last executing test programs: 53m18.089346689s ago: executing program 0 (id=996): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800004e9d00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000840)={'dummy0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c}}]}, 0x4c}}, 0x22040004) 53m17.87978757s ago: executing program 0 (id=997): r0 = io_uring_setup(0x497f, &(0x7f00000001c0)={0x0, 0x2000, 0x0, 0x0, 0xfffffffe}) r1 = inotify_init1(0x80800) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4) r2 = syz_open_dev$admmidi(&(0x7f0000000140), 0x20, 0x0) syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x80383, 0x0) read$midi(r2, &(0x7f0000000240)=""/160, 0xa0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xd) close_range(r0, 0xffffffffffffffff, 0x0) 53m17.122250583s ago: executing program 0 (id=998): bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'wg0\x00'}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x82000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socket(0x10, 0x5, 0xffffffff) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = dup(r6) write$UHID_INPUT(r7, &(0x7f0000001040)={0xc, {"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", 0x1000}}, 0x1006) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000e80)={0xffffffffffffffff, &(0x7f0000000d40), 0x0}, 0x20) 53m0.553235068s ago: executing program 0 (id=1006): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r1}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 53m0.183020949s ago: executing program 0 (id=1007): r0 = io_uring_setup(0x497f, &(0x7f00000001c0)={0x0, 0x2000, 0x0, 0x0, 0xfffffffe}) r1 = inotify_init1(0x80800) inotify_add_watch(r1, &(0x7f0000000180)='./file0\x00', 0x4) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x80383, 0x0) read$midi(0xffffffffffffffff, &(0x7f0000000240)=""/160, 0xa0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xd) close_range(r0, 0xffffffffffffffff, 0x0) 52m59.983557091s ago: executing program 0 (id=1008): socket(0x10, 0x803, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='net/if_inet6\x00') pread64(r3, &(0x7f0000000180)=""/74, 0x4a, 0x4000000003c) 52m14.758291479s ago: executing program 32 (id=1008): socket(0x10, 0x803, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000440)='net/if_inet6\x00') pread64(r3, &(0x7f0000000180)=""/74, 0x4a, 0x4000000003c) 52m6.32651141s ago: executing program 2 (id=1022): r0 = io_uring_setup(0x497f, &(0x7f00000001c0)={0x0, 0x2000, 0x0, 0x0, 0xfffffffe}) inotify_init1(0x80800) r1 = syz_open_dev$admmidi(&(0x7f0000000140), 0x20, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x80383, 0x0) read$midi(r1, &(0x7f0000000240)=""/160, 0xa0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xd) close_range(r0, 0xffffffffffffffff, 0x0) 52m5.45338886s ago: executing program 2 (id=1023): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xe, &(0x7f0000005640)=0x1, 0x4) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xf, 0x4, &(0x7f0000001300)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x1, 0x6}, 0x1c) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r1, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) lremovexattr(0x0, &(0x7f0000000080)=@known='system.advise\x00') setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, 0x0, 0x310) setsockopt$inet6_group_source_req(r1, 0x29, 0x2c, &(0x7f0000000040)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) fchdir(r2) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/profiling', 0xe41, 0x0) mount(&(0x7f0000000000), &(0x7f0000000280)='./cgroup\x00', 0x0, 0x75809, 0x0) mount(0x0, &(0x7f0000000140)='./cgroup\x00', 0x0, 0x21a8f5, 0x0) 52m4.862353883s ago: executing program 2 (id=1024): r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = dup2(r0, r0) sendmmsg$unix(r1, &(0x7f0000001e80)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="12f8a2b2236d539f42b67e083fcd9b5de2cb490c038d25210290c4cc3afacede0f7d823ef5968c9a", 0x28}], 0x1}}], 0x1, 0x0) 52m4.402615649s ago: executing program 2 (id=1025): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) 52m4.262152917s ago: executing program 2 (id=1027): r0 = io_uring_setup(0x497f, &(0x7f00000001c0)={0x0, 0x2000, 0x0, 0x0, 0xfffffffe}) r1 = syz_open_dev$admmidi(&(0x7f0000000140), 0x20, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x80383, 0x0) read$midi(r1, &(0x7f0000000240)=""/160, 0xa0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xd) close_range(r0, 0xffffffffffffffff, 0x0) 52m3.51353875s ago: executing program 2 (id=1028): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) pipe2$9p(0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r3, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) 51m48.619660469s ago: executing program 1 (id=1029): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0xe6, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) add_key$fscrypt_v1(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) 51m48.42206893s ago: executing program 1 (id=1030): r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x400000001fc, 0x301) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$USBDEVFS_REAPURB(r0, 0x4008550c, &(0x7f0000000180)) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000280)=@urb_type_control={0x2, {}, 0x4, 0x40, &(0x7f0000000000)={0x4b5a9da54893e123, 0x14, 0x8, 0x2}, 0x8, 0x7, 0x200, 0x0, 0x0, 0x20000, 0x0}) 51m48.131105347s ago: executing program 1 (id=1031): bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r3}, &(0x7f0000000040), &(0x7f0000000080)=r4}, 0x20) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r5, 0x0, 0x2e, &(0x7f0000000340)={0x8, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @multicast2}}}, 0x108) r6 = socket(0x2, 0x3, 0xff) bind$inet(r6, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) connect$inet(r6, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) 51m35.163372006s ago: executing program 1 (id=1032): r0 = syz_open_dev$admmidi(&(0x7f0000000140), 0x20, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x80383, 0x0) read$midi(r0, &(0x7f0000000240)=""/160, 0xa0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xd) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) 51m32.593250242s ago: executing program 1 (id=1033): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1600000000000000040000000100000000000000", @ANYBLOB="00ec", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'macsec0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x2000, {0x0, 0x0, 0x74, r3, {0xfffd, 0x10}, {0x1, 0xfff1}, {0xfff2, 0x3}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x30004804}, 0x840) 51m32.203038184s ago: executing program 1 (id=1034): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f0000000040)={0x90000005}) epoll_pwait(r7, &(0x7f0000000100)=[{}], 0x1, 0xfffeffff, 0x0, 0x443c000000000000) epoll_pwait(r7, &(0x7f00000000c0)=[{}], 0x1, 0x101, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='io_uring_create\x00'}, 0x10) io_uring_setup(0x5394, &(0x7f0000005480)={0x0, 0x0, 0x80, 0x0, 0x3bc}) connect$unix(r5, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x7a000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) syz_emit_ethernet(0x75, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000000280)={0x1, 0x4, [0x66c, 0xab6, 0x9fc, 0x2fb]}) 51m18.127959314s ago: executing program 33 (id=1028): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x18) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) pipe2$9p(0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000800)={r3, 0x0, 