last executing test programs:

11.145037976s ago: executing program 1 (id=1296):
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={<r1=>0xffffffffffffffff})
r2 = socket$nl_generic(0x10, 0x3, 0x10)
dup2(r2, r1)
sendmsg$SOCK_DESTROY(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0)

10.547330188s ago: executing program 1 (id=1297):
r0 = openat$nullb(0xffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$BLKROSET(r0, 0x401070c9, 0x0)

9.83119624s ago: executing program 1 (id=1299):
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f0000000500)={0xa, 0x2, 0x0, @empty}, 0x1c)
listen(r1, 0x0)
connect$inet(r0, &(0x7f00000001c0)={0x2, 0x2, @remote}, 0x10)
r2 = accept(r1, 0x0, 0x0)
r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
open(0x0, 0x0, 0x0)
ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0)
ioctl$SIOCGIFHWADDR(0xffffffffffffffff, 0x8927, 0x0)
r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff)
sendmmsg$inet(r4, &(0x7f0000000080), 0x0, 0x0)
r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
write$P9_RVERSION(0xffffffffffffffff, 0x0, 0xfffffdb8)
openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r6=>0xffffffffffffffff})
dup2(0xffffffffffffffff, 0xffffffffffffffff)
fcntl$dupfd(r5, 0x406, r3)
dup2(0xffffffffffffffff, 0xffffffffffffffff)
dup3(r6, 0xffffffffffffffff, 0x80000)
ioctl$F2FS_IOC_GARBAGE_COLLECT(r6, 0x5421, 0x0)
setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0)
setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0)
getsockopt$bt_hci(r2, 0x0, 0x1, 0x0, &(0x7f00000000c0))
r7 = socket$packet(0x11, 0x3, 0x300)
ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r7, 0x5411, 0x0)
dup2(r7, r4)
socket$inet(0x2, 0x6, 0x3)

8.056878186s ago: executing program 1 (id=1304):
r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0)
syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0)
syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0)
syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0})
syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0)
syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0)
syz_usb_ep_write(r0, 0x82, 0x5, &(0x7f0000002340)='hello')

2.678314546s ago: executing program 0 (id=1313):
r0 = creat(&(0x7f0000000640)='./file1\x00', 0x0)
r1 = ioctl$TUNGETDEVNETNS(r0, 0x5450, 0x0)
dup3(r0, r1, 0x0)
fdatasync(r1)

2.250054743s ago: executing program 0 (id=1314):
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={<r1=>0xffffffffffffffff})
close_range(r1, 0xffffffffffffffff, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0)

1.768467215s ago: executing program 0 (id=1315):
r0 = socket$packet(0x11, 0x3, 0x300)
ioctl$sock_inet_udp_SIOCINQ(r0, 0x5411, 0x0)

1.681512333s ago: executing program 1 (id=1316):
pipe2$watch_queue(&(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0xb82e336200000000)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
dup2(r1, r0)
sendmsg$inet6(r0, &(0x7f0000003e00)={0x0, 0x0, &(0x7f0000003dc0)=[{&(0x7f0000003bc0)="98", 0x1}], 0x1}, 0x0)

1.121453182s ago: executing program 0 (id=1317):
pipe2(&(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
write$FUSE_NOTIFY_POLL(r0, 0x0, 0x0)

1.070235986s ago: executing program 1 (id=1318):
r0 = socket$inet_udp(0x2, 0x2, 0x0)
setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x4547, 0x4)
bind$inet(r0, &(0x7f0000000640)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10)
connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10)
sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000000020850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
write$FUSE_INIT(r0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xa, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x71, 0x11, 0xb7}, [@ldst={0x6, 0x2}], {0x95, 0x0, 0x74}}, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x4d)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48)
bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000000), &(0x7f0000001540)=""/155}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10)
bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48)

512.903605ms ago: executing program 0 (id=1319):
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={<r1=>0xffffffffffffffff})
close_range(r1, 0xffffffffffffffff, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$SMC_PNETID_ADD(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)={0x14}, 0x14}}, 0x0)

0s ago: executing program 0 (id=1320):
r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000480)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x200}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x200}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0)
syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0)
syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0)
syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000340)={0x44, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x20, 0x80, 0x1c, {0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10, 0x10}}, 0x0, 0x0, 0x0, 0x0})
syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0)
syz_usb_control_io$cdc_ncm(r0, &(0x7f0000000080)={0x14, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x1a, {0x1a}}}, 0x0)
syz_usb_ep_write(r0, 0x82, 0x5, &(0x7f0000002340)='hello')

kernel console output (not intermixed with test programs):

