last executing test programs: 1h27m32.809253126s ago: executing program 0 (id=3248): r0 = openat$ttyS3(0xffffff9c, &(0x7f0000000140), 0x400, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_OPTION(r0, 0x8002f515, 0x0) (fail_nth: 2) 1h27m32.568407974s ago: executing program 0 (id=3249): openat$ttyS3(0xffffff9c, &(0x7f0000000140), 0x200001, 0x0) r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x5451, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000040), 0x6, 0x20240) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000080)) ioctl$TUNDETACHFILTER(r1, 0x400854d6, 0x0) ioctl$F2FS_IOC_GET_COMPRESS_OPTION(r0, 0x8002f515, 0x0) 1h27m32.340753921s ago: executing program 0 (id=3250): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) r2 = dup3(r0, r1, 0x0) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000000)='gretap0\x00', 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), r2) sendmsg$TIPC_CMD_GET_NETID(r2, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r3, 0x200, 0x70bd28, 0x25dfdbff, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0xc004) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, 0x0) 1h27m32.135922847s ago: executing program 0 (id=3251): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008c}, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000), 0x3, 0x200002) ioctl$SNDRV_PCM_IOCTL_STATUS64(r0, 0xc0984124, &(0x7f0000000c40)) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x81) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000240), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='fd=', @ANYRESDEC=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r2, 0x0, 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x226) 1h27m31.916554243s ago: executing program 0 (id=3252): gettid() r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffded, 0x3) r1 = openat$selinux_avc_cache_threshold(0xffffff9c, &(0x7f0000000240), 0x2, 0x0) close(r1) r2 = socket$nl_route(0x10, 0x3, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000280)=ANY=[], 0x4b) r3 = openat$vsock(0xffffff9c, &(0x7f0000000000), 0x12b802, 0x0) write$hidraw(r3, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = open(&(0x7f0000000040)='./file0\x00', 0xc2, 0x0) write$selinux_create(r4, 0x0, 0x0) r5 = openat$vnet(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) sendmmsg(r6, &(0x7f0000000700), 0x1, 0x440448d4) ioctl$VHOST_SET_LOG_FD(r5, 0x4004af07, 0x0) r7 = mq_open(&(0x7f00000002c0)='pft\xec\x00\x00m\b-\ty\xa8rs\xf81\xf6\x17\xd2lJ\xf8\xc9\x0f\xf6\xe3\x98-6l\x83\xc7*\xad\xdb&\xb7\xcb\xac\xed\x83b\xb6:\xb9\x99\xa4a\x90GmU@n\x1d\xb5\xcb\x1e\xf0u\x99Z\xcd\xd8\xfc4&\x9alS\xf0@5\xb0rR\x86@\xe3k\x18\x9e\xf1\x13\x96vMW\xf8Wl{w\x9a\xf4\x0f\xd5~\x9a_@d\x93\xcc\xdc\x94\xe7\xc1\xcc\xa39#a\x92),\f\x9fT|\xa3i\x8d\x13\xc4$KE\x11\xbf\x8c\xfc\xd5\b\x04\xbbP\xba\xdaV*\xa8\xdf\xb3\xf7\x89+\xb4\xfa\xf9\x82\xf9R\xde\x83\xd1\xebB\xd6\xe5{T=3\f\xf0r\x81@b\xa0\xcd\x86p\xec_<\xb7r\xbfN\v\xf4\xfbxk\xe1\xe4%U=\x89b\xe8\xc7ll\xcb(pAl\xb3\"\xc4L\x16\f\xae\x01\x05E\xad\x88\r\xf6A\x05\x01\xab\x97+ \xe5\xdf\xfb\xf6\x83\xe0b\a\x92\xf5I\xe8\xe99\x00'/251, 0x40, 0x2, 0x0) mq_getsetattr(r7, 0x0, 0x0) fsetxattr$trusted_overlay_upper(r5, &(0x7f0000000040), &(0x7f0000000080)={0x0, 0xfb, 0xce, 0x3, 0x3, "0aaa1df2d07f9c375c375d8f46b8af6f", "73e4d883a3a1923f45d40a127968a01741610a665f4877ad2a48e9db493bf3a64e5413579ce878d8c761d2dbabcaa3e83022dcd7744ba7b7e73ca3a0030b7b97a64eb398acf9fcc5f874d75701d9280b956bfeffffff4da7f8d273e0710ef87396b5146ac60a1f8466a87c4e57d797fcdbab041b114211f85251c4ccb0d0a98d2bcbd55d00ef71c4d716fe97df32e33b334501cb7965f3a441c93ee48f23e79fb5a7600d154991be267e53567709322f1058d0bd0887034bf1"}, 0xce, 0x1) socket$inet_tcp(0x2, 0x1, 0x0) read(r0, &(0x7f0000000440)=""/247, 0x26) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x31, @time={0x0, 0xfffffffd}, 0x0, {0x0, 0x2}, 0x0, 0x0, 0x4}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, 0x0) r8 = socket$inet6_mptcp(0xa, 0x1, 0x106) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r8, 0x8916, &(0x7f0000000180)={@local, 0x1a, r10}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@bloom_filter={0x1e, 0xffffffff, 0x8, 0x6e68, 0x4000, r2, 0xfffffc00, '\x00', 0x0, r1, 0x5, 0x2, 0x1, 0xf, @void, @value, @void, @value}, 0x50) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0x40045304, &(0x7f0000000200)={0x7, 0x2, 0x1, 'queue0\x00', 0x996a}) syz_clone(0x808000, &(0x7f0000002cc0)='t', 0x1, 0x0, 0x0, &(0x7f00000004c0)) 1h27m31.658666833s ago: executing program 0 (id=3253): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f00000000c0), 0x3c3300, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r2 = ioctl$NS_GET_PARENT(r1, 0x5450, 0x0) ioctl$NS_GET_OWNER_UID(r2, 0x5421, &(0x7f0000000080)) openat$proc_mixer(0xffffff9c, &(0x7f0000000240)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = ioctl$NS_GET_PARENT(r3, 0x5450, 0x0) ioctl$KDSETLED(r4, 0x5450, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000000)={0xe, {0xa, 0xe, 0x7, 0x7a, "ade17ada1b13ead7d7b9a726ec55688d811f9800413abd5cfbea3ed51c9568a6ec1a4af4984c9d15233e09f7f013cbe03d83ecded047bb9a5cf640b9069fc03040e3fbfd8f023629fc0854e7a05b074e69e9ccfa884f791f8bd13d8686e658fabd4ce9adcb1ce5734047787b0d1d2d6cc4251f4c0365d585e878"}}, 0x86) 1h27m31.658432803s ago: executing program 32 (id=3253): r0 = openat$dlm_monitor(0xffffff9c, &(0x7f00000000c0), 0x3c3300, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/arp\x00') r2 = ioctl$NS_GET_PARENT(r1, 0x5450, 0x0) ioctl$NS_GET_OWNER_UID(r2, 0x5421, &(0x7f0000000080)) openat$proc_mixer(0xffffff9c, &(0x7f0000000240)='/proc/asound/card2/oss_mixer\x00', 0x0, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) r4 = ioctl$NS_GET_PARENT(r3, 0x5450, 0x0) ioctl$KDSETLED(r4, 0x5450, 0x0) write$UHID_SET_REPORT_REPLY(r0, &(0x7f0000000000)={0xe, {0xa, 0xe, 0x7, 0x7a, "ade17ada1b13ead7d7b9a726ec55688d811f9800413abd5cfbea3ed51c9568a6ec1a4af4984c9d15233e09f7f013cbe03d83ecded047bb9a5cf640b9069fc03040e3fbfd8f023629fc0854e7a05b074e69e9ccfa884f791f8bd13d8686e658fabd4ce9adcb1ce5734047787b0d1d2d6cc4251f4c0365d585e878"}}, 0x86) 1h23m0.848043818s ago: executing program 1 (id=3721): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$selinux_create(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000180)={0x1, 0x3, [{0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x4000}, {0xffffffffffffffff, 0x0, 0x2000}, {0xffffffffffffffff, 0x0, 0xfffff000, 0xfffff000}]}) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r2, 0x0, &(0x7f00000000c0)=0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r4) sendmsg$NFC_CMD_DEV_UP(r4, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r5, @ANYBLOB="010028bd7000fedbdf250200000008000100", @ANYRES32=r3], 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8004) r6 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r8, 0x0) connect$unix(r7, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r8, r7, 0x0) r9 = accept4(r7, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r9, 0x5450, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r6, 0x0, &(0x7f00000000c0)=0x0) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r11) sendmsg$NFC_CMD_DEV_UP(r11, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="1c0000009923b46801ba772c1876271dabf814189adafbcca6764ac9b28d2765e1a76202a8ed8505113a2746049533123a6c8c639bbe", @ANYRES16=r12, @ANYBLOB="010028bd7000fedbdf250200000008000100", @ANYRES32=r10, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000240)=0x0) sendmsg$NFC_CMD_LLC_SET_PARAMS(r0, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000826bd7000ffdbdf251000000008000100", @ANYRES32=r10, @ANYBLOB="05000f0003000000060011002003000005000f004200000008000100", @ANYRES32=r13, @ANYBLOB="836b1736"], 0x3c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x5452, &(0x7f0000000a40)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000003c0), 0xffffffffffffffff) 1h22m57.550285229s ago: executing program 1 (id=3722): r0 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) read$alg(r0, 0x0, 0x0) r1 = openat$sw_sync_info(0xffffffffffffff9c, &(0x7f00000000c0), 0x40000, 0x0) r2 = socket$nl_crypto(0x10, 0x3, 0x15) recvmmsg(r2, 0x0, 0x0, 0x12000, 0x0) syz_genetlink_get_family_id$nl80211(0x0, r2) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r4 = openat$cgroup_devices(r3, &(0x7f0000000000)='devices.allow\x00', 0x63, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r4, 0x5451, 0x0) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r6 = openat$incfs(r5, &(0x7f0000000040)='.log\x00', 0x8c0, 0x0) futimesat(r6, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$RDMA_USER_CM_CMD_ACCEPT(r7, 0x0, 0x0) close_range(r2, r2, 0x2) socket$inet_smc(0x2b, 0x1, 0x0) r8 = socket$nl_audit(0x10, 0x3, 0x9) r9 = dup3(r8, r8, 0x0) setsockopt$SO_BINDTODEVICE(r9, 0x1, 0x19, &(0x7f0000000040)='ip6gretap0\x00', 0x8) connect$l2tp(r1, &(0x7f0000000240)={0x2, 0x0, @remote, 0x7ffff}, 0x10) pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$GIO_SCRNMAP(r10, 0x5421, &(0x7f00000002c0)=""/218) ioctl$UI_GET_SYSNAME(r9, 0x8040552c, 0x0) ioctl$TIOCGPTPEER(r9, 0x5441, 0xefd) write$FUSE_ATTR(r1, 0x0, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x44004) 1h22m56.726346081s ago: executing program 1 (id=3724): mknod$loop(&(0x7f0000000140)='./file0\x00', 0xfff, 0x1) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x80, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000006300)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000040)={0x50, 0x0, r1, {0x7, 0x1f, 0x0, 0x10408, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}, 0x50) syz_fuse_handle_req(r0, &(0x7f00000021c0)="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000081000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000003dc150f4000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f50000000000000000000000000000000000000000000000000000000000000000000000000000000000c6d90000000000001354c4b6000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a00", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x80101, 0x80) syz_usb_connect$printer(0x5, 0x2d, &(0x7f0000000540)=ANY=[@ANYBLOB="07000002000000402505a8a409090404ff0207010101090501020002ed0941d5cf8380c86cd25dc6614c2ad8f3e2f65dff5f7b77de6da31d0faa45a1a920935728e8964703d002fde4c53494a4a93fe5606d6ef21700932f28517d44ce94f6dbab7d7a442c391820f68099981d99f06fc900759514295753ba3ceeb98dbfb7650bb392800c2bd62d6f474fc837ad08af81d8be41c090419dd5fb9ff3"], &(0x7f00000003c0)={0xa, &(0x7f0000000100)={0xa, 0x6, 0x310, 0xd4, 0x6, 0xc, 0x40, 0xf2}, 0x37, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x5, [{0x4, &(0x7f0000000200)=@lang_id={0x4, 0x3, 0x44f}}, {0x4, &(0x7f0000000240)=@lang_id={0x4, 0x3, 0x449}}, {0x64, &(0x7f0000000280)=@string={0x64, 0x3, "665c600ac9776c8de62178b440fad9fd70d595b0eb260f9a371138103957b6523c25f33c1484025e99eb23fd9cbaa84ae02a40bec12f166ec9e1cc3dc47ffffee0761437c846fd306b6bd12b75e9ddc6e78a914e9d5872aa561e9747118929f2dc73"}}, {0x4, &(0x7f0000000340)=@lang_id={0x4, 0x3, 0x44d}}, {0x4, &(0x7f0000000380)=@lang_id={0x4, 0x3, 0x44c}}]}) r5 = dup2(r0, r0) ioctl$DRM_IOCTL_GET_CLIENT(r4, 0xc0186405, &(0x7f00000006c0)={0x8, 0x365, {r3}, {r2}, 0x7fffffff, 0x2}) syz_fuse_handle_req(r5, &(0x7f0000008340)="fa633f41c18c6fbb2d846f83014b62da76713276f97bc1814f511a75120df3d5a8996416d9fd12efa4ca28ac9deaa18592fe6265e14ef520927d97a5ee70640dfdf9e3dcf73998d2f524c48ad1c8e317760042d5746455979034bc6c467f9fd7ccb8d0d99af4cde65990ee87f97febdcffe19ef5f079bc62391d135021a342fddbd4e4ccbafb805186ed38c2e9e6d7c748ae56483a1152ac741f0b98df09b39d8eab12d54505a999d892648206262f8978c34ab2582b5a12e1015d37b08f9d649205c0bc1a9dee4ed79f9f4f1d173740725ce8bb946867b13035f4ffaa4e50eb9f6d0ae2f0944f83661c1a40727577674a2087748278d76a03aabea7bca022b7666c28e0fc6e2181ddbadd98a89f9e6abeb4f82e5a320e5874a2316060ce6f6c4f43da894e8e0c212881eea62e41774f5c6ef359469f4be29d67f4d5cbbad4e5975de930229d83fa2ce7b1f646ccb7785dd92f45fdc70de7b8e0d44cae5e066dc5b9d41a9ddbb393e0b81b5d34d01e79c9f3e61cb6f3dbaed1c261a8d44f7de0c81f004a43be1396ce7ec5c3e0a8795fc026efe420ab9dfdb9064557649a817a32ebdfb95c8c1b16b9cf5e653a34956dc130b02a0d1e83640d9554248fb143dbab133629fabe4ae958c1e38f613f47511e75d6cc4e12cae3b79f65bef6a743c1ef5ae506d058bfebd3af5fc7643385f6e089bd7ee21c6db1901be72ea7998a68de6912c93427dbf3c3f99fb51329f1ea2fdf8c149f0926821bde96a4bfaf1d0150df463a32cf94e9ce78f33dcea86db8a59910d57bfa153d1d2dc55e7298c3c6f5abb2fb866da89a7210b8e2d466a2399af3fa6ece3569a302c8f368c23c5ab1dc9c1bf1d16c833b6c2863d69810387cdff82fce955f5c03e4fb2e2e6a27a6c6132d0ac019c8e28078f96ffe9276d410df2b84e19938dfa5146623b43344b67658a303e71db97d93227d90162048b2f87a74c0531db224ab4b753ca5e5d90b6125910a4a1edb05dcf4fc1d4da47a8d42bc4a0926a2b72084066b110432a43d2326024290c7ce6351d0ef614fa4ce6f8b7045a31f172205340bdf483ed018d113a1f25f02838cb54544f59eed55d723032b281b6af58f39bcf421304f44b18d84eff09ca7b18e58fd22bb2db4bbf7ef8f5d389adaa29980c41ec3789d8c1f940c25af7c006aca7e7c59376e37d4eaff0de77d2034745dd7ab4431b87483f71e08a6c2d4f7dcf0b6475de0609c0760a71966d4ca7523dfc4f8dd9e89c4a5077d87c0ba827d5da2808485d3a15d6fe17702350686506065aa80e76dcf3bb9675b6c6dc85ba77f1d330c8dc55c6a81ebbd145088e800af2ba03674f7ca3f7426b678b14f8f5d2ed145056467d270760352d4540cadc13efa89d79f56a4f29c215b5662bd944ce5b54dee02cc2ef2adab03fd4916e7623c65cc1d571647c6ea2648a1774fffffac3239bf046a44837365859244511c6c2107f0c3db98192d9f99b2ce16615116294079927ed8b0928f8c03acf9c5bceaba7b720f9d877a245cffb9deea433e6a33628554747d8addd111157495e32e5f1dd87c0f98406615d15e52dd76f947555b50519ba4e3e6cb9d74e14de832d674000372d225f484204b2562f7f8ac0ffc44b7c89371d1dc586d12c02221d18ffd7873df9eb24a3114f533a86cade7020dbd08ff1d90a050a3a15ba1f66068362adce8c035d4812e1ea7dc9d99b06b79ba6d32660d5fd8ce624fada39671e11e25bd8bd4290092953d981cca65025eccc689217a02d10e55376871313a81e79f2e85c55b62552680623763225ca14cfd041bbaf9ef9be82c670e9c1ec31637a21cb1d0de8435400f2a5c7fc7ab234f9c3a4827e3e5bff9e5bda82cdc6e192087f3cd49c47ffd90dce236ccaf29af3b5684b91ecd43fffed71ef2cb8b29248d63568d39969133bcbb5af5a224b766f5e6b1ebd21ec004362ebcedf4627d0692643ce4950c46bcd5332b7d2bf8d13e85da87035800948d53a940183bb5c0309387b296c47ce756e96f6877011ee5d29dd1fac8f7ef39d5208205fef4418fe9cd1c776a95b4434f4914d39bbf6447b8345f131a922f1e16351d367f4ff6036e7be09c9a322b43abe89c736acd356450f35f7bc83e1059fca1ef041f0f1eff6c89af2d2c34a1626fa0490e9fc4dd9f02dd8e1e4cb9d1e828b191024ef57772e48a4dac2fbcf16de66527a18ec514d013a595d0edf6d542eb07b0862eaf531bb8d110da35d1fe833b64eb82de04833e2cae6c6ca91b38c74c2c82898e3acaf93f969e92ea863b245946c5c1453a6c0278238c0f89c6f99bfb78402fc07b346908826207b8dc96fa581d64cd559fc379de58a88d7c5d278a1e6d68c2b880d7f296fb70940375689e1c0777053fd1199f036ffeba141c18f064e0c740798c75b4c800fdeed2440687793c36536450d2b889302378c7bc3059273615b2477c0d4c7a8fa960168d6455139a55695be146efaf7e78245463c59c14874009852bef5635e0f0d8eea7dcc2a32eb5e538c77ccce76e966d352b523202c044eb6940ba3d0739076a070defa56956d038deeb8f28dd5d44badf96c95045b4c8774e315b85b231cb525bc220d5d5804549a2f915567a859899fcb0d3cf91909c53f3103e0426cbdcf232057d8eedcd8fbaedb1966b463d9bb94ce375d60d86aed45d64fe823a1a3f3ee0674b2edb0ba29cae872758b8a5bdaa2e9cc256f33edb0dfa310edc99664b75d740dd251afb509e8e68aa862eec7f29b2d1b9679df32669d0cbfa3e2c66c58cf4abad4cad203bbde29e43dba9aeb1e9c1f1040bbea8f82347c7cdd94aed6d070dd303ed2f5a6192dd404d4cd25517adb91721f2a8bcdb6da411a1778236300ee9d04a1c8683efb80aa310c1f407dab8cfdee0b1e32634b4d97957669a03e50102ea6fa27c1793dfabcd887272674c21fc372c05db878c4f87d4effda3befadfec0ad97539e12833448396ab7811ac93916c1b1c77c5856459c1f881df2ab2c4ce9e124370db9e3b17d0af40e1b4e929ab03eea5407ecfddaf65247af593e9cb753d505c3c34283d9972351128d0eb2d35b6aa36368c91d14c02a3e029c880f37c2d1ffdbadec0b9117d703a8a06d3f59010082a519d84dfd85961e91dcc7f6aafedf613ae62b56ca43dce7361b9764e53ed46a9c4ed4ffb3817074c5e0cb66ac558eb5d2922754ec30b40ac31f27be965355e215a971c1a13b432e44742e91b2321b53ef91fc21b3fbeb0a4e681f1442b02c1affd4dc369458058d9c2f1f5adfcd6655aee1a799904ac31e197bd7badbd334396d891c9db5cb91a03021bc762ae618c3f9f30f0e831cec39f7c1ce34e42b2a6eefd79ebad5e33dacb8b69ea9b3a6d2ebf4b2daabd2cd58ee0f07697e8ef20d01503b4c7087cd10db77ae91ef1369aa957fb10b7aec93e8d01d83a4ec8613f8e961105ab776ff4f8e742f32346ef558c80b77bd533ca61581e65c1627ca34ffdb18e5731b3ca4f81960567f805fa0e9ef5f7e15872906fc4a727b885cb4d25c403995d3713d0a3c0088da1f756b59e1b21b4668afd83606fbff11cb6e50788aede9c04306f80d1e7d9137d68532a425a781caa36ab82bd3b61d0c76b9becdc895232208992e639fcdd0bab0de6f0d94e6ecf390aa607895c028874dbb79e01e12402e73dc160d2857bce04c58980c02072f03a24a71caa05ec5819c88079d05335fc7a9e95fad24546d5ac2bcc1f8ccf2d71ed32f6516ff5cfd26621b9791b1f12e57fe18436843b28e3d6779ad25ec24c2d979372d505447f1ec60b1b2862a084df88603e82b83c31c0d3193bd23ab4c7773939effa05a071f9ef86b4b30b7103453ce02ef5c3e338481885301ab6936d8d2d9249847a90634aef90a409e8b3de74c7be08d7b4e9ba3b1083fb099e810137c19ad08505b4e8d878ce2c0c60d551ad4638d6ff26409888720f3212268569bc5cbe41ecf10c72e0e672f863326cac16a18a0f04e3a7582d50311b89e2ef37b5e78d2ed0b4ac5e9681fa60d33682125c1f3543bd0ed5ba0e3fdea0108a5f0a46783601cca07fb76e4aed2abfdee27b0a0d54375c4f8e4d2e4234eba22f0f4d55be95dd54aa772cc7c7f056cfe03ccc7a35567776a949b8c1c8131e8fdf760d2c5e18e6316865d2e65f8335ce16f49bdef672ef2cf009469be629ba7cb5a23fb5d071910d4657b84da3215cee7929b14163e69823d5d02bdae38ac121e1cbbd31f0fa0c0483a3d4aee0007451ebcc972154350e1b91320a4c69e0c73fb240afee2c75884665b6c2f589d8e43a97349307e33809c57eecf7dcfbbfbe8198e08ccd837a02385845a559ebeeb38210d814c0ee1088916e8712dad8ec6d060128648e6e141a7ec98bce11b31b7f414ee58995ecfb5dd190bc3aff8ed8b0ffef583779e61db8a32dcec7d7c424e629bf68fb0e76e7b6d3b47a9234d69d176c1a57ff2640b9d6f597b05f149add20c82b82416dde517c17518882d8d5ade02f1d4f0b0585dc5e00d2abd22c9c7fb21f700378f56a2079b9b7e434d7abe903f6ef88e5d5029e8e9a31dc625f6366a38acfea9eba53666b63538d2d65787040e8bda69b9f735a380819a4a291fb9c04dc40f4b03c1374309140ac87aa257ad2d31438f92eb5c70b145f1150d157850929df3720384f6bf840839776950fc5ab1fef5faccc41d3330e65efe6e663af72c9f39c26c9adb26fc61c908dbedf1b096a167d65425338940321d2d2016a7df556bae09c2b4c76ebcf6884c6df94af251dc3501d4b2fbd8063867995b3cebae410d441067db1bd1cdfe4c55739e7f7370cae282558cdb8d4a7df275a78a7cf004ad9c66ea1b050bdb99df0ddaf46b66702b7633729fa0d2130c4af1e04d2368117b230ab2b3ac99a6cd68dba110b3d8f3c7e7b4af02b6bec1a386e527ec4d5a8e2d96a93f32939fadd287f0ba4944f09d2991c3f5d5031ba16db7f55f555cf3f21248a21d0f5ead0e151d1656aa5192ce4524e200f55f9a599f61392e72d5a49e8c8af17f0a1a5f3fb