0x0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x80000000) 50m46.481458392s ago: executing program 34 (id=1034): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r6, &(0x7f00000bd000), 0x318, 0x0) r7 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f0000000040)={0x90000005}) epoll_pwait(r7, &(0x7f0000000100)=[{}], 0x1, 0xfffeffff, 0x0, 0x443c000000000000) epoll_pwait(r7, &(0x7f00000000c0)=[{}], 0x1, 0x101, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='io_uring_create\x00'}, 0x10) io_uring_setup(0x5394, &(0x7f0000005480)={0x0, 0x0, 0x80, 0x0, 0x3bc}) connect$unix(r5, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0x7a000000}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000400"/28], 0x50) syz_emit_ethernet(0x75, &(0x7f0000000300)=ANY=[@ANYBLOB], &(0x7f0000000280)={0x1, 0x4, [0x66c, 0xab6, 0x9fc, 0x2fb]}) 50m14.532474287s ago: executing program 4 (id=1059): bpf$MAP_CREATE(0x0, 0x0, 0x48) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x7, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) add_key$fscrypt_v1(0x0, &(0x7f0000000280)={'fscrypt:', @auto=[0x39, 0x31, 0x39, 0x30, 0x33, 0x0, 0x39, 0x36, 0x5e, 0x32, 0x36, 0x61, 0x36, 0x36, 0x62, 0x31]}, 0x0, 0x0, 0x0) r4 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r4, 0x1, 0x3c, &(0x7f0000000100)={0x0, 0xfffffffb}, 0x8) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0xfffffffd, @local, 0x2}, 0x1c) 49m56.943878716s ago: executing program 4 (id=1062): r0 = io_uring_setup(0x497f, &(0x7f00000001c0)={0x0, 0x2000, 0x0, 0x0, 0xfffffffe}) r1 = syz_open_dev$admmidi(0x0, 0x20, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x80383, 0x0) read$midi(r1, &(0x7f0000000240)=""/160, 0xa0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xd) close_range(r0, 0xffffffffffffffff, 0x0) 49m56.500495581s ago: executing program 4 (id=1063): bpf$PROG_LOAD(0x5, &(0x7f00000010c0)={0x13, 0x13, &(0x7f0000000000)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, @void, @value}, 0x94) socket$inet_tcp(0x2, 0x1, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @empty}, 0x1c) r1 = syz_open_dev$tty1(0xc, 0x4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syslog(0x2, &(0x7f0000000040)=""/36, 0x24) ioctl$TIOCL_SETSEL(r1, 0x541c, &(0x7f0000001900)={0x2, {0xc, 0xa00, 0x0, 0x80, 0x100}}) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x90) 49m53.792718305s ago: executing program 4 (id=1067): r0 = io_uring_setup(0x497f, &(0x7f00000001c0)={0x0, 0x2000, 0x0, 0x0, 0xfffffffe}) r1 = syz_open_dev$admmidi(0x0, 0x20, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x80383, 0x0) read$midi(r1, &(0x7f0000000240)=""/160, 0xa0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xd) close_range(r0, 0xffffffffffffffff, 0x0) 49m53.431030116s ago: executing program 4 (id=1068): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r2}, 0x10) setitimer(0x0, 0x0, 0x0) 49m52.912142515s ago: executing program 4 (id=1069): bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x2000030a, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0xff, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000040000850000008600000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) unshare(0x64000600) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000840), 0x75, r0}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = add_key$keyring(&(0x7f0000000080), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r6, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000000)='id:cb2e') 49m7.812464517s ago: executing program 35 (id=1069): bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x2000030a, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x1, 0xff, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, 0x0, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000000040000850000008600000095000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) unshare(0x64000600) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, 0x0, &(0x7f0000000840), 0x75, r0}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = add_key$keyring(&(0x7f0000000080), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r6, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000000)='id:cb2e') 41m37.233104214s ago: executing program 5 (id=1778): r0 = io_uring_setup(0x479, &(0x7f0000000ac0)={0x0, 0xfffefffe, 0x2, 0x2, 0x4800020}) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000180), 0x42, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006780)={0x90, 0x0, 0x3, {0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, {0x0, 0x2000000000, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x4, 0x2000, 0x7, 0x0, 0x0, 0xf0ee, 0xffffffff}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) open(&(0x7f00000001c0)='./file0/file0\x00', 0x1800, 0x0) mount(0x0, &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x480, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 41m36.997333468s ago: executing program 5 (id=1780): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(r0, 0x0, 0x36) 41m36.685275845s ago: executing program 5 (id=1782): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xb, 0x8, 0xc, 0x80000000, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000700007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r1}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) 41m36.200859432s ago: executing program 5 (id=1784): r0 = io_uring_setup(0x479, &(0x7f0000000ac0)={0x0, 0xfffefffe, 0x2, 0x2, 0x4800020}) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{}, 0x2c, {'rootmode', 0x3d, 0x4000}}) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006780)={0x90, 0x0, 0x3, {0x5, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, {0x0, 0x2000000000, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x4, 0x2000, 0x7, 0x0, 0x0, 0xf0ee, 0xffffffff}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) open(&(0x7f00000001c0)='./file0/file0\x00', 0x1800, 0x0) mount(0x0, &(0x7f0000000200)='./file0/file0\x00', 0x0, 0x480, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 41m36.121322247s ago: executing program 5 (id=1786): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) 41m35.426852367s ago: executing program 5 (id=1787): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000e50000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e334185850000007300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23}, 0x50) 40m50.321888919s ago: executing program 36 (id=1787): bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x8, 0x4, 0x7cb4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc0200000000000000ae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce896165127cb3f011a7d06602e2fc40848228567ffb400000000003ed38ae89d24e1cebfba2f87925bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df2624f56da648d28ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71400fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada10eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d32940000088dde499000000fdffffff00000000000f000000ef0000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e2df3ad37b729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18aba6b16455a66c3b84b138efc20a546d3d5227e23b03f2a834391ade2ff3e93ee296c4082ee73e7c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1ce6d0b2fea02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0847a1ff2f7fc3c2b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f05c7f0be31491eb8c9ff68236c8600040000000000000000000066e034c81c3cab64e4fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e75741e39e5cb6a193e06a1043375b0f61b5d4e17c81baa31b924d84f224baf1221c15fa12313ffbfa7c2730309f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca205081173bd03c4754fc4674812daab482fd390a1c903b5d28a1eb247b5837d7603b92495d5c569f6433c3fca5206cb0000003fdbbd3892c52c2e7612e05de32322e980a3d69931e2c9312dd517c96f2ee90362476ed853c4c9b7d4ebf13cbaa795860e92a3d7d004f2c491db38eb769f094d5d48b262cc35c40682138cf13a49aa9f27abec00002f01ba1251aaf2385416ca719300"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x6, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000e50000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300001e334185850000007300000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc240, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23}, 