s ago: executing program 41 (id=4647): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xaa, &(0x7f00000004c0)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000100), &(0x7f0000000200), 0x8, 0x1c, 0x8, 0x0, 0x0}}, 0x10) r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_lsm={0x18, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="8510000004000000950080000000000018000000000000000000000000000002950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00'}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r0, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0xa0, 0x0}}, 0x10) 22.840133758s ago: executing program 0 (id=5438): syz_usb_connect(0x3, 0x6b, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000385352608f20446b76e8e01020301090259000104e9000909049300000e0100ff0a2401020005028a010209240603040001a53011240606040508000400050006000100050924030506030501f909240702020005cbad092403"], &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}) 12.693000032s ago: executing program 1 (id=5442): r0 = memfd_create(&(0x7f0000001240)='[\v\xdbX\xae[\x1a\xad\xd1md\xc8\x85HX\xa9%\f\x1a,\xe2\x9c\xb4\xd7\xbc\xf1\xb3\x86\xe2/Op\xd0\xa2\x82\x1eb;(\xb5\xe1j\xc8\f\xe5\x89\x17\xee|J\x90=5\xed\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\xd2q%\x8a\xda\x05\x00f\xe3j%\x00\x00\x1c#\xc6\xd8\xdbD\x92P\xe16W\x10\xdau\xc7\x8f\xaa\x8d\xa9\x97\x9d\xcb\x1e\x80\xe7\xd5%N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\xbdD\xcc\'\xa2\xaf`\xf6L\x0e\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xecM\xe4H\xb7\xaf\xa8\x96dh\xa9\xab > \xac\x00O^\x14\xcbv\x17Hkb\xe7\xcb\x9d;\xd2\x9f\x05\xd1\x00\x8b\xd3\x9f\a\x99^v\xf7\xfa\xe5\xf0h\x87l\xd9\x15\xd2\x87~?\xb1\x9d\xc1\x92`\x8a\r\xfc\xeb\x14\xd1\x94\fv\x8a\xe3\x1d\x0fj}\x9f\xedsc\xd3\xee\xe6cXw\xa1\xbc\xd0o\xf9\x9cJ\b\x00\xd8;\\ik0+\xc8\xf2\x87\xdf\t\x97\x9dB\xc1\xa0\xa71\xf25GU|]A\x1eel \x8ff\xc6\nt\xd0\x91\x9d\x8c\xa4\xe5\xde\x06\x00\xffE\xf4\x96#\x92-9\xe5\xa7\xf8%\xb0I\xd4\x91r\xbf\x1bOS\xee}\x16\x87\x05\xf2\xb9\x81\x14\xe2NZ\\I\xd0[\xc4\xf2\"\x87\xf5\xb8\x95.M\xb1S\xbd\xe4i\x00\xc1b\t]?}0\t\xebV\xbci\xa5\x05\xca\xb6\xc22\x7fL\x89&\xa0\xcfMULr0rs\xb4\n\xa6)\xe23\xf0\x8d\x9dO\xb9\xc9\x83\xabS\x013\"\x1b\x97K\x17\x16\x89\a\xee\xc903\xad\x15\x1cH\xd2\x95\x91\xb4$\x1b\xbf\xaf\xf5\x9b\xc2\x85\xe7[\xe5\xfb}\x1d@f2\x11\x13Y\x98\xa4\xecWEE\x9eI\x05\v\x11\xad\x93!^T\xe5N\xf6LI\x9a6\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbf\x1a\xc9(a\x06>g\xe5\x00:\x9au\xef\x14\t\x1f8E\x86\xcb\xd0e\x17\xfb\xc1', 0x3) write$binfmt_script(r0, &(0x7f0000000040)={'#! ', './file0'}, 0xb) copy_file_range(r0, &(0x7f0000000100)=0x7, r0, 0x0, 0xc9e9, 0x0) 12.351245463s ago: executing program 1 (id=5443): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000e00), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000e40)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r1, @ANYBLOB="210f00000000000000002000000008000300", @ANYRES32=r2], 0x1c}, 0x1, 0x0, 0x0, 0x20000015}, 0x44000) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0), r0) 11.799032539s ago: executing program 0 (id=5444): prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x40940, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) readv(r3, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/135, 0x87}], 0x1) ioctl$TIOCVHANGUP(r3, 0x5437, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$FUSE_OPEN(r4, &(0x7f0000000080)={0x20, 0x8000000000000009, 0x0, {0x0, 0x8}}, 0x20) socket$vsock_stream(0x28, 0x1, 0x0) 10.658406903s ago: executing program 1 (id=5445): r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x30008085) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100), 0x4) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000001740)="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", 0x583}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 10.290463277s ago: executing program 1 (id=5446): r0 = syz_open_dev$vcsu(&(0x7f0000000240), 0x1ff, 0x0) readv(r0, &(0x7f00000008c0)=[{&(0x7f00000002c0)=""/132, 0x84}, {0x0}, {&(0x7f00000001c0)=""/22, 0x16}, {&(0x7f0000000700)=""/243, 0xf3}, {&(0x7f0000000800)=""/142, 0x8e}, {&(0x7f0000000580)=""/120, 0x78}], 0x6) 9.877320834s ago: executing program 1 (id=5447): socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CONNECT(r0, &(0x7f0000000380)={0x6, 0x118, 0xfa00, {{0xfffffffd, 0xffff, "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", 0x2, 0x4, 0x5, 0x3, 0xfe, 0x0, 0x0, 0x1}}}, 0x120) 9.573598433s ago: executing program 1 (id=5448): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6a72c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = syz_io_uring_setup(0x10d, &(0x7f0000000980)={0x0, 0x45885, 0x80, 0x0, 0x8}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd_index=0x3, 0x0, 0x0}) io_uring_enter(r3, 0x3596, 0x0, 0x49, 0x0, 0x0) 1.601893216s ago: executing program 0 (id=5449): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, 0x0, 0x0) r4 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x88, 0x24, 0xf0b, 0x70bd2b, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x1, [], 0x0, [0x1, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x8000, 0x0, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}]}, 0x88}}, 0x20000000) r5 = socket(0x400000000010, 0x3, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0xfffffffe, {0x0, 0x0, 0x0, r7, {0x0, 0xfff1}, {0x8, 0xffff}, {0xc, 0xf}}}, 0x24}, 0x1, 0x0, 0x0, 0x4008001}, 0x20008850) 887.314483ms ago: executing program 0 (id=5450): r0 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x30008085) setsockopt$sock_attach_bpf(r0, 0x1, 0x3e, &(0x7f0000000100), 0x4) sendmsg$inet(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000001740)="233f542f219e572873d1d1d5f305fbd2feff3b1adaa3521b8e435b7849c5112fcf6c0453a7f939d0deefc9d3d9e311684bc18f0fb81b9b93693b5eea2a2c0d8f029d2e98c8b0c803e20e551044938e3ecc2636b940d6abc72a28ed74c731e5207ec2d22f1f2be071e8b0d0eb8937fb7e34286ee894bea78d0b78d0b2480ef3b092693b44e4d26a794d8c0cd9aa7fad0861976d2650513ea68a64b9da7729f8088b808d2cc5c35c6f3e74631b1f042ad290c44548a72029624bacf514a6bc4d75925e1018e033e1b294fcdc52c97df499c40dca5e79bd9001e801ebc21eeb3b621f12796f114bb535c22a0d81e68248f94d22c47fdfc944a4e4903006978399f0dac48817c4b8636df47cb4851195113af6f2b42ee2e8b91fcfd3617fb3d0b52bd647bcef9036c9c556103feb6503b53c74acf5bef7b5e1d12f8a96497e1c1c27ebbeca2929d5160ae7f9bb8283dff53426af0ee1d044e56f5266ee75d1419cedff6d5edea16a510f7b0a2005f115d6234c94a7a0c7f64bfaa80879d150d3d57dc9232441a8045616801a118c50780487a0eb21c18cda9fc2f88b8f578c3b3e6599f71023ca3093779250341007aa4c1ed523962068636f46d50d0978c691091e03c8a2902c73c48ebbaa34da53bc491bcbb24ffafecc2a94eaf457fcf6276af0726bbffbf4bb5f480c58bc36adb50dacd9a4a76e23fb0142cf722ab461c5cd8cfef3cd6a890a16fc548dec204283969848caf86749872c54d49b9ea264bb2fc2aadaa14945ee69d5179fb4a672a64e5be6e8fa7358a2213a8e8aa2e9286a8afe28b94902a30c2feac6ddbc9b0901d0fa6ebb08a16be2802b9b0908b62012bc19737ade2f80286c5840243be27bcd149bec3b883982f485e053d6826aca0244a68f51e74e9a01c72ae971db52b5613c203f5832dd5c4497bf51df043bb95e080725ce84ea7154de82d14e9cd3ea1b7a0a8cd0b150f976f8bd9f7fc5fc41eccacae1a752b64b49d458f7a5f893afc1103d4671b0374ed401cf068b5c7de9476ddc8507f634cd69467721f7ce027ca32fcb87e091104d3362eaacc632345fa5be982d67d16c32806b3fb6328d4ab88b985e50443c748bb26d62a949a292dd90f828f758e3d99b2b39c051b1ee681f5854f3d074391a07d5ef51d70362d292ad096e6e5f580cbe0ed7e4659b0c896b7163d721ed3928cbe8b1147af7e4541fa3f1abbef6d3cd5acf5075a74f8f194b314cb20b28a9c0183a473b2ca1a3efb230f9ebe2a92a196f4bbadcf092c2e86e803fb852850fdf047bd2f6b580bb596ed18928de09825bb2734e7eb90d61871bae932fb633b0542e56c331e8bfc46d1586087978eaae52ba4b8673c7c085b6111810175f88481aad97437d6070774866843fd9616bb2593ba5ea81e91718adf6edce0ec8a6c8830f6d2b3f02b14e5b3eba08c9c398035c41e0aaf43ae0d63adeacc393bbc3883ad0a2c7404dbfaa54dbc1aa9b27f3d569e74f40280cdd24f64f27abc4db4753e1a6c5c024b5a8ade48f8a49c75f90702dd6661dfcaa933a0f889f5ae21316cd7c08bf50a757904f6d4e39fd62cbee57c232e2e405a2661826d7b53b3976b75e1c548624241146f2f3d47af4f68cad71eeaf810f5fdae1481596018cdfd3dc1d83bb90864866937beb52f97e68729b87b2ec336698d3711bc45b3fccf7e3e7abee3e339ee988c1c38299d7c706a99563307d9aaf045524a13f3b2922f5b501233147402bd94a4a2b50b955bf9f6946d7e21b74c22cee3bc22caaa2a47e3293490f9dd2653c60ed53d10cfff5f3dd4c913ad8edeffd8d9e853876b8c5959974e9fdd2399e497400dd1827a977a53a0e7ad383a4fabee545525915ebfff10cd82b233de81e47b4685a0d3dbc0431cbd27c204bec3de11b83ab2988bf55d1a7f1a0bd603851c9c3ddc89ab44637874ae48300fc73ff07d9e5da07f9e6984ea70762e3759f448e4f44f9f5b6d0de33925990", 0x583}], 0x1, 0x0, 0x0, 0x10000000}, 0x52cc) 529.996156ms ago: executing program 0 (id=5451): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r1, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001440)={r1, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000680)=@newqdisc={0x3c, 0x24, 0xf0b, 0x70bd2c, 0x0, {0x0, 0x0, 0x12, r2, {}, {0xffff, 0xffff}, {0xffe0, 0xf}}, [@qdisc_kind_options=@q_cake={{0x9}, {0xc, 0x2, [@TCA_CAKE_FWMARK={0x8}]}}]}, 0x3c}}, 0x4000010) 0s ago: executing program 0 (id=5452): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'comedi_parport\x00', [0x33, 0x3, 0x0, 0x10, 0x4, 0xcc7, 0xdf, 0x7, 0x9, 0x3ff, 0x8000800, 0xbc20, 0x1, 0x6, 0xf069, 0x0, 0x9, 0x200000, 0xfffffff4, 0x2, 0x0, 0xfffffffd, 0xfffffffd, 0xfffffff5, 0xffffeadb, 0x3, 0x7ff, 0x8000000b, 0x0, 0x8000000, 0x4]}) ioctl$COMEDI_SUBDINFO(r0, 0x80486402, &(0x7f0000000000)) kernel console output (not intermixed with test programs): ied { search } for pid=26945 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4503.090950][ T29] audit: type=1400 audit(4313.484:67896): avc: denied { search } for pid=26945 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4503.101190][ T29] audit: type=1400 audit(4313.493:67897): avc: denied { execmem } for pid=26946 comm="syz.0.5086" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4503.258740][ T29] audit: type=1400 audit(4313.632:67898): avc: denied { create } for pid=26947 comm="syz.1.5087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 4503.302009][ T29] audit: type=1400 audit(4313.660:67899): avc: denied { module_request } for pid=26947 comm="syz.1.5087" kmod="net-pf-24" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4503.666872][ T29] audit: type=1400 audit(4314.020:67900): avc: denied { search } for pid=26902 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4510.079225][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 4510.080855][ T29] audit: type=1400 audit(4319.936:67930): avc: denied { execmem } for pid=26967 comm="syz.1.5093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4510.193247][ T29] audit: type=1400 audit(4320.028:67931): avc: denied { create } for pid=26970 comm="syz.0.5094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4510.226780][ T29] audit: type=1400 audit(4320.074:67932): avc: denied { getopt } for pid=26970 comm="syz.0.5094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4510.646883][ T29] audit: type=1400 audit(4320.453:67933): avc: denied { create } for pid=26973 comm="syz.0.5095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4510.674605][ T29] audit: type=1400 audit(4320.462:67934): avc: denied { write } for pid=26973 comm="syz.0.5095" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4511.199998][ T29] audit: type=1400 audit(4320.961:67935): avc: denied { prog_load } for pid=26967 comm="syz.1.5093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4511.206985][ T29] audit: type=1400 audit(4320.979:67936): avc: denied { bpf } for pid=26967 comm="syz.1.5093" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4511.257908][ T29] audit: type=1400 audit(4321.016:67937): avc: denied { perfmon } for pid=26967 comm="syz.1.5093" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4511.272516][ T29] audit: type=1400 audit(4321.034:67938): avc: denied { create } for pid=26975 comm="syz.0.5096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4511.296575][ T29] audit: type=1400 audit(4321.053:67939): avc: denied { write } for pid=26975 comm="syz.0.5096" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4515.501301][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 4515.502290][ T29] audit: type=1400 audit(4324.939:67973): avc: denied { bpf } for pid=26993 comm="syz.0.5104" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4515.561129][ T29] audit: type=1400 audit(4324.994:67974): avc: denied { bpf } for pid=26993 comm="syz.0.5104" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4515.565031][ T29] audit: type=1400 audit(4324.994:67975): avc: denied { prog_run } for pid=26993 comm="syz.0.5104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4515.850245][ T29] audit: type=1400 audit(4325.262:67976): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4515.858781][ T29] audit: type=1400 audit(4325.262:67977): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4515.861163][ T29] audit: type=1400 audit(4325.262:67978): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4516.451939][ T29] audit: type=1400 audit(4325.816:67979): avc: denied { create } for pid=26998 comm="syz.0.5106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4516.482824][ T29] audit: type=1400 audit(4325.843:67980): avc: denied { write } for pid=26998 