Warning: Permanently added '[localhost]:5344' (ED25519) to the list of known hosts.
[  197.986800][   T30] audit: type=1400 audit(197.450:58): avc:  denied  { name_bind } for  pid=3195 comm="sshd" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[  198.571386][   T30] audit: type=1400 audit(198.030:59): avc:  denied  { execute } for  pid=3197 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[  198.578722][   T30] audit: type=1400 audit(198.040:60): avc:  denied  { execute_no_trans } for  pid=3197 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[  200.460101][   T30] audit: type=1400 audit(199.920:61): avc:  denied  { mounton } for  pid=3197 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[  200.481524][   T30] audit: type=1400 audit(199.940:62): avc:  denied  { mount } for  pid=3197 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[  200.526714][ T3197] cgroup: Unknown subsys name 'net'
[  200.558325][   T30] audit: type=1400 audit(200.020:63): avc:  denied  { unmount } for  pid=3197 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[  201.060716][ T3197] cgroup: Unknown subsys name 'rlimit'
[  201.485908][   T30] audit: type=1400 audit(200.950:64): avc:  denied  { setattr } for  pid=3197 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  201.489501][   T30] audit: type=1400 audit(200.950:65): avc:  denied  { create } for  pid=3197 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  201.497492][   T30] audit: type=1400 audit(200.950:66): avc:  denied  { write } for  pid=3197 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  201.502001][   T30] audit: type=1400 audit(200.960:67): avc:  denied  { module_request } for  pid=3197 comm="syz-executor" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1
[  202.581444][ T3201] SELinux:  Context root:object_r:swapfile_t is not valid (left unmapped).
Setting up swapspace version 1, size = 127995904 bytes
[  202.744498][ T3197] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
[  203.069310][   T30] kauditd_printk_skb: 8 callbacks suppressed
[  203.069398][   T30] audit: type=1400 audit(202.520:76): avc:  denied  { mounton } for  pid=3204 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1
[  203.070460][   T30] audit: type=1400 audit(202.530:77): avc:  denied  { mount } for  pid=3204 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[  203.083338][   T30] audit: type=1400 audit(202.540:78): avc:  denied  { read } for  pid=3204 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  203.084345][   T30] audit: type=1400 audit(202.540:79): avc:  denied  { open } for  pid=3204 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  203.102732][   T30] audit: type=1400 audit(202.560:80): avc:  denied  { mounton } for  pid=3204 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[  203.658480][   T30] audit: type=1400 audit(203.120:81): avc:  denied  { mounton } for  pid=3204 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[  203.704514][   T30] audit: type=1400 audit(203.150:82): avc:  denied  { mount } for  pid=3204 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1
[  203.731428][   T30] audit: type=1400 audit(203.190:83): avc:  denied  { read write } for  pid=3204 comm="syz-executor" name="loop1" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[  203.750141][   T30] audit: type=1400 audit(203.210:84): avc:  denied  { open } for  pid=3204 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[  203.770163][   T30] audit: type=1400 audit(203.230:85): avc:  denied  { ioctl } for  pid=3204 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=640 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[  208.818590][   T30] kauditd_printk_skb: 8 callbacks suppressed
[  208.818790][   T30] audit: type=1400 audit(208.280:94): avc:  denied  { create } for  pid=3236 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  209.413575][   T30] audit: type=1400 audit(208.860:95): avc:  denied  { create } for  pid=3239 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[  213.461428][   T30] audit: type=1400 audit(212.920:96): avc:  denied  { read } for  pid=3258 comm="syz.0.50" name="card0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1
[  213.493664][   T30] audit: type=1400 audit(212.920:97): avc:  denied  { open } for  pid=3258 comm="syz.0.50" path="/dev/dri/card0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1
[  213.543907][   T30] audit: type=1400 audit(212.990:98): avc:  denied  { write } for  pid=3258 comm="syz.0.50" name="card0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1
[  213.591908][ T3259] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[  214.653517][   T30] audit: type=1400 audit(214.090:99): avc:  denied  { read write } for  pid=3264 comm="syz.1.56" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1
[  214.655375][   T30] audit: type=1400 audit(214.110:100): avc:  denied  { open } for  pid=3264 comm="syz.1.56" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1
[  215.533024][   T30] audit: type=1400 audit(214.990:101): avc:  denied  { write } for  pid=3269 comm="syz.1.61" name="pfkey" dev="proc" ino=4026532720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1
[  216.889486][   T30] audit: type=1400 audit(216.350:102): avc:  denied  { create } for  pid=3277 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1
[  217.385690][   T30] audit: type=1400 audit(216.830:103): avc:  denied  { create } for  pid=3280 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1
[  218.896882][   T30] audit: type=1400 audit(218.350:104): avc:  denied  { create } for  pid=3285 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  218.974323][   T30] audit: type=1400 audit(218.420:105): avc:  denied  { create } for  pid=3286 comm="syz.0.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[  220.060254][   T30] audit: type=1400 audit(219.520:106): avc:  denied  { read write } for  pid=3290 comm="syz.0.80" name="udmabuf" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  220.061832][   T30] audit: type=1400 audit(219.520:107): avc:  denied  { open } for  pid=3290 comm="syz.0.80" path="/dev/udmabuf" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  222.300402][   T30] audit: type=1400 audit(221.760:108): avc:  denied  { create } for  pid=3303 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1
[  223.578124][   T30] audit: type=1400 audit(223.040:109): avc:  denied  { create } for  pid=3308 comm="syz.0.95" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1
[  228.241065][ T3328] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[  229.949260][   T30] audit: type=1400 audit(229.405:110): avc:  denied  { read } for  pid=3336 comm="syz.1.122" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1
[  229.959772][   T30] audit: type=1400 audit(229.415:111): avc:  denied  { open } for  pid=3336 comm="syz.1.122" path="/dev/loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1
[  229.974022][   T30] audit: type=1400 audit(229.425:112): avc:  denied  { write } for  pid=3336 comm="syz.1.122" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1
[  235.320725][   T30] audit: type=1400 audit(234.775:113): avc:  denied  { create } for  pid=3359 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[  236.405417][   T30] audit: type=1400 audit(235.855:114): avc:  denied  { mount } for  pid=3364 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[  237.489476][   T30] audit: type=1400 audit(236.945:115): avc:  denied  { sys_module } for  pid=3364 comm="syz-executor" capability=16  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[  242.705982][   T30] audit: type=1400 audit(242.155:116): avc:  denied  { read } for  pid=3388 comm="syz.1.156" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[  242.715370][   T30] audit: type=1400 audit(242.165:117): avc:  denied  { open } for  pid=3388 comm="syz.1.156" path="/dev/uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[  242.723576][   T30] audit: type=1400 audit(242.175:118): avc:  denied  { write } for  pid=3388 comm="syz.1.156" name="uinput" dev="devtmpfs" ino=708 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[  243.493543][   T30] audit: type=1400 audit(242.945:119): avc:  denied  { write } for  pid=3393 comm="syz.1.159" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1