1da6ac37fa1101becc1fecf0a9e0783f983ce51ab76bb32448a1a010b3d9f709de90c9c97124d15495b0cd16c3bab6f269f03e6dbe546df536ad9fb978625326352c1e3ce232bca7966acec8a0d4bd51852a7950b879eabd52565701843982ff4f7d5691728c3c7df1600e89f8b4f674248a1f42289a7947e5c3e914685549432ff201336414d602723d54dcb5cbce87456b0291cbc5f7b5e841f9232458dfb2edfeaeaddc8235706feaaa9248f36dc73b9d647e36f1664fa57a8ac1d8e23fa194caa2291cdc42c23ad891d4acff2f928d8893a582b4173554db8a1eaecd480b9e5d572aa236fe5d70308fa6ad53eaa38d23fd01ea57399ce7cb438b2fceb35c7d2aea3ed031513871ad85198e303f25d88006109e9d9cd1a96ad93f561544cbccc5a15e8af85470cbe340136aebe210ad8122c5657501124945ede18bf44bf79ff19a63e89127822d30dc54808376b33886fd76c1ec5b9bdeb6a21e33991541e9fcbf88166399d91cff2399d4b847e8ee3663b941e556301a1729bb3b677a1205b148fe5e31048fc54a053d4cfd596b1501f36cb05a6a90e20e68a153a19a370b0c4b9640f0e3ba05058c28e1a5bb652b83b17c68c1930ab275685b4f65d2518d92d74c766efe1577cad25779ad8a1fc8ef434af81c271c89a87a412469b9cc826b37d95be9b7cf998b04852ccffd0cbabd622a60244eb18d1b5cca7047c0c1314735093e7a94b81832bc6ff71ce8ebcbcfa9af1479142aa205a0ae53880e68a4e3249a60a76f36eee9c72a70112b1f4b21baf72dca1979faecb436fe3bcd33e113ecc7df91595460695543da308d410a31d8c8be317af03244207efa747f9459e5bdf787c3ab27bacaa74cfeacd8ad7dcf1776f3c988e27bbc0fd773cbc12679b8ffd5dd123aebe1e82eed75f25ae402431f0653cb263b3d64037d9fa0248e97343dd69e6c0101fbb1d7097611f32061845c03102aae36115d07116163a40be381142408a43f846bc0ff601045daf6dcacd500e6efb6e3d861df3aadc3f1b911c923a85ecf1f9959de852f0cf3f0fe3884fc039f539fa01092af29de0b82eb0b696a3eac9695be9b37ada4bddd0ffc5e96c66bfaa5c93932a2f3955136bd7db66df8c58c573c4e0333d94cae821a9cf03789a74f77dcc411790776f7b91dca7da34b5d2e2c2889a98a93628ae8de5b57df15d71f182e411fa4f485118e8d0a6bf56fa9fa1069ec9db75eafae3999581460f65b9424955492940afe614378a4731e2da26e483953c6bbd079c355dc6fa89b7d654bde248331cfc9b9e1c0eaf9d59ca608987a4e546b19b9840116545c1494aaffc2f908e0b89dcf0ba28b52dc1d210d7267aa04ca3534f6dcc9a94c9241473a550a5fd5599c957b3ac78b57dfa824ab3332eb7f7b2dde9f2c38062e06bb0535d302c95f01a8c280d8d1a72afc0b831b3df4820ea5a69dba90ce9971ae6fbde5d2003fa047330393fd09902f9c8f36e23cdaf9ba410405f96d43db55856df9b7f1e2b373c6f77d75fdb6674f9d072811e5900747755016ff3346f5c5d887dfcdac817cdeb5a5065503aa4aa910a38de85452b3d14673dc13eba1fa7958da14a484230e3a0cf13e65b137bca23d3c39fa5602045a833d5abe7b0f8c62c3c62d155b6c88c134407bf2ceb49089bd8395635cf6a43285ed8612a4ea6e02f42bae65653a126a80998b97b3f881abad41d28b32c26d21c2ab5fe9ceb77b39cfab3498013cef8c7f86440b69a78bd0c54a401c1868444ab641ca82f12d226f5a22c82bfffe5926bde0315c3ecc5c94c53bf8dbd34004ca5bb380ccf6eac4c78b8067862c67a2b81f02adae1cf473a5542f83e1ee773fc40c073263a442e4870b496437c92c90dc93a3e340a6313494674f91a216c0014ccda47cad81f1a7668722042bb03930a75707003fdd3fc8e1d041f21e7a43163a79ed53aa13e1b94708a669f9e3f91bec04e8677165225f782fc6d2d931db5f5d3d40ca8b133452599275c6e04acedfc86cfd45d1b6342d56df66128b438894126bbfd3dd7cb793ece19d986c827525e65229e10c233277796eea9b575f75a4fe0837f73b46ed92dabf0e372d205657c2b457b65e4a112f20acedd9d607497643523b57becebf84fa7860c8a567f68cc87b850b8363b2171b45f7c9d1c3794dad91d69ab65e5520b8a95ae5f89ecd49e483f8828b6f823ca1e4ad8edaedd66b6cee54f98977c64006e69b6ad9ec4e4d9960a1836d2b2f9ac32f2ff59769b4ac0c0a71420f78ac5f3b506c8465a5e02003f59025557e281ba3710a3e41203347d54df4c2900e77b076508d27c51ebae45e6e7d8150b4a31156d63f89a6d3dcb35df109e2d5b44078e5e5297ec4bce54e2554bab5c8427b83f060bb87ab715115551983fc7917acfa05debf34be0cbf664ab77114d687c761a38f6e86edbe35466c5a2e3dcdae1eabd053828f1f7a6eb0b0ef479ca9720390d016f8098e3025b1db000f16316dd774f3e6da0334438f0aaa83cd2d25735f48417e0dc3249c0c2912b50298af6dd2b40c47f35c2f0bd5e4cd471d6e4eaee000cefa7ce617ba0bef0c90e2e25143eabc0c4d18458f17dd63ebf3326063310297055027b78342309803db2b23759b4d9ff4e6f85bf496c2da69ed3ccd81dcd4412576494757a5a9ab7bb6755c1c3f42f0a724d9906aa9c2eb67d7faa3df85811c04a6d46f163c5e7ef065a1e02693982a1ca03a7652d264b94601d4498806e9d5df3476cc9584bd321bcad06837b9e9e20a1265e738e4a1f96c5c19c3d9b8df8dcb46d0ddaf0223fadf380b1c27b8410e6a4af96769e6da224a55c1a0a2f00d96db97255cc0fadacbedf0bad3b0ddc55c2246ddd9535c0fee1dd845e0cc669b2e545af86546bcd8a1756957abaadc064c29df177a469ac2f27c3b970ebbe1e54b22f6e24bbba4afd3ed043f58b53c40bac0dc32a9076e12cda46346402d62730a68f926ef4dd88d21b6274af12f22b5fd106619cd1f7acff81489e6ae8727b369e4ebafc91e6ee3706c4087f22cd7fd8deb805b41e525ee8e2e743900cb9f7ce4d455b2b47e41152ed9bbd1831aa6c68703a011ae5c6489f7df91e90f0c562e5c5a4c95d2df067e70c4b844e4c1356624254bb8db7175a4c027abef25e660d58d541551a7076b2c7646611faad1516956de596e95fc69e681685cba5bd0cbc997e4a9d39f3b469a381353379755e268f27c0516ea18a548ff20a8a582152c61b5bddecd884aa5716407a0d5bff77860a00c138fb77206232359e77e2e32713eaadb986504387be02e4cab7865bdda8db69ea58501c52a5560c335a1e8cbb8cc11d1b9e5c0d92c1fedcdb37978ae04d667f143fc5b32dce338a5835570648f6af77c1d2a3e6a2ba3e1ae1721961c59dcbfb0d748dfd4f353b0b78aaed5a10cd8cb88676673fcf114fb1e11568a44b65b8831ed9a41cb5ba401220c1c34b51d3dccd82b5894f08dfd8dd30ab55faa59f5234253a78a68a2e1e85d0086c6c196778b9a6e9310811b2120779c080c6529507cb12da5bb50ca57934e4104ff2f536d6efdb2c984d25ae8d7e7093de1ef69f6e6371f2026729f00e139e89dc09d3fb84827f2d2ab6ed6d764caf110dc3cff0e6bc822c5056deb9edec12063ae77d7062ce7ddf13eb99500035b6403a5e6737fa8f5d5ffcfeb139d2b830e4b1a55ca70694dc40246fba0f543507d0852c69114ef57ae92391de91a3dc6139446de49332ac1eaa843180a7e59a1fc2eff4d6adb94d6939870d82c1e1f1c4526dd7802a5feb69322048384c741b5f6e36311e2c698a8bb116de20ebfb85e645283edb8c1c48258dce81a597d5a286dfe4b566a1b4d33f2f9770ebf861217b9b93c865ec3da0ff21cc5f84c124e28e5f2b29dbe24620bf6b0793670a94f94b19dd4abe10d24d164e224fd65f9314f1fc51fa5f6db710e0e6125e85c52c768d11849371ec65033cdf1002cf110c49a7dcd5ef50363de93dfce43211397ff10ba16f73d118d628019c9cd719a61e540e1ca35ffe12ee4855572eda7a017695f16c0d470b00a6452c8743b16854bb07fbba6a1fdbebdec6f63ae1beb439f16ebf6ff1e7e2747d1cd2437dcde8f4e21dd9bd28bbf3fea3f3e50a11a493b2ed8401f2a61708b15b72c3c97d1ecb95b6bca95aae3b805b844a43c94e82ed9e48a7656deaf1cdef398518e7cea9901fc8c6cd8dc0088c31fb2077eb30ec5fd9122de7ddd62dbc161976b5d3063a3b2a0342a3950d596631d74b257d1f1b94cfccad9d6ba93be758aacca7269ac6a4a6bc760ea3be28a06693f116ca5ae80a1661b3e6b537a3de3c2b49c66a351b2e6ea25d11d30c3a32d4108a3da575aa20ed96ec420438ef56c8ffd4c27f0505e42340f9b18c67c208d8e3f9026d51a97c92daf2645e0fa896d4f2b974eda45488f77ff739df7b03d6696428372efe7da166785981c7b43e0b506e4df410f1df1c3a86a07fcd33c1e8d930ff4932aa5c87d6d0f42414a4a63c56bd21d2f8e5bb04a3e8a3d43c511d4ef330a8c2c0b82e489e4df7a16b0ffae286f0608a6828f88241c35077fa8a54030cd4a47e4c799d4b43fc3a0001ebb4abbeee09cafc2cc194356331f0d7c2acdb656372a03ce0890c1d2bd795017c8d83b62d407d55b5576808db2c0bc3acc76850e3267dbdf4bba2903c92cb36e299a4bcaeb97ee54c007fdfc8f883cb6aae45930f5a696deb21138f802df8b59b721670751fbc0a050a6b55d0153b7d3e14c19cf9bf3fca026c00891c8c039ec715d2eb160a3734bd28090fa7ccfeb6586f164df5d3af873c3a29b57e0d18be72fce03b7c90f75731cd8ebdb0102657b7047449399c4ae85303089c3b8241ef3104dabf01329be619c3f2a62aef10d774a2b92a9f1288f1d36fcc8b39ea0fd1736c1df5385d301672208303a639a20b8adbd6c15de69b7c16ed3283a082c069e27cc88029a6f7ec1a62822d51d5e728cddfb35fb2c313eca0c07471c9653496eedb6e26e8273c2d4bac1eb2c9d532334cfce907f06109cbd8a2e5b0a04089f6c56aa691e5fc1e3c6794db7b66fa209b3f7edb9fed26a4bfc19bd9820da0c669e916c45f19b53d6f98164b26c223b2f60ef1b3fdcb9a8ccb15a9ca37f36d70d4b9156d7c5990d5da90a712ccff2b3fc1b7678c76dc3cd4921cb74e7ac39e72365a269b3197cc4dd4a25a98cc129fd014f8a5c0f0c5ba467cf162ab159a02246f470ddd741e0c1b4fee47264985fd0eb9a149ddceb813affd9f8656dda88f3d20700b87abd403f02d566c673c7263c98ad559d5722d7f8c2e8423970b5d38015649963c450f52078d4b3317b9341040042bdb45f97f72e9a2489239632185ea9bdf0a26607185cbf9a7a5646d159da185b43dce9ecfbae7f44b944a6caa6b40323e2f83d9688ad922b46ae4a911183b144ad8777b36544887d9a2d8c7a5670c0c4feb2db999b812c17165d14cc3fe889916c48c27d1c9f21df8a423770e67353f7392b7d13e48e042228da2a553ff312dac117640a2d74eca9633474f6fca52225b5c243b204b1220929c9707635759ece4afc9aa9bf12a28f5c5ea28ea0b457b970f26460081c45b776cb87b2ac57f5274189ac7235dd61dbbeec042d5898bd5cf7424f3d8ef485d1598960e9a9745858f96497d8f739b2c577011d5498b223c77b595521314c6cdec02d1471b839fb85acddf75e15a3a6a9053cf434b75ff8119069a473c1b58f3663b386442325d6f3e8824c572fa879f696430ae57257f24f1c23306fbffc16a14cea7e0965c76cb1e14e0e1c003f6f00ff6fe852bd1822d811358a1223e4052fa6bc03aad9c8fc9dbf34ae08cad94c391e5e7aaa1f895776474eb645f0de74dca1766fd4c309a723c6c9ab8424804c8e5183e52e5edf5f69842a36c4cb113a66f71beae498055919126ec1151c4fae3cc7c2e94b839b14303a8fed36fc960b23f40ecbc5cad01547d4b0ce1d09d5ce9f54194abd8abaa3877e184e457f93866c4cebbcf7e055b434d5beaf130ad8155146403599d1ccdafbc2ac7d139dd584d86f03c247519a02ad248b66b0c5991c82087186b494ff2d6b63831fd71fcaa18a1c6ad55405a3f90daf6d5425aec08e879cd08d0f37f52dd6ab633f8d97327ddfbc0a0a31210b0447ec7445076881e558dabc9f52897a2b0614a59f033d791423327b022957be5bdf8c70cd8141bd088f533cee1b088286ec40263cc6648a73c78f6530d38537e49b53313ab2f370222e2047411688c62d8a1c03603331b7ac933c9b14f6b10f240df1fcde9b08548ed5948496415458c958cbee085c974966c59adb8e28340c2d8079fd0c09d51e7596662c7eb1381ec84e7252c3b2ac0ef7f67a7e6f8ab19c94649fe3227cba6c3deaa0c1e1b89d027a69f71871b4c42de13f1ab6b76a0e6f9a24f85c563d253f65e036129263fba95472a088ec6ecc0a50924d9024330c89266ff40ff555b580a5607721972eecc2fff14ffeaae2193392e811fcba3783904d263b433c37c649f8f5e1da", 0x2000, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)={0x20, 0xffffffffffffffda, 0x6, {0x0, 0x4, 0x8d, 0xffffd678}}, 0x0}) ioctl$F2FS_IOC_RESIZE_FS(r4, 0x4008f510, &(0x7f0000000000)=0x8) 1h22m45.659418921s ago: executing program 1 (id=3734): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000300)='./file0/../file0\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) pivot_root(&(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000240)='./file0\x00') getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000340)={{{@in=@broadcast, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@dev}}, &(0x7f00000002c0)=0xe8) statx(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat$procfs(0xffffff9c, &(0x7f0000000000)='/proc/asound/timers\x00', 0x0, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) syz_open_dev$dri(&(0x7f0000000340), 0x1, 0xa000) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r2, 0xc01064bd, &(0x7f0000000340)={&(0x7f0000000240)="9818b2d2", 0x4}) chown(&(0x7f0000000040)='./file0\x00', 0x0, r1) chown(&(0x7f0000000280)='./file0/../file0\x00', r0, r1) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) unlink(&(0x7f0000000440)='./file0\x00') move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) r4 = openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0) r5 = openat$cgroup_devices(r4, &(0x7f0000000000)='devices.deny\x00', 0x63, 0x0) fsetxattr$security_selinux(r5, &(0x7f00000000c0), &(0x7f0000000100)='system_u:object_r:modem_device_t:s0\x00', 0x24, 0x0) 1h22m45.061100787s ago: executing program 1 (id=3736): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = dup(r0) sendto$l2tp6(r1, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x3}, 0x20) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000001600)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x0) mlockall(0x1) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) prlimit64(0x0, 0x7, &(0x7f0000000ec0), 0x0) syz_genetlink_get_family_id$net_dm(0x0, 0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1, 0x13, r1, 0x0) socket$nl_audit(0x10, 0x3, 0x9) r2 = socket$igmp(0x2, 0x3, 0x2) r3 = dup2(r2, r2) getsockopt$MRT(r3, 0x0, 0xd0, 0x0, &(0x7f0000000080)) timer_create(0x1, &(0x7f0000000680)={0x0, 0x11}, &(0x7f00000001c0)=0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040), r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r5, r6) recvfrom$inet_nvme(r7, 0x0, 0x4e, 0x40032142, 0x0, 0xffffff6f) write$P9_RSETATTR(r1, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r8 = mq_open(&(0x7f0000000200)='!}+^{\x00\xbc\x9d\xdayb\xe6\xcc\xcd\xb6\xfbTf\x05*\x97\n\'\x9ce_%\x95{\x90q\xb5\xf5\xb2KOI/\x0fz6\xcdm\xc1/P\xd1\xdc\xaf\xac\x9dMc\xa7^\xb0\xd5\'`\xfc\xda\x1f\xb6?o\xa8x\x96\x95\xbc2]\xa3n|%\xbf\xf9/\xeb\"\xa6\x17#T)\a\xb8\xd9In\x9aE\xe0\xcc\xbb0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010028bd7000fedbdf250200000008000100", @ANYRES32=r1], 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8004) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) bind$unix(r6, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r6, 0x0) connect$unix(r5, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r6, r5, 0x0) r7 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r7, 0x5450, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f00000000c0)=0x0) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r9) sendmsg$NFC_CMD_DEV_UP(r9, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="1c0000009923b46801ba772c1876271dabf814189adafbcca6764ac9b28d2765e1a76202a8ed8505113a2746049533123a6c8c639bbe", @ANYRES16=r10, @ANYBLOB="010028bd7000fedbdf250200000008000100", @ANYRES32=r8, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000003c0), 0xffffffffffffffff) 1h22m44.059752122s ago: executing program 33 (id=3737): syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) openat$selinux_create(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) ioctl$UDMABUF_CREATE_LIST(0xffffffffffffffff, 0x40087543, &(0x7f0000000180)={0x1, 0x3, [{0xffffffffffffffff, 0x0, 0xfffffffffffff000, 0x4000}, {0xffffffffffffffff, 0x0, 0x2000}, {0xffffffffffffffff, 0x0, 0xfffff000, 0xfffff000}]}) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r3, @ANYBLOB="010028bd7000fedbdf250200000008000100", @ANYRES32=r1], 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x8004) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) bind$unix(r6, &(0x7f0000000200)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r6, 0x0) connect$unix(r5, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup3(r6, r5, 0x0) r7 = accept4(r5, 0x0, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r7, 0x5450, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f00000000c0)=0x0) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r9) sendmsg$NFC_CMD_DEV_UP(r9, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)=ANY=[@ANYBLOB="1c0000009923b46801ba772c1876271dabf814189adafbcca6764ac9b28d2765e1a76202a8ed8505113a2746049533123a6c8c639bbe", @ANYRES16=r10, @ANYBLOB="010028bd7000fedbdf250200000008000100", @ANYRES32=r8, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x4040}, 0x8000) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000000240)) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000003c0), 0xffffffffffffffff) 18.758172359s ago: executing program 2 (id=11517): r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SET_TUNSRC(r2, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001400)={&(0x7f0000001380)={0x14, 0x0, 0x604, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x60040000}, 0x48000) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x5452, &(0x7f00000000c0)={'wlan0\x00'}) bind$alg(r1, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'sha512-generic\x00'}, 0x58) r4 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x20040080) r5 = socket$unix(0x1, 0x1, 0x0) bind$unix(r5, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r6 = socket$inet6(0xa, 0x801, 0x0) dup3(r5, r6, 0x0) listen(r5, 0x0) r7 = openat$selinux_context(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) close(r7) accept4$unix(r6, 0x0, 0x0, 0x800) connect$unix(r0, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r8 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) ioctl$AUTOFS_IOC_FAIL(r8, 0x9361, 0x2f9d) pipe2$9p(&(0x7f00000021c0)={0xffffffffffffffff}, 0x0) ioctl$TIOCL_SETSEL(r9, 0x5450, 0x0) ioctl$sock_FIOSETOWN(r8, 0x8901, &(0x7f0000002900)) 14.039146759s ago: executing program 2 (id=11526): r0 = openat$zero(0xffffff9c, &(0x7f0000000300), 0x82400, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) write$sysctl(r0, 0x0, 0x0) 13.837045185s ago: executing program 2 (id=11523): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-384\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) read(r1, 0x0, 0x0) 13.679309556s ago: executing program 2 (id=11524): mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000000800), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_CREATE_OPEN(r0, &(0x7f00000000c0)={0xa0, 0x0, r1, {{0x6, 0x3, 0x8, 0x4, 0xffffffc0, 0x1, {0x1, 0x7, 0x3ff, 0x7fffffffffffffff, 0x21a3, 0x47a4, 0xa63, 0x3ff, 0x2, 0x4000, 0x1, r2, 0x0, 0x10, 0x8000}}}}, 0xa0) creat(&(0x7f0000000180)='./file0/file0\x00', 0x0) 13.443385694s ago: executing program 2 (id=11525): r0 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r0, 0x29, 0x24, &(0x7f00000000c0), 0x4) r1 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="48000000150081fb7059ae08060c04000aff0f11000000040011018701546fabca1b4e7d06a6bd7c493872f750375ed08a562af5745e17b8c119418f0f000000d6e74703c48f93b8", 0x48}], 0x1}, 0x0) sendmsg$kcm(r0, 0x0, 0x4000000) 13.068653883s ago: executing program 2 (id=11527): r0 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)=@generic={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x18) fsetxattr$security_selinux(r0, &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:unconfined_execmem_exec_t:s0\x00', 0x2f, 0x3) socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000100), &(0x7f0000000140)=0x8) r2 = syz_open_dev$evdev(&(0x7f0000000180), 0xffffffe7, 0x266201) ioctl$EVIOCGREP(r2, 0x80084503, &(0x7f00000001c0)=""/203) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000002c0), &(0x7f0000000300)=0x8) (async) getsockopt$sock_linger(r3, 0x1, 0xd, &(0x7f00000002c0), &(0x7f0000000300)=0x8) setsockopt$inet_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f0000000340)=@ccm_128={{0x304}, "33f0b5356125ca33", "11aa86e8e653d9b034434a47809be7f9", "2c334296", "bc1fb787ffe5a9ab"}, 0x28) r4 = shmget(0x2, 0x4000, 0x400, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000380)=""/3) (async) shmctl$SHM_STAT(r4, 0xd, &(0x7f0000000380)=""/3) r5 = openat$binfmt(0xffffff9c, 0x0, 0x41, 0x1ff) write$binfmt_misc(r5, &(0x7f00000003c0)="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", 0x1000) sendfile(r5, r5, &(0x7f00000013c0)=0x702, 0xabf6) (async) sendfile(r5, r5, &(0x7f00000013c0)=0x702, 0xabf6) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r5, 0x4018f50b, &(0x7f0000001400)={0x1, 0x4, 0x8}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000001480)={r2, 