comm="syz.0.5106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4516.485358][T27000] netlink: 52 bytes leftover after parsing attributes in process `syz.0.5106'. [ 4516.563590][ T29] audit: type=1400 audit(4325.917:67981): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4516.584909][ T29] audit: type=1400 audit(4325.926:67982): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4518.723414][T27011] netlink: 'syz.1.5110': attribute type 29 has an invalid length. [ 4523.004325][T27058] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5112'. [ 4523.007133][T27058] netlink: 28 bytes leftover after parsing attributes in process `syz.1.5112'. [ 4523.007631][T27058] netlink: 24 bytes leftover after parsing attributes in process `syz.1.5112'. [ 4523.901330][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 4523.901846][ T29] audit: type=1400 audit(4332.683:68065): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4523.923315][ T29] audit: type=1400 audit(4332.720:68066): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4523.952133][ T29] audit: type=1400 audit(4332.738:68067): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4524.687396][ T29] audit: type=1400 audit(4333.412:68068): avc: denied { create } for pid=27059 comm="syz.0.5113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4524.725519][ T29] audit: type=1400 audit(4333.458:68069): avc: denied { write } for pid=27059 comm="syz.0.5113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4524.733158][ T29] audit: type=1400 audit(4333.458:68070): avc: denied { nlmsg_write } for pid=27059 comm="syz.0.5113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4524.754872][T27060] netlink: 140 bytes leftover after parsing attributes in process `syz.0.5113'. [ 4524.843910][ T29] audit: type=1400 audit(4333.541:68071): avc: denied { map_create } for pid=27061 comm="syz.1.5114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4524.849256][ T29] audit: type=1400 audit(4333.569:68072): avc: denied { bpf } for pid=27061 comm="syz.1.5114" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4524.874736][ T29] audit: type=1400 audit(4333.587:68073): avc: denied { prog_load } for pid=27061 comm="syz.1.5114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4524.875133][ T29] audit: type=1400 audit(4333.587:68074): avc: denied { bpf } for pid=27061 comm="syz.1.5114" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4525.269491][T27064] netlink: 4 bytes leftover after parsing attributes in process `syz.0.5115'. [ 4529.461913][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 4529.462395][ T29] audit: type=1400 audit(4337.824:68119): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4529.482248][ T29] audit: type=1400 audit(4337.842:68120): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4529.496274][ T29] audit: type=1400 audit(4337.851:68121): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4530.138634][ T29] audit: type=1400 audit(4338.442:68122): avc: denied { write } for pid=27085 comm="syz.0.5123" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4530.165640][ T29] audit: type=1400 audit(4338.479:68123): avc: denied { write open } for pid=27085 comm="syz.0.5123" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4530.178901][ T29] audit: type=1400 audit(4338.488:68124): avc: denied { map_create } for pid=27085 comm="syz.0.5123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4530.200102][ T29] audit: type=1400 audit(4338.507:68125): avc: denied { ioctl } for pid=27085 comm="syz.0.5123" path="/dev/snd/seq" dev="devtmpfs" ino=720 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4530.782176][ T29] audit: type=1400 audit(4339.042:68126): avc: denied { ioctl } for pid=27085 comm="syz.0.5123" path="/dev/snd/seq" dev="devtmpfs" ino=720 ioctlcmd=0x534e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4530.808501][ T29] audit: type=1400 audit(4339.061:68127): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4530.835881][ T29] audit: type=1400 audit(4339.097:68128): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4532.308856][T27115] netlink: 'syz.1.5126': attribute type 5 has an invalid length. [ 4535.491176][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 4535.491530][ T29] audit: type=1400 audit(4343.389:68153): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4535.518219][ T29] audit: type=1400 audit(4343.417:68154): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4535.545562][ T29] audit: type=1400 audit(4343.426:68155): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4536.033702][ T29] audit: type=1400 audit(4343.879:68156): avc: denied { prog_load } for pid=27092 comm="syz.0.5125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4536.041978][ T29] audit: type=1400 audit(4343.897:68157): avc: denied { bpf } for pid=27092 comm="syz.0.5125" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4536.405758][ T29] audit: type=1400 audit(4344.239:68158): avc: denied { watch } for pid=27123 comm="syz.1.5129" path="/290/file1" dev="tmpfs" ino=1485 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4536.703150][ T29] audit: type=1400 audit(4344.506:68159): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4536.715450][ T29] audit: type=1400 audit(4344.515:68160): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4536.803859][ T29] audit: type=1400 audit(4344.599:68161): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4537.219298][ T29] audit: type=1400 audit(4344.986:68162): avc: denied { create } for pid=27126 comm="syz.1.5130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4537.311597][T27127] netlink: 48 bytes leftover after parsing attributes in process `syz.1.5130'. [ 4538.323185][T27132] netlink: 32 bytes leftover after parsing attributes in process `syz.1.5132'. [ 4540.771414][T27141] netlink: 80 bytes leftover after parsing attributes in process `syz.1.5135'. [ 4540.984018][ T29] kauditd_printk_skb: 36 callbacks suppressed [ 4540.984477][ T29] audit: type=1400 audit(4348.457:68199): avc: denied { create } for pid=27144 comm="syz.0.5136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4541.016052][ T29] audit: type=1400 audit(4348.475:68200): avc: denied { write } for pid=27144 comm="syz.0.5136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4541.016791][ T29] audit: type=1400 audit(4348.475:68201): avc: denied { nlmsg_write } for pid=27144 comm="syz.0.5136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4541.053798][ T29] audit: type=1400 audit(4348.521:68202): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4541.060930][ T29] audit: type=1400 audit(4348.531:68203): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4541.081175][ T29] audit: type=1400 audit(4348.549:68204): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4541.532407][ T29] audit: type=1400 audit(4348.964:68205): avc: denied { read write } for pid=27149 comm="syz.0.5138" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4541.579262][ T29] audit: type=1400 audit(4349.001:68206): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4541.586263][ T29] audit: type=1400 audit(4349.010:68208): avc: denied { read write open } for pid=27149 comm="syz.0.5138" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4541.612152][ T29] audit: type=1400 audit(4349.001:68207): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4544.692882][T27167] syz.1.5145: vmalloc error: size 536870904, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 4544.716057][T27167] CPU: 0 UID: 0 PID: 27167 Comm: syz.1.5145 Not tainted syzkaller #0 PREEMPT [ 4544.716258][T27167] Hardware name: ARM-Versatile Express [ 4544.716397][T27167] Call trace: [ 4544.716446][T27167] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 4544.716581][T27167] r7:60000013 r6:60000013 r5:822a20d0 r4:00000000 [ 4544.716601][T27167] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 4544.716653][T27167] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 4544.716720][T27167] r7:00000000 r6:822bdbf4 r5:86303c00 r4:00000000 [ 4544.716742][T27167] [<8021ed80>] (dump_stack) from [<80506d78>] (warn_alloc+0xdc/0x184) [ 4544.716793][T27167] [<80506c9c>] (warn_alloc) from [<804f4ee0>] (__vmalloc_node_range_noprof+0xbc/0x668) [ 4544.716851][T27167] r3:1ffffff8 r2:822bdbf4 [ 4544.716879][T27167] r7:822bdc2c r6:00000dc0 r5:ff800000 r4:df800000 [ 4544.716897][T27167] [<804f4e24>] (__vmalloc_node_range_noprof) from [<80516f64>] (__kvmalloc_node_noprof+0x298/0x714) [ 4544.716968][T27167] r10:85af4000 r9:000029c0 r8:86303c00 r7:00000000 r6:ea4b5cf8 r5:00000400 [ 4544.716988][T27167] r4:1ffffff8 [ 4544.717005][T27167] [<80516ccc>] (__kvmalloc_node_noprof) from [<81763220>] (xt_alloc_entry_offsets+0x28/0x34) [ 4544.717085][T27167] r10:85af4000 r9:ea4b5d00 r8:851fcd80 r7:00000000 r6:ea4b5cf8 r5:85af4040 [ 4544.717105][T27167] r4:07fffffe [ 4544.717125][T27167] [<817631f8>] (xt_alloc_entry_offsets) from [<818f2bd0>] (translate_table+0x74/0x764) [ 4544.717183][T27167] [<818f2b5c>] (translate_table) from [<818f3d98>] (do_replace+0xf4/0x5f0) [ 4544.717249][T27167] r10:00000000 r9:20000060 r8:851fcd80 r7:85af4040 r6:ea4b5cf8 r5:000002d0 [ 4544.717269][T27167] r4:85af4000 [ 4544.717285][T27167] [<818f3ca4>] (do_replace) from [<818f43c8>] (do_ip6t_set_ctl+0x134/0x29c) [ 4544.717359][T27167] r10:00000126 r9:81591d34 r8:00000330 r7:85c04fa4 r6:ea4b5da8 r5:00000040 [ 4544.717382][T27167] r4:84574a40 [ 4544.717398][T27167] [<818f4294>] (do_ip6t_set_ctl) from [<816eaf38>] (nf_setsockopt+0x54/0x70) [ 4544.717468][T27167] r10:00000126 r9:81591d34 r8:00000330 r7:85c04fa4 r6:00000040 r5:818f4294 [ 4544.717489][T27167] r4:829f5378 [ 4544.717505][T27167] [<816eaee8>] (nf_setsockopt) from [<818aa1d8>] (ipv6_setsockopt+0x9c/0xbc) [ 4544.717568][T27167] r6:00000330 r5:84574a40 r4:00000040 [ 4544.717584][T27167] [<818aa140>] (ipv6_setsockopt) from [<8179a234>] (tcp_setsockopt+0x3c/0x58) [ 4544.717640][T27167] r6:00000029 r5:85c04a80 r4:818aa13c [ 4544.717657][T27167] [<8179a1fc>] (tcp_setsockopt) from [<81591d6c>] (sock_common_setsockopt+0x38/0x40) [ 4544.717712][T27167] r4:8179a1f8 [ 4544.717729][T27167] [<81591d38>] (sock_common_setsockopt) from [<8199e67c>] (smc_setsockopt+0xac/0x354) [ 4544.717781][T27167] r4:00000040 [ 4544.717799][T27167] [<8199e5d4>] (smc_setsockopt) from [<8158d5b4>] (do_sock_setsockopt+0x70/0xc8) [ 4544.717869][T27167] r9:86303c00 r8:00000330 r7:855a7180 r6:00000040 r5:00000029 r4:8199e5d0 [ 4544.717889][T27167] [<8158d544>] (do_sock_setsockopt) from [<81590fd0>] (__sys_setsockopt+0x7c/0xc4) [ 4544.717957][T27167] r8:00000000 r7:86692300 r6:86692301 r5:00000040 r4:00000029 [ 4544.717976][T27167] [<81590f54>] (__sys_setsockopt) from [<81591034>] (sys_setsockopt+0x1c/0x24) [ 4544.718043][T27167] r8:8020029c r7:00000126 r6:00346318 r5:00000000 r4:00000330 [ 4544.718061][T27167] [<81591018>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4544.718107][T27167] Exception stack(0xea4b5fa8 to 0xea4b5ff0) [ 4544.718148][T27167] 5fa0: 00000330 00000000 00000003 00000029 00000040 20000000 [ 4544.718184][T27167] 5fc0: 00000330 00000000 00346318 00000126 003462d8 00000000 00000001 76f310dc [ 4544.718216][T27167] 5fe0: 76f30e88 76f30e78 00018734 0012fc20 [ 4544.751115][T27167] Mem-Info: [ 4544.757337][T27167] active_anon:8973 inactive_anon:0 isolated_anon:0 [ 4544.757337][T27167] active_file:2049 inactive_file:41435 isolated_file:0 [ 4544.757337][T27167] unevictable:768 dirty:12 writeback:0 [ 4544.757337][T27167] slab_reclaimable:1386 slab_unreclaimable:7468 [ 4544.757337][T27167] mapped:4532 shmem:6235 pagetables:810 [ 4544.757337][T27167] sec_pagetables:0 bounce:0 [ 4544.757337][T27167] kernel_misc_reclaimable:0 [ 4544.757337][T27167] free:395256 free_pcp:1122 free_cma:4032 [ 4544.765115][T27167] Node 0 active_anon:36060kB inactive_anon:0kB active_file:8196kB inactive_file:165740kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:18212kB dirty:48kB writeback:0kB shmem:25024kB kernel_stack:2392kB pagetables:3240kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 4544.769402][T27167] Normal free:1363700kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:6840kB unevictable:0kB writepending:24kB zspages:0kB present:1556480kB managed:1426896kB mlocked:0kB bounce:0kB free_pcp:4488kB local_pcp:2104kB free_cma:0kB [ 4544.771880][T27167] lowmem_reserve[]: 0 4224 4224 [ 4544.775955][T27167] Normal: 1*4kB (U) 2*8kB (ME) 2*16kB (UE) 2*32kB (UM) 0*64kB 1*128kB (E) 2*256kB (UE) 2*512kB (ME) 4*1024kB (ME) 3*2048kB (UM) 330*4096kB (UM) = 1363700kB [ 4544.794690][T27167] 49740 total pagecache pages [ 4544.795767][T27167] 0 pages in swap cache [ 4544.797937][T27167] Free swap = 124996kB [ 4544.798669][T27167] Total swap = 124996kB [ 4544.799555][T27167] 524288 pages RAM [ 4544.800856][T27167] 135168 pages HighMem/MovableOnly [ 4544.802173][T27167] 32396 pages reserved [ 4544.804428][T27167] 4096 pages cma reserved [ 4546.835923][ T29] kauditd_printk_skb: 52 callbacks suppressed [ 4546.836353][ T29] audit: type=1400 audit(4353.865:68260): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4546.851376][ T29] audit: type=1400 audit(4353.875:68261): avc: denied { prog_load } for pid=27166 comm="syz.0.5146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4546.854934][ T29] audit: type=1400 