[  246.968210][ T3364] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  247.004341][ T3364] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  249.841040][ T3364] hsr_slave_0: entered promiscuous mode
[  249.896581][ T3364] hsr_slave_1: entered promiscuous mode
[  250.873007][ T3364] netdevsim netdevsim0 netdevsim0: renamed from eth0
[  250.899380][ T3364] netdevsim netdevsim0 netdevsim1: renamed from eth1
[  250.921402][ T3364] netdevsim netdevsim0 netdevsim2: renamed from eth2
[  250.935695][ T3364] netdevsim netdevsim0 netdevsim3: renamed from eth3
[  252.718817][ T3364] 8021q: adding VLAN 0 to HW filter on device bond0
[  262.408618][ T3364] veth0_vlan: entered promiscuous mode
[  262.500742][ T3364] veth1_vlan: entered promiscuous mode
[  262.836052][ T3364] veth0_macvtap: entered promiscuous mode
[  262.896885][ T3364] veth1_macvtap: entered promiscuous mode
[  263.187550][ T3364] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  263.188974][ T3364] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  263.189552][ T3364] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  263.190003][ T3364] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  266.645697][   T56] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  267.138714][   T56] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  267.529892][   T56] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  268.056536][   T56] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  270.113467][   T30] audit: type=1400 audit(269.565:120): avc:  denied  { read } for  pid=3053 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1
[  273.780378][   T56] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  273.861104][   T56] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  273.944121][   T56] bond0 (unregistering): Released all slaves
[  274.369716][   T56] hsr_slave_0: left promiscuous mode
[  274.444634][   T56] hsr_slave_1: left promiscuous mode
[  274.761564][   T56] veth1_macvtap: left promiscuous mode
[  274.776408][   T56] veth0_macvtap: left promiscuous mode
[  274.778796][   T56] veth1_vlan: left promiscuous mode
[  274.781215][   T56] veth0_vlan: left promiscuous mode
[  291.500766][ T3454] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  291.517661][ T3454] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  291.988306][ T3456] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  292.030067][ T3456] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  295.637340][ T3454] hsr_slave_0: entered promiscuous mode
[  295.717523][ T3454] hsr_slave_1: entered promiscuous mode
[  297.616236][ T3456] hsr_slave_0: entered promiscuous mode
[  297.686489][ T3456] hsr_slave_1: entered promiscuous mode
[  297.745218][ T3456] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  297.747719][ T3456] Cannot create hsr debugfs directory
[  301.689302][ T3454] netdevsim netdevsim0 netdevsim0: renamed from eth0
[  301.814850][ T3454] netdevsim netdevsim0 netdevsim1: renamed from eth1
[  301.881127][ T3454] netdevsim netdevsim0 netdevsim2: renamed from eth2
[  301.960222][ T3454] netdevsim netdevsim0 netdevsim3: renamed from eth3
[  302.704370][ T3456] netdevsim netdevsim1 netdevsim0: renamed from eth0
[  302.811960][ T3456] netdevsim netdevsim1 netdevsim1: renamed from eth1
[  302.939000][ T3456] netdevsim netdevsim1 netdevsim2: renamed from eth2
[  303.060406][ T3456] netdevsim netdevsim1 netdevsim3: renamed from eth3
[  307.096069][ T3454] 8021q: adding VLAN 0 to HW filter on device bond0
[  307.214709][ T3456] 8021q: adding VLAN 0 to HW filter on device bond0
[  325.638554][ T3454] veth0_vlan: entered promiscuous mode
[  325.855711][ T3454] veth1_vlan: entered promiscuous mode
[  326.349105][ T3454] veth0_macvtap: entered promiscuous mode
[  326.437347][ T3454] veth1_macvtap: entered promiscuous mode
[  326.791577][ T3454] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  326.803905][ T3454] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  326.804641][ T3454] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  326.805038][ T3454] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  327.412115][   T30] audit: type=1400 audit(326.845:121): avc:  denied  { mounton } for  pid=3454 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[  328.716437][ T3456] veth0_vlan: entered promiscuous mode
[  328.733765][   T30] audit: type=1400 audit(328.185:122): avc:  denied  { read } for  pid=3008 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[  328.758982][   T30] audit: type=1400 audit(328.205:123): avc:  denied  { append } for  pid=3008 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[  328.784442][   T30] audit: type=1400 audit(328.235:124): avc:  denied  { open } for  pid=3008 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[  328.786031][   T30] audit: type=1400 audit(328.235:125): avc:  denied  { getattr } for  pid=3008 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[  328.877452][ T3456] veth1_vlan: entered promiscuous mode
[  329.308625][ T3456] veth0_macvtap: entered promiscuous mode
[  329.380142][ T3456] veth1_macvtap: entered promiscuous mode
[  329.480267][   T30] audit: type=1400 audit(328.935:126): avc:  denied  { ioctl } for  pid=3659 comm="syz.0.163" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9375 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1
[  329.490866][ T3660] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3660 comm=syz.0.163
[  329.788294][   T30] audit: type=1400 audit(329.245:127): avc:  denied  { read } for  pid=3661 comm="syz.0.164" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1
[  329.794443][   T30] audit: type=1400 audit(329.245:128): avc:  denied  { open } for  pid=3661 comm="syz.0.164" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1
[  329.816313][ T3456] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  329.817074][ T3456] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  329.817712][ T3456] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  329.818380][ T3456] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  329.824996][   T30] audit: type=1400 audit(329.285:129): avc:  denied  { ioctl } for  pid=3661 comm="syz.0.164" path="/dev/nullb0" dev="devtmpfs" ino=673 ioctlcmd=0x1267 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1
[  332.180542][ T3671] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3671 comm=syz.1.167
[  334.168396][   T30] audit: type=1400 audit(333.625:130): avc:  denied  { create } for  pid=3679 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  334.240808][   T30] audit: type=1400 audit(333.695:131): avc:  denied  { write } for  pid=3679 comm="syz.1.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  338.224162][   T30] audit: type=1400 audit(337.675:132): avc:  denied  { create } for  pid=3692 comm="syz.1.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  338.281517][   T30] audit: type=1400 audit(337.735:133): avc:  denied  { getopt } for  pid=3692 comm="syz.1.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  339.214115][   T30] audit: type=1400 audit(338.665:134): avc:  denied  { create } for  pid=3697 comm="syz.1.180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[  340.277699][ T3703] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3703 comm=syz.1.182
[  340.486017][ T3705] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3705 comm=syz.0.183
[  341.598201][   T30] audit: type=1400 audit(341.055:135): avc:  denied  { nlmsg_read } for  pid=3706 comm="syz.1.184" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1
[  342.044310][ T3710] Zero length message leads to an empty skb