0x54, 0x9, 0x3}) symlinkat(&(0x7f0000001440)='./file0\x00', r6, &(0x7f00000014c0)='./file0\x00') (async) symlinkat(&(0x7f0000001440)='./file0\x00', r6, &(0x7f00000014c0)='./file0\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001580)={r0, 0x58, &(0x7f0000001500)}, 0x10) (async) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001580)={r0, 0x58, &(0x7f0000001500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f0000001640)={'syztnl2\x00', &(0x7f00000015c0)={'syztnl0\x00', r7, 0x29, 0x3, 0x8, 0x55, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, @dev={0xfe, 0x80, '\x00', 0x3e}, 0x7, 0x7, 0xf, 0x9d}}) (async) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, &(0x7f0000001640)={'syztnl2\x00', &(0x7f00000015c0)={'syztnl0\x00', r7, 0x29, 0x3, 0x8, 0x55, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, @dev={0xfe, 0x80, '\x00', 0x3e}, 0x7, 0x7, 0xf, 0x9d}}) readlinkat(r6, &(0x7f0000001680)='./file0\x00', &(0x7f00000016c0)=""/48, 0x30) ioctl$VHOST_SET_LOG_BASE(r6, 0x4008af04, &(0x7f0000001740)=&(0x7f0000001700)) (async) ioctl$VHOST_SET_LOG_BASE(r6, 0x4008af04, &(0x7f0000001740)=&(0x7f0000001700)) setsockopt$IP_VS_SO_SET_EDIT(r6, 0x0, 0x483, &(0x7f0000001780)={0x5c, @empty, 0x4e24, 0x0, 'ovf\x00', 0x7, 0x1000, 0x1a}, 0x2c) fcntl$notify(r6, 0x402, 0x8000000a) r8 = openat$dlm_plock(0xffffff9c, &(0x7f00000017c0), 0x448200, 0x0) readv(r8, &(0x7f0000001900)=[{&(0x7f0000001800)=""/23, 0x17}, {&(0x7f0000001840)=""/173, 0xad}], 0x2) ioctl$EVIOCSABS0(r8, 0x401845c0, &(0x7f0000001940)={0x2, 0x4, 0x20, 0x7fff, 0x10, 0x1799800}) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000001980)='veth0_virt_wifi\x00') accept$inet6(r6, &(0x7f00000019c0), &(0x7f0000001a00)=0x1c) (async) r9 = accept$inet6(r6, &(0x7f00000019c0), &(0x7f0000001a00)=0x1c) accept$inet6(r9, &(0x7f0000001a40)={0xa, 0x0, 0x0, @remote}, &(0x7f0000001a80)=0x1c) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r6, &(0x7f0000001bc0)={&(0x7f0000001ac0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001b80)={&(0x7f0000001b40)={0x1c, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x100}, 0x40080) (async) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r6, &(0x7f0000001bc0)={&(0x7f0000001ac0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000001b80)={&(0x7f0000001b40)={0x1c, 0x0, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x2}]}, 0x1c}, 0x1, 0x0, 0x0, 0x100}, 0x40080) 7.145703855s ago: executing program 3 (id=11532): r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000040)={0x1d, r1, 0x3}, 0x18) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000300)={0x14, 0x0, 0x20, 0x70bd2d, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x1}, 0x4) sendmsg$AUDIT_TRIM(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x10, 0x3f6, 0x300, 0x70bd2b, 0x25dfdbfb}, 0x10}, 0x1, 0x0, 0x0, 0x400c8c1}, 0xc800) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000180), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001800)={0x6, 0x3, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000009400000000000000000000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000580)={r5, r4, 0x25, 0x4, @val=@netkit={@void, @value=r5}}, 0x1c) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000001c0)={r5, r4, 0x25, 0x2, @val=@kprobe_multi=@addrs={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc00}}, 0x30) getsockopt$inet_mreqn(r0, 0x0, 0x3, &(0x7f00000001c0)={@rand_addr, @remote}, &(0x7f0000000200)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000240)={&(0x7f0000000500)={0x68, r2, 0x300, 0x70bd26, 0x25dfdbff, {}, [{{0x8, 0x1, r4}, {0x4}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r1}}}]}}]}, 0x68}, 0x1, 0x0, 0x0, 0x4}, 0x40010) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14, 0x0, 0x8, 0x70bd29, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x8014) 4.236963007s ago: executing program 3 (id=11533): r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000400)="67d8901bdbdaf6a4bd866226b7cdb7c26858c4e4fd703be2f51ed6ddc4a47116ec2db75c7042a22491af0ffea4174a9de3350c14498396b28c7d1784d04aa38922721cb7816094cb82950fd012efd26d3abc8a75ac1f30e53a0eff506f6e6b369ba6c5306e91acaa94e89d3bff4e52cd151235f3defff171c60b91c0c5aeb29736830a09b262dbe4c7ed149885a054de1d7ff5bcecd7a50061814ceefb", 0x9d}], 0x1}, 0x0) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[], 0x30}}, 0x40) 3.66993s ago: executing program 3 (id=11534): r0 = openat$selinux_policy(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = socket(0x1d, 0x2, 0x6) mkdirat$cgroup(0xffffffffffffff9c, &(0x7f0000000000)='syz0\x00', 0x1ff) r2 = openat$cgroup(0xffffffffffffff9c, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) close(r2) memfd_create(&(0x7f0000000100)='\xd4\xb4y\x05F%v\xd5\xb2\xe0P(p\xe2\xbd%\x02\xe1\x89|\xe0un\x00\x00\xad\xeb\x7ft\x92\xda\xce\x0f\x89=\xa9\xd8q\'\x00\x00\x00\x00J6h\x11\xf2\xd8f\xbe/\xcdn\xe6\x01\xa7\xfb\x16\xaa\x84\x05A\xa1B\xe1B\x12\xd6\xb7w\xd9\xc4`\x15\xf3\x90\x8e\xe5x\xfe\x93>\x1c\xb1\xde\xf7\xebY;b\xd0[\xed2\x1b\xd0\x80u', 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r2, 0x5451, 0x0) pipe2$watch_queue(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) dup(r3) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r4, 0x3309) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000080)={0x1d, r5, 0x1, {0x1}, 0x2}, 0x18) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) r7 = dup(r6) sendto$l2tp6(r7, 0x0, 0x0, 0x20000000, &(0x7f0000000000)={0xa, 0x0, 0xffffffff, @remote, 0x3}, 0x20) write$binfmt_misc(r7, 0x0, 0x0) shutdown(r7, 0x0) ioctl$sock_inet_SIOCGIFADDR(r7, 0x8915, &(0x7f0000000040)={'lo\x00', {0x2, 0x0, @private}}) sendmsg$ETHTOOL_MSG_WOL_GET(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)={0x14, 0x0, 0x100, 0x70bd27, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x44080}, 0x8001) 885.716443ms ago: executing program 3 (id=11535): r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, 0x0) r2 = openat2(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x1c1041}, 0x18) write$char_usb(r2, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r1, 0xc0605345, &(0x7f0000000040)={0x80, 0x2, {0xfffffffffffffffd, 0x1, 0x0, 0x3, 0x8001}, 0x5}) 399.96117ms ago: executing program 3 (id=11536): openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) syz_open_procfs$pagemap(0xffffffffffffffff, 0x0) r0 = inotify_init1(0x80800) ioctl$BTRFS_IOC_SPACE_INFO(r0, 0x5450, 0x0) r1 = timerfd_create(0x0, 0x0) close(r1) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket(0x2b, 0x1, 0x1) sendmsg$IPVS_CMD_DEL_SERVICE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000840)={0x0, 0x11c}, 0x1, 0x0, 0x0, 0x8010}, 0x4000020) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={0x0, @initdev, @remote}, &(0x7f0000000080)=0xc) r3 = socket$inet6_udp(0xa, 0x2, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$RDMA_NLDEV_CMD_RES_CQ_GET(r6, &(0x7f0000008580)={0x0, 0x0, &(0x7f0000008540)={&(0x7f0000008500)={0x10, 0x140c, 0x800, 0x70bd25, 0x25dfdbfd}, 0x10}, 0x1, 0x0, 0x0, 0x8800}, 0x84) bind$unix(r5, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) listen(r3, 0x800) connect$unix(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) r7 = openat$yama_ptrace_scope(0xffffffffffffff9c, &(0x7f00000021c0), 0x2, 0x0) r8 = openat$selinux_checkreqprot(0xffffff9c, &(0x7f0000000000), 0x800, 0x0) write$P9_RMKNOD(r8, &(0x7f0000000140)={0x14, 0x13, 0x0, {0x2, 0x1, 0x2}}, 0x14) close(r8) pipe(&(0x7f0000000240)) ioctl$DRM_IOCTL_SG_ALLOC(r8, 0x5421, &(0x7f00000001c0)={0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) write$P9_RLCREATE(r8, 0x0, 0x0) ioctl$BTRFS_IOC_RM_DEV_V2(r7, 0x5451, 0x0) listen(r3, 0x1) connect$unix(r4, &(0x7f0000000280)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 0s ago: executing program 3 (id=11537): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$NL80211_CMD_NOTIFY_RADAR(0xffffffffffffffff, 0x0, 0x10) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x10, 0x3f2, 0x100, 0x70bd2b, 0x25dfdbfe}, 0x10}, 0x1, 0x0, 0x0, 0x4800}, 0x20000000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) fcntl$setsig(r1, 0xa, 0x20) kernel console output (not intermixed with test programs): type=1400 audit(134224324.325:128788): avc: denied { search } for pid=15499 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6596.383388][ T31] audit: type=1400 audit(134224324.325:128789): avc: denied { search } for pid=15499 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6596.384447][ T31] audit: type=1400 audit(134224324.325:128790): avc: denied { search } for pid=15499 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6596.604646][T15502] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63011 sclass=netlink_route_socket pid=15502 comm=syz.2.11104 [ 6601.370733][ T31] kauditd_printk_skb: 470 callbacks suppressed [ 6601.371002][ T31] audit: type=1400 audit(134224329.315:129261): avc: denied { write } for pid=15537 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:crond_exec_t:s0" [ 6601.372788][ T31] audit: type=1400 audit(134224329.315:129262): avc: denied { write open } for pid=15537 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:crond_exec_t:s0" [ 6601.427017][ T31] audit: type=1400 audit(134224329.375:129263): avc: denied { search } for pid=15537 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6601.437199][ T31] audit: type=1400 audit(134224329.385:129264): avc: denied { search } for pid=15537 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6601.437409][ T31] audit: type=1400 audit(134224329.385:129265): avc: denied { search } for pid=15537 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6601.439971][ T31] audit: type=1400 audit(134224329.385:129266): avc: denied { search } for pid=15537 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6601.582754][ T31] audit: type=1400 audit(134224329.525:129267): avc: denied { module_request } for pid=15095 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6601.599241][ T31] audit: type=1400 audit(134224329.545:129268): avc: denied { search } for pid=15541 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6601.603693][ T31] audit: type=1400 audit(134224329.545:129269): avc: denied { search } for pid=15541 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6601.608116][ T31] audit: type=1400 audit(134224329.555:129270): avc: denied { search } for pid=15541 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6602.453410][T15095] veth0_vlan: entered promiscuous mode [ 6602.567248][T15095] veth1_vlan: entered promiscuous mode [ 6602.845009][T15095] veth0_macvtap: entered promiscuous mode [ 6602.889379][T15095] veth1_macvtap: entered promiscuous mode [ 6603.139494][T15095] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6603.140965][T15095] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6603.142462][T15095] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6603.145670][T15095] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6606.351235][T15569] FAULT_INJECTION: forcing a failure. [ 6606.351235][T15569] name failslab, interval 1, probability 0, space 0, times 0 [ 6606.358552][T15569] CPU: 1 UID: 0 PID: 15569 Comm: syz.2.11111 Not tainted 6.15.0-syzkaller #0 PREEMPT [ 6606.358627][T15569] Hardware name: ARM-Versatile Express [ 6606.358642][T15569] Call trace: [ 6606.358662][T15569] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 6606.358717][T15569] r7:00000d40 r6:00000000 r5:60000013 r4:82259134 [ 6606.358727][T15569] [<80201ac8>] (show_stack) from [<80220544>] (dump_stack_lvl+0x70/0x7c) [ 6606.358753][T15569] [<802204d4>] (dump_stack_lvl) from [<80220568>] (dump_stack+0x18/0x1c) [ 6606.358781][T15569] r5:840cec00 r4:82919e80 [ 6606.358789][T15569] [<80220550>] (dump_stack) from [<80960c28>] (should_fail_ex+0x1c4/0x228) [ 6606.358818][T15569] [<80960a64>] (should_fail_ex) from [<8051f1a4>] (should_failslab+0x6c/0x94) [ 6606.358852][T15569] r8:840cec00 r7:00000d40 r6:84bdae68 r5:00000023 r4:83001240 [ 6606.358861][T15569] [<8051f138>] (should_failslab) from [<80503f9c>] (__kmalloc_noprof+0x9c/0x458) [ 6606.358887][T15569] [<80503f00>] (__kmalloc_noprof) from [<807b6d7c>] (tomoyo_encode2+0x64/0xf0) [ 6606.358921][T15569] r10:00000fff r9:8309e800 r8:00000000 r7:83413dd0 r6:84bdae68 r5:844d4ffc [ 6606.358931][T15569] r4:844d4fe4 [ 6606.358939][T15569] [<807b6d18>] (tomoyo_encode2) from [<807b6e2c>] (tomoyo_encode+0x24/0x30) [ 6606.358971][T15569] r9:8309e800 r8:00000000 r7:83413dd0 r6:84bdae68 r5:00001000 r4:844d4fe5 [ 6606.358979][T15569] [<807b6e08>] (tomoyo_encode) from [<807b6eb8>] (tomoyo_realpath_from_path+0x80/0x17c) [ 6606.359007][T15569] r5:00001000 r4:844d4000 [ 6606.359015][T15569] [<807b6e38>] (tomoyo_realpath_from_path) from [<807b2fb8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 6606.359048][T15569] r10:840cec00 r9:00000000 r8:00000005 r7:00004b72 r6:00000004 r5:81cd5844 [ 6606.359058][T15569] r4:84bdae68 r3:826c0240 [ 6606.359066][T15569] [<807b2eec>] (tomoyo_path_number_perm) from [<807b7898>] (tomoyo_file_ioctl+0x1c/0x20) [ 6606.359101][T15569] r9:84bdae40 r8:00000005 r7:00000000 r6:00000000 r5:00004b72 r4:84bdae40 [ 6606.359111][T15569] [<807b787c>] (tomoyo_file_ioctl) from [<807652bc>] (security_file_ioctl+0x64/0x1e4) [ 6606.359140][T15569] [<80765258>] (security_file_ioctl) from [<805650b4>] (sys_ioctl+0x4c/0xdc8) [ 6606.359170][T15569] r7:00000000 r6:84bdae41 r5:00000000 r4:00004b72 [ 6606.359178][T15569] [<80565068>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6606.359201][T15569] Exception stack(0xe05c5fa8 to 0xe05c5ff0) [ 6606.359220][T15569] 5fa0: 00000000 00000000 00000005 00004b72 00000000 00000000 [ 6606.359238][T15569] 5fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76b170bc [ 6606.359251][T15569] 5fe0: 76b16ec0 76b16eb0 0001939c 00131f30 [ 6606.359268][T15569] r10:00000036 r9:840cec00 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 6606.359278][T15569] r4:00000000 [ 6606.370562][T15569] ERROR: Out of memory at tomoyo_realpath_from_path. [ 6606.601850][ T31] kauditd_printk_skb: 578 callbacks suppressed [ 6606.602161][ T31] audit: type=1400 audit(134224334.545:129849): avc: denied { write } for pid=15570 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:crond_exec_t:s0" [ 6606.611219][ T31] audit: type=1400 audit(134224334.555:129850): avc: denied { write open } for pid=15570 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:crond_exec_t:s0" [ 6606.654086][ T31] audit: type=1400 audit(134224334.605:129851): avc: denied { search } for pid=15570 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6606.655817][ T31] audit: type=1400 audit(134224334.605:129852): avc: denied { search } for pid=15570 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6606.662768][ T31] audit: type=1400 audit(134224334.605:129853): avc: denied { search } for pid=15570 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6606.667826][ T31] audit: type=1400 audit(134224334.615:129854): avc: denied { search } for pid=15570 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6606.712818][ T31] audit: type=1400 audit(134224334.655:129855): avc: denied { create } for pid=15571 comm="syz.2.11112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6606.725694][ T31] audit: type=1400 audit(134224334.675:129856): avc: denied { write } for pid=15571 comm="syz.2.11112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6606.781029][ T31] audit: type=1400 audit(134224334.725:129857): avc: denied { search } for pid=15573 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6606.784225][ T31] audit: type=1400 audit(134224334.725:129858): avc: denied { search } for pid=15573 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6611.605934][ T31] kauditd_printk_skb: 785 callbacks suppressed [ 6611.606182][ T31] audit: type=1400 audit(134224339.555:130644): avc: denied { read } for pid=15608 comm="syz.3.11119" path="socket:[121403]" dev="sockfs" ino=121403 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6611.613557][ T31] audit: type=1400 audit(134224339.555:130645): avc: denied { read append } for pid=15604 comm="syz.2.11118" name="card2" dev="devtmpfs" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6611.614594][ T31] audit: type=1400 audit(134224339.555:130646): avc: denied { read open } for pid=15604 comm="syz.2.11118" path="/dev/dri/card2" dev="devtmpfs" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6611.615513][ T31] audit: type=1400 audit(134224339.555:130647): avc: denied { read } for pid=15608 comm="syz.3.11119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6611.670896][ T31] audit: type=1400 audit(134224339.615:130648): avc: denied { search } for pid=15607 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6611.674112][ T31] audit: type=1400 audit(134224339.625:130649): avc: denied { read } for pid=15607 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6611.683567][ T31] audit: type=1400 audit(134224339.625:130650): avc: denied { ioctl } for pid=15604 comm="syz.2.11118" path="/dev/fb0" dev="devtmpfs" ino=615 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6611.683874][ T31] audit: type=1400 audit(134224339.625:130651): avc: denied { read open } for pid=15607 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6611.684015][ T31] audit: type=1400 audit(134224339.625:130652): avc: denied { search } for pid=15607 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6611.693637][ T31] audit: type=1400 audit(134224339.635:130653): avc: denied { search } for pid=15607 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6616.926698][ T31] kauditd_printk_skb: 92 callbacks suppressed [ 6616.952590][ T31] audit: type=1400 audit(134224344.875:130746): avc: denied { create } for pid=15642 comm="syz.3.11129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6616.954931][ T31] audit: type=1400 audit(134224344.895:130747): avc: denied { bind } for pid=15642 comm="syz.3.11129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6616.956399][ T31] audit: type=1400 audit(134224344.895:130748): avc: denied { accept } for pid=15642 comm="syz.3.11129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6616.958092][ T31] audit: type=1400 audit(134224344.895:130749): avc: denied { write } for pid=15642 comm="syz.3.11129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6616.959596][ T31] audit: type=1400 audit(134224344.905:130750): avc: denied { read } for pid=15642 comm="syz.3.11129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6616.960935][ T31] audit: type=1400 audit(134224344.905:130751): avc: denied { write } for pid=15642 comm="syz.3.11129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6616.962254][ T31] audit: type=1400 audit(134224344.905:130752): avc: denied { read } for pid=15642 comm="syz.3.11129" path="socket:[121439]" dev="sockfs" ino=121439 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6616.964615][ T31] audit: type=1400 audit(134224344.905:130753): avc: denied { read } for pid=15642 comm="syz.3.11129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6617.433534][ T31] audit: type=1400 audit(134224345.365:130754): avc: denied { read } for pid=15644 comm="syz.2.11130" name="iommu" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6617.433806][ T31] audit: type=1400 audit(134224345.365:130755): avc: denied { read open } for pid=15644 comm="syz.2.11130" path="/dev/iommu" dev="devtmpfs" ino=610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6617.561647][T15645] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 6620.962394][T15663] FAULT_INJECTION: forcing a failure. [ 6620.962394][T15663] name failslab, interval 1, probability 0, space 0, times 0 [ 6620.962860][T15663] CPU: 0 UID: 0 PID: 15663 Comm: syz.3.11137 Not tainted 6.15.0-syzkaller #0 PREEMPT [ 6620.962932][T15663] Hardware name: ARM-Versatile Express [ 6620.962962][T15663] Call trace: [ 6620.963003][T15663] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 6620.963153][T15663] r7:84788000 r6:00000000 r5:60000013 r4:82259134 [ 6620.963174][T15663] [<80201ac8>] (show_stack) from [<80220544>] (dump_stack_lvl+0x70/0x7c) [ 6620.963232][T15663] [<802204d4>] (dump_stack_lvl) from [<80220568>] (dump_stack+0x18/0x1c) [ 6620.963418][T15663] r5:84788000 r4:82919e80 [ 6620.963466][T15663] [<80220550>] (dump_stack) from [<80960c28>] (should_fail_ex+0x1c4/0x228) [ 6620.963572][T15663] [<80960a64>] (should_fail_ex) from [<8051f1a4>] (should_failslab+0x6c/0x94) [ 6620.963722][T15663] r8:00000000 r7:84788000 r6:00000cc0 r5:ffffffff r4:830ad9c0 [ 6620.963807][T15663] [<8051f138>] (should_failslab) from [<805035ac>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 6620.964050][T15663] [<8050355c>] (kmem_cache_alloc_node_noprof) from [<8152aff0>] (__alloc_skb+0x138/0x160) [ 6620.964233][T15663] r10:81d55d9c r9:00000000 r8:00000cc0 r7:00000000 r6:830ad9c0 r5:ffffffff [ 6620.964397][T15663] r4:82806040 [ 6620.964610][T15663] [<8152aeb8>] (__alloc_skb) from [<80b84dd4>] (virtual_ncidev_write+0x30/0x1d0) [ 6620.964698][T15663] r8:848a6100 r7:84788000 r6:00000000 r5:861f5c00 r4:00000000 [ 6620.964711][T15663] [<80b84da4>] (virtual_ncidev_write) from [<8054bb24>] (vfs_write+0xac/0x44c) [ 6620.964784][T15663] r10:81d55d9c r9:00000000 r8:eaa85f78 r7:84788000 r6:00000000 r5:861f5c00 [ 6620.964813][T15663] r4:80b84da4 [ 6620.964833][T15663] [<8054ba78>] (vfs_write) from [<8054c334>] (sys_pwrite64+0xa0/0xc8) [ 6620.964902][T15663] r10:000000b5 r9:84788000 r8:8020029c r7:00000000 r6:861f5c00 r5:00000000 [ 6620.965019][T15663] r4:861f5c01 [ 6620.965039][T15663] [<8054c294>] (sys_pwrite64) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6620.965088][T15663] Exception stack(0xeaa85fa8 to 0xeaa85ff0) [ 6620.965125][T15663] 5fa0: 00000000 00000000 00000003 00000000 00000000 00000002 [ 6620.965158][T15663] 5fc0: 00000000 00000000 0012fee0 000000b5 002d0000 00000000 00006364 76b480bc [ 6620.965184][T15663] 5fe0: 76b47ec0 76b47eb0 0001939c 00131f30 [ 6620.965212][T15663] r7:000000b5 r6:0012fee0 r5:00000000 r4:00000000 [ 6621.956228][ T31] kauditd_printk_skb: 57 callbacks suppressed [ 6621.957340][ T31] audit: type=1400 audit(134224349.905:130813): avc: denied { write } for pid=15674 comm="syz.3.11138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6621.965390][ T31] audit: type=1400 audit(134224349.915:130814): avc: denied { read } for pid=15669 comm="syz.2.11136" dev="nsfs" ino=4026532653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6621.999629][ T31] audit: type=1400 audit(134224349.945:130815): avc: denied { read open } for pid=15669 comm="syz.2.11136" path="net:[4026532653]" dev="nsfs" ino=4026532653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6622.005437][ T31] audit: type=1400 audit(134224349.955:130816): avc: denied { create } for pid=15669 comm="syz.2.11136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6622.027009][ T31] audit: type=1400 audit(134224349.975:130817): avc: denied { write } for pid=15669 comm="syz.2.11136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6622.042874][ T31] audit: type=1400 audit(134224349.985:130818): avc: denied { create } for pid=15669 comm="syz.2.11136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6622.064473][ T31] audit: type=1400 audit(134224350.015:130819): avc: denied { write } for pid=15669 comm="syz.2.11136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6622.083853][ T31] audit: type=1400 audit(134224350.015:130820): avc: denied { read } for pid=15669 comm="syz.2.11136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6622.086460][ T31] audit: type=1400 audit(134224350.035:130821): avc: denied { read } for pid=15669 comm="syz.2.11136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6622.465993][ T31] audit: type=1400 audit(134224350.415:130822): avc: denied { write } for pid=15674 comm="syz.3.11138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6626.863519][T15695] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 6627.134795][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 6627.135729][ T31] audit: type=1400 audit(134224355.085:130850): avc: denied { ioctl } for pid=15681 comm="syz.3.11140" path="socket:[121487]" dev="sockfs" ino=121487 ioctlcmd=0x5406 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6627.188823][ T31] audit: type=1400 audit(134224355.135:130851): avc: denied { create } for pid=15696 comm="syz.2.11146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6627.197633][ T31] audit: type=1400 audit(134224355.145:130852): avc: denied { setopt } for pid=15696 comm="syz.2.11146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6627.362370][ T31] audit: type=1400 audit(134224355.305:130853): avc: denied { create } for pid=15699 comm="syz.2.11147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6627.367246][ T31] audit: type=1400 audit(134224355.315:130854): avc: denied { bind } for pid=15699 comm="syz.2.11147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6627.374074][ T31] audit: type=1400 audit(134224355.325:130855): avc: denied { setopt } for pid=15699 comm="syz.2.11147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6627.378097][ T31] audit: type=1400 audit(134224355.325:130856): avc: denied { accept } for pid=15699 comm="syz.2.11147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6627.381824][ T31] audit: type=1400 audit(134224355.325:130857): avc: denied { write } for pid=15699 comm="syz.2.11147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6627.386476][ T31] audit: type=1400 audit(134224355.335:130858): avc: denied { read } for pid=15699 comm="syz.2.11147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6627.895086][ T31] audit: type=1400 audit(134224355.845:130859): avc: denied { write } for pid=15699 comm="syz.2.11147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6631.363775][T15711] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11152'. [ 6632.476402][ T31] kauditd_printk_skb: 57 callbacks suppressed [ 6632.476652][ T31] audit: type=1400 audit(134224360.425:130917): avc: denied { create } for pid=15722 comm="syz.3.11155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6632.482375][ T31] audit: type=1400 audit(134224360.425:130918): avc: denied { write } for pid=15722 comm="syz.3.11155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6632.513607][ T31] audit: type=1400 audit(134224360.455:130919): avc: denied { write } for pid=15722 comm="syz.3.11155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6632.863521][ T31] audit: type=1400 audit(134224360.805:130920): avc: denied { create } for pid=15724 comm="syz.3.11156" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6633.183459][ T31] audit: type=1400 audit(134224361.125:130921): avc: denied { create } for pid=15726 comm="syz.3.11157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6633.253384][ T31] audit: type=1400 audit(134224361.185:130922): avc: denied { ioctl } for pid=15726 comm="syz.3.11157" path="socket:[121553]" dev="sockfs" ino=121553 ioctlcmd=0x8934 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6633.342608][ T31] audit: type=1400 audit(134224361.285:130923): avc: denied { map_create } for pid=15726 comm="syz.3.11157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6633.344970][ T31] audit: type=1400 audit(134224361.285:130924): avc: denied { map_read map_write } for pid=15726 comm="syz.3.11157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6633.377381][ T31] audit: type=1400 audit(134224361.325:130925): avc: denied { map_create } for pid=15726 comm="syz.3.11157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6633.545288][ T31] audit: type=1400 audit(134224361.485:130926): avc: denied { create } for pid=15726 comm="syz.3.11157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6633.827818][T15727] netlink: 'syz.3.11157': attribute type 16 has an invalid length. [ 6633.828252][T15727] netlink: 'syz.3.11157': attribute type 17 has an invalid length. [ 6636.929957][T15753] syzkaller1: entered promiscuous mode [ 6636.933602][T15753] syzkaller1: entered allmulticast mode [ 6637.526062][ T31] kauditd_printk_skb: 97 callbacks suppressed [ 6637.526301][ T31] audit: type=1400 audit(134224365.475:131024): avc: denied { read } for pid=15756 comm="syz.2.11166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6637.547124][ T31] audit: type=1400 audit(134224365.495:131025): avc: denied { module_request } for pid=15756 comm="syz.2.11166" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6637.850118][ T31] audit: type=1400 audit(134224365.795:131026): avc: denied { read } for pid=15764 comm="syz.3.11168" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6637.862000][ T31] audit: type=1400 audit(134224365.805:131027): avc: denied { read open } for pid=15764 comm="syz.3.11168" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6637.936386][ T31] audit: type=1400 audit(134224365.885:131028): avc: denied { create } for pid=15764 comm="syz.3.11168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 6637.954428][ T31] audit: type=1400 audit(134224365.905:131029): avc: denied { create } for pid=15764 comm="syz.3.11168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6637.976224][ T31] audit: type=1400 audit(134224365.925:131030): avc: denied { create } for pid=15764 comm="syz.3.11168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6637.979494][ T31] audit: type=1400 audit(134224365.925:131031): avc: denied { write } for pid=15764 comm="syz.3.11168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6637.986755][ T31] audit: type=1400 audit(134224365.935:131032): avc: denied { read } for pid=15764 comm="syz.3.11168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6637.997406][ T31] audit: type=1400 audit(134224365.945:131033): avc: denied { read } for pid=15764 comm="syz.3.11168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6638.048212][T15765] netlink: 'syz.3.11168': attribute type 11 has an invalid length. [ 6642.552206][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 6642.552615][ T31] audit: type=1400 audit(134224370.495:131061): avc: denied { bpf } for pid=15780 comm="syz.3.11175" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6642.572224][ T31] audit: type=1400 audit(134224370.495:131062): avc: denied { bpf } for pid=15780 comm="syz.3.11175" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6642.572639][ T31] audit: type=1400 audit(134224370.495:131063): avc: denied { prog_run } for pid=15780 comm="syz.3.11175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6642.604068][ T31] audit: type=1400 audit(134224370.545:131064): avc: denied { create } for pid=15780 comm="syz.3.11175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6642.623915][ T31] audit: type=1400 audit(134224370.565:131065): avc: denied { write } for pid=15780 comm="syz.3.11175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6642.637432][ T31] audit: type=1400 audit(134224370.585:131066): avc: denied { module_request } for pid=15780 comm="syz.3.11175" kmod="net-pf-16-proto-16-family-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6643.076487][ T31] audit: type=1400 audit(134224371.025:131067): avc: denied { read } for pid=15780 comm="syz.3.11175" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6643.094471][ T31] audit: type=1400 audit(134224371.025:131068): avc: denied { ioctl } for pid=15780 comm="syz.3.11175" path="socket:[121615]" dev="sockfs" ino=121615 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6643.109641][ T31] audit: type=1400 audit(134224371.055:131069): avc: denied { module_request } for pid=15780 comm="syz.3.11175" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6643.386271][ T31] audit: type=1400 audit(134224371.335:131070): avc: denied { sys_module } for pid=15780 comm="syz.3.11175" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6647.800682][ T31] kauditd_printk_skb: 41 callbacks suppressed [ 6647.801054][ T31] audit: type=1400 audit(134224375.745:131112): avc: denied { create } for pid=15800 comm="syz.2.11182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6647.811185][ T31] audit: type=1400 audit(134224375.755:131113): avc: denied { map_create } for pid=15800 comm="syz.2.11182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6647.836944][ T31] audit: type=1400 audit(134224375.785:131114): avc: denied { prog_load } for pid=15800 comm="syz.2.11182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6647.859312][ T31] audit: type=1400 audit(134224375.805:131115): avc: denied { bpf } for pid=15800 comm="syz.2.11182" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6647.883625][ T31] audit: type=1400 audit(134224375.825:131116): avc: denied { prog_load } for pid=15800 comm="syz.2.11182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6647.897068][ T31] audit: type=1400 audit(134224375.845:131117): avc: denied { bpf } for pid=15800 comm="syz.2.11182" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6647.939486][ T31] audit: type=1400 audit(134224375.885:131118): avc: denied { perfmon } for pid=15800 comm="syz.2.11182" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6647.957634][ T31] audit: type=1400 audit(134224375.905:131119): avc: denied { perfmon } for pid=15800 comm="syz.2.11182" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6648.018996][ T31] audit: type=1400 audit(134224375.965:131120): avc: denied { perfmon } for pid=15800 comm="syz.2.11182" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6648.022387][ T31] audit: type=1400 audit(134224375.965:131121): avc: denied { perfmon } for pid=15800 comm="syz.2.11182" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6650.416938][T15816] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11189'. [ 6650.435590][T15816] netlink: 20 bytes leftover after parsing attributes in process `syz.3.11189'. [ 6652.184343][T15836] netlink: 'syz.2.11192': attribute type 28 has an invalid length. [ 6653.150224][ T31] kauditd_printk_skb: 79 callbacks suppressed [ 6653.150464][ T31] audit: type=1400 audit(134224381.095:131201): avc: denied { create } for pid=15840 comm="syz.3.11197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6653.165644][ T31] audit: type=1400 audit(134224381.115:131202): avc: denied { ioctl } for pid=15840 comm="syz.3.11197" path="socket:[121704]" dev="sockfs" ino=121704 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6653.199888][ T31] audit: type=1400 audit(134224381.145:131203): avc: denied { read } for pid=15839 comm="syz.2.11196" dev="nsfs" ino=4026532653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6653.290953][ T31] audit: type=1400 audit(134224381.235:131204): avc: denied { read open } for pid=15839 comm="syz.2.11196" path="net:[4026532653]" dev="nsfs" ino=4026532653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6653.413351][ T31] audit: type=1400 audit(134224381.355:131205): avc: denied { create } for pid=15839 comm="syz.2.11196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6653.417390][ T31] audit: type=1400 audit(134224381.355:131206): avc: denied { write } for pid=15839 comm="syz.2.11196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6653.727676][ T31] audit: type=1400 audit(134224381.675:131207): avc: denied { create } for pid=15845 comm="syz.3.11198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6653.747909][ T31] audit: type=1400 audit(134224381.695:131208): avc: denied { setopt } for pid=15845 comm="syz.3.11198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6653.793976][ T31] audit: type=1400 audit(134224381.715:131209): avc: denied { bind } for pid=15845 comm="syz.3.11198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6653.794398][ T31] audit: type=1400 audit(134224381.715:131210): avc: denied { name_bind } for pid=15845 comm="syz.3.11198" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 6658.163590][ T31] kauditd_printk_skb: 577 callbacks suppressed [ 6658.163927][ T31] audit: type=1400 audit(134224386.105:131788): avc: denied { write } for pid=15848 comm="syz.3.11200" laddr=224.0.0.1 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6658.175281][ T31] audit: type=1400 audit(134224386.125:131789): avc: denied { write } for pid=15848 comm="syz.3.11200" laddr=224.0.0.1 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6658.180176][ T31] audit: type=1400 audit(134224386.125:131790): avc: denied { write } for pid=15848 comm="syz.3.11200" laddr=224.0.0.1 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6658.186270][ T31] audit: type=1400 audit(134224386.135:131791): avc: denied { write } for pid=15848 comm="syz.3.11200" laddr=224.0.0.1 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6658.190213][ T31] audit: type=1400 audit(134224386.135:131792): avc: denied { write } for pid=15848 comm="syz.3.11200" laddr=224.0.0.1 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6658.213877][ T31] audit: type=1400 audit(134224386.145:131793): avc: denied { write } for pid=15848 comm="syz.3.11200" laddr=224.0.0.1 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6658.231111][ T31] audit: type=1400 audit(134224386.175:131794): avc: denied { write } for pid=15848 comm="syz.3.11200" laddr=224.0.0.1 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6658.245842][ T31] audit: type=1400 audit(134224386.195:131795): avc: denied { write } for pid=15848 comm="syz.3.11200" laddr=224.0.0.1 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6658.253533][ T31] audit: type=1400 audit(134224386.195:131796): avc: denied { write } for pid=15848 comm="syz.3.11200" laddr=224.0.0.1 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6658.253726][ T31] audit: type=1400 audit(134224386.195:131797): avc: denied { write } for pid=15848 comm="syz.3.11200" laddr=224.0.0.1 faddr=172.20.20.170 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6661.369967][T15876] netlink: 32 bytes leftover after parsing attributes in process `syz.2.11206'. [ 6661.418024][T15874] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6661.441659][T15876] netlink: 32 bytes leftover after parsing attributes in process `syz.2.11206'. [ 6661.482253][T15874] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6661.546752][T15874] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6661.587548][T15874] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6661.644303][T15874] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6661.648123][T15874] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6661.672478][T15874] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6661.687327][T15874] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6663.385888][ T31] kauditd_printk_skb: 516 callbacks suppressed [ 6663.387377][ T31] audit: type=1400 audit(134224391.335:132314): avc: denied { prog_load } for pid=15902 comm="syz.3.11212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6663.392605][ T31] audit: type=1400 audit(134224391.335:132315): avc: denied { bpf } for pid=15902 comm="syz.3.11212" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6663.400441][ T31] audit: type=1400 audit(134224391.345:132316): avc: denied { perfmon } for pid=15902 comm="syz.3.11212" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6663.407022][ T31] audit: type=1400 audit(134224391.355:132317): avc: denied { perfmon } for pid=15902 comm="syz.3.11212" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6663.411818][ T31] audit: type=1400 audit(134224391.355:132318): avc: denied { perfmon } for pid=15902 comm="syz.3.11212" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6663.417358][ T31] audit: type=1400 audit(134224391.365:132319): avc: denied { perfmon } for pid=15902 comm="syz.3.11212" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6663.421496][ T31] audit: type=1400 audit(134224391.365:132320): avc: denied { bpf } for pid=15902 comm="syz.3.11212" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6663.428078][ T31] audit: type=1400 audit(134224391.375:132321): avc: denied { bpf } for pid=15902 comm="syz.3.11212" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6663.430989][ T31] audit: type=1400 audit(134224391.375:132322): avc: denied { prog_run } for pid=15902 comm="syz.3.11212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6663.456606][ T31] audit: type=1400 audit(134224391.405:132323): avc: denied { write } for pid=15902 comm="syz.3.11212" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6673.550017][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 6673.550254][ T31] audit: type=1400 audit(134224401.495:132353): avc: denied { prog_load } for pid=15935 comm="syz.3.11216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6673.552885][ T31] audit: type=1400 audit(134224401.495:132354): avc: denied { bpf } for pid=15935 comm="syz.3.11216" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6673.857957][ T31] audit: type=1400 audit(134224401.805:132355): avc: denied { create } for pid=15937 comm="syz.3.11217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6673.863935][ T31] audit: type=1400 audit(134224401.805:132356): avc: denied { setopt } for pid=15937 comm="syz.3.11217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6674.021949][ T31] audit: type=1400 audit(134224401.965:132357): avc: denied { create } for pid=15939 comm="syz.3.11219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6674.022207][ T31] audit: type=1400 audit(134224401.965:132358): avc: denied { setopt } for pid=15939 comm="syz.3.11219" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6674.125082][ T31] audit: type=1400 audit(134224402.065:132359): avc: denied { create } for pid=15942 comm="syz.3.11220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6674.128465][ T31] audit: type=1400 audit(134224402.075:132360): avc: denied { bind } for pid=15942 comm="syz.3.11220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6674.132030][ T31] audit: type=1400 audit(134224402.075:132361): avc: denied { accept } for pid=15942 comm="syz.3.11220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6674.136370][ T31] audit: type=1400 audit(134224402.085:132362): avc: denied { write } for pid=15942 comm="syz.3.11220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6678.575283][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 6678.575614][ T31] audit: type=1400 audit(134224406.525:132423): avc: denied { create } for pid=15974 comm="syz.2.11235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 6678.698153][ T31] audit: type=1400 audit(134224406.645:132424): avc: denied { create } for pid=15974 comm="syz.2.11235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6678.737333][ T31] audit: type=1400 audit(134224406.685:132425): avc: denied { create } for pid=15974 comm="syz.2.11235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 6678.935046][ T31] audit: type=1400 audit(134224406.875:132426): avc: denied { create } for pid=15974 comm="syz.2.11235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6679.015855][ T31] audit: type=1400 audit(134224406.965:132427): avc: denied { create } for pid=15979 comm="syz.3.11237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6679.020187][ T31] audit: type=1400 audit(134224406.965:132428): avc: denied { write } for pid=15974 comm="syz.2.11235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6679.025896][ T31] audit: type=1400 audit(134224406.975:132429): avc: denied { module_request } for pid=15974 comm="syz.2.11235" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6679.027586][ T31] audit: type=1400 audit(134224406.975:132430): avc: denied { prog_load } for pid=15979 comm="syz.3.11237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6679.028961][ T31] audit: type=1400 audit(134224406.975:132431): avc: denied { bpf } for pid=15979 comm="syz.3.11237" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6679.030348][ T31] audit: type=1400 audit(134224406.975:132432): avc: denied { perfmon } for pid=15979 comm="syz.3.11237" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6679.195290][T15980] "syz.3.11237" (15980) uses obsolete ecb(arc4) skcipher [ 6683.748624][ T31] kauditd_printk_skb: 80 callbacks suppressed [ 6683.748895][ T31] audit: type=1400 audit(134224411.695:132513): avc: denied { bpf } for pid=16007 comm="syz.3.11247" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6683.776831][ T31] audit: type=1400 audit(134224411.725:132514): avc: denied { prog_load } for pid=16007 comm="syz.3.11247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6683.779141][ T31] audit: type=1400 audit(134224411.725:132515): avc: denied { bpf } for pid=16007 comm="syz.3.11247" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6683.781671][ T31] audit: type=1400 audit(134224411.725:132516): avc: denied { perfmon } for pid=16007 comm="syz.3.11247" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6683.835906][ T31] audit: type=1400 audit(134224411.785:132517): avc: denied { perfmon } for pid=16007 comm="syz.3.11247" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6683.838371][ T31] audit: type=1400 audit(134224411.785:132518): avc: denied { perfmon } for pid=16007 comm="syz.3.11247" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6683.840694][ T31] audit: type=1400 audit(134224411.785:132519): avc: denied { perfmon } for pid=16007 comm="syz.3.11247" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6683.843392][ T31] audit: type=1400 audit(134224411.785:132520): avc: denied { perfmon } for pid=16007 comm="syz.3.11247" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6683.876771][ T31] audit: type=1400 audit(134224411.825:132521): avc: denied { bpf } for pid=16007 comm="syz.3.11247" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6683.882667][ T31] audit: type=1400 audit(134224411.825:132522): avc: denied { bpf } for pid=16007 comm="syz.3.11247" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6689.256709][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 6689.257323][ T31] audit: type=1400 audit(134224417.205:132582): avc: denied { read } for pid=16034 comm="syz.3.11258" dev="nsfs" ino=4026532663 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6689.264873][ T31] audit: type=1400 audit(134224417.205:132583): avc: denied { read open } for pid=16034 comm="syz.3.11258" path="net:[4026532663]" dev="nsfs" ino=4026532663 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6689.266015][ T31] audit: type=1400 audit(134224417.215:132584): avc: denied { create } for pid=16034 comm="syz.3.11258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6689.284347][ T31] audit: type=1400 audit(134224417.225:132585): avc: denied { write } for pid=16034 comm="syz.3.11258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6689.296663][ T31] audit: type=1400 audit(134224417.245:132586): avc: denied { read } for pid=16034 comm="syz.3.11258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6689.303455][ T31] audit: type=1400 audit(134224417.245:132587): avc: denied { read } for pid=16034 comm="syz.3.11258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6689.308110][ T31] audit: type=1400 audit(134224417.255:132588): avc: denied { write } for pid=16034 comm="syz.3.11258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6689.544851][ T31] audit: type=1400 audit(134224417.495:132589): avc: denied { read } for pid=16036 comm="syz.3.11259" dev="nsfs" ino=4026532663 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6689.547147][ T31] audit: type=1400 audit(134224417.495:132590): avc: denied { read open } for pid=16036 comm="syz.3.11259" path="net:[4026532663]" dev="nsfs" ino=4026532663 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6689.550913][ T31] audit: type=1400 audit(134224417.495:132591): avc: denied { create } for pid=16036 comm="syz.3.11259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 6694.427200][ T31] kauditd_printk_skb: 701 callbacks suppressed [ 6694.427554][ T31] audit: type=1400 audit(134224422.375:133293): avc: denied { setopt } for pid=16050 comm="syz.3.11266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6694.427854][ T31] audit: type=1400 audit(134224422.375:133294): avc: denied { module_request } for pid=16050 comm="syz.3.11266" kmod="crypto-cbc-twofish-3way-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6694.534516][ T31] audit: type=1400 audit(134224422.485:133295): avc: denied { accept } for pid=16050 comm="syz.3.11266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6694.552577][ T31] audit: type=1400 audit(134224422.495:133296): avc: denied { create } for pid=16050 comm="syz.3.11266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6694.569184][ T31] audit: type=1400 audit(134224422.515:133297): avc: denied { getopt } for pid=16050 comm="syz.3.11266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6694.652941][ T31] audit: type=1400 audit(134224422.595:133298): avc: denied { create } for pid=16050 comm="syz.3.11266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6694.667839][ T31] audit: type=1400 audit(134224422.605:133299): avc: denied { setopt } for pid=16050 comm="syz.3.11266" lport=17 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6694.705961][ T31] audit: type=1400 audit(134224422.655:133300): avc: denied { write } for pid=16050 comm="syz.3.11266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6695.253854][T16063] netlink: 8 bytes leftover after parsing attributes in process `syz.2.11267'. [ 6695.477572][ T31] audit: type=1400 audit(134224423.425:133301): avc: denied { execmem } for pid=16066 comm="syz.3.11268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6695.491012][ T31] audit: type=1400 audit(134224423.435:133302): avc: denied { create } for pid=16066 comm="syz.3.11268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 6695.698920][T16067] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11268'. [ 6695.849238][T16067] GUP no longer grows the stack in syz.3.11268 (16067): 20003000-2000a000 (20001000) [ 6695.849469][T16067] CPU: 0 UID: 0 PID: 16067 Comm: syz.3.11268 Not tainted 6.15.0-syzkaller #0 PREEMPT [ 6695.849506][T16067] Hardware name: ARM-Versatile Express [ 6695.849519][T16067] Call trace: [ 6695.849587][T16067] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 6695.849674][T16067] r7:df991b4c r6:00000001 r5:60000013 r4:82259134 [ 6695.849708][T16067] [<80201ac8>] (show_stack) from [<80220544>] (dump_stack_lvl+0x70/0x7c) [ 6695.849738][T16067] [<802204d4>] (dump_stack_lvl) from [<80220568>] (dump_stack+0x18/0x1c) [ 6695.849764][T16067] r5:00000000 r4:20001000 [ 6695.849771][T16067] [<80220550>] (dump_stack) from [<804b9f84>] (gup_vma_lookup+0xb4/0xb8) [ 6695.849796][T16067] [<804b9ed0>] (gup_vma_lookup) from [<804bbe08>] (__get_user_pages+0xec/0x664) [ 6695.849819][T16067] r4:00290001 [ 6695.849827][T16067] [<804bbd1c>] (__get_user_pages) from [<804bd0a0>] (__gup_longterm_locked+0xd4/0x990) [ 6695.849856][T16067] r10:df991b4c r9:848ad160 r8:8510f0c0 r7:00000001 r6:00000001 r5:20001000 [ 6695.849880][T16067] r4:00000000 [ 6695.849970][T16067] [<804bcfcc>] (__gup_longterm_locked) from [<804bde8c>] (gup_fast_fallback+0x530/0x810) [ 6695.850029][T16067] r10:20001000 r9:00000000 r8:00000001 r7:84bd1800 r6:ffefd008 r5:ffefd008 [ 6695.850129][T16067] r4:20001000 [ 6695.850164][T16067] [<804bd95c>] (gup_fast_fallback) from [<804be280>] (pin_user_pages_fast+0x50/0x60) [ 6695.850275][T16067] r10:00000001 r9:df991c48 r8:df991c44 r7:20001000 r6:00000001 r5:20001000 [ 6695.850308][T16067] r4:848ad160 [ 6695.850317][T16067] [<804be230>] (pin_user_pages_fast) from [<808ac594>] (iov_iter_extract_pages+0xfc/0x7d4) [ 6695.850369][T16067] r6:0000007f r5:00000480 r4:df991ef0 [ 6695.850409][T16067] [<808ac498>] (iov_iter_extract_pages) from [<808aa084>] (extract_iter_to_sg+0xc4/0x92c) [ 6695.850472][T16067] r10:848ad060 r9:00000000 r8:848ad048 r7:00000174 r6:0000007f r5:848ad008 [ 6695.850575][T16067] r4:0000000e [ 6695.850617][T16067] [<808a9fc0>] (extract_iter_to_sg) from [<80809f24>] (af_alg_get_rsgl+0xd0/0x234) [ 6695.850694][T16067] r10:df991ee0 r9:848ad800 r8:00000000 r7:00000000 r6:848ad1b8 r5:848ad000 [ 6695.850746][T16067] r4:848ad008 [ 6695.850777][T16067] [<80809e54>] (af_alg_get_rsgl) from [<8080cb98>] (aead_recvmsg+0x11c/0x640) [ 6695.850835][T16067] r10:848ad000 r9:0000e078 r8:0000e068 r7:df991ee0 r6:8557b540 r5:848ad800 [ 6695.850868][T16067] r4:86196780 [ 6695.850929][T16067] [<8080ca7c>] (aead_recvmsg) from [<8151d318>] (____sys_recvmsg+0x160/0x184) [ 6695.851039][T16067] r10:df991d4c r9:00000060 r8:00000000 r7:8080ca7c r6:837dbb80 r5:20000ca0 [ 6695.851086][T16067] r4:df991ee0 [ 6695.851115][T16067] [<8151d1b8>] (____sys_recvmsg) from [<81520354>] (___sys_recvmsg+0x88/0xbc) [ 6695.851178][T16067] r10:00000002 r9:84bd1800 r8:837dbb80 r7:00000060 r6:20000ca0 r5:df991ee0 [ 6695.851190][T16067] r4:00000000 [ 6695.851282][T16067] [<815202cc>] (___sys_recvmsg) from [<815204a8>] (do_recvmmsg+0x120/0x2f8) [ 6695.851324][T16067] r8:00000000 r7:00000060 r6:00000001 r5:20000ca0 r4:df991ec0 [ 6695.851333][T16067] [<81520388>] (do_recvmmsg) from [<81520da8>] (sys_recvmmsg_time32+0xc4/0xd8) [ 6695.851404][T16067] r10:0000016d r9:84bd1800 r8:00000002 r7:00000060 r6:00000000 r5:20000c80 [ 6695.851449][T16067] r4:00000006 [ 6695.851458][T16067] [<81520ce4>] (sys_recvmmsg_time32) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6695.851507][T16067] Exception stack(0xdf991fa8 to 0xdf991ff0) [ 6695.851598][T16067] 1fa0: 00000000 00000000 00000006 20000c80 00000002 00000060 [ 6695.851661][T16067] 1fc0: 00000000 00000000 002e6308 0000016d 002d0000 00000000 00006364 76b480bc [ 6695.851707][T16067] 1fe0: 76b47ec0 76b47eb0 0001939c 00131f30 [ 6695.851775][T16067] r8:8020029c r7:0000016d r6:002e6308 r5:00000000 r4:00000000 [ 6699.369969][T16089] netlink: 'syz.2.11277': attribute type 27 has an invalid length. [ 6700.201862][ T31] kauditd_printk_skb: 65 callbacks suppressed [ 6700.202267][ T31] audit: type=1400 audit(134224428.145:133368): avc: denied { create } for pid=16095 comm="syz.3.11282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6700.214752][ T31] audit: type=1400 audit(134224428.165:133369): avc: denied { bind } for pid=16095 comm="syz.3.11282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6700.217405][ T31] audit: type=1400 audit(134224428.165:133370): avc: denied { accept } for pid=16095 comm="syz.3.11282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6700.548488][ T31] audit: type=1400 audit(134224428.495:133371): avc: denied { create } for pid=16097 comm="syz.2.11281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6700.616252][ T31] audit: type=1400 audit(134224428.565:133372): avc: denied { write } for pid=16097 comm="syz.2.11281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6700.678049][ T31] audit: type=1400 audit(134224428.625:133373): avc: denied { create } for pid=16098 comm="syz.3.11283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6700.688672][ T31] audit: type=1400 audit(134224428.635:133374): avc: denied { ioctl } for pid=16098 comm="syz.3.11283" path="socket:[123158]" dev="sockfs" ino=123158 