last executing test programs: 17.28332271s ago: executing program 3 (id=1720): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) writev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="4805", 0x2}], 0x1) 17.244832304s ago: executing program 3 (id=1723): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x3, &(0x7f0000000440)=[{0x20, 0x2, 0x81, 0xfffff034}, {0x20, 0x0, 0x0, 0xfffff00c}, {0x6}]}, 0x10) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x207, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge0\x00', 0x0}) sendto$packet(r1, &(0x7f00000002c0)="05031600d3fc140000004788031c09102c28", 0xfce0, 0x4, &(0x7f0000000140)={0x11, 0x86dd, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) 17.214527956s ago: executing program 3 (id=1725): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00), 0x1, 0x4008080) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)={0x18, r5, 0x1, 0x70bd2e, 0x2, {}, [@ETHTOOL_A_COALESCE_HEADER={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x144}, 0x0) 17.214224576s ago: executing program 3 (id=1727): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) connect$inet6(r4, &(0x7f0000000100)={0xa, 0x4e23, 0x5, @empty}, 0x1c) 17.1837237s ago: executing program 3 (id=1729): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) keyctl$KEYCTL_PKEY_DECRYPT(0x1a, &(0x7f00000000c0), 0x0, 0x0, 0x0) 17.18351129s ago: executing program 3 (id=1731): mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f000069e000/0x4000)=nil) ptrace(0x10, 0x1) 11.951209233s ago: executing program 0 (id=2028): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000100)={0x0, "4fed071c60eed95d709154fa9f4dbeaa58a48032f2a7acea9ea8aa77fb7c7ec086e020061a32af40141b219104dac7354e819cd916a9d91dd97a1c086d32afdb", 0x2}, 0x48, 0xffffffffffffffff) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r2, @ANYRES64=r1], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r4, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x80, 0x0, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r6, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, 0x0, 0x0) 11.951045513s ago: executing program 0 (id=2029): r0 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000400)='./binderfs/binder1\x00', 0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f00000027c0)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x9, @loopback, 0x4}, 0x1c, 0x0, 0x0, &(0x7f00000026c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x3}}, @flowinfo={{0x14, 0x29, 0xb, 0x4}}], 0x30}}], 0x1, 0x24004000) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000000c0)={'syz_tun\x00', 0x0}) r4 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000900)={0x0, 0x0, 0x0}, &(0x7f0000000940)=0xc) keyctl$chown(0x4, 0x0, r5, r6) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000040)=0xf3f, 0xa) sendto$packet(r2, &(0x7f0000000240)="3f031c000300140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1bc5b8431bb01c8200f4c3087489be91d3b08f48bdd6c1107607257711da807e3e67411d56bdac41ba", 0x49, 0x0, &(0x7f0000000540)={0xc9, 0x0, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000100)={0x4c, 0x0, &(0x7f0000002680)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x21, 0x0, 0x0, 0xffffffffffffff8b, 0x18, &(0x7f00000004c0)={@ptr={0x70742a85, 0x2, &(0x7f0000000280)=""/226, 0xe2, 0x2, 0x138}, @fda={0x66646185, 0xffffffffffffffff, 0x0, 0xe}, @ptr={0x70742a85, 0x0, 0x0, 0x0, 0x0, 0x28}}, &(0x7f00000001c0)={0x0, 0x28, 0x48}}, 0x40}], 0x0, 0x0, 0x0}) 11.950899633s ago: executing program 0 (id=2030): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r3, 0x0, 0x0, 0x805, 0x0, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000075c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40804) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r5, 0x0) ioctl$KVM_X86_SETUP_MCE(r5, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r4, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone3(&(0x7f0000000000)={0x81103280, &(0x7f00000000c0), 0x0, 0x0, {0x24}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11.896046339s ago: executing program 0 (id=2031): r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x205, 0x2581) ioctl$USBDEVFS_GETDRIVER(r0, 0x41045508, &(0x7f0000000040)={0x0, "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"}) 11.895797019s ago: executing program 0 (id=2032): setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000000c0), 0x4) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x100, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup(r1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000840)={0x5, 0x2, 0x2000, 0x1000, &(0x7f0000003000/0x1000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, 0x0}], 0x1, 0x72, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000040)=[@text64={0x40, 0x0}], 0x1, 