[  342.983599][   T30] audit: type=1400 audit(342.435:136): avc:  denied  { write } for  pid=3711 comm="syz.1.186" path="socket:[5260]" dev="sockfs" ino=5260 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[  356.790073][   T30] audit: type=1400 audit(356.245:137): avc:  denied  { ioctl } for  pid=3750 comm="syz.1.205" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0x891b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[  358.361777][   T30] audit: type=1400 audit(357.815:138): avc:  denied  { prog_load } for  pid=3759 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[  358.368107][   T30] audit: type=1400 audit(357.825:139): avc:  denied  { bpf } for  pid=3759 comm="syz.1.209" capability=39  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[  358.484846][   T30] audit: type=1400 audit(357.935:140): avc:  denied  { ioctl } for  pid=3759 comm="syz.1.209" path="socket:[5353]" dev="sockfs" ino=5353 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  360.058854][   T30] audit: type=1400 audit(359.515:141): avc:  denied  { ioctl } for  pid=3767 comm="syz.0.213" path="socket:[5368]" dev="sockfs" ino=5368 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  360.090678][   T30] audit: type=1400 audit(359.545:142): avc:  denied  { bind } for  pid=3767 comm="syz.0.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  360.144622][   T30] audit: type=1400 audit(359.595:143): avc:  denied  { read } for  pid=3767 comm="syz.0.213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[  364.572717][   T30] audit: type=1400 audit(364.025:144): avc:  denied  { create } for  pid=3790 comm="syz.1.223" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  364.580988][   T30] audit: type=1400 audit(364.035:145): avc:  denied  { map } for  pid=3790 comm="syz.1.223" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5413 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  364.593419][   T30] audit: type=1400 audit(364.035:146): avc:  denied  { read write } for  pid=3790 comm="syz.1.223" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5413 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  367.463952][   T30] audit: type=1400 audit(366.905:147): avc:  denied  { mounton } for  pid=3802 comm="syz.1.229" path="/syzkaller.6nDrWW/43/file0" dev="vda" ino=1762 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[  367.474647][   T30] audit: type=1400 audit(366.925:148): avc:  denied  { mount } for  pid=3802 comm="syz.1.229" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1
[  367.503643][   T30] audit: type=1400 audit(366.955:149): avc:  denied  { mounton } for  pid=3802 comm="syz.1.229" path="/syzkaller.6nDrWW/43/file0" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=dir permissive=1
[  367.716863][   T30] audit: type=1400 audit(367.165:150): avc:  denied  { unmount } for  pid=3456 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1
[  367.774138][   T30] audit: type=1400 audit(367.215:151): avc:  denied  { unmount } for  pid=3456 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[  368.927116][  T147] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  369.416297][  T147] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  369.931146][  T147] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  370.460634][  T147] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  372.247087][   T30] audit: type=1400 audit(371.705:152): avc:  denied  { ioctl } for  pid=3823 comm="syz.0.238" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=6152 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[  374.140191][   T30] audit: type=1400 audit(373.595:153): avc:  denied  { map_create } for  pid=3830 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[  374.334407][   T30] audit: type=1400 audit(373.785:154): avc:  denied  { map_read map_write } for  pid=3830 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[  374.354287][   T30] audit: type=1400 audit(373.805:155): avc:  denied  { perfmon } for  pid=3830 comm="syz.0.240" capability=38  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[  374.423282][   T30] audit: type=1400 audit(373.845:156): avc:  denied  { setopt } for  pid=3830 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  377.056611][  T147] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  377.177800][  T147] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  377.299195][  T147] bond0 (unregistering): Released all slaves
[  377.843901][  T147] hsr_slave_0: left promiscuous mode
[  377.927851][  T147] hsr_slave_1: left promiscuous mode
[  378.431142][  T147] veth1_macvtap: left promiscuous mode
[  378.451547][  T147] veth0_macvtap: left promiscuous mode
[  378.458539][  T147] veth1_vlan: left promiscuous mode
[  378.466191][  T147] veth0_vlan: left promiscuous mode
[  383.498602][   T30] audit: type=1400 audit(382.955:157): avc:  denied  { ioctl } for  pid=3853 comm="syz.0.248" path="socket:[5648]" dev="sockfs" ino=5648 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  385.789759][   T30] audit: type=1400 audit(385.245:158): avc:  denied  { setopt } for  pid=3859 comm="syz.0.251" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  392.139292][   T30] audit: type=1400 audit(391.595:159): avc:  denied  { read } for  pid=3883 comm="syz.0.257" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1
[  392.164333][   T30] audit: type=1400 audit(391.615:160): avc:  denied  { open } for  pid=3883 comm="syz.0.257" path="/dev/input/mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1
[  393.343308][   T30] audit: type=1400 audit(392.795:161): avc:  denied  { create } for  pid=3887 comm="syz.0.258" name="file2" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=blk_file permissive=1
[  393.414384][   T30] audit: type=1400 audit(392.865:162): avc:  denied  { read } for  pid=3887 comm="syz.0.258" name="file2" dev="vda" ino=1760 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=blk_file permissive=1
[  393.419752][   T30] audit: type=1400 audit(392.875:163): avc:  denied  { open } for  pid=3887 comm="syz.0.258" path="/syzkaller.2CzGnj/51/file2" dev="vda" ino=1760 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=blk_file permissive=1
[  393.464903][   T30] audit: type=1400 audit(392.905:164): avc:  denied  { ioctl } for  pid=3887 comm="syz.0.258" path="/syzkaller.2CzGnj/51/file2" dev="vda" ino=1760 ioctlcmd=0x1279 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=blk_file permissive=1
[  393.756877][   T30] audit: type=1400 audit(393.205:165): avc:  denied  { unlink } for  pid=3454 comm="syz-executor" name="file2" dev="vda" ino=1760 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=blk_file permissive=1
[  396.906232][ T3809] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  396.976513][ T3809] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  399.918793][   T30] audit: type=1400 audit(399.375:166): avc:  denied  { unmount } for  pid=3454 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1
[  401.464230][   T30] audit: type=1400 audit(400.915:167): avc:  denied  { write } for  pid=3929 comm="syz.0.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1
[  403.713036][   T30] audit: type=1400 audit(403.165:168): avc:  denied  { ioctl } for  pid=3938 comm="syz.0.269" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x550e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[  403.770038][ T3809] hsr_slave_0: entered promiscuous mode
[  403.828010][ T3809] hsr_slave_1: entered promiscuous mode
[  403.934783][ T3809] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  403.935902][ T3809] Cannot create hsr debugfs directory
[  410.018262][ T3809] netdevsim netdevsim1 netdevsim0: renamed from eth0
[  410.115341][ T3809] netdevsim netdevsim1 netdevsim1: renamed from eth1
[  410.225078][ T3809] netdevsim netdevsim1 netdevsim2: renamed from eth2
[  410.306644][ T3809] netdevsim netdevsim1 netdevsim3: renamed from eth3
[  416.099678][ T3809] 8021q: adding VLAN 0 to HW filter on device bond0
[  416.564068][   T30] audit: type=1400 audit(416.015:169): avc:  denied  { create } for  pid=3991 comm="syz.0.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  416.650270][   T30] audit: type=1400 audit(416.105:170): avc:  denied  { setopt } for  pid=3991 comm="syz.0.282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  419.346518][   T30] audit: type=1400 audit(418.795:171): avc:  denied  { create } for  pid=4004 comm="syz.0.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1
[  419.383998][   T30] audit: type=1400 audit(418.835:172): avc:  denied  { write } for  pid=4004 comm="syz.0.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1