audit(4353.875:68262): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4546.870524][ T29] audit: type=1400 audit(4353.884:68263): avc: denied { bpf } for pid=27166 comm="syz.0.5146" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4546.870648][ T29] audit: type=1400 audit(4353.884:68264): avc: denied { perfmon } for pid=27166 comm="syz.0.5146" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4546.870750][ T29] audit: type=1400 audit(4353.893:68265): avc: denied { perfmon } for pid=27166 comm="syz.0.5146" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4546.870811][ T29] audit: type=1400 audit(4353.893:68266): avc: denied { perfmon } for pid=27166 comm="syz.0.5146" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4546.899149][ T29] audit: type=1400 audit(4353.893:68267): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4546.899586][ T29] audit: type=1400 audit(4353.912:68268): avc: denied { perfmon } for pid=27166 comm="syz.0.5146" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4546.899881][ T29] audit: type=1400 audit(4353.912:68269): avc: denied { perfmon } for pid=27166 comm="syz.0.5146" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4549.313258][T27182] netlink: 180 bytes leftover after parsing attributes in process `syz.1.5152'. [ 4553.231010][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 4553.231300][ T29] audit: type=1400 audit(4359.763:68300): avc: denied { prog_load } for pid=27189 comm="syz.1.5156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4553.253560][ T29] audit: type=1400 audit(4359.782:68301): avc: denied { bpf } for pid=27189 comm="syz.1.5156" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4553.254045][ T29] audit: type=1400 audit(4359.782:68302): avc: denied { perfmon } for pid=27189 comm="syz.1.5156" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4553.298541][ T29] audit: type=1400 audit(4359.819:68303): avc: denied { perfmon } for pid=27189 comm="syz.1.5156" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4553.305933][ T29] audit: type=1400 audit(4359.837:68304): avc: denied { perfmon } for pid=27189 comm="syz.1.5156" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4553.332068][ T29] audit: type=1400 audit(4359.856:68305): avc: denied { perfmon } for pid=27189 comm="syz.1.5156" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4553.392118][ T29] audit: type=1400 audit(4359.902:68306): avc: denied { perfmon } for pid=27189 comm="syz.1.5156" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4553.392562][ T29] audit: type=1400 audit(4359.902:68307): avc: denied { bpf } for pid=27189 comm="syz.1.5156" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4553.392762][ T29] audit: type=1400 audit(4359.902:68308): avc: denied { bpf } for pid=27189 comm="syz.1.5156" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4553.427031][ T29] audit: type=1400 audit(4359.948:68309): avc: denied { prog_run } for pid=27189 comm="syz.1.5156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4559.403807][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 4559.412494][ T29] audit: type=1400 audit(4365.468:68363): avc: denied { execmem } for pid=27214 comm="syz.1.5166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4560.483475][ T29] audit: type=1400 audit(4366.455:68364): avc: denied { prog_load } for pid=27214 comm="syz.1.5166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4560.527606][ T29] audit: type=1400 audit(4366.492:68365): avc: denied { bpf } for pid=27214 comm="syz.1.5166" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4560.591176][ T29] audit: type=1400 audit(4366.557:68366): avc: denied { perfmon } for pid=27214 comm="syz.1.5166" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4560.591483][ T29] audit: type=1400 audit(4366.557:68367): avc: denied { perfmon } for pid=27214 comm="syz.1.5166" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4560.591648][ T29] audit: type=1400 audit(4366.557:68368): avc: denied { perfmon } for pid=27214 comm="syz.1.5166" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4560.591865][ T29] audit: type=1400 audit(4366.557:68369): avc: denied { perfmon } for pid=27214 comm="syz.1.5166" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4560.713665][ T29] audit: type=1400 audit(4366.677:68370): avc: denied { perfmon } for pid=27214 comm="syz.1.5166" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4560.726217][ T29] audit: type=1400 audit(4366.686:68371): avc: denied { bpf } for pid=27214 comm="syz.1.5166" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4560.909160][ T29] audit: type=1400 audit(4366.852:68372): avc: denied { bpf } for pid=27214 comm="syz.1.5166" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4571.028901][T27207] alloc_vmap_area: 6 callbacks suppressed [ 4571.030366][T27207] vmalloc_node_range for size 536875008 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 4571.031566][T27207] syz.0.5163: vmalloc error: size 536870904, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 4571.035033][T27207] CPU: 0 UID: 0 PID: 27207 Comm: syz.0.5163 Not tainted syzkaller #0 PREEMPT [ 4571.035137][T27207] Hardware name: ARM-Versatile Express [ 4571.035182][T27207] Call trace: [ 4571.035218][T27207] [<80201a40>] (dump_backtrace) from [<80201b34>] (show_stack+0x18/0x1c) [ 4571.035405][T27207] r7:60000013 r6:60000013 r5:822a20d0 r4:00000000 [ 4571.035430][T27207] [<80201b1c>] (show_stack) from [<8021ed6c>] (dump_stack_lvl+0x5c/0x70) [ 4571.035493][T27207] [<8021ed10>] (dump_stack_lvl) from [<8021ed98>] (dump_stack+0x18/0x1c) [ 4571.035595][T27207] r7:00000000 r6:822bdbf4 r5:850e5400 r4:00000000 [ 4571.035616][T27207] [<8021ed80>] (dump_stack) from [<80506d78>] (warn_alloc+0xdc/0x184) [ 4571.035711][T27207] [<80506c9c>] (warn_alloc) from [<804f4ee0>] (__vmalloc_node_range_noprof+0xbc/0x668) [ 4571.035780][T27207] r3:1ffffff8 r2:822bdbf4 [ 4571.035813][T27207] r7:822bdc2c r6:00000dc0 r5:ff800000 r4:df800000 [ 4571.035833][T27207] [<804f4e24>] (__vmalloc_node_range_noprof) from [<80516f64>] (__kvmalloc_node_noprof+0x298/0x714) [ 4571.035915][T27207] r10:84d41400 r9:000029c0 r8:850e5400 r7:00000000 r6:ea5a5cf8 r5:00000400 [ 4571.035939][T27207] r4:1ffffff8 [ 4571.035958][T27207] [<80516ccc>] (__kvmalloc_node_noprof) from [<81763220>] (xt_alloc_entry_offsets+0x28/0x34) [ 4571.036049][T27207] r10:84d41400 r9:ea5a5d00 r8:851fdd00 r7:00000000 r6:ea5a5cf8 r5:84d41440 [ 4571.036073][T27207] r4:07fffffe [ 4571.036094][T27207] [<817631f8>] (xt_alloc_entry_offsets) from [<818f2bd0>] (translate_table+0x74/0x764) [ 4571.036226][T27207] [<818f2b5c>] (translate_table) from [<818f3d98>] (do_replace+0xf4/0x5f0) [ 4571.036310][T27207] r10:00000000 r9:20000060 r8:851fdd00 r7:84d41440 r6:ea5a5cf8 r5:000002d0 [ 4571.036334][T27207] r4:84d41400 [ 4571.036354][T27207] [<818f3ca4>] (do_replace) from [<818f43c8>] (do_ip6t_set_ctl+0x134/0x29c) [ 4571.036431][T27207] r10:00000126 r9:81591d34 r8:00000330 r7:85c054e4 r6:ea5a5da8 r5:00000040 [ 4571.036498][T27207] r4:84572100 [ 4571.036521][T27207] [<818f4294>] (do_ip6t_set_ctl) from [<816eaf38>] (nf_setsockopt+0x54/0x70) [ 4571.036599][T27207] r10:00000126 r9:81591d34 r8:00000330 r7:85c054e4 r6:00000040 r5:818f4294 [ 4571.036625][T27207] r4:829f5378 [ 4571.036642][T27207] [<816eaee8>] (nf_setsockopt) from [<818aa1d8>] (ipv6_setsockopt+0x9c/0xbc) [ 4571.036709][T27207] r6:00000330 r5:84572100 r4:00000040 [ 4571.036727][T27207] [<818aa140>] (ipv6_setsockopt) from [<8179a234>] (tcp_setsockopt+0x3c/0x58) [ 4571.036791][T27207] r6:00000029 r5:85c04fc0 r4:818aa13c [ 4571.036809][T27207] [<8179a1fc>] (tcp_setsockopt) from [<81591d6c>] (sock_common_setsockopt+0x38/0x40) [ 4571.036865][T27207] r4:8179a1f8 [ 4571.036938][T27207] [<81591d38>] (sock_common_setsockopt) from [<8199e67c>] (smc_setsockopt+0xac/0x354) [ 4571.037007][T27207] r4:00000040 [ 4571.037026][T27207] [<8199e5d4>] (smc_setsockopt) from [<8158d5b4>] (do_sock_setsockopt+0x70/0xc8) [ 4571.037097][T27207] r9:850e5400 r8:00000330 r7:855a6000 r6:00000040 r5:00000029 r4:8199e5d0 [ 4571.037129][T27207] [<8158d544>] (do_sock_setsockopt) from [<81590fd0>] (__sys_setsockopt+0x7c/0xc4) [ 4571.037204][T27207] r8:00000000 r7:86692cc0 r6:86692cc1 r5:00000040 r4:00000029 [ 4571.037223][T27207] [<81590f54>] (__sys_setsockopt) from [<81591034>] (sys_setsockopt+0x1c/0x24) [ 4571.037283][T27207] r8:8020029c r7:00000126 r6:00346318 r5:00000000 r4:00000330 [ 4571.037303][T27207] [<81591018>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4571.037356][T27207] Exception stack(0xea5a5fa8 to 0xea5a5ff0) [ 4571.037450][T27207] 5fa0: 00000330 00000000 00000003 00000029 00000040 20000000 [ 4571.037494][T27207] 5fc0: 00000330 00000000 00346318 00000126 003462d8 00000000 00000001 76f050dc [ 4571.037524][T27207] 5fe0: 76f04e88 76f04e78 00018734 0012fc20 [ 4571.072861][T27207] Mem-Info: [ 4571.073631][T27207] active_anon:6364 inactive_anon:0 isolated_anon:0 [ 4571.073631][T27207] active_file:2049 inactive_file:41443 isolated_file:0 [ 4571.073631][T27207] unevictable:768 dirty:6 writeback:0 [ 4571.073631][T27207] slab_reclaimable:1388 slab_unreclaimable:7471 [ 4571.073631][T27207] mapped:2448 shmem:3636 pagetables:792 [ 4571.073631][T27207] sec_pagetables:0 bounce:0 [ 4571.073631][T27207] kernel_misc_reclaimable:0 [ 4571.073631][T27207] free:397179 free_pcp:1238 free_cma:4032 [ 4571.083226][T27207] Node 0 active_anon:25456kB inactive_anon:0kB active_file:8196kB inactive_file:165772kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:9792kB dirty:24kB writeback:0kB shmem:14544kB kernel_stack:2384kB pagetables:3168kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 4571.085645][T27207] Normal free:1363196kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:6872kB unevictable:0kB writepending:4kB zspages:0kB present:1556480kB managed:1426896kB mlocked:0kB bounce:0kB free_pcp:4952kB local_pcp:2344kB free_cma:0kB [ 4571.087751][T27207] lowmem_reserve[]: 0 4224 4224 [ 4571.090015][T27207] Normal: 1*4kB (M) 3*8kB (UME) 2*16kB (UE) 2*32kB (UM) 0*64kB 1*128kB (E) 2*256kB (ME) 1*512kB (E) 4*1024kB (ME) 3*2048kB (UM) 330*4096kB (UM) = 1363196kB [ 4571.109106][T27207] 47130 total pagecache pages [ 4571.109935][T27207] 0 pages in swap cache [ 4571.110702][T27207] Free swap = 124996kB [ 4571.111405][T27207] Total swap = 124996kB [ 4571.112322][T27207] 524288 pages RAM [ 4571.118536][T27207] 135168 pages HighMem/MovableOnly [ 4571.125408][T27207] 32396 pages reserved [ 4571.126030][T27207] 4096 pages cma reserved [ 4573.055352][ T29] audit: type=1400 audit(4378.057:68379): avc: denied { map_create } for pid=27224 comm="syz.0.5169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4573.110935][ T29] audit: type=1400 audit(4378.094:68380): avc: denied { perfmon } for pid=27224 comm="syz.0.5169" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4573.118604][ T29] audit: type=1400 audit(4378.113:68381): avc: denied { map_read map_write } for pid=27224 comm="syz.0.5169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4573.235246][ T29] audit: type=1400 audit(4378.223:68382): avc: denied { prog_load } for pid=27224 comm="syz.0.5169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4573.253856][ T29] audit: type=1400 audit(4378.242:68383): avc: denied { bpf } for pid=27224 comm="syz.0.5169" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4573.270985][ T29] audit: type=1400 audit(4378.270:68384): avc: denied { prog_load } for pid=27224 comm="syz.0.5169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4573.299273][ T29] audit: type=1400 audit(4378.288:68385): avc: denied { bpf } for pid=27224 comm="syz.0.5169" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4573.324086][ T29] audit: type=1400 audit(4378.307:68386): avc: denied { perfmon } for pid=27224 comm="syz.0.5169" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4573.333360][ T29] audit: type=1400 audit(4378.316:68387): avc: denied { perfmon } for pid=27224 comm="syz.0.5169" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4576.490302][ T29] kauditd_printk_skb: 381 callbacks suppressed [ 4576.490711][ T29] audit: type=1400 audit(4381.232:68769): avc: denied { search } for pid=27223 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4576.494532][ T29] audit: type=1400 audit(4381.232:68770): avc: denied { search } for pid=27223 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4576.502671][ T29] audit: type=1400 audit(4381.232:68771): avc: denied { search } for pid=27223 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4576.534768][ T29] audit: type=1400 audit(4381.279:68772): avc: denied { search } for pid=27223 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4576.539885][ T29] audit: type=1400 audit(4381.279:68773): avc: denied { search } for pid=27223 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4576.544328][ T29] audit: type=1400 audit(4381.288:68774): avc: denied { search } for pid=27223 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4576.568141][ T29] audit: type=1400 audit(4381.288:68775): avc: denied { getattr } for pid=27223 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4576.639055][ T29] audit: type=1400 audit(4381.362:68776): avc: denied { search } for pid=27223 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4576.639464][ T29] audit: type=1400 audit(4381.362:68777): avc: denied { search } for pid=27223 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4576.639690][ T29] audit: type=1400 audit(4381.362:68778): avc: denied { search } for pid=27223 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4580.500975][T27237] SELinux: failed to load policy [ 4583.094061][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 4583.096200][ T29] audit: type=1400 audit(4387.315:68847): avc: denied { create } for pid=27240 comm="syz.0.5174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4583.162977][ T29] audit: type=1400 audit(4387.398:68848): avc: denied { setopt } for pid=27240 comm="syz.0.5174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4583.167214][ T29] audit: type=1400 audit(4387.398:68849): avc: denied { prog_load } for pid=27240 comm="syz.0.5174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4583.171304][ T29] audit: type=1400 audit(4387.398:68850): avc: denied { bpf } for pid=27240 comm="syz.0.5174" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4583.183558][ T29] audit: type=1400 audit(4387.417:68851): avc: denied { prog_load } for pid=27240 comm="syz.0.5174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4583.187491][ T29] audit: type=1400 audit(4387.417:68852): avc: denied { bpf } for pid=27240 comm="syz.0.5174" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4583.193474][ T29] audit: type=1400 audit(4387.417:68853): avc: denied { perfmon } for pid=27240 comm="syz.0.5174" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4583.196720][ T29] audit: type=1400 audit(4387.426:68854): avc: denied { perfmon } for pid=27240 comm="syz.0.5174" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4583.201059][ T29] audit: type=1400 audit(4387.426:68855): avc: denied { perfmon } for pid=27240 comm="syz.0.5174" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4583.215429][ T29] audit: type=1400 audit(4387.435:68856): avc: denied { perfmon } for pid=27240 comm="syz.0.5174" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4589.439330][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 4589.439620][ T29] audit: type=1400 audit(4393.185:68862): avc: denied { prog_load } for pid=27244 comm="syz.0.5176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4589.459291][ T29] audit: type=1400 audit(4393.204:68863): avc: denied { bpf } for pid=27244 comm="syz.0.5176" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4589.464934][ T29] audit: type=1400 audit(4393.204:68864): avc: denied { perfmon } for pid=27244 comm="syz.0.5176" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4589.509979][ T29] audit: type=1400 audit(4393.222:68865): avc: denied { perfmon } for pid=27244 comm="syz.0.5176" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4589.510346][ T29] audit: type=1400 audit(4393.241:68866): avc: denied { perfmon } for pid=27244 comm="syz.0.5176" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4589.510554][ T29] audit: type=1400 audit(4393.241:68867): avc: denied { perfmon } for pid=27244 comm="syz.0.5176" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4589.560500][ T29] audit: type=1400 audit(4393.296:68868): avc: denied { perfmon } for pid=27244 comm="syz.0.5176" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4589.575788][ T29] audit: type=1400 audit(4393.305:68869): avc: denied { bpf } for pid=27244 comm="syz.0.5176" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4589.598193][ T29] audit: type=1400 audit(4393.324:68870): avc: denied { bpf } for pid=27244 comm="syz.0.5176" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4589.612705][ T29] audit: type=1400 audit(4393.342:68871): avc: denied { prog_run } for pid=27244 comm="syz.0.5176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4596.694279][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 4596.694655][ T29] audit: type=1400 audit(4399.877:68876): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4596.698047][ T29] audit: type=1400 audit(4399.886:68877): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4596.701464][ T29] audit: type=1400 audit(4399.886:68878): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4597.066896][ T29] audit: type=1400 audit(4400.228:68879): avc: denied { map_create } for pid=27258 comm="syz.0.5182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4597.069689][ T29] audit: type=1400 audit(4400.228:68880): avc: denied { perfmon } for pid=27258 comm="syz.0.5182" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4597.085553][ T29] audit: type=1400 audit(4400.246:68881): avc: denied { map_read map_write } for pid=27258 comm="syz.0.5182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4597.098402][ T29] audit: type=1400 audit(4400.255:68882): avc: denied { map_create } for pid=27258 comm="syz.0.5182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4597.102628][ T29] audit: type=1400 audit(4400.255:68883): avc: denied { map_read map_write } for pid=27258 comm="syz.0.5182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4597.132445][ T29] audit: type=1400 audit(4400.283:68884): avc: denied { prog_load } for pid=27258 comm="syz.0.5182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4597.135550][ T29] audit: type=1400 audit(4400.283:68885): avc: denied { bpf } for pid=27258 comm="syz.0.5182" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4602.137886][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 4602.139266][ T29] audit: type=1400 audit(4404.907:68934): avc: denied { create } for pid=27271 comm="syz.1.5187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4602.199281][ T29] audit: type=1400 audit(4404.963:68935): avc: denied { prog_load } for pid=27271 comm="syz.1.5187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4602.201590][ T29] audit: type=1400 audit(4404.963:68936): avc: denied { bpf } for pid=27271 comm="syz.1.5187" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4602.207921][ T29] audit: type=1400 audit(4404.963:68937): avc: denied { perfmon } for pid=27271 comm="syz.1.5187" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4602.254742][ T29] audit: type=1400 audit(4405.018:68938): avc: denied { perfmon } for pid=27271 comm="syz.1.5187" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4602.258558][ T29] audit: type=1400 audit(4405.018:68939): avc: denied { perfmon } for pid=27271 comm="syz.1.5187" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4602.293374][ T29] audit: type=1400 audit(4405.046:68940): avc: denied { perfmon } for pid=27271 comm="syz.1.5187" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4602.308649][ T29] audit: type=1400 audit(4405.064:68941): avc: denied { bpf } for pid=27271 comm="syz.1.5187" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4602.316262][ T29] audit: type=1400 audit(4405.064:68942): avc: denied { bpf } for pid=27271 comm="syz.1.5187" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4602.355133][ T29] audit: type=1400 audit(4405.101:68943): avc: denied { prog_run } for pid=27271 comm="syz.1.5187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4605.624295][T27288] dvmrp6: entered allmulticast mode [ 4607.564836][ T29] kauditd_printk_skb: 311 callbacks suppressed [ 4607.565192][ T29] audit: type=1400 audit(4409.919:69255): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4607.570954][ T29] audit: type=1400 audit(4409.919:69256): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4607.585964][ T29] audit: type=1400 audit(4409.938:69257): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4607.593961][ T29] audit: type=1400 audit(4409.947:69258): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4607.625215][ T29] audit: type=1400 audit(4409.947:69259): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4607.630438][ T29] audit: type=1400 audit(4409.975:69260): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4607.640112][ T29] audit: type=1400 audit(4409.984:69261): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4607.667278][ T29] audit: type=1400 audit(4410.002:69262): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4607.680162][ T29] audit: type=1400 audit(4410.012:69263): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4607.727917][ T29] audit: type=1400 audit(4410.039:69264): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4613.001191][ T29] kauditd_printk_skb: 553 callbacks suppressed [ 4613.002574][ T29] audit: type=1400 audit(4414.931:69818): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4613.020484][ T29] audit: type=1400 audit(4414.950:69819): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4613.037692][ T29] audit: type=1400 audit(4414.968:69820): avc: denied { create } for pid=27309 comm="syz.1.5205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4613.040842][ T29] audit: type=1400 audit(4414.968:69821): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4613.050539][ T29] audit: type=1400 audit(4414.977:69822): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4613.061861][ T29] audit: type=1400 audit(4414.987:69823): avc: denied { bind } for pid=27309 comm="syz.1.5205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4613.074503][ T29] audit: type=1400 audit(4414.996:69824): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4613.099140][ T29] audit: type=1400 audit(4415.023:69825): avc: denied { write } for pid=27283 comm="syz.0.5194" laddr=172.20.20.10 lport=256 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4613.104200][ T29] audit: type=1400 audit(4415.023:69826): avc: denied { setopt } for pid=27309 comm="syz.1.5205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4613.138790][ T29] audit: type=1400 audit(4415.033:69827): avc: denied { setopt } for pid=27309 comm="syz.1.5205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4618.888545][ T29] kauditd_printk_skb: 305 callbacks suppressed [ 4618.888917][ T29] audit: type=1400 audit(4420.368:70133): avc: denied { read write } for pid=27334 comm="syz.1.5215" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4618.895828][ T29] audit: type=1400 audit(4420.377:70134): avc: denied { read write open } for pid=27334 comm="syz.1.5215" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4619.057296][ T29] audit: type=1400 audit(4420.515:70135): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4619.077182][ T29] audit: type=1400 audit(4420.534:70136): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4619.077605][ T29] audit: type=1400 audit(4420.534:70137): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4619.556737][ T29] audit: type=1400 audit(4420.986:70138): avc: denied { create } for pid=27338 comm="syz.1.5217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4619.589307][ T29] audit: type=1400 audit(4421.014:70139): avc: denied { setopt } for pid=27338 comm="syz.1.5217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 4619.720118][ T29] audit: type=1400 audit(4421.134:70140): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4619.722746][ T29] audit: type=1400 audit(4421.134:70141): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4619.748552][ T29] audit: type=1400 audit(4421.152:70142): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4624.339604][ T29] kauditd_printk_skb: 69 callbacks suppressed [ 4624.340101][ T29] audit: type=1400 audit(4425.398:70212): avc: denied { ioctl } for pid=27370 comm="syz.0.5226" path="socket:[57366]" dev="sockfs" ino=57366 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4624.362457][ T29] audit: type=1400 audit(4425.416:70213): avc: denied { module_request } for pid=27370 comm="syz.0.5226" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4624.660411][ T29] audit: type=1400 audit(4425.693:70214): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4624.677031][ T29] audit: type=1400 audit(4425.703:70215): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4624.707000][ T29] audit: type=1400 audit(4425.739:70216): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4624.832875][ T29] audit: type=1400 audit(4425.841:70217): avc: denied { read } for pid=27370 comm="syz.0.5226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4624.901768][ T29] audit: type=1400 audit(4425.915:70218): avc: denied { write } for pid=27370 comm="syz.0.5226" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4625.108406][ T29] audit: type=1400 audit(4426.109:70219): avc: denied { sys_module } for pid=27370 comm="syz.0.5226" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4625.131541][ T29] audit: type=1400 audit(4426.127:70220): avc: denied { module_request } for pid=27370 comm="syz.0.5226" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4625.337338][ T29] audit: type=1400 audit(4426.312:70221): avc: denied { mount } for pid=27375 comm="syz.1.5227" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 4626.658471][T27383] SELinux: failed to load policy [ 4630.604261][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 4630.604689][ T29] audit: type=1400 audit(4431.176:70267): avc: denied { map_create } for pid=27397 comm="syz.0.5235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4630.631144][ T29] audit: type=1400 audit(4431.204:70268): avc: denied { perfmon } for