0x50) 8m9.319279718s ago: executing program 6 (id=5161): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="6000000002060101000000000000000001000000140007800800124000070005050015001f000000050001"], 0x60}, 0x1, 0x0, 0x0, 0xc0d1}, 0xc951349034062a20) 8m7.312666994s ago: executing program 6 (id=5163): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 8m6.250210085s ago: executing program 6 (id=5164): r0 = syz_open_dev$dri(&(0x7f00000000c0), 0x1ff, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f00000003c0)={0x0, &(0x7f0000000300)=[0x0], &(0x7f0000000340)=[0x0], 0x0, 0x0, 0x1, 0x1}) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(r0, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000640)=[r2, r1], 0x2}) ioctl$DRM_IOCTL_MODE_LIST_LESSEES(r0, 0xc01064c7, &(0x7f0000000180)={0x0, 0x0, 0x0}) 8m5.472445309s ago: executing program 6 (id=5166): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000003d0007010000f9ffffffffff02"], 0x28}}, 0xc000) 8m3.465194625s ago: executing program 6 (id=5168): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000001c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_KEY(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000000)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="3f9d00000000000000001700000008000300", @ANYRES32=r2], 0x7c}}, 0x0) 7m47.131410714s ago: executing program 6 (id=5172): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x9) mount(&(0x7f0000000040)=@md0, &(0x7f0000000580)='./file0\x00', &(0x7f0000000000)='pvfs2\x00', 0x480, 0x0) 7m0.820388058s ago: executing program 37 (id=5172): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) open(&(0x7f00009e1000)='./file0\x00', 0x8060, 0x9) mount(&(0x7f0000000040)=@md0, &(0x7f0000000580)='./file0\x00', &(0x7f0000000000)='pvfs2\x00', 0x480, 0x0) 24.433440184s ago: executing program 3 (id=5315): socketpair$unix(0x1, 0x7, 0x0, 0x0) mmap(&(0x7f00008c7000/0x3000)=nil, 0x3000, 0x0, 0x8031, 0xffffffffffffffff, 0x4dd4a000) prlimit64(0x0, 0xe, &(0x7f00000007c0)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r0 = syz_open_dev$sndmidi(&(0x7f0000000000), 0x2, 0x141102) writev(r0, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) socket$can_j1939(0x1d, 0x2, 0x7) mount$fuse(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000300)="c99b57381801238c09d0ff0f1d0dbd30", 0x10) 21.573292889s ago: executing program 3 (id=5316): r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0xffffffff, @dev={0xfe, 0x80, '\x00', 0x11}, 0x9}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001840)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001400)=ANY=[@ANYRES32], 0x28}}], 0x2, 0x0) 20.313737982s ago: executing program 3 (id=5317): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000400)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = openat$vnet(0xffffffffffffff9c, &(0x7f00000038c0), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r3, 0xaf01, 0x0) r4 = eventfd(0x80000001) ioctl$VHOST_SET_VRING_KICK(r3, 0x4008af20, &(0x7f0000000040)={0x1, r4}) 7.103843641s ago: executing program 3 (id=5318): r0 = openat$fuse(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000040)={"9c4376ade4dd1d42647607079d722abe", 0x0, 0x0, {0x63, 0xa}, {0x2d4, 0x10001}, 0x5, [0x8, 0x9, 0x1a, 0x3ff, 0x7, 0x8001, 0xffffffffffffffff, 0x9, 0x12, 0x200, 0x6, 0xaae3, 0xb, 0x1, 0xfffffffffffffff8, 0x3ff]}) ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000200)={0xc, 0x1, {0x7f, @struct={0x2, 0x7}, 0x0, 0x1ff, 0x3, 0xdd, 0xbded, 0x8001, 0x28, @usage=0x10, 0xffff, 0x80000000, [0xff, 0x39f2f881, 0x5, 0x8001, 0x88c4, 0x3]}, {0x9, @struct={0x8, 0x2}, 0x0, 0x81, 0x8000000000000001, 0xb, 0xb2, 0x6, 0xc, @struct={0x40, 0x1}, 0x2, 0x0, [0x9, 0x4, 0x4, 0xbf5, 0x8]}, {0x1, @struct={0x4, 0xfffffff7}, 0x0, 0x4, 0x3ff, 0x8, 0x9, 0xbc3, 0xd0, @usage=0x40, 0x3, 0x4, [0xffffffffffffff3b, 0x80, 0x6, 0x4800000000000, 0x6, 0x6]}, {0x7f, 0x9, 0x7fffffff}}) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000600)={{}, r1, 0x8, @inherit={0x88, &(0x7f0000000140)={0x1, 0x8, 0x2, 0x5, {0x8, 0x400, 0x9, 0x40, 0x2}, [0x3, 0x9a, 0xc17, 0x101, 0x5, 0x1, 0x9, 0x9]}}, @devid=r2}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001640), 0xffffffffffffffff) sendmsg$NL80211_CMD_TDLS_OPER(r3, &(0x7f0000001700)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x34, r4, 0x10, 0x70bd2b, 0x25dfdbff, {{}, {@void, @val={0xc, 0x99, {0x7, 0x4d}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x3}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4) semget(0x2, 0x4, 0x10) sendmsg$NL80211_CMD_START_SCHED_SCAN(r3, &(0x7f00000019c0)={&(0x7f0000001740)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000001980)={&(0x7f0000001780)={0x1e8, r4, 0x300, 0x70bd29, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_SCHED_SCAN_MATCH={0x19c, 0x84, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x2c, 0x6, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x8, 0x2, 0x3}, @NL80211_BAND_5GHZ={0x8, 0x1, 0xfffffffb}, @NL80211_BAND_LC={0x8, 0x5, 0x100}, @NL80211_BAND_LC={0x8, 0x5, 0xae00}, @NL80211_BAND_LC={0x8, 0x5, 0x37d113b7}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0xb49}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ap_ssid}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x1}]}, {0x10, 0x0, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ap_ssid}]}, {0x28, 0x0, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @from_mac=@broadcast}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x3}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x6}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x7fff}]}, {0x40, 0x0, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0xd}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x34, 0x6, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x8}, @NL80211_BAND_6GHZ={0x8, 0x3, 0xde}, @NL80211_BAND_6GHZ={0x8, 0x3, 0x4}, @NL80211_BAND_6GHZ={0x8, 0x3, 0x9}, @NL80211_BAND_2GHZ={0x8}, @NL80211_BAND_5GHZ={0x8, 0x1, 0x4}]}]}, {0x54, 0x0, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ap_ssid}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x2c, 0x6, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x8, 0x1, 0x7}, @NL80211_BAND_6GHZ={0x8, 0x3, 0x2}, @NL80211_BAND_5GHZ={0x8, 0x1, 0xa}, @NL80211_BAND_2GHZ={0x8, 0x0, 0xa3}, @NL80211_BAND_6GHZ={0x8, 0x3, 0x8000}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa, 0x5, @random="180a4710d653"}, @NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xc, 0x1, @random="535da61e11f94100"}]}, {0x38, 0x0, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_SSID={0xa, 0x1, @default_ap_ssid}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x4c}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0xc, 0x6, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x8, 0x2, 0x9}]}, @NL80211_SCHED_SCAN_MATCH_ATTR_BSSID={0xa}, @NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0xfffffffd}]}, {0x48, 