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6700.694885][ T31] audit: type=1400 audit(134224428.635:133375): avc: denied { bind } for pid=16098 comm="syz.3.11283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6700.854335][ T31] audit: type=1400 audit(134224428.805:133376): avc: denied { connect } for pid=16098 comm="syz.3.11283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6700.915424][ T31] audit: type=1400 audit(134224428.865:133377): avc: denied { create } for pid=16098 comm="syz.3.11283" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6705.563434][ T31] kauditd_printk_skb: 66 callbacks suppressed [ 6705.564122][ T31] audit: type=1400 audit(134224433.505:133444): avc: denied { prog_load } for pid=16125 comm="syz.3.11293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6705.577266][ T31] audit: type=1400 audit(134224433.525:133445): avc: denied { bpf } for pid=16125 comm="syz.3.11293" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6705.579808][ T31] audit: type=1400 audit(134224433.525:133446): avc: denied { perfmon } for pid=16125 comm="syz.3.11293" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6705.615072][ T31] audit: type=1400 audit(134224433.525:133447): avc: denied { perfmon } for pid=16125 comm="syz.3.11293" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6705.617793][ T31] audit: type=1400 audit(134224433.565:133448): avc: denied { perfmon } for pid=16125 comm="syz.3.11293" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6705.620294][ T31] audit: type=1400 audit(134224433.565:133449): avc: denied { perfmon } for pid=16125 comm="syz.3.11293" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6705.622838][ T31] audit: type=1400 audit(134224433.565:133450): avc: denied { perfmon } for pid=16125 comm="syz.3.11293" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6705.648655][ T31] audit: type=1400 audit(134224433.595:133451): avc: denied { bpf } for pid=16125 comm="syz.3.11293" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6705.652880][ T31] audit: type=1400 audit(134224433.595:133452): avc: denied { bpf } for pid=16125 comm="syz.3.11293" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6705.677388][ T31] audit: type=1400 audit(134224433.625:133453): avc: denied { prog_run } for pid=16125 comm="syz.3.11293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6711.114857][ T31] kauditd_printk_skb: 31 callbacks suppressed [ 6711.115039][ T31] audit: type=1400 audit(134224439.065:133485): avc: denied { create } for pid=16149 comm="syz.2.11301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6711.119572][ T31] audit: type=1400 audit(134224439.065:133486): avc: denied { setopt } for pid=16149 comm="syz.2.11301" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6711.130661][ T31] audit: type=1400 audit(134224439.075:133487): avc: denied { connect } for pid=16149 comm="syz.2.11301" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6711.602258][ T31] audit: type=1400 audit(134224439.545:133488): avc: denied { create } for pid=16153 comm="syz.2.11303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6711.622819][ T31] audit: type=1400 audit(134224439.565:133489): avc: denied { setopt } for pid=16153 comm="syz.2.11303" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6712.160629][ T31] audit: type=1400 audit(134224440.105:133490): avc: denied { create } for pid=16155 comm="syz.3.11304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6712.183668][ T31] audit: type=1400 audit(134224440.125:133491): avc: denied { bind } for pid=16155 comm="syz.3.11304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6712.185831][ T31] audit: type=1400 audit(134224440.125:133492): avc: denied { setopt } for pid=16155 comm="syz.3.11304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6712.187428][ T31] audit: type=1400 audit(134224440.135:133493): avc: denied { accept } for pid=16155 comm="syz.3.11304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 6712.197830][ T31] audit: type=1400 audit(134224440.145:133494): avc: denied { prog_load } for pid=16156 comm="syz.2.11305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6716.779471][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 6716.779725][ T31] audit: type=1400 audit(134224444.725:133539): avc: denied { create } for pid=16205 comm="syz.3.11314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6716.786802][ T31] audit: type=1400 audit(134224444.735:133540): avc: denied { create } for pid=16205 comm="syz.3.11314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6716.788474][ T31] audit: type=1400 audit(134224444.735:133541): avc: denied { write } for pid=16205 comm="syz.3.11314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6716.790334][ T31] audit: type=1400 audit(134224444.735:133542): avc: denied { read } for pid=16205 comm="syz.3.11314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6716.800725][ T31] audit: type=1400 audit(134224444.745:133543): avc: denied { read } for pid=16205 comm="syz.3.11314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6716.805397][ T31] audit: type=1400 audit(134224444.755:133544): avc: denied { write } for pid=16205 comm="syz.3.11314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6716.845498][ T31] audit: type=1400 audit(134224444.795:133545): avc: denied { create } for pid=16207 comm="syz.2.11315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6716.851600][ T31] audit: type=1400 audit(134224444.795:133546): avc: denied { create } for pid=16207 comm="syz.2.11315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6716.858535][ T31] audit: type=1400 audit(134224444.805:133547): avc: denied { write } for pid=16207 comm="syz.2.11315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6716.861878][ T31] audit: type=1400 audit(134224444.805:133548): avc: denied { module_request } for pid=16207 comm="syz.2.11315" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6718.219896][T16220] netlink: 16 bytes leftover after parsing attributes in process `syz.2.11318'. [ 6718.459330][T16223] netlink: 8 bytes leftover after parsing attributes in process `syz.2.11319'. [ 6722.152590][ T31] kauditd_printk_skb: 93 callbacks suppressed [ 6722.152872][ T31] audit: type=1400 audit(134224450.095:133642): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6722.162776][ T31] audit: type=1400 audit(134224450.105:133643): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6722.205014][ T31] audit: type=1400 audit(134224450.145:133644): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6722.205266][ T31] audit: type=1400 audit(134224450.145:133645): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6722.205461][ T31] audit: type=1400 audit(134224450.155:133646): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6722.216341][ T31] audit: type=1400 audit(134224450.165:133647): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6722.219027][ T31] audit: type=1400 audit(134224450.165:133648): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6722.241934][ T31] audit: type=1400 audit(134224450.185:133649): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6722.253527][ T31] audit: type=1400 audit(134224450.195:133650): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6722.725686][ T31] audit: type=1400 audit(134224450.665:133651): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6725.900864][T16261] netlink: 16 bytes leftover after parsing attributes in process `syz.3.11334'. [ 6726.277051][T16265] netlink: 'syz.2.11336': attribute type 12 has an invalid length. [ 6727.178401][ T31] kauditd_printk_skb: 266 callbacks suppressed [ 6727.178608][ T31] audit: type=1400 audit(134224455.125:133918): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6727.184484][ T31] audit: type=1400 audit(134224455.135:133919): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6727.204759][ T31] audit: type=1400 audit(134224455.155:133920): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6727.207253][ T31] audit: type=1400 audit(134224455.155:133921): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6727.526185][ T31] audit: type=1400 audit(134224455.475:133922): avc: denied { nlmsg_write } for pid=16266 comm="syz.3.11337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 6727.713672][T16275] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11337'. [ 6728.020230][ T31] audit: type=1400 audit(134224455.965:133923): avc: denied { read } for pid=16276 comm="syz.2.11339" dev="nsfs" ino=4026532653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6728.029146][ T31] audit: type=1400 audit(134224455.975:133924): avc: denied { read open } for pid=16276 comm="syz.2.11339" path="net:[4026532653]" dev="nsfs" ino=4026532653 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6728.048064][ T31] audit: type=1400 audit(134224455.985:133925): avc: denied { create } for pid=16276 comm="syz.2.11339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6728.067181][ T31] audit: type=1400 audit(134224456.015:133926): avc: denied { write } for pid=16276 comm="syz.2.11339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6728.076671][ T31] audit: type=1400 audit(134224456.025:133927): avc: denied { module_request } for pid=16276 comm="syz.2.11339" kmod="net-pf-16-proto-16-family-nl802154" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6732.674181][ T31] kauditd_printk_skb: 94 callbacks suppressed [ 6732.674507][ T31] audit: type=1400 audit(134224460.605:134022): avc: denied { map_create } for pid=16293 comm="syz.3.11344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6732.678813][ T31] audit: type=1400 audit(134224460.625:134023): avc: denied { map_create } for pid=16293 comm="syz.3.11344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6732.928705][T16300] netlink: 132 bytes leftover after parsing attributes in process `syz.2.11345'. [ 6733.072506][ T31] audit: type=1400 audit(134224461.015:134024): avc: denied { sys_module } for pid=16293 comm="syz.3.11344" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6733.087639][ T31] audit: type=1400 audit(134224461.035:134025): avc: denied { module_request } for pid=16293 comm="syz.3.11344" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6733.098189][ T31] audit: type=1400 audit(134224461.045:134026): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6733.100446][ T31] audit: type=1400 audit(134224461.045:134027): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6733.108225][ T31] audit: type=1400 audit(134224461.055:134028): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6733.110506][ T31] audit: type=1400 audit(134224461.055:134029): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6733.213833][ T31] audit: type=1400 audit(134224461.135:134030): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6733.214187][ T31] audit: type=1400 audit(134224461.135:134031): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6737.421605][T16316] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11348'. [ 6737.728436][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 6737.728846][ T31] audit: type=1400 audit(134224465.675:134086): avc: denied { map_create } for pid=16317 comm="syz.2.11349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6737.732713][ T31] audit: type=1400 audit(134224465.675:134087): avc: denied { bpf } for pid=16317 comm="syz.2.11349" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6737.737706][ T31] audit: type=1400 audit(134224465.685:134088): avc: denied { map_read map_write } for pid=16317 comm="syz.2.11349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6737.760547][ T31] audit: type=1400 audit(134224465.705:134089): avc: denied { map_create } for pid=16317 comm="syz.2.11349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6737.765828][ T31] audit: type=1400 audit(134224465.715:134090): avc: denied { perfmon } for pid=16317 comm="syz.2.11349" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6737.776981][ T31] audit: type=1400 audit(134224465.725:134091): avc: denied { map_read map_write } for pid=16317 comm="syz.2.11349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6737.786951][ T31] audit: type=1400 audit(134224465.735:134092): avc: denied { prog_load } for pid=16317 comm="syz.2.11349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6737.849648][ T31] audit: type=1400 audit(134224465.795:134093): avc: denied { bpf } for pid=16317 comm="syz.2.11349" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6737.968998][ T31] audit: type=1400 audit(134224465.915:134094): avc: denied { perfmon } for pid=16317 comm="syz.2.11349" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6738.034000][ T31] audit: type=1400 audit(134224465.975:134095): avc: denied { perfmon } for pid=16317 comm="syz.2.11349" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6741.825018][T16334] ip6tnl1: entered promiscuous mode [ 6741.825233][T16334] ip6tnl1: entered allmulticast mode [ 6742.927622][ T31] kauditd_printk_skb: 110 callbacks suppressed [ 6742.927984][ T31] audit: type=1400 audit(134224470.875:134206): avc: denied { create } for pid=16341 comm="syz.3.11357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6743.027718][ T31] audit: type=1400 audit(134224470.975:134207): avc: denied { connect } for pid=16341 comm="syz.3.11357" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6743.053609][ T31] audit: type=1400 audit(134224470.995:134208): avc: denied { write } for pid=16341 comm="syz.3.11357" laddr=fe80::13 lport=60 faddr=fe80::d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6743.131509][ T31] audit: type=1400 audit(134224471.075:134209): avc: denied { write } for pid=16341 comm="syz.3.11357" laddr=fe80::13 lport=60 faddr=fe80::d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6743.178625][ T31] audit: type=1400 audit(134224471.115:134210): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6743.185053][ T31] audit: type=1400 audit(134224471.135:134211): avc: denied { recv } for pid=11890 comm="syz-executor" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6743.248085][ T31] audit: type=1400 audit(134224471.175:134212): avc: denied { recv } for pid=27946 comm="kworker/u9:0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6743.248457][ T31] audit: type=1400 audit(134224471.175:134213): avc: denied { recv } for pid=27946 comm="kworker/u9:0" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6743.248695][ T31] audit: type=1400 audit(134224471.195:134214): avc: denied { recv } for pid=27946 comm="kworker/u9:0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6743.274515][ T31] audit: type=1400 audit(134224471.205:134215): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6746.256869][T16378] netlink: 'syz.3.11374': attribute type 10 has an invalid length. [ 6746.258393][T16378] syz_tun: entered promiscuous mode [ 6746.283002][T16378] netlink: 14 bytes leftover after parsing attributes in process `syz.3.11374'. [ 6747.426739][T16388] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6747.524535][T16388] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6747.644808][T16388] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6747.744831][T16388] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6747.889826][T16388] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6747.906807][T16388] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6747.920363][T16388] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6747.996253][T16388] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6748.018852][ T31] kauditd_printk_skb: 340 callbacks suppressed [ 6748.019143][ T31] audit: type=1400 audit(134224475.965:134556): avc: denied { write } for pid=16385 comm="syz.2.11377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6748.024863][ T31] audit: type=1400 audit(134224475.975:134557): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6748.075995][ T31] audit: type=1400 audit(134224476.025:134558): avc: denied { recv } for pid=10771 comm="kworker/1:2" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6748.078345][ T31] audit: type=1400 audit(134224476.025:134559): avc: denied { recv } for pid=10771 comm="kworker/1:2" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6748.080274][ T31] audit: type=1400 audit(134224476.025:134560): avc: denied { recv } for pid=10771 comm="kworker/1:2" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6748.081980][ T31] audit: type=1400 audit(134224476.025:134561): avc: denied { read } for pid=16385 comm="syz.2.11377" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6748.189586][ T31] audit: type=1400 audit(134224476.135:134562): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6748.229556][ T31] audit: type=1400 audit(134224476.175:134563): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6748.229985][ T31] audit: type=1400 audit(134224476.175:134564): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6748.281113][ T31] audit: type=1400 audit(134224476.225:134565): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6753.034808][ T31] kauditd_printk_skb: 159 callbacks suppressed [ 6753.035795][ T31] audit: type=1400 audit(134224480.985:134725): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6753.051235][ T31] audit: type=1400 audit(134224480.995:134726): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6753.051685][ T31] audit: type=1400 audit(134224480.995:134727): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6753.123746][ T31] audit: type=1400 audit(134224481.065:134728): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6753.133392][ T31] audit: type=1400 audit(134224481.075:134729): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6753.394184][ T31] audit: type=1400 audit(134224481.325:134730): avc: denied { create } for pid=16434 comm="syz.3.11390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6753.407419][ T31] audit: type=1400 audit(134224481.355:134731): avc: denied { write } for pid=16434 comm="syz.3.11390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6753.410377][ T31] audit: type=1400 audit(134224481.355:134732): avc: denied { module_request } for pid=16434 comm="syz.3.11390" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6753.946816][ T31] audit: type=1400 audit(134224481.895:134733): avc: denied { create } for pid=16434 