pid=27397 comm="syz.0.5235" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4630.648978][ T29] audit: type=1400 audit(4431.213:70269): avc: denied { map_read map_write } for pid=27397 comm="syz.0.5235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4630.788696][ T29] audit: type=1400 audit(4431.342:70270): avc: denied { prog_load } for pid=27397 comm="syz.0.5235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4630.799070][ T29] audit: type=1400 audit(4431.351:70271): avc: denied { bpf } for pid=27397 comm="syz.0.5235" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4630.817122][ T29] audit: type=1400 audit(4431.379:70272): avc: denied { perfmon } for pid=27397 comm="syz.0.5235" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4630.891021][ T29] audit: type=1400 audit(4431.434:70273): avc: denied { perfmon } for pid=27397 comm="syz.0.5235" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4630.915202][ T29] audit: type=1400 audit(4431.453:70274): avc: denied { perfmon } for pid=27397 comm="syz.0.5235" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4630.958478][ T29] audit: type=1400 audit(4431.471:70275): avc: denied { perfmon } for pid=27397 comm="syz.0.5235" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4631.032014][ T29] audit: type=1400 audit(4431.573:70276): avc: denied { perfmon } for pid=27397 comm="syz.0.5235" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4633.819984][T27406] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 4636.079720][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 4636.080065][ T29] audit: type=1400 audit(4436.216:70322): avc: denied { execmem } for pid=27413 comm="syz.1.5243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4636.423397][ T29] audit: type=1400 audit(4436.539:70323): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4636.429346][ T29] audit: type=1400 audit(4436.557:70324): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4636.450620][ T29] audit: type=1400 audit(4436.576:70325): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4636.986295][ T29] audit: type=1326 audit(4437.065:70326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27416 comm="syz.1.5244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 4636.996581][ T29] audit: type=1326 audit(4437.074:70327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27416 comm="syz.1.5244" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 4636.996917][ T29] audit: type=1400 audit(4437.074:70328): avc: denied { read write } for pid=27416 comm="syz.1.5244" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4637.017980][ T29] audit: type=1400 audit(4437.092:70329): avc: denied { read open } for pid=27416 comm="syz.1.5244" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4637.024954][ T29] audit: type=1326 audit(4437.102:70330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27416 comm="syz.1.5244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 4637.027055][ T29] audit: type=1326 audit(4437.102:70331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=27416 comm="syz.1.5244" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x12fc20 code=0x7ffc0000 [ 4640.857275][T27436] syzkaller0: entered promiscuous mode [ 4640.857841][T27436] syzkaller0: entered allmulticast mode [ 4641.798045][ T29] kauditd_printk_skb: 61 callbacks suppressed [ 4641.798502][ T29] audit: type=1400 audit(4441.514:70393): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4641.803981][ T29] audit: type=1400 audit(4441.514:70394): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4641.928537][ T29] audit: type=1400 audit(4441.634:70395): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4642.527316][ T29] audit: type=1400 audit(4442.187:70396): avc: denied { block_suspend } for pid=27443 comm="syz.0.5255" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4642.569275][ T29] audit: type=1400 audit(4442.224:70397): avc: denied { block_suspend } for pid=27443 comm="syz.0.5255" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4642.833110][ T29] audit: type=1400 audit(4442.464:70398): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4642.847470][ T29] audit: type=1400 audit(4442.473:70399): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4642.847943][ T29] audit: type=1400 audit(4442.473:70400): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4643.890782][ T29] audit: type=1400 audit(4443.443:70401): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4643.894559][ T29] audit: type=1400 audit(4443.443:70402): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4648.593205][ T29] kauditd_printk_skb: 42 callbacks suppressed [ 4648.600957][ T29] audit: type=1400 audit(4447.781:70445): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4648.606861][ T29] audit: type=1400 audit(4447.799:70446): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4648.618105][ T29] audit: type=1400 audit(4447.808:70447): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4648.956038][ T29] audit: type=1400 audit(4448.113:70448): avc: denied { prog_load } for pid=27485 comm="syz.1.5268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4648.968576][ T29] audit: type=1400 audit(4448.122:70449): avc: denied { bpf } for pid=27485 comm="syz.1.5268" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4648.973815][ T29] audit: type=1400 audit(4448.131:70450): avc: denied { allowed } for pid=27486 comm="syz.0.5267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 4648.977647][ T29] audit: type=1400 audit(4448.131:70451): avc: denied { map_create } for pid=27485 comm="syz.1.5268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4648.985071][ T29] audit: type=1400 audit(4448.141:70452): avc: denied { bpf } for pid=27485 comm="syz.1.5268" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4648.996771][ T29] audit: type=1400 audit(4448.159:70453): avc: denied { create } for pid=27486 comm="syz.0.5267" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4649.007706][ T29] audit: type=1400 audit(4448.168:70454): avc: denied { map_read map_write } for pid=27485 comm="syz.1.5268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4654.114487][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 4654.115692][ T29] audit: type=1400 audit(4452.876:70520): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4654.117600][ T29] audit: type=1400 audit(4452.885:70521): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4654.128271][ T29] audit: type=1400 audit(4452.885:70522): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4654.331751][ T29] audit: type=1400 audit(4453.079:70523): avc: denied { create } for pid=27510 comm="syz.0.5277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4654.361740][ T29] audit: type=1400 audit(4453.106:70524): avc: denied { write } for pid=27510 comm="syz.0.5277" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4654.824324][ T29] audit: type=1400 audit(4453.531:70525): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4654.827971][ T29] audit: type=1400 audit(4453.531:70526): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4654.855435][ T29] audit: type=1400 audit(4453.568:70527): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4655.029401][ T29] audit: type=1400 audit(4453.725:70528): avc: denied { allowed } for pid=27514 comm="syz.0.5279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 4655.109812][ T29] audit: type=1400 audit(4453.799:70529): avc: denied { create } for pid=27514 comm="syz.0.5279" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4659.547499][ T29] kauditd_printk_skb: 106 callbacks suppressed [ 4659.547951][ T29] audit: type=1400 audit(4457.897:70636): avc: denied { write } for pid=27532 comm="syz.1.5288" laddr=::1 lport=4 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4659.560213][ T29] audit: type=1400 audit(4457.906:70637): avc: denied { write } for pid=27532 comm="syz.1.5288" laddr=::1 lport=4 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4659.655512][ T29] audit: type=1400 audit(4457.998:70638): avc: denied { write } for pid=27532 comm="syz.1.5288" laddr=::1 lport=4 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4659.669634][ T29] audit: type=1400 audit(4458.008:70639): avc: denied { write } for pid=27532 comm="syz.1.5288" laddr=::1 lport=4 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4659.712986][ T29] audit: type=1400 audit(4458.044:70640): avc: denied { write } for pid=27532 comm="syz.1.5288" laddr=::1 lport=4 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4659.731569][ T29] audit: type=1400 audit(4458.063:70641): avc: denied { write } for pid=27532 comm="syz.1.5288" laddr=::1 lport=4 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4659.744565][ T29] audit: type=1400 audit(4458.072:70642): avc: denied { write } for pid=27532 comm="syz.1.5288" laddr=::1 lport=4 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4659.786423][ T29] audit: type=1400 audit(4458.091:70643): avc: denied { write } for pid=27532 comm="syz.1.5288" laddr=::1 lport=4 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4659.806865][ T29] audit: type=1400 audit(4458.128:70644): avc: denied { create } for pid=27557 comm="syz.0.5290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4659.819199][ T29] audit: type=1400 audit(4458.146:70645): avc: denied { write } for pid=27532 comm="syz.1.5288" laddr=::1 lport=4 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4662.610091][T27569] netlink: 'syz.0.5294': attribute type 10 has an invalid length. [ 4665.008215][ T29] kauditd_printk_skb: 126 callbacks suppressed [ 4665.009718][ T29] audit: type=1400 audit(4462.936:70772): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4665.036251][ T29] audit: type=1400 audit(4462.955:70773): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4665.038191][ T29] audit: type=1400 audit(4462.955:70774): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4665.415462][ T29] audit: type=1400 audit(4463.296:70775): avc: denied { execmem } for pid=27579 comm="syz.1.5299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4665.900365][ T29] audit: type=1400 audit(4463.758:70776): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4665.920685][ T29] audit: type=1400 audit(4463.776:70777): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4665.921078][ T29] audit: type=1400 audit(4463.776:70778): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4666.238333][ T29] audit: type=1400 audit(4464.062:70779): avc: denied { create } for pid=27582 comm="syz.0.5300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4666.264821][ T29] audit: type=1400 audit(4464.099:70780): avc: denied { setopt } for pid=27582 comm="syz.0.5300" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4666.977552][ T29] audit: type=1400 audit(4464.755:70781): avc: denied { create } for pid=27584 comm="syz.1.5301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4670.457736][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 4670.458406][ T29] audit: type=1400 audit(4467.967:70842): avc: denied { bpf } for pid=27608 comm="syz.1.5311" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4670.477642][ T29] audit: type=1400 audit(4467.985:70843): avc: denied { perfmon } for pid=27608 comm="syz.1.5311" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4670.489836][ T29] audit: type=1400 audit(4467.994:70844): avc: denied { bpf } for pid=27608 comm="syz.1.5311" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4670.501695][ T29] audit: type=1400 audit(4468.004:70845): avc: denied { perfmon } for pid=27608 comm="syz.1.5311" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4670.512608][ T29] audit: type=1400 audit(4468.013:70846): avc: denied { bpf } for pid=27608 comm="syz.1.5311" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4670.531547][ T29] audit: type=1400 audit(4468.031:70847): avc: denied { perfmon } for pid=27608 comm="syz.1.5311" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4670.545763][ T29] audit: type=1400 audit(4468.041:70848): avc: denied { bpf } for pid=27608 comm="syz.1.5311" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4670.565507][ T29] audit: type=1400 audit(4468.059:70849): avc: denied { perfmon } for pid=27608 comm="syz.1.5311" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4670.578146][ T29] audit: type=1400 audit(4468.077:70850): avc: denied { bpf } for pid=27608 comm="syz.1.5311" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4670.605011][ T29] audit: type=1400 audit(4468.077:70851): avc: denied { perfmon } for pid=27608 comm="syz.1.5311" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4672.517538][T27621] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5317'. [ 4672.526035][T27621] netlink: 28 bytes leftover after parsing attributes in process `syz.0.5317'. [ 4672.533762][T27621] netlink: 'syz.0.5317': attribute type 6 has an invalid length. [ 4676.115994][ T29] kauditd_printk_skb: 46 callbacks suppressed [ 4676.116514][ T29] audit: type=1400 audit(4473.182:70898): avc: denied { allowed } for pid=27640 comm="syz.1.5323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 4676.178578][ T29] audit: type=1400 audit(4473.237:70899): avc: denied { create } for pid=27640 