0x0, 0x0, 0x1, [@NL80211_SCHED_SCAN_MATCH_ATTR_RSSI={0x8, 0x2, 0x7f}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0x24, 0x6, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x8, 0x3, 0x2}, @NL80211_BAND_LC={0x8, 0x5, 0x3}, @NL80211_BAND_5GHZ={0x8}, @NL80211_BAND_5GHZ={0x8, 0x1, 0x2}]}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0xc, 0x6, 0x0, 0x1, [@NL80211_BAND_LC={0x8, 0x5, 0x4}]}, @NL80211_SCHED_SCAN_MATCH_PER_BAND_RSSI={0xc, 0x6, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x8, 0x1, 0xfffffbff}]}]}]}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0xbe}, @NL80211_ATTR_SCHED_SCAN_MULTI={0x4}, @NL80211_ATTR_TX_NO_CCK_RATE={0x4}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0xc5}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x10001}, @NL80211_ATTR_MEASUREMENT_DURATION={0x6, 0xeb, 0x2}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x2}]}, 0x1e8}, 0x1, 0x0, 0x0, 0x24040001}, 0x40) r5 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000001a00)='cgroup.threads\x00', 0x2, 0x0) r6 = getpgid(0x0) write$cgroup_pid(r5, &(0x7f0000001a40)=r6, 0x12) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffffff, 0xc018620b, &(0x7f0000001a80)={0x3}) r7 = creat(&(0x7f0000001ac0)='./file0\x00', 0x1bf) ioctl$TIOCL_UNBLANKSCREEN(r7, 0x541c, &(0x7f0000001b00)) semctl$IPC_RMID(0x0, 0x0, 0x0) r8 = socket$inet_mptcp(0x2, 0x1, 0x106) getsockopt$inet_tcp_int(r8, 0x6, 0xbea7d111be01c9a8, &(0x7f0000001b40), &(0x7f0000001b80)=0x4) ioctl$FS_IOC_GETFLAGS(r5, 0x80046601, &(0x7f0000001bc0)) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82187202, &(0x7f0000001c00)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$KDGKBMETA(0xffffffffffffffff, 0x4b62, &(0x7f0000001e40)) r9 = openat$rfkill(0xffffff9c, &(0x7f0000001e80), 0x40, 0x0) fsetxattr$trusted_overlay_origin(r9, &(0x7f0000001ec0), &(0x7f0000001f00), 0x2, 0x1) socket$unix(0x1, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000001f80), r7) sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f0000002040)={&(0x7f0000001f40)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x42000000}, 0x4008000) epoll_create1(0x0) r10 = syz_open_dev$sndctrl(&(0x7f0000002080), 0x6, 0x113500) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r10, 0x81785501, &(0x7f00000020c0)=""/231) 3.113610931s ago: executing program 3 (id=5319): r0 = io_uring_setup(0x1ba5, &(0x7f00000002c0)) r1 = socket(0x29, 0x2, 0x0) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x33fe0}}, 0x0) sendmsg$IPVS_CMD_GET_SERVICE(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$mice(0xffffff9c, &(0x7f0000000000), 0x0) socket$nl_generic(0x10, 0x3, 0x10) 0s ago: executing program 3 (id=5320): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, 0x0, 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f0000004280)={0x2020, 0x0, 0x0}, 0x2020) stat(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f0000000200)={0x78, 0x0, r1, {0x0, 0x8000, 0x0, {0x3, 0x7, 0x6d3e, 0x2, 0x8001, 0xe6b4, 0x40, 0x2, 0x101, 0x6000, 0x7, r2, 0x0, 0x9, 0x6}}}, 0x78) kernel console output (not intermixed with test programs): { bind } for pid=25319 comm="syz.3.5216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3834.805033][ T31] audit: type=1400 audit(3833.200:35484): avc: denied { name_bind } for pid=25319 comm="syz.3.5216" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 3834.805181][ T31] audit: type=1400 audit(3833.200:35485): avc: denied { node_bind } for pid=25319 comm="syz.3.5216" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 3834.805311][ T31] audit: type=1400 audit(3833.220:35486): avc: denied { write } for pid=25319 comm="syz.3.5216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3834.805433][ T31] audit: type=1400 audit(3833.220:35487): avc: denied { connect } for pid=25319 comm="syz.3.5216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3834.805555][ T31] audit: type=1400 audit(3833.240:35488): avc: denied { name_connect } for pid=25319 comm="syz.3.5216" dest=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 3834.805684][ T31] audit: type=1400 audit(3831.450:35482): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3834.854323][ T31] audit: type=1400 audit(3834.760:35489): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3834.854602][ T31] audit: type=1400 audit(3834.760:35490): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3834.854734][ T31] audit: type=1400 audit(3834.760:35491): avc: denied { read } for pid=25290 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3839.844808][ T31] kauditd_printk_skb: 38 callbacks suppressed [ 3839.845183][ T31] audit: type=1400 audit(3839.760:35530): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3839.894526][ T31] audit: type=1400 audit(3839.800:35531): avc: denied { read } for pid=25290 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3839.975397][ T31] audit: type=1400 audit(3839.860:35532): avc: denied { read open } for pid=25290 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3840.034625][ T31] audit: type=1400 audit(3839.930:35533): avc: denied { getattr } for pid=25290 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3840.085355][ T31] audit: type=1400 audit(3840.000:35534): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3840.254797][ T31] audit: type=1400 audit(3840.180:35535): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3840.334634][ T31] audit: type=1400 audit(3840.230:35536): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3840.354492][ T31] audit: type=1400 audit(3840.280:35537): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3840.424652][ T31] audit: type=1400 audit(3840.330:35538): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3840.614766][ T31] audit: type=1400 audit(3840.520:35539): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3843.750125][T25362] netlink: 28 bytes leftover after parsing attributes in process `syz.3.5217'. [ 3845.704996][ T31] kauditd_printk_skb: 36 callbacks suppressed [ 3845.705257][ T31] audit: type=1400 audit(3845.410:35576): avc: denied { read open } for pid=25290 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3845.705454][ T31] audit: type=1400 audit(3845.410:35577): avc: denied { getattr } for pid=25290 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3845.705583][ T31] audit: type=1400 audit(3845.410:35578): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3845.705707][ T31] audit: type=1400 audit(3845.410:35579): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3845.705838][ T31] audit: type=1400 audit(3845.410:35580): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3846.558005][ T31] audit: type=1400 audit(3846.490:35581): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3846.650445][ T31] audit: type=1400 audit(3846.580:35582): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3846.705036][ T31] audit: type=1400 audit(3846.580:35583): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3847.618007][ T31] audit: type=1400 audit(3847.450:35584): avc: denied { create } for pid=25364 comm="syz.3.5218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3847.623394][ T31] audit: type=1400 audit(3847.490:35585): avc: denied { write } for pid=25364 comm="syz.3.5218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 3851.017467][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 3851.017677][ T31] audit: type=1400 audit(3850.950:35647): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3851.166864][ T31] audit: type=1400 