[  421.064906][   T30] audit: type=1400 audit(420.515:173): avc:  denied  { node_bind } for  pid=4011 comm="syz.0.287" saddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[  421.981775][   T30] audit: type=1400 audit(421.435:174): avc:  denied  { create } for  pid=4016 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  422.046444][   T30] audit: type=1400 audit(421.505:175): avc:  denied  { write } for  pid=4016 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  422.068026][   T30] audit: type=1400 audit(421.515:176): avc:  denied  { read } for  pid=4016 comm="syz.0.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  432.098124][ T3809] veth0_vlan: entered promiscuous mode
[  432.206775][ T3809] veth1_vlan: entered promiscuous mode
[  432.454440][ T3809] veth0_macvtap: entered promiscuous mode
[  432.494038][ T3809] veth1_macvtap: entered promiscuous mode
[  432.839739][ T3809] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  432.840808][ T3809] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  432.841595][ T3809] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  432.847561][ T3809] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  435.495202][   T30] audit: type=1400 audit(434.935:177): avc:  denied  { ioctl } for  pid=4092 comm="syz.1.311" path="socket:[6126]" dev="sockfs" ino=6126 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[  440.784099][   T30] audit: type=1400 audit(440.235:178): avc:  denied  { write } for  pid=4121 comm="syz.0.326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  450.634607][   T30] audit: type=1400 audit(450.085:179): avc:  denied  { create } for  pid=4175 comm="syz.1.351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[  450.645552][   T30] audit: type=1400 audit(450.095:180): avc:  denied  { read write } for  pid=4175 comm="syz.1.351" path="socket:[7303]" dev="sockfs" ino=7303 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[  452.905716][   T30] audit: type=1400 audit(452.355:181): avc:  denied  { bind } for  pid=4187 comm="syz.1.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[  452.941029][   T30] audit: type=1400 audit(452.375:182): avc:  denied  { accept } for  pid=4187 comm="syz.1.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[  452.994231][   T30] audit: type=1400 audit(452.445:183): avc:  denied  { write } for  pid=4187 comm="syz.1.357" path="socket:[7324]" dev="sockfs" ino=7324 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[  453.591810][   T30] audit: type=1400 audit(453.045:184): avc:  denied  { create } for  pid=4192 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1
[  453.641523][   T30] audit: type=1400 audit(453.095:185): avc:  denied  { write } for  pid=4192 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1
[  462.499431][   T30] audit: type=1400 audit(461.955:186): avc:  denied  { ioctl } for  pid=4238 comm="syz.0.381" path="/dev/loop-control" dev="devtmpfs" ino=638 ioctlcmd=0x7213 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1
[  463.081948][   T30] audit: type=1400 audit(462.535:187): avc:  denied  { read } for  pid=4242 comm="syz.0.383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[  464.627489][   T30] audit: type=1400 audit(464.075:188): avc:  denied  { ioctl } for  pid=4248 comm="syz.0.386" path="socket:[7434]" dev="sockfs" ino=7434 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  464.993890][   T30] audit: type=1400 audit(464.445:189): avc:  denied  { name_bind } for  pid=4249 comm="syz.1.387" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1
[  465.056771][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[  470.255553][   T30] audit: type=1400 audit(469.705:190): avc:  denied  { mounton } for  pid=4271 comm="syz.0.397" path="/syzkaller.2CzGnj/148/file0" dev="vda" ino=1766 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[  485.213656][   T30] audit: type=1400 audit(484.665:191): avc:  denied  { ioctl } for  pid=4308 comm="syz.1.412" path="socket:[7540]" dev="sockfs" ino=7540 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  485.400794][   T30] audit: type=1400 audit(484.855:192): avc:  denied  { setopt } for  pid=4308 comm="syz.1.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  485.424356][   T30] audit: type=1400 audit(484.875:193): avc:  denied  { bind } for  pid=4308 comm="syz.1.412" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  485.454600][   T30] audit: type=1400 audit(484.905:194): avc:  denied  { name_bind } for  pid=4308 comm="syz.1.412" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1
[  485.507844][   T30] audit: type=1400 audit(484.955:195): avc:  denied  { node_bind } for  pid=4308 comm="syz.1.412" saddr=172.20.20.187 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1
[  486.570310][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[  490.953704][   T30] audit: type=1400 audit(490.405:196): avc:  denied  { connect } for  pid=4334 comm="syz.0.420" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[  490.955597][   T30] audit: type=1400 audit(490.405:197): avc:  denied  { name_connect } for  pid=4334 comm="syz.0.420" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1
[  495.374727][   T30] audit: type=1400 audit(494.825:198): avc:  denied  { write } for  pid=4357 comm="syz.0.431" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1
[  509.578835][ T4420] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1543 sclass=netlink_tcpdiag_socket pid=4420 comm=syz.0.461
[  509.581993][   T30] audit: type=1400 audit(509.035:199): avc:  denied  { write } for  pid=4419 comm="syz.0.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[  512.175042][ T4433] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1543 sclass=netlink_tcpdiag_socket pid=4433 comm=syz.0.467
[  514.464917][ T4444] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1543 sclass=netlink_tcpdiag_socket pid=4444 comm=syz.1.473
[  514.657221][   T30] audit: type=1400 audit(514.115:200): avc:  denied  { write } for  pid=4440 comm="syz.0.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[  516.621842][   T30] audit: type=1400 audit(516.075:201): avc:  denied  { write } for  pid=4455 comm="syz.1.478" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1
[  518.864762][ T4466] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1543 sclass=netlink_tcpdiag_socket pid=4466 comm=syz.1.483
[  519.829807][   T30] audit: type=1400 audit(519.285:202): avc:  denied  { nlmsg_write } for  pid=4463 comm="syz.0.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1
[  524.111904][   T30] audit: type=1400 audit(523.555:203): avc:  denied  { read write } for  pid=4489 comm="syz.1.493" name="vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1
[  524.116255][   T30] audit: type=1400 audit(523.565:204): avc:  denied  { open } for  pid=4489 comm="syz.1.493" path="/dev/vhost-net" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1
[  524.146695][   T30] audit: type=1400 audit(523.595:205): avc:  denied  { ioctl } for  pid=4489 comm="syz.1.493" path="/dev/vhost-net" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1
[  532.374200][   T30] audit: type=1400 audit(531.825:206): avc:  denied  { read write } for  pid=4518 comm="syz.0.506" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1
[  532.378445][   T30] audit: type=1400 audit(531.825:207): avc:  denied  { open } for  pid=4518 comm="syz.0.506" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1
[  534.957040][   T30] audit: type=1400 audit(534.405:208): avc:  denied  { ioctl } for  pid=4528 comm="syz.1.511" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1
[  537.777300][ T4542] serio: Serial port pts0
[  542.857386][   T30] audit: type=1400 audit(542.315:209): avc:  denied  { create } for  pid=4561 comm="syz.1.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  543.834618][   T30] audit: type=1400 audit(543.295:210): avc:  denied  { write } for  pid=4565 comm="syz.1.527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  548.906241][ T4583] block nbd1: NBD_DISCONNECT
[  550.705114][   T30] audit: type=1400 audit(550.165:211): avc:  denied  { ioctl } for  pid=4587 comm="syz.1.537" path="/dev/dri/card1" dev="devtmpfs" ino=620 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1
[  552.576380][ T4594] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4594 comm=syz.1.540
[  552.594669][   T30] audit: type=1400 audit(552.035:212): avc:  denied  { write } for  pid=4593 comm="syz.1.540" path="socket:[8057]" dev="sockfs" ino=8057 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[  554.666388][ T4601] block nbd1: NBD_DISCONNECT