0x11, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 11.895644869s ago: executing program 0 (id=2033): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) rt_sigqueueinfo(0x0, 0x12, &(0x7f00000000c0)={0x26, 0x96a7, 0x1}) 4.511453448s ago: executing program 1 (id=2052): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x24000]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_freeze_timeout', 0x82802, 0xf) 4.511220048s ago: executing program 2 (id=2053): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) write(r0, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003780)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) writev(r4, &(0x7f00000000c0)=[{&(0x7f0000000040)='k\r', 0x2}], 0x1) 3.160223523s ago: executing program 1 (id=2054): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r4, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x39, 0x0, 0x68) 3.160010453s ago: executing program 2 (id=2055): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) umount2(&(0x7f0000000040)='.\x00', 0x2) 1.788494s ago: executing program 1 (id=2056): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0x7, 0x4, 0x10d}) 1.78827204s ago: executing program 2 (id=2057): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x24000]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r3, 0x29, 0x12, &(0x7f0000000000)=0x100, 0x4) 1.773036932s ago: executing program 32 (id=1731): mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x8, &(0x7f000069e000/0x4000)=nil) ptrace(0x10, 0x1) 1.726639307s ago: executing program 2 (id=2059): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)='W', 0x1}], 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_buf(r4, 0x29, 0x39, &(0x7f0000e86000)="0022041100ffffeb", 0x8) 1.676157202s ago: executing program 1 (id=2060): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) syz_clone3(&(0x7f0000000140)={0x4000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x2}, 0x7a) 80.493761ms ago: executing program 1 (id=2061): setuid(0xee01) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x14e22, 0x0, @ipv4}, 0x1c) listen(r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r1, &(0x7f0000000080)=[{&(0x7f0000000200)="a10100001400add427323b470c45b45602067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee00000000000000000200000000", 0x1a1}], 0x1) 64.987713ms ago: executing program 2 (id=2062): mlock2(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) 201.689µs ago: executing program 1 (id=2063): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet6(r3, &(0x7f00000006c0)=[{{&(0x7f0000000100)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0xfffffffc}, 0x1c, 0x0}}], 0x1, 0x2000c8c0) sendmmsg$inet6(r3, &(0x7f00000001c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40) recvmmsg(r2, &(0x7f0000004c40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}, 0x7}], 0x2, 0x10021, 0x0) 0s ago: executing program 2 (id=2064): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r5, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r4, 0x0, 0x0) rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.2' (ED25519) to the list of known hosts. [ 22.855343][ T36] audit: type=1400 audit(1763366631.950:64): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 22.856813][ T282] cgroup: Unknown subsys name 'net' [ 22.878098][ T36] audit: type=1400 audit(1763366631.950:65): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.905390][ T36] audit: type=1400 audit(1763366631.990:66): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 22.905625][ T282] cgroup: Unknown subsys name 'devices' [ 23.088775][ T282] cgroup: Unknown subsys name 'hugetlb' [ 23.094463][ T282] cgroup: Unknown subsys name 'rlimit' [ 23.189642][ T36] audit: type=1400 audit(1763366632.290:67): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 23.212857][ T36] audit: type=1400 audit(1763366632.290:68): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 23.237623][ T36] audit: type=1400 audit(1763366632.290:69): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 23.244543][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 23.269770][ T36] audit: type=1400 audit(1763366632.380:70): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.295347][ T36] audit: type=1400 audit(1763366632.380:71): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.311450][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 23.321130][ T36] audit: type=1400 audit(1763366632.410:72): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 23.355231][ T36] audit: type=1400 audit(1763366632.410:73): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.334360][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.341628][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.348769][ T290] bridge_slave_0: entered allmulticast mode [ 26.355071][ T290] bridge_slave_0: entered promiscuous mode [ 26.363120][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.370355][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.377495][ T290] bridge_slave_1: entered allmulticast mode [ 26.383738][ T290] bridge_slave_1: entered promiscuous mode [ 26.440334][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.447410][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.454515][ T291] bridge_slave_0: entered allmulticast mode [ 26.460880][ T291] bridge_slave_0: entered promiscuous mode [ 26.480153][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.487236][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.494311][ T291] bridge_slave_1: entered allmulticast mode [ 26.500750][ T291] bridge_slave_1: entered promiscuous mode [ 26.515174][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.522292][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.529399][ T289] bridge_slave_0: entered allmulticast mode [ 26.535647][ T289] bridge_slave_0: entered promiscuous mode [ 26.543399][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.550512][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.557643][ T289] bridge_slave_1: entered allmulticast mode [ 26.563968][ T289] bridge_slave_1: entered promiscuous mode [ 26.632916][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.640020][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.647284][ T292] bridge_slave_0: entered allmulticast mode [ 26.653517][ T292] bridge_slave_0: entered promiscuous mode [ 26.663645][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.670817][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.678208][ T292] bridge_slave_1: entered allmulticast mode [ 26.684525][ T292] bridge_slave_1: entered promiscuous mode [ 26.782787][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.789884][ T290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.797187][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.804226][ T290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.834754][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.841847][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.849511][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.856607][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.878020][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 26.885419][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 26.947364][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.954436][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 26.969370][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 26.976547][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 26.990597][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 26.997846][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.012157][ T290] veth0_vlan: entered promiscuous mode [ 27.025689][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.032909][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.062732][ T290] veth1_macvtap: entered promiscuous mode [ 27.079944][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.087213][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 27.102691][ T291] veth0_vlan: entered promiscuous mode [ 27.113056][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 27.120147][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 27.158044][ T290] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 27.174292][ T289] veth0_vlan: entered promiscuous mode [ 27.181932][ T291] veth1_macvtap: entered promiscuous mode [ 27.218061][ T292] veth0_vlan: entered promiscuous mode [ 27.231433][ T289] veth1_macvtap: entered promiscuous mode [ 27.258408][ T292] veth1_macvtap: entered promiscuous mode [ 27.338439][ T341] kvm_intel: L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 27.365881][ T344] netlink: 12 bytes leftover after parsing attributes in process `syz.1.6'. [ 27.399953][ T348] capability: warning: `syz.3.7' uses deprecated v2 capabilities in a way that may be insecure [ 27.614609][ T376] rust_binder: Transaction failed: BR_FAILED_REPLY { source: EINVAL } my_pid:8 [ 27.851899][ T399] netlink: 12 bytes leftover after parsing attributes in process `syz.1.32'. [ 27.874668][ T36] kauditd_printk_skb: 1406 callbacks suppressed [ 27.874695][ T36] audit: type=1326 audit(1763366636.980:1480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=371 comm="syz.2.20" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab7798f6c9 code=0x50000 [ 27.905706][ T398] audit: audit_backlog=65 > audit_backlog_limit=64 [ 27.914810][ T398] audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 [ 27.922578][ T398] audit: backlog limit exceeded [ 27.928557][ T398] audit: audit_backlog=65 > audit_backlog_limit=64 [ 27.935105][ T398] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 27.943229][ T36] audit: type=1326 audit(1763366636.980:1481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=371 comm="syz.2.20" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab7798f6c9 code=0x50000 [ 27.966227][ T398] audit: backlog limit exceeded [ 27.985486][ T36] audit: type=1326 audit(1763366636.980:1482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=371 comm="syz.2.20" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab7798f6c9 code=0x50000 [ 28.010872][ T36] audit: type=1326 audit(1763366636.980:1483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=371 comm="syz.2.20" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fab7798f6c9 code=0x50000 [ 29.056007][ T425] netlink: 9 bytes leftover after parsing attributes in process `syz.3.46'. [ 29.065817][ T425] gretap0: entered promiscuous mode [ 29.126691][ T429] overlayfs: missing 'lowerdir' [ 29.360310][ T450] overlayfs: missing 'lowerdir' [ 29.556134][ T65] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 29.726010][ T65] usb 2-1: Using ep0 maxpacket: 32 [ 29.737629][ T65] usb 2-1: device descriptor read/all, error -71 [ 32.877662][ T36] kauditd_printk_skb: 15087 callbacks suppressed [ 32.877682][ T36] audit: type=1400 audit(1763366641.980:16571): avc: denied { read write } for pid=289 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 32.939667][ T36] audit: type=1400 audit(1763366642.020:16572): avc: denied { execute } for pid=794 comm="syz.1.228" path="/44/blkio.bfq.group_wait_time" dev="tmpfs" ino=276 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 32.964484][ T36] audit: type=1400 audit(1763366642.020:16573): avc: denied { create } for pid=794 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 32.985521][ T36] audit: type=1400 audit(1763366642.020:16574): avc: denied { wake_alarm } for pid=794 comm="syz.1.228" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 33.007538][ T36] audit: type=1400 audit(1763366642.020:16575): avc: denied { execute } for pid=795 comm="syz.2.229" path="/37/blkio.bfq.group_wait_time" dev="tmpfs" ino=240 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 33.032169][ T36] audit: type=1400 audit(1763366642.020:16576): avc: denied { execute } for pid=797 comm="syz.3.227" path="/88/blkio.bfq.group_wait_time" dev="tmpfs" ino=538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 33.057048][ T36] audit: type=1400 audit(1763366642.020:16577): avc: denied { read } for pid=795 comm="syz.2.229" name="ashmem" dev="devtmpfs" ino=201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 33.082951][ T36] audit: type=1400 audit(1763366642.020:16578): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.107780][ T36] audit: type=1400 audit(1763366642.030:16579): avc: denied { read write } for pid=289 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 33.139325][ T36] audit: type=1400 audit(1763366642.110:16580): avc: denied { execute } for pid=802 comm="syz.2.231" path="/38/blkio.bfq.group_wait_time" dev="tmpfs" ino=246 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 35.033121][ T1057] netlink: 9 bytes leftover after parsing attributes in process `syz.2.356'. [ 35.046183][ T1057] gretap0: entered promiscuous mode [ 35.591978][ T1170] netlink: 9 bytes leftover after parsing attributes in process `syz.1.412'. [ 35.600939][ T1170] gretap0: entered promiscuous mode [ 37.891157][ T36] kauditd_printk_skb: 956 callbacks suppressed [ 37.891176][ T36] audit: type=1400 audit(1763366646.990:17537): avc: denied { execute } for pid=1539 comm="syz.2.596" path="/109/blkio.bfq.group_wait_time" dev="tmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 37.966161][ T36] audit: type=1400 audit(1763366647.000:17538): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.014199][ T36] audit: type=1400 audit(1763366647.040:17539): avc: denied { execute } for pid=1543 comm="syz.0.597" path="/162/blkio.bfq.group_wait_time" dev="tmpfs" ino=984 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 38.063483][ T36] audit: type=1400 audit(1763366647.060:17540): avc: denied { read write } for pid=289 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.124186][ T36] audit: type=1400 audit(1763366647.060:17541): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.167256][ T36] audit: type=1400 audit(1763366647.100:17542): avc: denied { sys_module } for pid=1545 comm="syz.2.598" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 38.234511][ T36] audit: type=1400 audit(1763366647.100:17543): avc: denied { sys_module } for pid=1545 comm="syz.2.598" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 38.288083][ T36] audit: type=1400 audit(1763366647.100:17544): avc: denied { read write } for pid=291 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 38.354901][ T36] audit: type=1400 audit(1763366647.110:17545): avc: denied { execute } for