audit(3851.090:35648): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3851.254221][ T31] audit: type=1400 audit(3851.140:35649): avc: denied { search } for pid=25290 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3851.254509][ T31] audit: type=1400 audit(3851.140:35650): avc: denied { read } for pid=25290 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3851.254725][ T31] audit: type=1400 audit(3851.140:35651): avc: denied { read open } for pid=25290 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3851.254907][ T31] audit: type=1400 audit(3851.140:35652): avc: denied { getattr } for pid=25290 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3851.615149][ T31] audit: type=1400 audit(3851.480:35653): avc: denied { allowed } for pid=25380 comm="syz.3.5223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3851.617289][ T31] audit: type=1400 audit(3851.490:35654): avc: denied { create } for pid=25380 comm="syz.3.5223" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3851.618549][ T31] audit: type=1400 audit(3851.490:35655): avc: denied { map } for pid=25380 comm="syz.3.5223" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=55118 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3851.619616][ T31] audit: type=1400 audit(3851.490:35656): avc: denied { read write } for pid=25380 comm="syz.3.5223" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=55118 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3856.298450][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 3856.298949][ T31] audit: type=1400 audit(3856.230:35678): avc: denied { search } for pid=25273 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3856.664662][ T31] audit: type=1400 audit(3856.470:35679): avc: denied { search } for pid=25273 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3856.664957][ T31] audit: type=1400 audit(3856.550:35680): avc: denied { getattr } for pid=25273 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3856.665107][ T31] audit: type=1400 audit(3856.550:35681): avc: denied { search } for pid=25273 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3856.665238][ T31] audit: type=1400 audit(3856.550:35682): avc: denied { search } for pid=25273 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3856.665361][ T31] audit: type=1400 audit(3856.550:35683): avc: denied { search } for pid=25273 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3856.665483][ T31] audit: type=1400 audit(3856.570:35684): avc: denied { write search } for pid=25273 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3856.665605][ T31] audit: type=1400 audit(3856.570:35685): avc: denied { add_name search } for pid=25273 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3856.665724][ T31] audit: type=1400 audit(3856.570:35686): avc: denied { create } for pid=25273 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3856.665867][ T31] audit: type=1400 audit(3856.570:35687): avc: denied { write open } for pid=25273 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=107 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3861.307594][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 3861.307970][ T31] audit: type=1400 audit(3861.240:35700): avc: denied { search } for pid=25273 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3861.345699][ T31] audit: type=1400 audit(3861.280:35701): avc: denied { append } for pid=25273 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=107 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3861.384480][ T31] audit: type=1400 audit(3861.300:35702): avc: denied { append open } for pid=25273 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=107 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3861.414530][ T31] audit: type=1400 audit(3861.320:35703): avc: denied { search } for pid=25273 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3861.494898][ T31] audit: type=1400 audit(3861.420:35704): avc: denied { getattr } for pid=25273 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3861.574438][ T31] audit: type=1400 audit(3861.480:35705): avc: denied { execmem } for pid=25383 comm="syz.3.5224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3861.694869][ T31] audit: type=1400 audit(3861.530:35706): avc: denied { search } for pid=25273 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3861.695397][ T31] audit: type=1400 audit(3861.600:35707): avc: denied { getattr } for pid=25273 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3861.874445][ T31] audit: type=1400 audit(3861.790:35708): avc: denied { search } for pid=25273 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3861.964377][ T31] audit: type=1400 audit(3861.860:35709): avc: denied { search } for pid=25273 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3867.209533][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 3867.209786][ T31] audit: type=1400 audit(3867.140:35728): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3870.718938][ T31] audit: type=1400 audit(3870.650:35729): avc: denied { search } for pid=25385 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3870.784862][ T31] audit: type=1400 audit(3870.710:35730): avc: denied { read } for pid=25385 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3871.020069][ T31] audit: type=1400 audit(3870.790:35731): avc: denied { read open } for pid=25385 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3871.134443][ T31] audit: type=1400 audit(3871.020:35732): avc: denied { search } for pid=25385 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3871.454396][ T31] audit: type=1400 audit(3871.360:35733): avc: denied { search } for pid=25385 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3871.454778][ T31] audit: type=1400 audit(3871.360:35734): avc: denied { search } for pid=25385 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3871.454981][ T31] audit: type=1400 audit(3871.360:35735): avc: denied { read } for pid=25385 comm="cmp" name="resolv.conf.eth0.ra" dev="tmpfs" ino=107 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3871.455112][ T31] audit: type=1400 audit(3871.360:35736): avc: denied { read open } for pid=25385 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=107 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3871.455236][ T31] audit: type=1400 audit(3871.360:35737): avc: denied { getattr } for pid=25385 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3874.854614][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 3874.854882][ T31] audit: type=1400 audit(3874.770:35739): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3875.714493][ T31] audit: type=1400 audit(3875.640:35740): avc: denied { create } for pid=25395 comm="syz.3.5225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3875.717322][ T31] audit: type=1400 audit(3875.650:35741): avc: denied { write } for pid=25395 comm="syz.3.5225" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3876.137293][ T31] audit: type=1400 audit(3875.650:35742): avc: denied { module_request } for pid=25395 comm="syz.3.5225" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3879.104682][ T31] audit: type=1400 audit(3879.010:35743): avc: denied { write } for pid=25402 comm="syz.3.5228" name="tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3879.104959][ T31] audit: type=1400 audit(3879.010:35744): avc: denied { write open } for pid=25402 comm="syz.3.5228" path="/dev/net/tun" dev="devtmpfs" ino=675 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3879.105100][ T31] audit: type=1400 audit(3879.020:35745): avc: denied { ioctl } for pid=25402 