[  555.390818][ T4605] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4605 comm=syz.1.545
[  556.967087][ T4612] block nbd1: NBD_DISCONNECT
[  557.448989][ T4618] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4618 comm=syz.1.551
[  561.569436][   T30] audit: type=1400 audit(561.015:213): avc:  denied  { ioctl } for  pid=4638 comm="syz.1.563" path="socket:[8143]" dev="sockfs" ino=8143 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[  563.967908][   T30] audit: type=1400 audit(563.425:214): avc:  denied  { connect } for  pid=4652 comm="syz.1.570" lport=185 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  564.080758][   T30] audit: type=1400 audit(563.535:215): avc:  denied  { read } for  pid=4652 comm="syz.1.570" laddr=172.20.20.10 lport=185 faddr=172.20.20.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  572.563127][   T30] audit: type=1400 audit(572.015:216): avc:  denied  { mount } for  pid=4690 comm="syz.0.586" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[  572.613872][   T30] audit: type=1400 audit(572.065:217): avc:  denied  { read } for  pid=4690 comm="syz.0.586" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1
[  572.618053][   T30] audit: type=1400 audit(572.075:218): avc:  denied  { open } for  pid=4690 comm="syz.0.586" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1
[  576.040103][   T30] audit: type=1400 audit(575.495:219): avc:  denied  { create } for  pid=4704 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  576.058811][   T30] audit: type=1400 audit(575.515:220): avc:  denied  { create } for  pid=4704 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[  576.148607][   T30] audit: type=1400 audit(575.605:221): avc:  denied  { write } for  pid=4704 comm="syz.0.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[  582.197491][   T30] audit: type=1400 audit(581.655:222): avc:  denied  { create } for  pid=4723 comm="syz.0.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1
[  582.235412][   T30] audit: type=1400 audit(581.685:223): avc:  denied  { write } for  pid=4723 comm="syz.0.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1
[  584.904538][   T30] audit: type=1400 audit(584.355:224): avc:  denied  { read } for  pid=4736 comm="syz.0.606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1
[  600.304925][   T30] audit: type=1400 audit(599.725:225): avc:  denied  { lock } for  pid=4809 comm="syz.0.640" path="socket:[8812]" dev="sockfs" ino=8812 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  610.617428][   T30] audit: type=1400 audit(610.065:226): avc:  denied  { mounton } for  pid=4856 comm="syz.1.661" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1
[  612.108765][   T30] audit: type=1400 audit(611.565:227): avc:  denied  { create } for  pid=4866 comm="syz.1.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  612.124414][   T30] audit: type=1400 audit(611.575:228): avc:  denied  { connect } for  pid=4866 comm="syz.1.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  612.654501][   T30] audit: type=1400 audit(612.105:229): avc:  denied  { write } for  pid=4866 comm="syz.1.665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[  615.455334][ T4890] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4890 comm=syz.1.676
[  616.091619][   T30] audit: type=1400 audit(615.545:230): avc:  denied  { write } for  pid=4892 comm="syz.0.678" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  617.073997][ T4903] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=4903 comm=syz.1.681
[  621.074463][   T30] audit: type=1400 audit(620.525:231): avc:  denied  { block_suspend } for  pid=4923 comm="syz.0.692" capability=36  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[  621.206544][   T30] audit: type=1400 audit(620.665:232): avc:  denied  { module_load } for  pid=4923 comm="syz.0.692" path="/sys/power/wakeup_count" dev="sysfs" ino=844 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1
[  636.321250][ T5009] sctp: [Deprecated]: syz.0.731 (pid 5009) Use of int in maxseg socket option.
[  636.321250][ T5009] Use struct sctp_assoc_value instead
[  637.518159][ T5015] syz.1.734 (pid 5015) is setting deprecated v1 encryption policy; recommend upgrading to v2.
[  638.844342][ T5024] block nbd1: NBD_DISCONNECT
[  641.080973][ T5037] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5037 comm=syz.0.745
[  641.848417][   T30] audit: type=1400 audit(641.295:233): avc:  denied  { setopt } for  pid=5040 comm="syz.0.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[  644.141635][   T30] audit: type=1400 audit(643.595:234): avc:  denied  { setopt } for  pid=5051 comm="syz.0.753" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  649.810740][   T30] audit: type=1400 audit(649.265:235): avc:  denied  { ioctl } for  pid=5078 comm="syz.0.766" path="socket:[10000]" dev="sockfs" ino=10000 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  649.819024][   T30] audit: type=1400 audit(649.275:236): avc:  denied  { bind } for  pid=5078 comm="syz.0.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  661.413661][   T30] audit: type=1400 audit(660.865:237): avc:  denied  { ioctl } for  pid=5132 comm="syz.0.792" path="socket:[10304]" dev="sockfs" ino=10304 ioctlcmd=0x8904 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[  678.768601][   T30] audit: type=1400 audit(678.205:238): avc:  denied  { create } for  pid=5225 comm="syz.0.838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[  678.825872][   T30] audit: type=1400 audit(678.285:239): avc:  denied  { write } for  pid=5225 comm="syz.0.838" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[  684.550230][   T30] audit: type=1400 audit(684.005:240): avc:  denied  { read } for  pid=5258 comm="syz.0.855" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[  684.584155][   T30] audit: type=1400 audit(684.025:241): avc:  denied  { open } for  pid=5258 comm="syz.0.855" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[  684.617767][   T30] audit: type=1400 audit(684.075:242): avc:  denied  { ioctl } for  pid=5258 comm="syz.0.855" path="/dev/binderfs/binder-control" dev="binder" ino=2 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[  686.545667][   T30] audit: type=1400 audit(685.995:243): avc:  denied  { getopt } for  pid=5273 comm="syz.1.861" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[  695.987348][ T5330] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5330 comm=syz.1.889
[  698.385310][ T5342] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5342 comm=syz.1.895
[  705.066352][   T30] audit: type=1400 audit(704.525:244): avc:  denied  { execute } for  pid=5375 comm="syz.0.911" path=2F6D656D66643AFF2D42D54E49C56A9A707070F00884A26D202864656C6574656429 dev="tmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1
[  705.815069][   T30] audit: type=1400 audit(705.265:245): avc:  denied  { getopt } for  pid=5378 comm="syz.1.912" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  709.551162][   T30] audit: type=1400 audit(709.005:246): avc:  denied  { create } for  pid=5401 comm="syz.0.923" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[  709.570303][   T30] audit: type=1400 audit(709.025:247): avc:  denied  { ioctl } for  pid=5401 comm="syz.0.923" path="socket:[10777]" dev="sockfs" ino=10777 ioctlcmd=0x8901 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[  715.591487][ T5425] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=5425 comm=syz.1.934
[  718.376068][ T5437] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1019 sclass=netlink_route_socket pid=5437 comm=syz.0.940
[  740.224305][   T30] audit: type=1400 audit(739.665:248): avc:  denied  { read } for  pid=5553 comm="syz.1.997" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1
[  740.229918][   T30] audit: type=1400 audit(739.685:249): avc:  denied  { open } for  pid=5553 comm="syz.1.997" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1
[  740.308066][   T30] audit: type=1400 audit(739.765:250): avc:  denied  { ioctl } for  pid=5553 comm="syz.1.997" path="/dev/fb0" dev="devtmpfs" ino=621 ioctlcmd=0x64a3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1