comm="syz.1.5323" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4676.197954][ T29] audit: type=1400 audit(4473.265:70900): avc: denied { map } for pid=27640 comm="syz.1.5323" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=57203 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4676.219182][ T29] audit: type=1400 audit(4473.274:70901): avc: denied { read write } for pid=27640 comm="syz.1.5323" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=57203 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4676.243479][ T29] audit: type=1400 audit(4473.302:70902): avc: denied { map } for pid=27640 comm="syz.1.5323" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=57203 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4676.250392][ T29] audit: type=1400 audit(4473.302:70903): avc: denied { read write } for pid=27640 comm="syz.1.5323" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=57203 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4676.374421][ T29] audit: type=1400 audit(4473.422:70904): avc: denied { read } for pid=27640 comm="syz.1.5323" name="random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4676.401096][ T29] audit: type=1400 audit(4473.449:70905): avc: denied { read open } for pid=27640 comm="syz.1.5323" path="/dev/random" dev="devtmpfs" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4676.863346][ T29] audit: type=1400 audit(4473.874:70906): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4676.891781][ T29] audit: type=1400 audit(4473.902:70907): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4678.650250][T27652] geneve2: entered promiscuous mode [ 4680.857258][T27658] netlink: 1096 bytes leftover after parsing attributes in process `syz.1.5330'. [ 4681.608663][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 4681.609254][ T29] audit: type=1400 audit(4478.258:70928): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4681.623586][ T29] audit: type=1400 audit(4478.267:70929): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4681.626957][ T29] audit: type=1400 audit(4478.277:70930): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4681.725031][ T29] audit: type=1400 audit(4478.369:70931): avc: denied { create } for pid=27663 comm="syz.0.5333" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4681.748473][ T29] audit: type=1400 audit(4478.387:70932): avc: denied { ioctl } for pid=27663 comm="syz.0.5333" path="socket:[57742]" dev="sockfs" ino=57742 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4681.837210][T27664] netlink: 'syz.0.5333': attribute type 10 has an invalid length. [ 4681.856400][T27664] syz_tun: entered promiscuous mode [ 4682.183153][ T29] audit: type=1400 audit(4478.784:70933): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4682.208043][ T29] audit: type=1400 audit(4478.803:70934): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4682.208600][ T29] audit: type=1400 audit(4478.803:70935): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4682.559101][T27670] netlink: 36 bytes leftover after parsing attributes in process `syz.1.5336'. [ 4682.589878][ T29] audit: type=1400 audit(4479.153:70936): avc: denied { create } for pid=27667 comm="syz.0.5335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4682.596414][ T29] audit: type=1400 audit(4479.163:70937): avc: denied { create } for pid=27667 comm="syz.0.5335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4687.327610][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 4687.328094][ T29] audit: type=1400 audit(4483.538:70996): avc: denied { create } for pid=27694 comm="syz.1.5346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4687.347822][ T29] audit: type=1400 audit(4483.556:70997): avc: denied { setopt } for pid=27694 comm="syz.1.5346" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4687.363869][ T29] audit: type=1400 audit(4483.565:70998): avc: denied { connect } for pid=27694 comm="syz.1.5346" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4687.393973][ T29] audit: type=1400 audit(4483.593:70999): avc: denied { prog_load } for pid=27694 comm="syz.1.5346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4687.402774][ T29] audit: type=1400 audit(4483.602:71000): avc: denied { bpf } for pid=27694 comm="syz.1.5346" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4687.440662][ T29] audit: type=1400 audit(4483.639:71001): avc: denied { setopt } for pid=27694 comm="syz.1.5346" laddr=fe80::11 lport=58 faddr=ff02::1 fport=65534 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4687.463465][ T29] audit: type=1400 audit(4483.667:71002): avc: denied { write } for pid=27694 comm="syz.1.5346" path="socket:[57789]" dev="sockfs" ino=57789 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4687.471160][ T29] audit: type=1400 audit(4483.667:71003): avc: denied { map_create } for pid=27695 comm="syz.0.5347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4687.473885][ T29] audit: type=1400 audit(4483.667:71004): avc: denied { write } for pid=27694 comm="syz.1.5346" laddr=fe80::11 lport=58 faddr=ff02::1 fport=65534 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4687.495380][ T29] audit: type=1400 audit(4483.685:71005): avc: denied { perfmon } for pid=27695 comm="syz.0.5347" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4692.975165][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 4692.975511][ T29] audit: type=1400 audit(4488.743:71063): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4692.990823][ T29] audit: type=1400 audit(4488.762:71064): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4692.998761][ T29] audit: type=1400 audit(4488.762:71065): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4694.172399][ T29] audit: type=1400 audit(4489.842:71066): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4694.172892][ T29] audit: type=1400 audit(4489.842:71067): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4694.173021][ T29] audit: type=1400 audit(4489.860:71068): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4695.168046][ T29] audit: type=1400 audit(4490.774:71069): avc: denied { create } for pid=27735 comm="syz.1.5362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4695.259182][ T29] audit: type=1400 audit(4490.857:71070): avc: denied { write } for pid=27735 comm="syz.1.5362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4695.362256][ T29] audit: type=1400 audit(4490.949:71071): avc: denied { write } for pid=27735 comm="syz.1.5362" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4695.582364][ T29] audit: type=1400 audit(4491.152:71072): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4698.607791][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 4698.608240][ T29] audit: type=1400 audit(4493.949:71129): avc: denied { create } for pid=27749 comm="syz.1.5369" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 4698.906651][ T29] audit: type=1400 audit(4494.226:71130): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4698.908925][ T29] audit: type=1400 audit(4494.226:71131): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4698.947564][ T29] audit: type=1400 audit(4494.254:71132): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4699.452009][ T29] audit: type=1400 audit(4494.725:71133): avc: denied { read } for pid=27753 comm="syz.1.5371" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4699.474850][ T29] audit: type=1400 audit(4494.743:71134): avc: denied { read open } for pid=27753 comm="syz.1.5371" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4699.537027][ T29] audit: type=1400 audit(4494.808:71135): avc: denied { ioctl } for pid=27753 comm="syz.1.5371" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4699.720035][ T29] audit: type=1400 audit(4494.974:71136): avc: denied { module_request } for pid=27753 comm="syz.1.5371" kmod="ematch-kind-768" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4700.878644][ T29] audit: type=1400 audit(4496.044:71137): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4700.881963][ T29] audit: type=1400 audit(4496.044:71138): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4704.030926][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 4704.032608][ T29] audit: type=1400 audit(4498.952:71159): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4704.062168][ T29] audit: type=1400 audit(4498.989:71160): avc: denied { map } for pid=27771 comm="syz.0.5377" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=57876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4704.068105][ T29] audit: type=1400 audit(4498.989:71161): avc: denied { read write } for pid=27771 comm="syz.0.5377" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=57876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4704.104586][ T29] audit: type=1400 audit(4499.016:71162): avc: denied { map } for pid=27771 comm="syz.0.5377" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=57876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4704.106414][ T29] audit: type=1400 audit(4499.016:71163): avc: denied { read write } for pid=27771 comm="syz.0.5377" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=57876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4704.963920][ T29] audit: type=1400 audit(4499.819:71164): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4704.974239][ T29] audit: type=1400 audit(4499.819:71165): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4705.013759][ T29] audit: type=1400 audit(4499.838:71166): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4706.120398][ T29] audit: type=1400 audit(4500.881:71167): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4706.125931][ T29] audit: type=1400 audit(4500.881:71168): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4707.010504][T27787] wg1: entered allmulticast mode [ 4709.350882][T27800] syzkaller0: entered promiscuous mode [ 4709.351388][T27800] syzkaller0: entered allmulticast mode [ 4709.560124][ T29] kauditd_printk_skb: 55 callbacks suppressed [ 4709.561556][ T29] audit: type=1400 audit(4504.056:71224): avc: denied { create } for pid=27799 comm="syz.1.5390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4709.596044][ T29] audit: type=1400 audit(4504.084:71225): avc: denied { write } for pid=27799 comm="syz.1.5390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4709.943579][ T29] audit: type=1400 audit(4504.407:71226): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4709.944018][ T29] audit: type=1400 audit(4504.407:71227): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4709.944344][ T29] audit: type=1400 audit(4504.407:71228): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4710.430878][ T29] audit: type=1400 audit(4504.859:71229): avc: denied { read } for pid=27807 comm="syz.1.5392" dev="nsfs" ino=4026533150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4710.444235][ T29] audit: type=1400 audit(4504.878:71230): avc: denied { read open } for pid=27807 comm="syz.1.5392" path="net:[4026533150]" dev="nsfs" ino=4026533150 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4710.526980][ T29] audit: type=1400 audit(4504.924:71231): avc: denied { create } for pid=27807 comm="syz.1.5392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4710.639843][ T29] audit: type=1400 audit(4505.053:71232): avc: denied { create } for pid=27807 comm="syz.1.5392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4710.643697][ T29] audit: type=1400 audit(4505.053:71233): avc: denied { write } for pid=27807 comm="syz.1.5392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4715.234097][ T29] kauditd_printk_skb: 53 callbacks suppressed [ 4715.234503][ T29] audit: type=1400 audit(4509.299:71287): avc: denied { create } for pid=27828 comm="syz.0.5399" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4715.269853][ T29] audit: type=1400 audit(4509.326:71288): avc: denied { setopt } for pid=27828 comm="syz.0.5399" lport=10 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4715.291079][ T29] audit: type=1400 audit(4509.345:71289): avc: denied { write } for pid=27828 comm="syz.0.5399" lport=10 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4715.648914][ T29] audit: type=1400 audit(4509.677:71290): avc: denied { write } for pid=27830 comm="syz.1.5400" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4715.651548][ T29] audit: type=1400 audit(4509.677:71291): avc: denied { write open } for pid=27830 comm="syz.1.5400" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4715.828185][ T29] audit: type=1400 audit(4509.843:71292): avc: denied { ioctl } for pid=27830 comm="syz.1.5400" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4715.834281][ T29] audit: type=1400 audit(4509.843:71293): avc: denied { sys_module } for pid=27830 comm="syz.1.5400" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4715.850091][ T29] audit: type=1400 audit(4509.862:71294): avc: denied { module_request } for pid=27830 comm="syz.1.5400" kmod="tty-ldisc-14" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4716.959162][ T29] audit: type=1400 audit(4510.886:71295): avc: denied { create } for pid=27836 comm="syz.0.5402" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4716.992843][ T29] audit: type=1400 audit(4510.914:71296): avc: denied { connect } for