pid=1547 comm="syz.0.599" path="/163/blkio.bfq.group_wait_time" dev="tmpfs" ino=990 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 38.408004][ T36] audit: type=1400 audit(1763366647.110:17546): avc: denied { read write } for pid=289 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 39.353035][ T1701] netlink: 24 bytes leftover after parsing attributes in process `syz.0.674'. [ 42.900729][ T36] kauditd_printk_skb: 1037 callbacks suppressed [ 42.900748][ T36] audit: type=1400 audit(1763366651.998:18584): avc: denied { read write } for pid=291 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.931777][ T36] audit: type=1400 audit(1763366651.998:18585): avc: denied { execute } for pid=2355 comm="syz.1.998" path="/256/blkio.bfq.group_wait_time" dev="tmpfs" ino=1526 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 42.956395][ T36] audit: type=1400 audit(1763366652.018:18586): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 42.983599][ T36] audit: type=1400 audit(1763366652.038:18587): avc: denied { execute } for pid=2359 comm="syz.1.1000" path="/257/blkio.bfq.group_wait_time" dev="tmpfs" ino=1532 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 43.008672][ T36] audit: type=1400 audit(1763366652.038:18588): avc: denied { read } for pid=2359 comm="syz.1.1000" name="ashmem" dev="devtmpfs" ino=201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 43.036751][ T36] audit: type=1400 audit(1763366652.048:18589): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.070184][ T36] audit: type=1400 audit(1763366652.058:18590): avc: denied { execute } for pid=2358 comm="syz.3.999" path="/272/blkio.bfq.group_wait_time" dev="tmpfs" ino=1633 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 43.095233][ T36] audit: type=1400 audit(1763366652.058:18591): avc: denied { read write } for pid=2358 comm="syz.3.999" name="ashmem" dev="devtmpfs" ino=201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 43.119511][ T36] audit: type=1400 audit(1763366652.058:18592): avc: denied { read write } for pid=291 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 43.143801][ T36] audit: type=1400 audit(1763366652.058:18593): avc: denied { execute } for pid=2362 comm="syz.3.1002" path="/273/blkio.bfq.io_wait_time_recursive" dev="tmpfs" ino=1639 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 43.531800][ T2395] mmap: syz.0.1016 (2395) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 45.386269][ T2585] netlink: 'syz.0.1110': attribute type 17 has an invalid length. [ 46.598979][ T2799] Zero length message leads to an empty skb [ 47.910256][ T36] kauditd_printk_skb: 598 callbacks suppressed [ 47.910275][ T36] audit: type=1400 audit(1763366657.008:19192): avc: denied { read write } for pid=289 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.940770][ T36] audit: type=1400 audit(1763366657.028:19193): avc: denied { execute } for pid=2882 comm="syz.2.1254" path="/224/blkio.bfq.group_wait_time" dev="tmpfs" ino=1353 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 47.968769][ T36] audit: type=1400 audit(1763366657.028:19194): avc: denied { create } for pid=2882 comm="syz.2.1254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 47.989916][ T36] audit: type=1400 audit(1763366657.028:19195): avc: denied { create } for pid=2882 comm="syz.2.1254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 48.011262][ T36] audit: type=1400 audit(1763366657.028:19196): avc: denied { read write } for pid=289 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.035787][ T36] audit: type=1400 audit(1763366657.048:19197): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.061614][ T36] audit: type=1400 audit(1763366657.068:19198): avc: denied { read write } for pid=289 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.094120][ T36] audit: type=1400 audit(1763366657.068:19199): avc: denied { execute } for pid=2888 comm="syz.2.1257" path="/226/blkio.bfq.group_wait_time" dev="tmpfs" ino=1364 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 48.122992][ T36] audit: type=1400 audit(1763366657.068:19200): avc: denied { read write } for pid=289 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 48.147799][ T36] audit: type=1400 audit(1763366657.098:19201): avc: denied { execute } for pid=2890 comm="syz.2.1258" path="/227/blkio.bfq.group_wait_time" dev="tmpfs" ino=1370 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 49.385234][ T3076] netlink: 'syz.0.1347': attribute type 4 has an invalid length. [ 51.147108][ T3339] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1014 sclass=netlink_tcpdiag_socket pid=3339 comm=syz.2.1477 [ 52.960938][ T36] kauditd_printk_skb: 742 callbacks suppressed [ 52.960957][ T36] audit: type=1400 audit(1763366662.058:19944): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 52.998784][ T36] audit: type=1400 audit(1763366662.098:19945): avc: denied { execute } for pid=3537 comm="syz.0.1575" path="/447/blkio.bfq.group_wait_time" dev="tmpfs" ino=2679 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 53.025378][ T36] audit: type=1400 audit(1763366662.108:19946): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.050782][ T36] audit: type=1400 audit(1763366662.138:19947): avc: denied { read write } for pid=291 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.076070][ T36] audit: type=1400 audit(1763366662.148:19948): avc: denied { execute } for pid=3541 comm="syz.3.1574" path="/447/blkio.bfq.group_wait_time" dev="tmpfs" ino=2669 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 53.101388][ T36] audit: type=1400 audit(1763366662.148:19949): avc: denied { create } for pid=3541 comm="syz.3.1574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 53.122610][ T36] audit: type=1400 audit(1763366662.148:19950): avc: denied { create } for pid=3541 comm="syz.3.1574" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 53.143424][ T36] audit: type=1400 audit(1763366662.158:19951): avc: denied { read write } for pid=291 comm="syz-executor" name="loop3" dev="devtmpfs" ino=52 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 53.181764][ T36] audit: type=1400 audit(1763366662.168:19952): avc: denied { execute } for pid=3543 comm="syz.3.1577" path="/448/blkio.bfq.group_wait_time" dev="tmpfs" ino=2675 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 53.207392][ T36] audit: type=1400 audit(1763366662.168:19953): avc: denied { read } for pid=3543 comm="syz.3.1577" dev="nsfs" ino=4026532466 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 55.998706][ T4001] netlink: 'syz.0.1803': attribute type 4 has an invalid length. [ 56.358335][ T4076] syz.1.1839 uses obsolete (PF_INET,SOCK_PACKET) [ 56.894420][ T4174] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1888'. [ 57.966606][ T36] kauditd_printk_skb: 827 callbacks suppressed [ 57.966623][ T36] audit: type=1400 audit(1763366667.068:20781): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 57.997149][ T36] audit: type=1400 audit(1763366667.068:20782): avc: denied { execute } for pid=4261 comm="syz.0.1931" path="/548/blkio.bfq.group_wait_time" dev="tmpfs" ino=3261 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 58.022579][ T36] audit: type=1400 audit(1763366667.098:20783): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.051547][ T36] audit: type=1400 audit(1763366667.098:20784): avc: denied { execute } for pid=4263 comm="syz.1.1932" path="/490/cpuacct.usage_user" dev="tmpfs" ino=2909 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 58.075741][ T36] audit: type=1400 audit(1763366667.098:20785): avc: denied { create } for pid=4263 comm="syz.1.1932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 58.096751][ T36] audit: type=1400 audit(1763366667.128:20786): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.121300][ T36] audit: type=1400 audit(1763366667.128:20787): avc: denied { execute } for pid=4265 comm="syz.1.1933" path="/491/blkio.bfq.group_wait_time" dev="tmpfs" ino=2915 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 58.146329][ T36] audit: type=1400 audit(1763366667.128:20788): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.170678][ T36] audit: type=1400 audit(1763366667.158:20789): avc: denied { read write } for pid=292 comm="syz-executor" name="loop0" dev="devtmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 58.195199][ T36] audit: type=1400 audit(1763366667.158:20790): avc: denied { execute } for pid=4267 comm="syz.1.1934" path="/492/blkio.bfq.group_wait_time" dev="tmpfs" ino=2921 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 58.881832][ T4336] netlink: 'syz.0.1968': attribute type 11 has an invalid length. [ 58.889728][ T4336] netlink: 3657 bytes leftover after parsing attributes in process `syz.0.1968'. [ 60.272557][ T46] bridge_slave_1: left allmulticast mode [ 60.278270][ T46] bridge_slave_1: left promiscuous mode [ 60.283969][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 60.291653][ T46] bridge_slave_0: left allmulticast mode [ 60.297412][ T46] bridge_slave_0: left promiscuous mode [ 60.303151][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 60.427987][ T46] veth1_macvtap: left promiscuous mode [ 60.433519][ T46] veth0_vlan: left promiscuous mode [ 63.302507][ T36] kauditd_printk_skb: 271 callbacks suppressed [ 63.302525][ T36] audit: type=1400 audit(1763366672.398:21062): avc: denied { execmem } for pid=4497 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 63.328689][ T36] audit: type=1400 audit(1763366672.418:21063): avc: denied { execute } for pid=4498 comm="syz.1.2043" path="/530/blkio.bfq.group_wait_time" dev="tmpfs" ino=3147 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 