[  752.392005][ T5624] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5624 comm=syz.1.1032
[  758.234795][   T30] audit: type=1400 audit(757.685:251): avc:  denied  { ioctl } for  pid=5652 comm="syz.0.1046" path="socket:[12037]" dev="sockfs" ino=12037 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1
[  763.365633][   T30] audit: type=1400 audit(762.805:252): avc:  denied  { ioctl } for  pid=5674 comm="syz.0.1055" path="/dev/usbmon0" dev="devtmpfs" ino=697 ioctlcmd=0x9208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1
[  779.257200][ T5756] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5756 comm=syz.0.1087
[  781.426434][ T5766] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1005 sclass=netlink_xfrm_socket pid=5766 comm=syz.0.1091
[  783.426694][ T5776] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1005 sclass=netlink_xfrm_socket pid=5776 comm=syz.1.1096
[  786.825051][ T5789] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1005 sclass=netlink_xfrm_socket pid=5789 comm=syz.1.1102
[  788.756646][   T30] audit: type=1400 audit(788.215:253): avc:  denied  { getopt } for  pid=5797 comm="syz.0.1107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1
[  789.367667][ T5801] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1005 sclass=netlink_xfrm_socket pid=5801 comm=syz.1.1108
[  791.144373][ T5812] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1005 sclass=netlink_xfrm_socket pid=5812 comm=syz.0.1114
[  791.460872][   T30] audit: type=1400 audit(790.915:254): avc:  denied  { read } for  pid=5814 comm="syz.0.1115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[  799.848468][ T5855] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=5855 comm=syz.1.1135
[  800.791297][   T30] audit: type=1400 audit(800.235:255): avc:  denied  { mount } for  pid=5856 comm="syz.1.1137" name="/" dev="autofs" ino=13383 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1
[  802.341528][ T5867] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1542 sclass=netlink_route_socket pid=5867 comm=syz.1.1141
[  806.558110][   T30] audit: type=1400 audit(806.015:256): avc:  denied  { read } for  pid=5892 comm="syz.0.1154" dev="nsfs" ino=4026532769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  806.567652][   T30] audit: type=1400 audit(806.015:257): avc:  denied  { open } for  pid=5892 comm="syz.0.1154" path="net:[4026532769]" dev="nsfs" ino=4026532769 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[  808.907180][ T5904] [U] ^@
[  821.331425][   T30] audit: type=1400 audit(820.785:258): avc:  denied  { connect } for  pid=5969 comm="syz.1.1191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[  824.881295][ T5996] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=5996 comm=syz.0.1204
[  843.833272][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[  843.948777][   T30] audit: type=1400 audit(843.395:259): avc:  denied  { create } for  pid=6110 comm="syz.0.1261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1
[  849.569740][ T6138] sctp: [Deprecated]: syz.1.1272 (pid 6138) Use of struct sctp_assoc_value in delayed_ack socket option.
[  849.569740][ T6138] Use struct sctp_sack_info instead
[  851.705645][ T6148] sctp: [Deprecated]: syz.0.1277 (pid 6148) Use of struct sctp_assoc_value in delayed_ack socket option.
[  851.705645][ T6148] Use struct sctp_sack_info instead
[  861.262937][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[  863.557695][ T6210] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy
[  863.575368][ T6210] misc raw-gadget: fail, usb_gadget_register_driver returned -16
[  866.106939][ T6221] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6221 comm=syz.0.1309
[  871.777427][   T10] usb 1-1: new high-speed USB device number 2 using dummy_hcd
[  871.802703][    C0] hrtimer: interrupt took 802304 ns
[  872.504613][   T10] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7
[  872.640819][   T10] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40
[  872.642929][   T10] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3
[  872.643758][   T10] usb 1-1: Product: syz
[  872.644378][   T10] usb 1-1: Manufacturer: syz
[  872.644994][   T10] usb 1-1: SerialNumber: syz
[  874.410083][   T10] cdc_ncm 1-1:1.0: MAC-Address: 42:42:42:42:42:42
[  874.426396][   T10] cdc_ncm 1-1:1.0: dwNtbInMaxSize=16 is too small. Using 2048
[  874.427565][   T10] cdc_ncm 1-1:1.0: setting rx_max = 2048
[  874.869541][   T10] cdc_ncm 1-1:1.0: setting tx_max = 88
[  875.084826][   T10] cdc_ncm 1-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.0-1, CDC NCM (NO ZLP), 42:42:42:42:42:42
[  875.247283][   T10] usb 1-1: USB disconnect, device number 2
[  875.320443][   T10] cdc_ncm 1-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.0-1, CDC NCM (NO ZLP)
[  875.847589][   T10] ------------[ cut here ]------------
[  875.848550][   T10] ODEBUG: free active (active state 0) object: 00000000763e2132 object type: work_struct hint: usbnet_deferred_kevent+0x0/0xa74
[  875.881249][   T10] WARNING: CPU: 0 PID: 10 at lib/debugobjects.c:514 debug_print_object+0x184/0x264
[  875.882587][   T10] Modules linked in:
[  875.886553][   T10] CPU: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.10.0-rc6-syzkaller-00051-g1dfe225e9af5 #0
[  875.888052][   T10] Hardware name: linux,dummy-virt (DT)
[  875.888963][   T10] Workqueue: usb_hub_wq hub_event
[  875.890261][   T10] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  875.891042][   T10] pc : debug_print_object+0x184/0x264
[  875.891633][   T10] lr : debug_print_object+0x184/0x264
[  875.892299][   T10] sp : ffff8000898e7090
[  875.892852][   T10] x29: ffff8000898e7090 x28: dfff800000000000 x27: 0000000000000004
[  875.894056][   T10] x26: ffff8000801cc8cc x25: ffff8000898e7218 x24: ffff8000852ac0a0
[  875.894945][   T10] x23: 0000000000000003 x22: ffff80008689fb68 x21: ffff800084fe5c80
[  875.895800][   T10] x20: ffff8000852ab8a0 x19: ffff8000898e7200 x18: ffff00000a26a880
[  875.896760][   T10] x17: 0000000000000000 x16: 0000000000000006 x15: 1fffe0000144d50f
[  875.897639][   T10] x14: 0000000000000000 x13: 0000000000000004 x12: ffff60000d4cb369
[  875.898488][   T10] x11: 1fffe0000d4cb368 x10: ffff80008814b940 x9 : ffff00000a26a8c8
[  875.899465][   T10] x8 : 00000000f3000000 x7 : 1fffe0000144d519 x6 : 00000000f3f3f3f3
[  875.900337][   T10] x5 : 00000000f2f2f200 x4 : ffff70001131cd6e x3 : 0000000000000001
[  875.901255][   T10] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00000a269e00
[  875.902495][   T10] Call trace:
[  875.903110][   T10]  debug_print_object+0x184/0x264
[  875.903753][   T10]  debug_check_no_obj_freed+0x3b8/0x4fc
[  875.904307][   T10]  kfree+0x1bc/0x388
[  875.904787][   T10]  kvfree+0x3c/0x4c
[  875.905303][   T10]  netdev_freemem+0x48/0x60
[  875.905804][   T10]  netdev_release+0x70/0x98
[  875.906307][   T10]  device_release+0xe4/0x1e8
[  875.906809][   T10]  kobject_put+0x17c/0x444
[  875.907324][   T10]  put_device+0x14/0x24
[  875.907781][   T10]  free_netdev+0x2c0/0x474
[  875.908283][   T10]  usbnet_disconnect+0x194/0x38c
[  875.908805][   T10]  usb_unbind_interface+0x168/0x6f4
[  875.909390][   T10]  device_remove+0x100/0x14c
[  875.909877][   T10]  device_release_driver_internal+0x310/0x47c
[  875.910445][   T10]  device_release_driver+0x18/0x24
[  875.910960][   T10]  bus_remove_device+0x1a4/0x348
[  875.911474][   T10]  device_del+0x2d8/0x7ac
[  875.911958][   T10]  usb_disable_device+0x240/0x5ac
[  875.912614][   T10]  usb_disconnect+0x22c/0x75c
[  875.913182][   T10]  hub_event+0x10a8/0x365c
[  875.913655][   T10]  process_one_work+0x7bc/0x18a0
[  875.914204][   T10]  worker_thread+0x764/0xbec
[  875.914668][   T10]  kthread+0x27c/0x300
[  875.915150][   T10]  ret_from_fork+0x10/0x20
[  875.915931][   T10] irq event stamp: 477634
[  875.916473][   T10] hardirqs last  enabled at (477633): [<ffff800080220344>] finish_task_switch.isra.0+0x1a8/0x8e8
[  875.917408][   T10] hardirqs last disabled at (477634): [<ffff800084f42358>] el1_dbg+0x24/0x9c
[  875.918159][   T10] softirqs last  enabled at (477626): [<ffff80008018eaa4>] handle_softirqs+0x8a8/0xd80
[  875.918909][   T10] softirqs last disabled at (477607): [<ffff800080010770>] __do_softirq+0x14/0x20
[  875.919639][   T10] ---[ end trace 0000000000000000 ]---