pid=27836 comm="syz.0.5402" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4720.966898][ T29] kauditd_printk_skb: 40 callbacks suppressed [ 4720.968099][ T29] audit: type=1400 audit(4514.587:71337): avc: denied { execute } for pid=27850 comm="syz.0.5408" dev="tmpfs" ino=1187 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4721.003075][ T29] audit: type=1400 audit(4514.615:71338): avc: denied { execute_no_trans } for pid=27850 comm="syz.0.5408" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1187 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4721.128295][ T29] audit: type=1400 audit(4514.735:71339): avc: denied { execute } for pid=27850 comm="syz.0.5408" name="file0" dev="tmpfs" ino=1654 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4721.179601][ T29] audit: type=1400 audit(4514.772:71340): avc: denied { execute } for pid=27850 comm="syz.0.5408" dev="tmpfs" ino=1187 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4721.207170][ T29] audit: type=1400 audit(4514.809:71341): avc: denied { execute_no_trans } for pid=27850 comm="syz.0.5408" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1187 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4721.287956][ T29] audit: type=1400 audit(4514.883:71342): avc: denied { execute } for pid=27850 comm="syz.0.5408" name="file0" dev="tmpfs" ino=1654 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4721.352536][ T29] audit: type=1400 audit(4514.938:71343): avc: denied { execute } for pid=27850 comm="syz.0.5408" dev="tmpfs" ino=1187 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4721.481578][ T29] audit: type=1400 audit(4515.058:71344): avc: denied { execute_no_trans } for pid=27850 comm="syz.0.5408" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1187 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4721.641025][ T29] audit: type=1400 audit(4515.206:71345): avc: denied { execute } for pid=27850 comm="syz.0.5408" name="file0" dev="tmpfs" ino=1654 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4721.669851][ T29] audit: type=1400 audit(4515.234:71346): avc: denied { execute } for pid=27850 comm="syz.0.5408" dev="tmpfs" ino=1187 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4724.533336][T27863] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5412'. [ 4726.498416][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 4726.498931][ T29] audit: type=1400 audit(4519.682:71425): avc: denied { write } for pid=27865 comm="syz.1.5413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4726.762759][ T29] audit: type=1400 audit(4519.932:71426): avc: denied { sys_module } for pid=27865 comm="syz.1.5413" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4726.773088][ T29] audit: type=1400 audit(4519.941:71427): avc: denied { module_request } for pid=27865 comm="syz.1.5413" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4727.249620][ T29] audit: type=1400 audit(4520.384:71428): avc: denied { read write } for pid=27872 comm="syz.0.5415" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4727.259595][ T29] audit: type=1400 audit(4520.393:71429): avc: denied { read write open } for pid=27872 comm="syz.0.5415" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4727.291993][ T29] audit: type=1400 audit(4520.412:71430): avc: denied { mounton } for pid=27872 comm="syz.0.5415" path="/328/file0" dev="tmpfs" ino=1670 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 4727.307605][ T29] audit: type=1400 audit(4520.439:71431): avc: denied { mount } for pid=27872 comm="syz.0.5415" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4727.619470][ T29] audit: type=1400 audit(4520.725:71432): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4727.622928][ T29] audit: type=1400 audit(4520.725:71433): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4727.653976][ T29] audit: type=1400 audit(4520.753:71434): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4728.708736][T24063] usb 2-1: new high-speed USB device number 123 using dummy_hcd [ 4728.935964][T24063] usb 2-1: Using ep0 maxpacket: 16 [ 4729.220448][T24063] usb 2-1: New USB device found, idVendor=17ef, idProduct=721e, bcdDevice=de.06 [ 4729.221308][T24063] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4729.227274][T24063] usb 2-1: Product: syz [ 4729.227543][T24063] usb 2-1: Manufacturer: syz [ 4729.228054][T24063] usb 2-1: SerialNumber: syz [ 4729.365498][T24063] r8152-cfgselector 2-1: Unknown version 0x0000 [ 4729.366943][T24063] r8152-cfgselector 2-1: config 0 descriptor?? [ 4729.933980][T24063] r8152-cfgselector 2-1: USB disconnect, device number 123 [ 4731.953282][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 4731.953632][ T29] audit: type=1400 audit(4524.722:71491): avc: denied { ioctl } for pid=27902 comm="syz.1.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4732.013018][T24063] usb 2-1: new high-speed USB device number 124 using dummy_hcd [ 4732.021030][ T29] audit: type=1400 audit(4524.787:71492): avc: denied { ioctl } for pid=27902 comm="syz.1.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4732.032139][ T29] audit: type=1400 audit(4524.796:71493): avc: denied { ioctl } for pid=27902 comm="syz.1.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4732.068748][ T29] audit: type=1400 audit(4524.833:71494): avc: denied { ioctl } for pid=27902 comm="syz.1.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4732.189747][ T29] audit: type=1400 audit(4524.944:71495): avc: denied { ioctl } for pid=27902 comm="syz.1.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4732.193210][ T29] audit: type=1400 audit(4524.944:71496): avc: denied { ioctl } for pid=27902 comm="syz.1.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4732.223341][ T29] audit: type=1400 audit(4524.953:71497): avc: denied { ioctl } for pid=27902 comm="syz.1.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4732.224180][ T29] audit: type=1400 audit(4524.971:71498): avc: denied { ioctl } for pid=27902 comm="syz.1.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4732.229874][ T29] audit: type=1400 audit(4524.971:71499): avc: denied { ioctl } for pid=27902 comm="syz.1.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4732.233820][ T29] audit: type=1400 audit(4524.990:71500): avc: denied { ioctl } for pid=27902 comm="syz.1.5420" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4732.234428][T24063] usb 2-1: too many endpoints for config 0 interface 0 altsetting 3: 65, using maximum allowed: 30 [ 4732.234707][T24063] usb 2-1: config 0 interface 0 altsetting 3 has 1 endpoint descriptor, different from the interface descriptor's value: 65 [ 4732.234902][T24063] usb 2-1: config 0 interface 0 has no altsetting 0 [ 4732.235111][T24063] usb 2-1: New USB device found, idVendor=1b96, idProduct=000c, bcdDevice= 0.00 [ 4732.235301][T24063] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4732.262762][T24063] usb 2-1: config 0 descriptor?? [ 4732.939229][T24063] ntrig 0003:1B96:000C.001F: unknown main item tag 0x0 [ 4732.956041][T24063] ntrig 0003:1B96:000C.001F: unknown main item tag 0x0 [ 4732.956623][T24063] ntrig 0003:1B96:000C.001F: unknown main item tag 0x0 [ 4732.956944][T24063] ntrig 0003:1B96:000C.001F: unknown main item tag 0x0 [ 4732.957362][T24063] ntrig 0003:1B96:000C.001F: unknown main item tag 0x0 [ 4733.026332][T24063] ntrig 0003:1B96:000C.001F: hidraw0: USB HID v0.0b Device [HID 1b96:000c] on usb-dummy_hcd.1-1/input0 [ 4733.038887][T27910] VFS: Mount too revealing [ 4733.215417][T24063] ntrig 0003:1B96:000C.001F: Firmware version: 5.9.4.2.5 (a44a 5d98) [ 4733.437569][T14696] usb 2-1: USB disconnect, device number 124 [ 4734.690832][T24990] usb 2-1: new full-speed USB device number 125 using dummy_hcd [ 4735.072360][T24990] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 4735.072778][T24990] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 4735.335588][T24990] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 4735.336043][T24990] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4735.336335][T24990] usb 2-1: Product: syz [ 4735.336462][T24990] usb 2-1: Manufacturer: syz [ 4735.336501][T24990] usb 2-1: SerialNumber: syz [ 4735.751697][T24990] usb 2-1: 0:2 : does not exist [ 4735.771491][T24990] usb 2-1: 5:0: failed to get current value for ch 0 (-22) [ 4735.911110][T24990] usb 2-1: USB disconnect, device number 125 [ 4737.007888][T14696] usb 2-1: new high-speed USB device number 126 using dummy_hcd [ 4737.289315][T14696] usb 2-1: New USB device found, idVendor=9710, idProduct=7730, bcdDevice=96.33 [ 4737.289716][T14696] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 4737.339867][T14696] usb 2-1: config 0 descriptor?? [ 4737.387129][ T29] kauditd_printk_skb: 88 callbacks suppressed [ 4737.387834][ T29] audit: type=1400 audit(4529.734:71589): avc: denied { ioctl } for pid=27956 comm="syz.1.5424" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4737.624120][ T29] audit: type=1400 audit(4529.955:71590): avc: denied { ioctl } for pid=27956 comm="syz.1.5424" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4737.663849][ T29] audit: type=1400 audit(4529.983:71591): avc: denied { ioctl } for pid=27956 comm="syz.1.5424" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4737.800242][ T29] audit: type=1400 audit(4530.112:71592): avc: denied { ioctl } for pid=27963 comm="syz.0.5426" path="socket:[58049]" dev="sockfs" ino=58049 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4737.821326][ T29] audit: type=1400 audit(4530.149:71593): avc: denied { module_request } for pid=27963 comm="syz.0.5426" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4737.892311][ T29] audit: type=1400 audit(4530.205:71594): avc: denied { ioctl } for pid=27956 comm="syz.1.5424" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4737.905404][ T29] audit: type=1400 audit(4530.214:71595): avc: denied { ioctl } for pid=27956 comm="syz.1.5424" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4738.141598][T14696] usb 2-1: Cannot set autoneg [ 4738.142501][T14696] MOSCHIP usb-ethernet driver 2-1:0.0: probe with driver MOSCHIP usb-ethernet driver failed with error -71 [ 4738.167500][T14696] usb 2-1: USB disconnect, device number 126 [ 4738.361526][ T29] audit: type=1400 audit(4530.638:71596): avc: denied { bind } for pid=27963 comm="syz.0.5426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4738.399741][ T29] audit: type=1400 audit(4530.675:71597): avc: denied { create } for pid=27963 comm="syz.0.5426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4738.424740][ T29] audit: type=1400 audit(4530.694:71598): avc: denied { ioctl } for pid=27963 comm="syz.0.5426" path="socket:[58668]" dev="sockfs" ino=58668 ioctlcmd=0x89a1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4744.926077][T27993] trusted_key: encrypted_key: key user:syz not found [ 4751.526121][ T29] kauditd_printk_skb: 29 callbacks suppressed [ 4751.526523][ T29] audit: type=1400 audit(4542.794:71628): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4751.536260][ T29] audit: type=1400 audit(4542.794:71629): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4751.547490][ T29] audit: type=1400 audit(4542.804:71630): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4751.814822][ T29] audit: type=1400 audit(4543.053:71631): avc: denied { read } for pid=27994 comm="syz.1.5432" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4751.830561][ T29] audit: type=1400 audit(4543.071:71632): avc: denied { read open } for pid=27994 comm="syz.1.5432" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4751.848358][ T29] audit: type=1400 audit(4543.080:71633): avc: denied { ioctl } for pid=27994 comm="syz.1.5432" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4751.928647][T27995] netlink: 'syz.1.5432': attribute type 13 has an invalid length. [ 4752.404815][ T29] audit: type=1400 audit(4543.607:71634): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4752.419753][ T29] audit: type=1400 audit(4543.616:71635): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4752.436722][ T29] audit: type=1400 audit(4543.625:71636): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4752.708507][ T29] audit: type=1400 audit(4543.883:71637): avc: denied { read write } for pid=28000 comm="syz.1.5433" name="uinput" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4757.882943][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 4757.884368][ T29] audit: type=1400 audit(4548.655:71652): avc: denied { unmount } for pid=24724 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4758.171866][ T29] audit: type=1400 audit(4548.923:71653): avc: denied { create } for pid=28014 comm="syz.0.5437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4758.184774][ T29] audit: type=1400 audit(4548.932:71654): avc: denied { connect } for pid=28014 comm="syz.0.5437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4758.194564][ T29] audit: type=1400 audit(4548.942:71655): avc: denied { setopt } for pid=28014 comm="syz.0.5437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4758.475502][ T29] audit: type=1400 audit(4549.209:71656): avc: denied { read write } for pid=28016 comm="syz.0.5438" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4758.482451][ T29] audit: type=1400 audit(4549.209:71657): avc: denied { read write open } for pid=28016 comm="syz.0.5438" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4758.500793][ T29] audit: type=1400 audit(4549.218:71658): avc: denied { ioctl } for pid=28016 comm="syz.0.5438" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4758.501386][ T29] audit: type=1400 audit(4549.228:71659): avc: denied { ioctl } for pid=28016 comm="syz.0.5438" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4758.501595][ T29] audit: type=1400 audit(4549.228:71660): avc: denied { ioctl } for pid=28016 comm="syz.0.5438" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4758.521539][ T29] audit: type=1400 audit(4549.246:71661): avc: denied { ioctl } for pid=28016 comm="syz.0.5438" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4764.844041][ T29] audit: type=1400 audit(4555.089:71662): avc: denied { unmount } for pid=24284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 4764.898507][ T29] audit: type=1400 audit(4555.135:71663): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4764.904440][ T29] audit: type=1400 audit(4555.135:71664): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4764.916473][ T29] audit: type=1400 audit(4555.144:71665): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4765.057053][ T29] audit: type=1400 audit(4555.273:71666): avc: denied { create } for pid=28022 comm="syz.1.5439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4765.069370][ T29] audit: type=1400 audit(4555.283:71667): avc: denied { write } for pid=28022 comm="syz.1.5439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4765.119585][ T29] audit: type=1400 audit(4555.338:71668): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4765.123523][ T29] audit: type=1400 audit(4555.347:71669): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4765.128009][ T29] audit: type=1400 audit(4555.347:71670): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4765.331420][ T29] audit: type=1400 audit(4555.532:71671): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4770.336868][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 4770.337248][ T29] audit: type=1400 audit(4560.156:71699): avc: denied { read } for pid=28034 comm="syz.1.5443" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4770.449909][ T29] audit: type=1400 audit(4560.258:71700): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4770.481712][ T29] audit: type=1400 audit(4560.285:71701): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4770.502139][ T29] audit: type=1400 audit(4560.294:71702): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4770.889565][ T29] audit: type=1400 audit(4560.664:71703): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4770.894230][ T29] audit: type=1400 audit(4560.664:71704): avc: denied { read write open } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4770.901786][ T29] audit: type=1400 audit(4560.673:71705): avc: denied { ioctl } for pid=24284 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4771.153022][ T29] audit: type=1400 audit(4560.904:71706): avc: denied { read } for pid=28048 comm="syz.1.5446" name="vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4771.173026][ T29] audit: type=1400 audit(4560.922:71707): avc: denied { read open } for pid=28048 comm="syz.1.5446" path="/dev/vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4771.237157][ T29] audit: type=1400 audit(4560.987:71708): avc: denied { read write } for pid=24284 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 4779.787902][ T29] kauditd_printk_skb: 37 callbacks suppressed [ 4779.788309][ T29] audit: type=1400 audit(4568.878:71746): avc: denied { read } for pid=28057 comm="syz.0.5449" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4779.807317][ T29] audit: type=1400 audit(4568.897:71747): avc: denied { read open } for pid=28057 comm="syz.0.5449" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4779.835088][ T29] audit: type=1400 audit(4568.915:71748): avc: denied { ioctl } for pid=28057 comm="syz.0.5449" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4779.915401][ T29] audit: type=1400 audit(4568.998:71749): avc: denied { create } for pid=28057 comm="syz.0.5449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4779.956934][ T29] audit: type=1400 audit(4569.035:71750): avc: denied { bind } for pid=28057 comm="syz.0.5449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4780.875919][ T29] audit: type=1400 audit(4569.884:71751): avc: denied { prog_load } for pid=28065 comm="syz.0.5451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4780.879079][ T29] audit: type=1400 audit(4569.884:71752): avc: denied { bpf } for pid=28065 comm="syz.0.5451" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4780.894239][ T29] audit: type=1400 audit(4569.894:71753): avc: denied { perfmon } for pid=28065 comm="syz.0.5451" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4780.907724][ T29] audit: type=1400 audit(4569.903:71754): avc: denied { perfmon } for pid=28065 comm="syz.0.5451" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4780.915219][ T29] audit: type=1400 audit(4569.912:71755): avc: denied { perfmon } for pid=28065 comm="syz.0.5451" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4781.600334][T28068] 8<--- cut here --- [ 4781.618789][T28068] Unable to handle kernel paging request at virtual address fee00033 when write [ 4781.644729][T28068] [fee00033] *pgd=80000080007003, *pmd=00000000 [ 4781.646654][T28068] Internal error: Oops: a06 [#1] SMP ARM [ 4781.649549][T28068] Modules linked in: [ 4781.650091][T28068] CPU: 1 UID: 0 PID: 28068 Comm: syz.0.5452 Not tainted syzkaller #0 PREEMPT [ 4781.650424][T28068] Hardware name: ARM-Versatile Express [ 4781.650792][T28068] PC is at parport_attach+0x174/0x1d0 [ 4781.651299][T28068] LR is at parport_attach+0x164/0x1d0 [ 4781.652274][T28068] pc : [<81401274>] lr : [<81401264>] psr: 60000113 [ 4781.653097][T28068] sp : ea4d1d30 ip : ea4d1d30 fp : ea4d1d54 [ 4781.653629][T28068] r10: 82b29b30 r9 : 00000003 r8 : 84699180 [ 4781.654049][T28068] r7 : ea4d1d90 r6 : 84699180 r5 : 00000000 r4 : 00000000 [ 4781.654713][T28068] r3 : fee00033 r2 : 81e24f44 r1 : 00000001 r0 : 81400ee4 [ 4781.655389][T28068] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 4781.655959][T28068] Control: 30c5387d Table: 85339440 DAC: 00000000 [ 4781.656353][T28068] Register r0 information: non-slab/vmalloc memory [ 4781.657522][T28068] Register r1 information: non-paged memory [ 4781.657951][T28068] Register r2 information: non-slab/vmalloc memory [ 4781.658261][T28068] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 4781.658840][T28068] Register r4 information: NULL pointer [ 4781.659129][T28068] Register r5 information: NULL pointer [ 4781.659401][T28068] Register r6 information: slab kmalloc-192 start 84699180 pointer offset 0 size 192 [ 4781.660361][T28068] Register r7 information: 2-page vmalloc region starting at 0xea4d0000 allocated at kernel_clone+0xac/0x3f4 [ 4781.660828][T28068] Register r8 information: slab kmalloc-192 start 84699180 pointer offset 0 size 192 [ 4781.661430][T28068] Register r9 information: non-paged memory [ 4781.661723][T28068] Register r10 information: non-slab/vmalloc memory [ 4781.662025][T28068] Register r11 information: 2-page vmalloc region starting at 0xea4d0000 allocated at kernel_clone+0xac/0x3f4 [ 4781.662502][T28068] Register r12 information: 2-page vmalloc region starting at 0xea4d0000 allocated at kernel_clone+0xac/0x3f4 [ 4781.663013][T28068] Process syz.0.5452 (pid: 28068, stack limit = 0xea4d0000) [ 4781.663478][T28068] Stack: (0xea4d1d30 to 0xea4d2000) [ 4781.663833][T28068] 1d20: 8243d12c 84699180 829d4280 829d4280 [ 4781.664193][T28068] 1d40: 81e25404 00000000 ea4d1d8c ea4d1d58 813fcea0 8140110c 40946400 00000000 [ 4781.664478][T28068] 1d60: ea4d1d7c 200000c0 84699180 b5403587 40946400 850e0c00 00000003 846991b0 [ 4781.664803][T28068] 1d80: ea4d1e4c ea4d1d90 813f87d8 813fcda0 656d6f63 705f6964 6f707261 00007472 [ 4781.665591][T28068] 1da0: 00000000 00000033 00000003 00000000 00000010 00000004 00000cc7 000000df [ 4781.666019][T28068] 1dc0: 00000007 00000009 000003ff 08000800 0000bc20 00000001 00000006 0000f069 [ 4781.666451][T28068] 1de0: 00000000 00000009 00200000 fffffff4 00000002 00000000 fffffffd fffffffd [ 4781.666850][T28068] 1e00: fffffff5 ffffeadb 00000003 000007ff 8000000b 00000000 08000000 00000004 [ 4781.667400][T28068] 1e20: 00000000 f17ebb42 00000000 84e9e240 84699180 200000c0 40946400 850e0c00 [ 4781.667872][T28068] 1e40: ea4d1f14 ea4d1e50 813f9358 813f8710 ea4d1e4c f17ebb42 00000000 00000000 [ 4781.668334][T28068] 1e60: 824b15ec ea4d1ea4 0000005f 84014250 00000064 8453add4 ea4d1ee4 ea4d1e88 [ 4781.669050][T28068] 1e80: 807b3fb4 807aa630 00000064 00000001 00000000 ea4d1ea4 84e1c3d0 834304c8 [ 4781.669499][T28068] 1ea0: 00006400 0000000b ea4d1e98 00000000 ea4d1d38 f17ebb42 00000000 84e9e240 [ 4781.670236][T28068] 1ec0: 40946400 200000c0 200000c0 84e9e240 00000003 850e0c00 ea4d1ef4 ea4d1ee8 [ 4781.670903][T28068] 1ee0: 807b40e4 f17ebb42 ea4d1f14 00000000 84e9e241 40946400 200000c0 84e9e240 [ 4781.671542][T28068] 1f00: 00000003 850e0c00 ea4d1fa4 ea4d1f18 805821a4 813f9260 ecac8b10 850e0c00 [ 4781.672292][T28068] 1f20: ea4d1f3c ea4d1f30 81aa6d38 81aa6c08 ea4d1f54 ea4d1f40 8025ba7c 8028ef68 [ 4781.672850][T28068] 1f40: ea4d1fb0 40000000 ea4d1f84 ea4d1f58 80221a54 8025ba38 00000000 8281cf7c [ 4781.673300][T28068] 1f60: ea4d1fb0 0013ddc0 ecac8b10 802219a8 00000000 f17ebb42 ea4d1fac 00000000 [ 4781.673818][T28068] 1f80: 00000000 00346310 00000036 8020029c 850e0c00 00000036 00000000 ea4d1fa8 [ 4781.674396][T28068] 1fa0: 80200060 80581f6c 00000000 00000000 00000003 40946400 200000c0 00000000 [ 4781.674921][T28068] 1fc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f050dc [ 4781.675277][T28068] 1fe0: 76f04e88 76f04e78 00018734 0012fc20 60000010 00000003 00000000 00000000 [ 4781.675688][T28068] Call trace: [ 4781.675921][T28068] [<81401100>] (parport_attach) from [<813fcea0>] (comedi_device_attach+0x10c/0x248) [ 4781.676574][T28068] r6:00000000 r5:81e25404 r4:829d4280 [ 4781.676903][T28068] [<813fcd94>] (comedi_device_attach) from [<813f87d8>] (do_devconfig_ioctl+0xd4/0x21c) [ 4781.677477][T28068] r10:846991b0 r9:00000003 r8:850e0c00 r7:40946400 r6:b5403587 r5:84699180 [ 4781.677857][T28068] r4:200000c0 [ 4781.678013][T28068] [<813f8704>] (do_devconfig_ioctl) from [<813f9358>] (comedi_unlocked_ioctl+0x104/0x1c80) [ 4781.678403][T28068] r8:850e0c00 r7:40946400 r6:200000c0 r5:84699180 r4:84e9e240 [ 4781.678658][T28068] [<813f9254>] (comedi_unlocked_ioctl) from [<805821a4>] (sys_ioctl+0x244/0xb58) [ 4781.679039][T28068] r10:850e0c00 r9:00000003 r8:84e9e240 r7:200000c0 r6:40946400 r5:84e9e241 [ 4781.679355][T28068] r4:00000000 [ 4781.679522][T28068] [<80581f60>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 4781.679906][T28068] Exception stack(0xea4d1fa8 to 0xea4d1ff0) [ 4781.680191][T28068] 1fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 4781.680543][T28068] 1fc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f050dc [ 4781.684641][T28068] 1fe0: 76f04e88 76f04e78 00018734 0012fc20 [ 4781.687511][T28068] r10:00000036 r9:850e0c00 r8:8020029c r7:00000036 r6:00346310 r5:00000000 [ 4781.688159][T28068] r4:00000000 [ 4781.688721][T28068] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 4781.691121][T28068] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 4781.739016][T28068] Kernel panic - not syncing: Fatal exception [ 4781.741846][T28068] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:06:04 Registers: info registers vcpu 0 CPU#0 R00=dddd01c0 R01=5b70d000 R02=00a4d337 R03=81aa7574 R04=00000008 R05=828f7d88 R06=8280c7e4 R07=828f7d80 R08=850e6c00 R09=828f7d88 R10=00000000 R11=e846dcec R12=e846dcf0 R13=e846dce0 R14=80340808 R15=81aa7584 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=01f72780 R01=00000000 R02=00006a78 R03=01f85000 R04=00019300 R05=00000100 R06=01f72780 R07=01f287c0 R08=01f1d1d8 R09=0058201c R10=00001589 R11=7ef962bc R12=00000000 R13=7ef96108 R14=769cf94c R15=769664ec PSR=20030010 --C- A S usr32 s00=88030008 s01=3608000b d00=3608000b88030008 s02=000b9003 s03=98030108 d01=98030108000b9003 s04=00100000 s05=0f048881 d02=0f04888100100000 s06=4cdbec46 s07=48a7ccb9 d03=48a7ccb94cdbec46 s08=0021f40e s09=bde30000 d04=bde300000021f40e s10=0044fb6e s11=000e0313 d05=000e03130044fb6e s12=000d000a s13=80ba0800 d06=80ba0800000d000a s14=01120000 s15=00118803 d07=0011880301120000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=08000988 s33=0990031e d16=0990031e08000988 s34=034a0800 s35=08000998 d17=08000998034a0800 s36=09a00308 s37=ffffff04 d18=ffffff0409a00308 s38=b00303ff s39=ffff0409 d19=ffff0409b00303ff s40=0303ffff s41=080009c0 d20=080009c00303ffff s42=09c80300 s43=03000800 d21=0300080009c80300 s44=080009d0 s45=09d80300 d22=09d80300080009d0 s46=03000800 s47=ff0409e0 d23=ff0409e003000800 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=85df669b s53=45996b71 d26=45996b7185df669b s54=dc259cd3 s55=19f3ee8d d27=19f3ee8ddc259cd3 s56=ba5f6507 s57=80ebf86c d28=80ebf86cba5f6507 s58=6fa37c19 s59=bca23ba7 d29=bca23ba76fa37c19 s60=a6117f21 s61=6fafc234 d30=6fafc234a6117f21 s62=59ebb9ff s63=0ebeca0a d31=0ebeca0a59ebb9ff FPSCR: 00000000