63.353268][ T36] audit: type=1400 audit(1763366672.418:21064): avc: denied { remount } for pid=4498 comm="syz.1.2043" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=0 [ 63.373355][ T36] audit: type=1400 audit(1763366672.418:21065): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 63.397498][ T36] audit: type=1400 audit(1763366672.418:21066): avc: denied { execute } for pid=4499 comm="syz.2.2044" path="/431/blkio.bfq.group_wait_time" dev="tmpfs" ino=2565 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 63.422110][ T36] audit: type=1400 audit(1763366672.418:21067): avc: denied { read write } for pid=4499 comm="syz.2.2044" name="ppp" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=0 [ 63.445508][ T36] audit: type=1400 audit(1763366672.438:21068): avc: denied { read write } for pid=289 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 64.219922][ T36] audit: type=1400 audit(1763366673.318:21069): avc: denied { execmem } for pid=4502 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 64.242720][ T36] audit: type=1400 audit(1763366673.318:21070): avc: denied { mounton } for pid=4503 comm="syz.1.2045" path="/531/file0" dev="tmpfs" ino=3154 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 64.265912][ T36] audit: type=1400 audit(1763366673.318:21071): avc: denied { mounton } for pid=4503 comm="syz.1.2045" path="/531/file0" dev="tmpfs" ino=3154 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 68.884896][ T36] kauditd_printk_skb: 23 callbacks suppressed [ 68.884915][ T36] audit: type=1400 audit(1763366677.988:21095): avc: denied { execmem } for pid=4524 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 68.910562][ T36] audit: type=1400 audit(1763366677.988:21096): avc: denied { execute } for pid=4526 comm="syz.2.2055" path="/436/blkio.bfq.group_wait_time" dev="tmpfs" ino=2593 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 68.935237][ T36] audit: type=1400 audit(1763366677.998:21097): avc: denied { read write } for pid=289 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 68.959556][ T36] audit: type=1400 audit(1763366678.008:21098): avc: denied { execute } for pid=4525 comm="syz.1.2054" path="/536/blkio.bfq.group_wait_time" dev="tmpfs" ino=3185 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 68.984119][ T36] audit: type=1400 audit(1763366678.038:21099): avc: denied { read write } for pid=290 comm="syz-executor" name="loop1" dev="devtmpfs" ino=50 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.296550][ T36] audit: type=1400 audit(1763366679.398:21100): avc: denied { execmem } for pid=4529 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.320128][ T36] audit: type=1400 audit(1763366679.418:21101): avc: denied { execmem } for pid=4532 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 70.375294][ T36] audit: type=1400 audit(1763366679.438:21102): avc: denied { execute } for pid=4531 comm="syz.2.2057" path="/437/blkio.bfq.group_wait_time" dev="tmpfs" ino=2599 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 70.404282][ T36] audit: type=1400 audit(1763366679.438:21103): avc: denied { create } for pid=4531 comm="syz.2.2057" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 70.424006][ T36] audit: type=1400 audit(1763366679.448:21104): avc: denied { read write } for pid=289 comm="syz-executor" name="loop2" dev="devtmpfs" ino=51 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 70.520875][ T46] bridge_slave_1: left allmulticast mode [ 70.526641][ T46] bridge_slave_1: left promiscuous mode [ 70.532264][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 70.539942][ T46] bridge_slave_0: left allmulticast mode [ 70.545588][ T46] bridge_slave_0: left promiscuous mode [ 70.551366][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 70.658404][ T46] veth1_macvtap: left promiscuous mode [ 70.663956][ T46] veth0_vlan: left promiscuous mode [ 72.126750][ T46] bridge_slave_1: left allmulticast mode [ 72.132519][ T46] bridge_slave_1: left promiscuous mode [ 72.145695][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.168053][ T46] bridge_slave_0: left allmulticast mode [ 72.173829][ T46] bridge_slave_0: left promiscuous mode [ 72.196068][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.328601][ T46] veth1_macvtap: left promiscuous mode [ 72.334160][ T46] veth0_vlan: left promiscuous mode [ 72.598025][ T46] bridge_slave_1: left allmulticast mode [ 72.603776][ T46] bridge_slave_1: left promiscuous mode [ 72.609472][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.617094][ T46] bridge_slave_0: left allmulticast mode [ 72.622742][ T46] bridge_slave_0: left promiscuous mode [ 72.628402][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.737997][ T46] veth1_macvtap: left promiscuous mode [ 72.743533][ T46] veth0_vlan: left promiscuous mode