VM DIAGNOSIS:
07:35:55  Registers:
info registers vcpu 0

CPU#0
 PC=ffff800084f22774 X00=0000000000000000 X01=0000000000000002
X02=0000000000000001 X03=0000000000000002 X04=ffff800084fde84c
X05=ffff800088145b8c X06=6e69617420746f4e X07=006465746e696174
X08=ffff800088145b8b X09=dfff800000000000 X10=ffff700011028b71
X11=1ffff00011028b71 X12=ffff700011028b72 X13=0000000000000004
X14=0000000000000000 X15=1fffe0000144d50f X16=0000000000000006
X17=0000000000000000 X18=ffff00000a26a880 X19=ffff800085ed01c1
X20=0000000000000023 X21=dfff800000000000 X22=ffff800088013c23
X23=0000000000000020 X24=ffff800085ed01c0 X25=ffff800088013c23
X26=ffff800085ed0180 X27=ffff800084f95580 X28=000000000000001d
X29=ffff8000898e6b60 X30=ffff800084ec0b1c  SP=ffff8000898e6b60
PSTATE=800003c5 N--- EL1h     FPCR=00000000 FPSR=00000000
Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000
Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000
Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000
Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000
Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000
Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000
Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000
Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000
Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000
Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000
Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000
Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000
Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000
Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000
Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000
Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000
info registers vcpu 1

CPU#1
 PC=ffff8000802da194 X00=0000000000000000 X01=1fffe00002364158
X02=0000000000000004 X03=0000000000000002 X04=ffff700011300f36
X05=1fffe00002364159 X06=ffff000011b20aa8 X07=0000000000000095
X08=00000000ffffffff X09=412a91162ab8dfb8 X10=ffff80008689fb60
X11=0000000000000001 X12=1ffff0001102976e X13=0000000000000004
X14=0000000000000000 X15=1fffe0000236414f X16=0000000000000000
X17=ffff7fffe3e28000 X18=ffff000011b20a80 X19=0000000000000001
X20=ffff80008683ffc8 X21=0000000000000000 X22=ffff800089807d20
X23=1fffe00001463b43 X24=ffff7fffe3e28000 X25=ffff00000a31da18
X26=ffff00000a31e3a0 X27=0000000000000200 X28=0000000000000001
X29=ffff800089807d90 X30=ffff8000802397ac  SP=ffff800089807d90
PSTATE=100000c5 ---V EL1h     FPCR=00000000 FPSR=00000000
Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000
Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000
Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000
Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000
Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000
Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000
Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000
Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000
Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000
Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000
Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000
Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000
Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000
Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000
Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000
Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000