comm="syz.3.11390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6754.052038][ T31] audit: type=1400 audit(134224481.995:134734): avc: denied { read } for pid=16434 comm="syz.3.11390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6758.389083][ T31] kauditd_printk_skb: 63 callbacks suppressed [ 6758.389471][ T31] audit: type=1400 audit(134224486.335:134798): avc: denied { create } for pid=16455 comm="syz.2.11395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6758.492214][ T31] audit: type=1400 audit(134224486.435:134799): avc: denied { connect } for pid=16455 comm="syz.2.11395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6758.501503][ T31] audit: type=1400 audit(134224486.445:134800): avc: denied { setopt } for pid=16455 comm="syz.2.11395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6758.526198][ T31] audit: type=1400 audit(134224486.475:134801): avc: denied { setopt } for pid=16455 comm="syz.2.11395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6758.541318][ T31] audit: type=1400 audit(134224486.485:134802): avc: denied { write } for pid=16455 comm="syz.2.11395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6758.552657][ T31] audit: type=1400 audit(134224486.495:134803): avc: denied { write } for pid=16455 comm="syz.2.11395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6758.595755][ T31] audit: type=1400 audit(134224486.535:134804): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6758.598170][ T31] audit: type=1400 audit(134224486.535:134805): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6758.600097][ T31] audit: type=1400 audit(134224486.545:134806): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6758.618453][ T31] audit: type=1400 audit(134224486.555:134807): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6763.406010][ T31] kauditd_printk_skb: 133 callbacks suppressed [ 6763.406226][ T31] audit: type=1400 audit(134224491.355:134941): avc: denied { write } for pid=16522 comm="syz.3.11402" lport=17 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6763.508883][ T31] audit: type=1400 audit(134224491.455:134942): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6763.511248][ T31] audit: type=1400 audit(134224491.455:134943): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6763.531245][ T31] audit: type=1400 audit(134224491.475:134944): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6763.531489][ T31] audit: type=1400 audit(134224491.475:134945): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6763.589558][ T31] audit: type=1400 audit(134224491.535:134946): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6763.723835][ T31] audit: type=1400 audit(134224491.655:134947): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6763.724105][ T31] audit: type=1400 audit(134224491.655:134948): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6763.763668][ T31] audit: type=1400 audit(134224491.695:134949): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6763.763941][ T31] audit: type=1400 audit(134224491.705:134950): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6765.581021][T16535] netlink: 'syz.3.11404': attribute type 10 has an invalid length. [ 6765.588362][T16535] netlink: 40 bytes leftover after parsing attributes in process `syz.3.11404'. [ 6765.589817][T16535] vxcan0: entered promiscuous mode [ 6765.590397][T16535] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 6768.417596][ T31] kauditd_printk_skb: 127 callbacks suppressed [ 6768.417832][ T31] audit: type=1400 audit(134224496.365:135078): avc: denied { create } for pid=16552 comm="syz.3.11413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6768.428183][ T31] audit: type=1400 audit(134224496.375:135079): avc: denied { connect } for pid=16552 comm="syz.3.11413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6768.438861][ T31] audit: type=1400 audit(134224496.385:135080): avc: denied { setopt } for pid=16552 comm="syz.3.11413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6768.558308][ T31] audit: type=1400 audit(134224496.505:135081): avc: denied { bind } for pid=16552 comm="syz.3.11413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6768.617804][ T31] audit: type=1400 audit(134224496.565:135082): avc: denied { write } for pid=16552 comm="syz.3.11413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6768.696784][ T31] audit: type=1400 audit(134224496.645:135083): avc: denied { write } for pid=16552 comm="syz.3.11413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6768.712253][ T31] audit: type=1400 audit(134224496.655:135084): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6768.712486][ T31] audit: type=1400 audit(134224496.655:135085): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6768.733531][ T31] audit: type=1400 audit(134224496.665:135086): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6768.733772][ T31] audit: type=1400 audit(134224496.665:135087): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6773.478922][ T31] kauditd_printk_skb: 226 callbacks suppressed [ 6773.479518][ T31] audit: type=1400 audit(134224501.425:135314): avc: denied { create } for pid=16582 comm="syz.3.11427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6773.539653][ T31] audit: type=1400 audit(134224501.485:135315): avc: denied { create } for pid=16582 comm="syz.3.11427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6773.560645][ T31] audit: type=1400 audit(134224501.505:135316): avc: denied { write } for pid=16582 comm="syz.3.11427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6773.596958][ T31] audit: type=1400 audit(134224501.545:135317): avc: denied { module_request } for pid=16582 comm="syz.3.11427" kmod="net-pf-16-proto-16-family-TIPC" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6774.003597][ T31] audit: type=1400 audit(134224501.945:135318): avc: denied { write } for pid=16582 comm="syz.3.11427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6774.220727][ T31] audit: type=1400 audit(134224502.165:135319): avc: denied { read } for pid=16582 comm="syz.3.11427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6774.265490][ T31] audit: type=1400 audit(134224502.195:135320): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6774.266743][ T31] audit: type=1400 audit(134224502.205:135321): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6774.266916][ T31] audit: type=1400 audit(134224502.205:135322): avc: denied { prog_load } for pid=16585 comm="syz.2.11428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6774.267035][ T31] audit: type=1400 audit(134224502.205:135323): avc: denied { bpf } for pid=16585 comm="syz.2.11428" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6778.517940][ T31] kauditd_printk_skb: 117 callbacks suppressed [ 6778.518967][ T31] audit: type=1400 audit(134224506.455:135441): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6778.519263][ T31] audit: type=1400 audit(134224506.455:135442): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6778.519486][ T31] audit: type=1400 audit(134224506.455:135443): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6778.519706][ T31] audit: type=1400 audit(134224506.465:135444): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6778.565677][ T31] audit: type=1400 audit(134224506.475:135445): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6778.568290][ T31] audit: type=1400 audit(134224506.485:135446): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6778.716336][ T31] audit: type=1400 audit(134224506.645:135447): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6778.718265][ T31] audit: type=1400 audit(134224506.665:135448): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6778.969231][ T31] audit: type=1400 audit(134224506.915:135449): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6778.970275][ T31] audit: type=1400 audit(134224506.915:135450): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6782.899188][T16634] netlink: 'syz.2.11442': attribute type 10 has an invalid length. [ 6783.689782][ T31] kauditd_printk_skb: 143 callbacks suppressed [ 6783.690368][ T31] audit: type=1400 audit(134224511.635:135594): avc: denied { create } for pid=16637 comm="syz.2.11445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 6783.700159][ T31] audit: type=1400 audit(134224511.645:135595): avc: denied { prog_load } for pid=16637 comm="syz.2.11445" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6783.705171][ T31] audit: type=1400 audit(134224511.655:135596): avc: denied { bpf } for pid=16637 comm="syz.2.11445" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6783.716251][ T31] audit: type=1400 audit(134224511.665:135597): avc: denied { perfmon } for pid=16637 comm="syz.2.11445" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6783.725933][ T31] audit: type=1400 audit(134224511.675:135598): avc: denied { perfmon } for pid=16637 comm="syz.2.11445" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6783.734457][ T31] audit: type=1400 audit(134224511.675:135599): avc: denied { perfmon } for pid=16637 comm="syz.2.11445" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6783.737419][ T31] audit: type=1400 audit(134224511.685:135600): avc: denied { perfmon } for pid=16637 comm="syz.2.11445" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6783.745489][ T31] audit: type=1400 audit(134224511.695:135601): avc: denied { bpf } for pid=16637 comm="syz.2.11445" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6783.756266][ T31] audit: type=1400 audit(134224511.705:135602): avc: denied { bpf } for pid=16637 comm="syz.2.11445" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6783.759244][ T31] audit: type=1400 audit(134224511.705:135603): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6788.824553][ T31] kauditd_printk_skb: 155 callbacks suppressed [ 6788.824945][ T31] audit: type=1400 audit(134224516.775:135759): avc: denied { create } for pid=16660 comm="syz.2.11455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6788.986541][ T31] audit: type=1400 audit(134224516.935:135760): avc: denied { create } for pid=16660 comm="syz.2.11455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 6788.991301][ T31] audit: type=1400 audit(134224516.935:135761): avc: denied { create } for pid=16660 comm="syz.2.11455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6789.032205][ T31] audit: type=1400 audit(134224516.975:135762): avc: denied { create } for pid=16660 comm="syz.2.11455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6789.032488][ T31] audit: type=1400 audit(134224516.975:135763): avc: denied { write } for pid=16660 comm="syz.2.11455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6789.032623][ T31] audit: type=1400 audit(134224516.975:135764): avc: denied { read } for pid=16660 comm="syz.2.11455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6789.032693][ T31] audit: type=1400 audit(134224516.975:135765): avc: denied { read } for pid=16660 comm="syz.2.11455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6789.038909][ T31] audit: type=1400 audit(134224516.985:135766): avc: denied { write } for pid=16660 comm="syz.2.11455" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6789.093652][ T31] audit: type=1400 audit(134224517.035:135767): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6789.102197][ T31] audit: type=1400 audit(134224517.045:135768): avc: denied { recv } for pid=12670 comm="syz.2.10378" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6793.913681][ T31] kauditd_printk_skb: 167 callbacks suppressed [ 6793.914097][ T31] audit: type=1400 audit(134224521.855:135936): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6793.930959][ T31] audit: type=1400 audit(134224521.875:135937): avc: denied { recv } for pid=15095 comm="syz-executor" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6793.980379][ T31] audit: type=1400 audit(134224521.925:135938): avc: denied { recv } for pid=15095 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6793.981519][ T31] audit: type=1400 audit(134224521.925:135939): avc: denied { recv } for pid=15095 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6793.982382][ T31] audit: type=1400 audit(134224521.925:135940): avc: denied { recv } for pid=15095 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6793.988879][ T31] audit: type=1400 audit(134224521.935:135941): avc: denied { recv } for pid=2819 comm="pr/ttyAMA0" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6793.989111][ T31] audit: type=1400 audit(134224521.935:135942): avc: denied { recv } for pid=2819 comm="pr/ttyAMA0" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6794.005664][ T31] audit: type=1400 audit(134224521.955:135943): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6794.010551][ T31] audit: type=1400 audit(134224521.955:135944): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6794.059253][ T31] audit: type=1400 audit(134224522.005:135945): avc: denied { create } for pid=16695 comm="syz.3.11472" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 6795.962146][T16722] FAULT_INJECTION: forcing a failure. [ 6795.962146][T16722] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 6795.963645][T16722] CPU: 0 UID: 0 PID: 16722 Comm: syz.2.11482 Not tainted 6.15.0-syzkaller #0 PREEMPT [ 6795.963713][T16722] Hardware name: ARM-Versatile Express [ 6795.963729][T16722] Call trace: [ 6795.963750][T16722] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 6795.963812][T16722] r7:76b15e1c r6:00000000 r5:60000013 r4:82259134 [ 6795.963822][T16722] [<80201ac8>] (show_stack) from [<80220544>] (dump_stack_lvl+0x70/0x7c) [ 6795.963849][T16722] [<802204d4>] (dump_stack_lvl) from [<80220568>] (dump_stack+0x18/0x1c) [ 6795.963875][T16722] r5:840c8000 r4:82950950 [ 6795.963883][T16722] [<80220550>] (dump_stack) from [<80960c28>] (should_fail_ex+0x1c4/0x228) [ 6795.963912][T16722] [<80960a64>] (should_fail_ex) from [<80960ca0>] (should_fail+0x14/0x18) [ 6795.963942][T16722] r8:84862181 r7:76b15e1c r6:dfb71ee4 r5:0000000c r4:0000000c [ 6795.963950][T16722] [<80960c8c>] (should_fail) from [<80960cc0>] (should_fail_usercopy+0x1c/0x20) [ 6795.963974][T16722] [<80960ca4>] (should_fail_usercopy) from [<8151e4f4>] (move_addr_to_kernel+0x34/0xf8) [ 6795.964003][T16722] [<8151e4c0>] (move_addr_to_kernel) from [<8151fa4c>] (__sys_sendto+0xd0/0x160) [ 6795.964030][T16722] r7:76b15e1c r6:8368bb80 r5:00000000 r4:00000000 [ 6795.964039][T16722] [<8151f97c>] (__sys_sendto) from [<8151faf8>] (sys_sendto+0x1c/0x24) [ 6795.964069][T16722] r9:840c8000 r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76b15e1c [ 6795.964078][T16722] [<8151fadc>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6795.964102][T16722] Exception stack(0xdfb71fa8 to 0xdfb71ff0) [ 6795.964121][T16722] 1fa0: 76b15e1c 0000000c 00000003 76b15eb0 00000020 00000000 [ 6795.964138][T16722] 1fc0: 76b15e1c 0000000c 00000000 00000122 00000003 00000000 76b15eb0 76b170bc [ 6795.964151][T16722] 1fe0: 00000000 76b15df0 000d7d68 001343c8 [ 6798.337527][T16756] fuse: Unknown parameter './file0' [ 6798.993496][ T31] kauditd_printk_skb: 370 callbacks suppressed [ 6798.994133][ T31] audit: type=1400 audit(134224526.935:136314): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6798.999377][ T31] audit: type=1400 audit(134224526.945:136315): avc: denied { recv } for pid=11890 comm="syz-executor" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6799.040965][ T31] audit: type=1400 audit(134224526.985:136316): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6799.051395][ T31] audit: type=1400 audit(134224526.985:136317): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6799.051681][ T31] audit: type=1400 audit(134224526.985:136318): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6799.051829][ T31] audit: type=1400 audit(134224526.995:136319): avc: denied { recv } for pid=16759 comm="syz.3.11500" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6799.051955][ T31] audit: type=1400 audit(134224526.995:136320): avc: denied { recv } for pid=16759 comm="syz.3.11500" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6799.057467][ T31] audit: type=1400 audit(134224527.005:136321): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6799.057672][ T31] audit: type=1400 audit(134224527.005:136322): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6799.062587][ T31] audit: type=1400 audit(134224527.005:136323): avc: denied { write } for pid=16759 comm="syz.3.11500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 6800.778134][T16778] fuse: Bad value for 'group_id' [ 6800.778802][T16778] fuse: Bad value for 'group_id' [ 6801.098663][T16781] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63011 sclass=netlink_route_socket pid=16781 comm=syz.3.11507 [ 6801.755718][T16789] FAULT_INJECTION: forcing a failure. [ 6801.755718][T16789] name failslab, interval 1, probability 0, space 0, times 0 [ 6801.756585][T16789] CPU: 0 UID: 0 PID: 16789 Comm: syz.2.11512 Not tainted 6.15.0-syzkaller #0 PREEMPT [ 6801.756663][T16789] Hardware name: ARM-Versatile Express [ 6801.756678][T16789] Call trace: [ 6801.756699][T16789] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 6801.756803][T16789] r7:00000d40 r6:00000000 r5:60000013 r4:82259134 [ 6801.756814][T16789] [<80201ac8>] (show_stack) from [<80220544>] (dump_stack_lvl+0x70/0x7c) [ 6801.756841][T16789] [<802204d4>] (dump_stack_lvl) from [<80220568>] (dump_stack+0x18/0x1c) [ 6801.756868][T16789] r5:832f3000 r4:82919e80 [ 6801.756876][T16789] [<80220550>] (dump_stack) from [<80960c28>] (should_fail_ex+0x1c4/0x228) [ 6801.756905][T16789] [<80960a64>] (should_fail_ex) from [<8051f1a4>] (should_failslab+0x6c/0x94) [ 6801.756938][T16789] r8:832f3000 r7:00000d40 r6:88c96f28 r5:0000001a r4:83001240 [ 6801.756947][T16789] [<8051f138>] (should_failslab) from [<80503f9c>] (__kmalloc_noprof+0x9c/0x458) [ 6801.756972][T16789] [<80503f00>] (__kmalloc_noprof) from [<807b6d7c>] (tomoyo_encode2+0x64/0xf0) [ 6801.757006][T16789] r10:00000fff r9:8309fc00 r8:00000000 r7:8367dee0 r6:88c96f28 r5:858daffd [ 6801.757015][T16789] r4:858dafee [ 6801.757023][T16789] [<807b6d18>] (tomoyo_encode2) from [<807b6e2c>] (tomoyo_encode+0x24/0x30) [ 6801.757054][T16789] r9:8309fc00 r8:00000000 r7:8367dee0 r6:88c96f28 r5:00001000 r4:858dafef [ 6801.757062][T16789] [<807b6e08>] (tomoyo_encode) from [<807b6eb8>] (tomoyo_realpath_from_path+0x80/0x17c) [ 6801.757089][T16789] r5:00001000 r4:858da000 [ 6801.757096][T16789] [<807b6e38>] (tomoyo_realpath_from_path) from [<807b2fb8>] (tomoyo_path_number_perm+0xcc/0x22c) [ 6801.757128][T16789] r10:832f3000 r9:00000000 r8:00000004 r7:00008901 r6:00000004 r5:81cd5844 [ 6801.757139][T16789] r4:88c96f28 r3:826c0240 [ 6801.757146][T16789] [<807b2eec>] (tomoyo_path_number_perm) from [<807b7898>] (tomoyo_file_ioctl+0x1c/0x20) [ 6801.757178][T16789] r9:88c96f00 r8:00000004 r7:20002900 r6:20002900 r5:00008901 r4:88c96f00 [ 6801.757186][T16789] [<807b787c>] (tomoyo_file_ioctl) from [<807652bc>] (security_file_ioctl+0x64/0x1e4) [ 6801.757214][T16789] [<80765258>] (security_file_ioctl) from [<805650b4>] (sys_ioctl+0x4c/0xdc8) [ 6801.757243][T16789] r7:20002900 r6:88c96f01 r5:00000000 r4:00008901 [ 6801.757251][T16789] [<80565068>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6801.757273][T16789] Exception stack(0xdff61fa8 to 0xdff61ff0) [ 6801.757291][T16789] 1fa0: 00000000 00000000 00000004 00008901 20002900 00000000 [ 6801.757308][T16789] 1fc0: 00000000 00000000 0012fee0 00000036 002d0000 00000000 00006364 76b170bc [ 6801.757321][T16789] 1fe0: 76b16ec0 76b16eb0 0001939c 00131f30 [ 6801.757337][T16789] r10:00000036 r9:832f3000 r8:8020029c r7:00000036 r6:0012fee0 r5:00000000 [ 6801.757347][T16789] r4:00000000 [ 6801.765805][T16789] ERROR: Out of memory at tomoyo_realpath_from_path. [ 6801.975143][T16791] fuse: Bad value for 'group_id' [ 6801.975357][T16791] fuse: Bad value for 'group_id' [ 6802.432350][T16795] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16795 comm=syz.2.11515 [ 6802.457874][T16795] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=22 sclass=netlink_audit_socket pid=16795 comm=syz.2.11515 [ 6804.142263][ T31] kauditd_printk_skb: 217 callbacks suppressed [ 6804.142573][ T31] audit: type=1400 audit(134224532.085:136541): avc: denied { read } for pid=16796 comm="syz.2.11520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6804.147186][ T31] audit: type=1400 audit(134224532.095:136542): avc: denied { create } for pid=16796 comm="syz.2.11520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6804.151537][ T31] audit: type=1400 audit(134224532.095:136543): avc: denied { ioctl } for pid=16796 comm="syz.2.11520" path="socket:[125279]" dev="sockfs" ino=125279 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6804.155724][ T31] audit: type=1400 audit(134224532.105:136544): avc: denied { prog_load } for pid=16796 comm="syz.2.11520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6804.158169][ T31] audit: type=1400 audit(134224532.105:136545): avc: denied { bpf } for pid=16796 comm="syz.2.11520" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6804.162347][ T31] audit: type=1400 audit(134224532.105:136546): avc: denied { perfmon } for pid=16796 comm="syz.2.11520" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6804.165323][ T31] audit: type=1400 audit(134224532.115:136547): avc: denied { perfmon } for pid=16796 comm="syz.2.11520" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6804.167544][ T31] audit: type=1400 audit(134224532.115:136548): avc: denied { perfmon } for pid=16796 comm="syz.2.11520" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6804.170422][ T31] audit: type=1400 audit(134224532.115:136549): avc: denied { perfmon } for pid=16796 comm="syz.2.11520" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6804.172680][ T31] audit: type=1400 audit(134224532.115:136550): avc: denied { bpf } for pid=16796 comm="syz.2.11520" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6806.198157][T16805] fuse: Bad value for 'group_id' [ 6806.198353][T16805] fuse: Bad value for 'group_id' [ 6808.260008][T16812] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=63011 sclass=netlink_route_socket pid=16812 comm=syz.3.11521 [ 6810.005876][ T31] kauditd_printk_skb: 69 callbacks suppressed [ 6810.006218][ T31] audit: type=1400 audit(134224537.955:136620): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6810.009725][ T31] audit: type=1400 audit(134224537.955:136621): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6810.032832][ T31] audit: type=1400 audit(134224537.975:136622): avc: denied { recv } for pid=15095 comm="syz-executor" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6810.040522][ T31] audit: type=1400 audit(134224537.985:136623): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6810.044698][ T31] audit: type=1400 audit(134224537.995:136624): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6810.069973][ T31] audit: type=1400 audit(134224538.015:136625): avc: denied { recv } for pid=15095 comm="syz-executor" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6810.070331][ T31] audit: type=1400 audit(134224538.015:136626): avc: denied { recv } for pid=15095 comm="syz-executor" saddr=10.0.2.2 src=48098 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6810.085110][ T31] audit: type=1400 audit(134224538.035:136627): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6810.088992][ T31] audit: type=1400 audit(134224538.035:136628): avc: denied { recv } for pid=3092 comm="sshd-session" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6810.107684][ T31] audit: type=1400 audit(134224538.055:136629): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6815.026103][ T31] kauditd_printk_skb: 139 callbacks suppressed [ 6815.026290][ T31] audit: type=1400 audit(134224542.975:136769): avc: denied { sys_module } for pid=16847 comm="syz.3.11530" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6815.026439][ T31] audit: type=1400 audit(134224542.975:136770): avc: denied { module_request } for pid=16847 comm="syz.3.11530" kmod="netdevsim0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6815.040032][ T31] audit: type=1400 audit(134224542.985:136771): avc: denied { prog_load } for pid=16847 comm="syz.3.11530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6815.063537][ T31] audit: type=1400 audit(134224543.005:136772): avc: denied { bpf } for pid=16847 comm="syz.3.11530" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6815.063884][ T31] audit: type=1400 audit(134224543.005:136773): avc: denied { perfmon } for pid=16847 comm="syz.3.11530" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6815.113372][ T31] audit: type=1400 audit(134224543.055:136774): avc: denied { perfmon } for pid=16847 comm="syz.3.11530" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6815.143463][ T31] audit: type=1400 audit(134224543.085:136775): avc: denied { perfmon } for pid=16847 comm="syz.3.11530" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6815.156139][ T31] audit: type=1400 audit(134224543.105:136776): avc: denied { read write } for pid=16838 comm="syz-executor" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6815.159400][ T31] audit: type=1400 audit(134224543.105:136777): avc: denied { read write open } for pid=16838 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6815.176756][ T31] audit: type=1400 audit(134224543.125:136778): avc: denied { ioctl } for pid=16838 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6820.237744][ T31] kauditd_printk_skb: 68 callbacks suppressed [ 6820.237922][ T31] audit: type=1400 audit(134224548.185:136847): avc: denied { module_request } for pid=16838 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6820.344898][ T31] audit: type=1400 audit(134224548.295:136848): avc: denied { create } for pid=16982 comm="syz.3.11533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6820.348552][ T31] audit: type=1400 audit(134224548.295:136849): avc: denied { connect } for pid=16982 comm="syz.3.11533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6820.351094][ T31] audit: type=1400 audit(134224548.295:136850): avc: denied { setopt } for pid=16982 comm="syz.3.11533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6820.355315][ T31] audit: type=1400 audit(134224548.305:136851): avc: denied { setopt } for pid=16982 comm="syz.3.11533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6820.365446][ T31] audit: type=1400 audit(134224548.315:136852): avc: denied { bind } for pid=16982 comm="syz.3.11533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6820.368024][ T31] audit: type=1400 audit(134224548.315:136853): avc: denied { write } for pid=16982 comm="syz.3.11533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6820.371138][ T31] audit: type=1400 audit(134224548.315:136854): avc: denied { write } for pid=16982 comm="syz.3.11533" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 6820.380276][ T31] audit: type=1400 audit(134224548.325:136855): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=41322 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6820.382405][ T31] audit: type=1400 audit(134224548.325:136856): avc: denied { recv } for pid=3093 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=41322 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6821.739299][T16838] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6821.783691][T16838] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6823.010915][T15099] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6823.104935][T15099] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6823.235494][T15099] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6823.309265][T15099] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6823.681044][T15099] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6823.694805][T15099] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6823.708170][T15099] bond0 (unregistering): Released all slaves [ 6823.833846][T15099] hsr_slave_0: left promiscuous mode [ 6823.835130][T15099] hsr_slave_1: left promiscuous mode [ 6823.838659][T15099] veth1_macvtap: left promiscuous mode [ 6823.838848][T15099] veth0_macvtap: left promiscuous mode [ 6823.839096][T15099] veth1_vlan: left promiscuous mode [ 6823.839221][T15099] veth0_vlan: left promiscuous mode [ 6823.903632][T19809] SELinux: failure in sel_netif_sid_slow(), invalid network interface (32) [ 6823.904083][T19809] SELinux: failure in sel_netif_sid_slow(), invalid network interface (34) [ 6824.411070][T15099] 8<--- cut here --- [ 6824.411420][T15099] Unable to handle kernel paging request at virtual address 6c5f6674 when read [ 6824.411672][T15099] [6c5f6674] *pgd=80000080005003, *pmd=00000000 [ 6824.412636][T15099] Internal error: Oops: 206 [#1] SMP ARM [ 6824.413464][T15099] Modules linked in: [ 6824.414024][T15099] CPU: 1 UID: 0 PID: 15099 Comm: kworker/u8:0 Not tainted 6.15.0-syzkaller #0 PREEMPT [ 6824.415281][T15099] Hardware name: ARM-Versatile Express [ 6824.416053][T15099] Workqueue: netns cleanup_net [ 6824.416414][T15099] PC is at rb_erase+0x270/0x394 [ 6824.416670][T15099] LR is at 0x0 [ 6824.417394][T15099] pc : [<81a442c0>] lr : [<00000000>] psr: 20010013 [ 6824.417694][T15099] sp : dfe09d80 ip : 6c5f666c fp : dfe09d94 [ 6824.418042][T15099] r10: 850f1b00 r9 : 829d1204 r8 : 00000004 [ 6824.418311][T15099] r7 : 8619b000 r6 : 00000001 r5 : 8619bc48 r4 : 8619bc00 [ 6824.418607][T15099] r3 : 6c5f666e r2 : 00000000 r1 : 8619b034 r0 : 8619bc68 [ 6824.419022][T15099] Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 6824.419398][T15099] Control: 30c5387d Table: 846cb440 DAC: 00000000 [ 6824.419718][T15099] Register r0 information: slab kmalloc-128 start 8619bc00 pointer offset 104 size 128 [ 6824.420862][T15099] Register r1 information: slab kmalloc-128 start 8619b000 pointer offset 52 size 128 [ 6824.421366][T15099] Register r2 information: NULL pointer [ 6824.421856][T15099] Register r3 information: non-paged memory [ 6824.422203][T15099] Register r4 information: slab kmalloc-128 start 8619bc00 pointer offset 0 size 128 [ 6824.422723][T15099] Register r5 information: slab kmalloc-128 start 8619bc00 pointer offset 72 size 128 [ 6824.423476][T15099] Register r6 information: non-paged memory [ 6824.423812][T15099] Register r7 information: slab kmalloc-128 start 8619b000 pointer offset 0 size 128 [ 6824.424289][T15099] Register r8 information: non-paged memory [ 6824.424552][T15099] Register r9 information: non-slab/vmalloc memory [ 6824.424961][T15099] Register r10 information: slab net_namespace start 850f1b00 pointer offset 0 size 3456 [ 6824.425493][T15099] Register r11 information: 2-page vmalloc region starting at 0xdfe08000 allocated at kernel_clone+0xac/0x3e4 [ 6824.426094][T15099] Register r12 information: non-paged memory [ 6824.426435][T15099] Process kworker/u8:0 (pid: 15099, stack limit = 0xdfe08000) [ 6824.426826][T15099] Stack: (0xdfe09d80 to 0xdfe0a000) [ 6824.427228][T15099] 9d80: 8619bc00 8619bc48 dfe09dd4 dfe09d98 8060b7c4 81a4405c 0000000c 60010013 [ 6824.427556][T15099] 9da0: ddde099c 60010013 00000000 e61b2138 848f6e00 8543bc00 848f6e00 00000001 [ 6824.427884][T15099] 9dc0: 8619bc00 0000000b dfe09e14 dfe09dd8 8060b7f8 8060b700 20010013 830e73c0 [ 6824.428369][T15099] 9de0: 000094b8 82ac9268 848f6e00 e61b2138 dfe09e14 8543bc00 848f6e00 829dddfc [ 6824.429023][T15099] 9e00: dfe09e90 829d1204 dfe09e2c dfe09e18 8060b8c8 8060b700 85204380 848f6e00 [ 6824.429386][T15099] 9e20: dfe09e3c dfe09e30 81985104 8060b8ac dfe09e54 dfe09e40 816701d8 81985100 [ 6824.429742][T15099] 9e40: 85204380 dfe09e90 dfe09e74 dfe09e58 8153dee4 816701c8 829dddfc 82c1e7c0 [ 6824.430117][T15099] 9e60: 829d11c0 dfe09e90 dfe09ed4 dfe09e78 81540370 8153deb0 81a6048c 80294814 [ 6824.430466][T15099] 9e80: 82c1e7c0 829d11c0 808cb0c0 8153df0c 852043a0 852043a0 00000100 00000122 [ 6824.430829][T15099] 9ea0: 00000000 e61b2138 81c01f84 85152280 829d11d8 8301bc00 8300e600 832e8c00 [ 6824.431190][T15099] 9ec0: 8301bc15 8300f070 dfe09f2c dfe09ed8 8027eb9c 815400cc 81c01a40 832e8c00 [ 6824.431542][T15099] 9ee0: dfe09f14 dfe09ef0 829d11dc 829d11d8 829d11dc 829d11d8 dfe09f2c 00000000 [ 6824.431926][T15099] 9f00: 8027a4d8 85152280 8300e620 8300e600 82804d40 851522ac 832e8c00 61c88647 [ 6824.432304][T15099] 9f20: dfe09f6c dfe09f30 8027f7e4 8027e9f4 81a6048c 80294814 dfe09f6c dfe09f48 [ 6824.432684][T15099] 9f40: 8028632c 00000001 832e8c00 85122180 ed3a1e60 8027f5e8 85152280 00000000 [ 6824.433206][T15099] 9f60: dfe09fac dfe09f70 80286810 8027f5f4 8026c664 81a60414 832e8c00 e61b2138 [ 6824.433804][T15099] 9f80: dfe09fac 84828440 802866e4 00000000 00000000 00000000 00000000 00000000 [ 6824.434164][T15099] 9fa0: 00000000 dfe09fb0 80200114 802866f0 00000000 00000000 00000000 00000000 [ 6824.434506][T15099] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 6824.434881][T15099] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 00000000 00000000 [ 6824.435310][T15099] Call trace: [ 6824.435545][T15099] [<81a44050>] (rb_erase) from [<8060b7c4>] (drop_sysctl_table+0xd0/0x1ac) [ 6824.435920][T15099] r5:8619bc48 r4:8619bc00 [ 6824.436127][T15099] [<8060b6f4>] (drop_sysctl_table) from [<8060b7f8>] (drop_sysctl_table+0x104/0x1ac) [ 6824.436444][T15099] r8:0000000b r7:8619bc00 r6:00000001 r5:848f6e00 r4:8543bc00 [ 6824.436791][T15099] [<8060b6f4>] (drop_sysctl_table) from [<8060b8c8>] (unregister_sysctl_table+0x28/0x38) [ 6824.437292][T15099] r8:829d1204 r7:dfe09e90 r6:829dddfc r5:848f6e00 r4:8543bc00 [ 6824.437632][T15099] [<8060b8a0>] (unregister_sysctl_table) from [<81985104>] (unregister_net_sysctl_table+0x10/0x14) [ 6824.438104][T15099] r5:848f6e00 r4:85204380 [ 6824.438313][T15099] [<819850f4>] (unregister_net_sysctl_table) from [<816701d8>] (nf_log_net_exit+0x1c/0x5c) [ 6824.438715][T15099] [<816701bc>] (nf_log_net_exit) from [<8153dee4>] (ops_exit_list+0x40/0x68) [ 6824.439221][T15099] r5:dfe09e90 r4:85204380 [ 6824.439557][T15099] [<8153dea4>] (ops_exit_list) from [<81540370>] (cleanup_net+0x2b0/0x49c) [ 6824.440018][T15099] r7:dfe09e90 r6:829d11c0 r5:82c1e7c0 r4:829dddfc [ 6824.440285][T15099] [<815400c0>] (cleanup_net) from [<8027eb9c>] (process_one_work+0x1b4/0x4f4) [ 6824.440664][T15099] r10:8300f070 r9:8301bc15 r8:832e8c00 r7:8300e600 r6:8301bc00 r5:829d11d8 [ 6824.441016][T15099] r4:85152280 [ 6824.441196][T15099] [<8027e9e8>] (process_one_work) from [<8027f7e4>] (worker_thread+0x1fc/0x3d8) [ 6824.441578][T15099] r10:61c88647 r9:832e8c00 r8:851522ac r7:82804d40 r6:8300e600 r5:8300e620 [ 6824.441907][T15099] r4:85152280 [ 6824.442098][T15099] [<8027f5e8>] (worker_thread) from [<80286810>] (kthread+0x12c/0x280) [ 6824.442463][T15099] r10:00000000 r9:85152280 r8:8027f5e8 r7:ed3a1e60 r6:85122180 r5:832e8c00 [ 6824.442786][T15099] r4:00000001 [ 6824.442964][T15099] [<802866e4>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 6824.443573][T15099] Exception stack(0xdfe09fb0 to 0xdfe09ff8) [ 6824.443837][T15099] 9fa0: 00000000 00000000 00000000 00000000 [ 6824.444233][T15099] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 6824.444576][T15099] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 6824.444906][T15099] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802866e4 [ 6824.445237][T15099] r4:84828440 [ 6824.445614][T15099] Code: e5903000 e3530003 9a00001b e3c3c003 (e59c2008) [ 6824.447093][T15099] ---[ end trace 0000000000000000 ]--- [ 6824.447929][T15099] Kernel panic - not syncing: Fatal exception [ 6824.449712][T15099] Rebooting in 86400 seconds.. VM DIAGNOSIS: 14:58:23 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=60000113 R02=82ad2f08 R03=84bd1800 R04=82ad3f08 R05=00000000 R06=0000004e R07=0000024f R08=82ad3f0c R09=80780fdc R10=82ad3f10 R11=df801814 R12=df801800 R13=df801808 R14=81a600d0 R15=81a6045c PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=fffc0f90 s05=fffc0f90 d02=fffc0f90fffc0f90 s06=08040201 s07=00000000 d03=0000000008040201 s08=c0300c00 s09=c0300c03 d04=c0300c03c0300c00 s10=08040201 s11=80402010 d05=8040201008040201 s12=08040201 s13=80402010 d06=8040201008040201 s14=00000008 s15=00000000 d07=0000000000000008 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=841ef840 R01=00000065 R02=eb40d000 R03=00000000 R04=840af032 R05=841ef840 R06=80a6427c R07=840af03b R08=82828408 R09=00000000 R10=00006bc2 R11=dfe0994c R12=00000002 R13=dfe09940 R14=8295a534 R15=80a642d4 PSR=80010193 N--- A S svc32 s00=73726556 s01=6c697461 d00=6c69746173726556 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=63538263 s11=37010135 d05=3701013563538263 s12=0379010e s13=1a0f0c06 d06=1a0f0c060379010e s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 80000010