comm="syz.3.5228" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3879.644389][ T31] audit: type=1400 audit(3879.540:35746): avc: denied { ioctl } for pid=25402 comm="syz.3.5228" path="/dev/net/tun" dev="devtmpfs" ino=675 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3880.005752][T21201] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3880.144386][ T31] audit: type=1400 audit(3880.070:35747): avc: denied { search } for pid=25393 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3880.294523][ T31] audit: type=1400 audit(3880.220:35748): avc: denied { search } for pid=25393 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3880.294792][ T31] audit: type=1400 audit(3880.220:35749): avc: denied { search } for pid=25393 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3880.294978][ T31] audit: type=1400 audit(3880.220:35750): avc: denied { getattr } for pid=25393 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=107 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3880.295184][ T31] audit: type=1400 audit(3880.220:35751): avc: denied { search } for pid=25393 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3880.295338][ T31] audit: type=1400 audit(3880.220:35752): avc: denied { search } for pid=25393 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3880.598661][ T31] audit: type=1400 audit(3880.530:35753): avc: denied { search } for pid=25393 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3880.684812][ T31] audit: type=1400 audit(3880.590:35754): avc: denied { write search } for pid=25393 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3880.725461][ T31] audit: type=1400 audit(3880.640:35755): avc: denied { remove_name search } for pid=25393 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=107 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3880.838872][ T31] audit: type=1400 audit(3880.720:35756): avc: denied { unlink } for pid=25393 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=107 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3881.829512][T25414] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3881.848356][T25414] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3881.967494][T21201] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3883.205954][T21201] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3883.666982][T21201] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3883.811833][T25448] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3883.812402][T25448] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3884.710722][T25493] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3884.715604][T25493] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3885.614412][ T31] kauditd_printk_skb: 61 callbacks suppressed [ 3885.619521][ T31] audit: type=1400 audit(3885.430:35818): avc: denied { create } for pid=25496 comm="syz.3.5237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3886.067911][ T31] audit: type=1400 audit(3885.430:35819): avc: denied { bind } for pid=25496 comm="syz.3.5237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3886.069320][ T31] audit: type=1400 audit(3885.430:35820): avc: denied { module_request } for pid=25496 comm="syz.3.5237" kmod="crypto-cbc-camellia-aesni" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3886.070748][ T31] audit: type=1400 audit(3885.970:35821): avc: denied { setopt } for pid=25496 comm="syz.3.5237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3886.195508][ T31] audit: type=1400 audit(3885.970:35822): avc: denied { accept } for pid=25496 comm="syz.3.5237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3886.304498][ T31] audit: type=1400 audit(3885.970:35823): avc: denied { create } for pid=25496 comm="syz.3.5237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3886.306254][ T31] audit: type=1400 audit(3886.000:35824): avc: denied { write } for pid=25496 comm="syz.3.5237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3886.307716][ T31] audit: type=1400 audit(3886.000:35825): avc: denied { module_request } for pid=25496 comm="syz.3.5237" kmod="net-pf-16-proto-16-family-IPVS" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3888.084386][ T31] audit: type=1400 audit(3887.910:35826): avc: denied { module_request } for pid=25496 comm="syz.3.5237" kmod="crypto-cbc-camellia-aesni-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3888.212587][ T31] audit: type=1400 audit(3888.140:35827): avc: denied { search } for pid=25427 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3891.193039][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 3891.193250][ T31] audit: type=1400 audit(3891.120:35837): avc: denied { sys_module } for pid=25199 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3891.195199][ T31] audit: type=1400 audit(3891.130:35838): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3893.834551][ T31] audit: type=1400 audit(3893.680:35839): avc: denied { search } for pid=25273 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3895.205063][T21201] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3896.457689][T21201] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3896.476347][T21201] bond0 (unregistering): Released all slaves [ 3897.284827][T21201] hsr_slave_0: left promiscuous mode [ 3897.414419][T21201] hsr_slave_1: left promiscuous mode [ 3897.537217][T21201] veth1_macvtap: left promiscuous mode [ 3897.537508][T21201] veth0_macvtap: left promiscuous mode [ 3897.537742][T21201] veth1_vlan: left promiscuous mode [ 3897.537959][T21201] veth0_vlan: left promiscuous mode [ 3901.255248][ T31] audit: type=1400 audit(3901.190:35840): avc: denied { read write } for pid=25508 comm="syz.3.5239" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3901.257356][ T31] audit: type=1400 audit(3901.190:35841): avc: denied { read write open } for pid=25508 comm="syz.3.5239" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3901.276557][ T31] audit: type=1400 audit(3901.210:35842): avc: denied { mounton } for pid=25508 comm="syz.3.5239" path="/362/file0" dev="tmpfs" ino=1980 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 3901.299592][ T31] audit: type=1400 audit(3901.210:35843): avc: denied { mount } for pid=25508 comm="syz.3.5239" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3901.300037][ T31] audit: type=1400 audit(3901.220:35844): avc: denied { map_create } for pid=25508 comm="syz.3.5239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3901.324739][ T31] audit: type=1400 audit(3901.240:35845): avc: denied { perfmon } for pid=25508 comm="syz.3.5239" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3901.325100][ T31] audit: type=1400 audit(3901.240:35846): avc: denied { map_read map_write } for pid=25508 comm="syz.3.5239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3902.246044][ T31] audit: type=1400 audit(3902.100:35847): avc: denied { read } for pid=25508 comm="syz.3.5239" name="file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 3902.325917][ T31] audit: type=1400 audit(3902.130:35848): avc: denied { read open } for pid=25508 comm="syz.3.5239" path="/362/file0/file0" dev="fuse" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 3902.327333][ T31] audit: type=1400 audit(3902.240:35849): avc: denied { unmount } for pid=22635 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 3906.924362][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 3906.924724][ T31] audit: type=1400 audit(3906.770:35860): avc: denied { read } for pid=25518 comm="syz.3.5241" name="card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3906.924976][ T31] audit: type=1400 audit(3906.780:35861): avc: denied { read open } for pid=25518 comm="syz.3.5241" path="/dev/dri/card1" dev="devtmpfs" ino=614 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3906.925170][ T31] audit: type=1400 audit(3906.790:35862): avc: denied { ioctl } for pid=25518 comm="syz.3.5241" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3906.925321][ T31] audit: type=1400 audit(3906.790:35863): avc: denied { ioctl } for pid=25518 comm="syz.3.5241" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64a1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3906.925458][ T31] audit: type=1400 audit(3906.800:35864): avc: denied { ioctl } for pid=25518 comm="syz.3.5241" path="/dev/dri/card1" dev="devtmpfs" ino=614 ioctlcmd=0x64b0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3907.702286][ T31] audit: type=1400 audit(3907.630:35865): avc: denied { read } for pid=25520 comm="syz.3.5242" name="sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3907.814592][ T31] audit: type=1400 audit(3907.640:35866): avc: denied { read open } for pid=25520 comm="syz.3.5242" path="/dev/sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3907.814958][ T31] audit: type=1400 audit(3907.640:35867): avc: denied { read write } for pid=25520 comm="syz.3.5242" name="midiC2D0" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3907.815110][ T31] audit: type=1400 audit(3907.650:35868): avc: denied { read write open } for pid=25520 comm="syz.3.5242" path="/dev/snd/midiC2D0" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3908.064426][ T31] audit: type=1400 audit(3907.960:35869): avc: denied { sys_module } for pid=25199 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3908.120088][T25521] nbd: must specify an index to disconnect [ 3908.166895][T25521] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5242'. [ 3908.167131][T25521] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5242'. [ 3911.999528][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 3911.999782][ T31] audit: type=1400 audit(3911.930:35878): avc: denied { create } for pid=25525 comm="syz.3.5243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3912.080419][ T31] audit: type=1400 audit(3911.930:35879): avc: denied { map_create } for pid=25525 comm="syz.3.5243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3912.080680][ T31] audit: type=1400 audit(3911.940:35880): avc: denied { perfmon } for pid=25525 comm="syz.3.5243" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3912.080835][ T31] audit: type=1400 audit(3911.940:35881): avc: denied { map_read map_write } for pid=25525 comm="syz.3.5243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3912.080961][ T31] audit: type=1400 audit(3911.940:35882): avc: denied { prog_load } for pid=25525 comm="syz.3.5243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3912.081083][ T31] audit: type=1400 audit(3911.940:35883): avc: denied { bpf } for pid=25525 comm="syz.3.5243" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3912.081206][ T31] audit: type=1400 audit(3911.940:35884): avc: denied { perfmon } for pid=25525 comm="syz.3.5243" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3912.081325][ T31] audit: type=1400 audit(3911.950:35885): avc: denied { execmem } for pid=25525 comm="syz.3.5243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3914.544592][ T31] audit: type=1400 audit(3914.250:35886): avc: denied { create } for pid=25525 comm="syz.3.5243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3914.546650][ T31] audit: type=1400 audit(3914.400:35887): avc: denied { write } for pid=25525 comm="syz.3.5243" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3918.056273][T25199] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3918.062541][T25199] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3918.944429][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 3918.944691][ T31] audit: type=1400 audit(3918.690:35889): avc: denied { write } for pid=25528 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3918.944872][ T31] audit: type=1400 audit(3918.690:35890): avc: denied { write open } for pid=25528 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3920.494432][ T31] audit: type=1400 audit(3920.410:35891): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3923.697152][ T31] audit: type=1400 audit(3923.630:35892): avc: denied { map_create } for pid=25581 comm="syz.3.5244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3923.844498][ T31] audit: type=1400 audit(3923.640:35893): avc: denied { create } for pid=25581 comm="syz.3.5244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3924.364888][ T31] audit: type=1400 audit(3923.660:35894): avc: denied { read } for pid=25581 comm="syz.3.5244" name="sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3924.365423][ T31] audit: type=1400 audit(3923.660:35895): avc: denied { read open } for pid=25581 comm="syz.3.5244" path="/dev/sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3924.365526][ T31] audit: type=1400 audit(3923.670:35896): avc: denied { read write } for pid=25581 comm="syz.3.5244" name="midiC2D0" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3924.365607][ T31] audit: type=1400 audit(3923.670:35897): avc: denied { read write open } for pid=25581 comm="syz.3.5244" path="/dev/snd/midiC2D0" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3924.365698][ T31] audit: type=1400 audit(3924.210:35898): avc: denied { prog_load } for pid=25581 comm="syz.3.5244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3924.365781][ T31] audit: type=1400 audit(3924.210:35899): avc: denied { bpf } for pid=25581 comm="syz.3.5244" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3924.365874][ T31] audit: type=1400 audit(3924.240:35900): avc: denied { create } for pid=25581 comm="syz.3.5244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 3924.674615][ T31] audit: type=1400 audit(3924.410:35901): avc: denied { module_request } for pid=25581 comm="syz.3.5244" kmod="fs-nfs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3926.184380][ T31] audit: type=1400 audit(3925.880:35902): avc: denied { write } for pid=25580 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3926.184640][ T31] audit: type=1400 audit(3925.880:35903): avc: denied { write open } for pid=25580 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3926.394584][ T31] audit: type=1400 audit(3926.320:35904): avc: denied { search } for pid=25580 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3927.088310][T25590] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5247'. [ 3929.524343][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 3929.524567][ T31] audit: type=1400 audit(3929.450:35948): avc: denied { getattr } for pid=25592 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3929.524729][ T31] audit: type=1400 audit(3929.450:35949): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3929.524867][ T31] audit: type=1400 audit(3929.450:35950): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3929.524992][ T31] audit: type=1400 audit(3929.450:35951): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3929.525115][ T31] audit: type=1400 audit(3929.450:35952): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3931.284580][ T31] audit: type=1400 audit(3929.600:35953): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3931.284887][ T31] audit: type=1400 audit(3929.610:35954): avc: denied { create } for pid=25597 comm="syz.3.5250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3931.285041][ T31] audit: type=1400 audit(3929.620:35955): avc: denied { write } for pid=25597 comm="syz.3.5250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3931.285181][ T31] audit: type=1400 audit(3929.620:35956): avc: denied { module_request } for pid=25597 comm="syz.3.5250" kmod="net-pf-16-proto-16-family-TIPC" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3931.285308][ T31] audit: type=1400 audit(3930.130:35957): avc: denied { write } for pid=25597 comm="syz.3.5250" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3936.482739][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 3936.483042][ T31] audit: type=1400 audit(3936.410:35980): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3936.488576][ T31] audit: type=1400 audit(3936.410:35981): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3936.524365][ T31] audit: type=1400 audit(3936.450:35982): avc: denied { read } for pid=25592 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3936.524659][ T31] audit: type=1400 audit(3936.450:35983): avc: denied { read open } for pid=25592 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3936.524802][ T31] audit: type=1400 audit(3936.450:35984): avc: denied { getattr } for pid=25592 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3936.524936][ T31] audit: type=1400 audit(3936.450:35985): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3937.474673][ T31] audit: type=1400 audit(3937.390:35986): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3938.335081][ T31] audit: type=1400 audit(3938.200:35987): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3938.974446][ T31] audit: type=1400 audit(3938.870:35988): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3939.005430][ T31] audit: type=1400 audit(3938.930:35989): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3942.863633][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 3942.964713][ T31] audit: type=1400 audit(3942.780:35996): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3942.965068][ T31] audit: type=1400 audit(3942.780:35997): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3942.965329][ T31] audit: type=1400 audit(3942.780:35998): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3942.965489][ T31] audit: type=1400 audit(3942.780:35999): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3942.965693][ T31] audit: type=1400 audit(3942.780:36000): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3943.094519][ T31] audit: type=1400 audit(3943.010:36001): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3943.094805][ T31] audit: type=1400 audit(3943.010:36002): avc: denied { read } for pid=25592 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3943.094995][ T31] audit: type=1400 audit(3943.010:36003): avc: denied { read open } for pid=25592 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3943.095130][ T31] audit: type=1400 audit(3943.010:36004): avc: denied { getattr } for pid=25592 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3943.324350][ T31] audit: type=1400 audit(3943.220:36005): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3950.284815][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 3950.285255][ T31] audit: type=1400 audit(3947.940:36045): avc: denied { read open } for pid=25592 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3950.285587][ T31] audit: type=1400 audit(3947.940:36046): avc: denied { getattr } for pid=25592 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3950.286181][ T31] audit: type=1400 audit(3947.940:36047): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3950.286470][ T31] audit: type=1400 audit(3947.940:36048): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3950.286755][ T31] audit: type=1400 audit(3947.940:36049): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3950.287077][ T31] audit: type=1400 audit(3948.160:36050): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3950.287175][ T31] audit: type=1400 audit(3948.160:36051): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3950.287288][ T31] audit: type=1400 audit(3948.160:36052): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3950.287375][ T31] audit: type=1400 audit(3948.160:36053): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3950.287464][ T31] audit: type=1400 audit(3948.160:36054): avc: denied { read } for pid=25592 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3956.108512][ T31] kauditd_printk_skb: 65 callbacks suppressed [ 3956.108873][ T31] audit: type=1400 audit(3956.040:36120): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3956.364211][ T31] audit: type=1400 audit(3956.290:36121): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3956.364589][ T31] audit: type=1400 audit(3956.290:36122): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3956.364751][ T31] audit: type=1400 audit(3956.290:36123): avc: denied { read } for pid=25592 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3956.364898][ T31] audit: type=1400 audit(3956.290:36124): avc: denied { read open } for pid=25592 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3956.365024][ T31] audit: type=1400 audit(3956.290:36125): avc: denied { getattr } for pid=25592 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3956.475530][ T31] audit: type=1400 audit(3956.390:36126): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3956.504382][ T31] audit: type=1400 audit(3956.420:36127): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3956.504694][ T31] audit: type=1400 audit(3956.420:36128): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3956.504840][ T31] audit: type=1400 audit(3956.420:36129): avc: denied { search } for pid=25592 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3961.282683][T25618] audit_log_start: 184 callbacks suppressed [ 3961.282995][T25618] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3961.283145][T25618] audit: audit_lost=157 audit_rate_limit=0 audit_backlog_limit=64 [ 3961.283264][T25618] audit: backlog limit exceeded [ 3961.295858][T25618] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3961.296049][T25618] audit: audit_lost=158 audit_rate_limit=0 audit_backlog_limit=64 [ 3961.296164][T25618] audit: backlog limit exceeded [ 3961.297850][T25618] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3961.298065][T25618] audit: audit_lost=159 audit_rate_limit=0 audit_backlog_limit=64 [ 3961.298180][T25618] audit: backlog limit exceeded [ 3961.299683][T25618] audit: audit_backlog=65 > audit_backlog_limit=64 [ 3963.854494][T25620] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3963.861260][T25620] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3964.332383][T25624] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3964.354642][T25624] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3966.535885][ T31] kauditd_printk_skb: 1984 callbacks suppressed [ 3966.536092][ T31] audit: type=1400 audit(3966.470:36433): avc: denied { search } for pid=25580 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3966.555609][ T31] audit: type=1400 audit(3966.490:36434): avc: denied { search } for pid=25580 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3966.585959][ T31] audit: type=1400 audit(3966.500:36435): avc: denied { search } for pid=25580 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3966.684299][ T31] audit: type=1400 audit(3966.570:36436): avc: denied { search } for pid=25580 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3966.684563][ T31] audit: type=1400 audit(3966.570:36437): avc: denied { search } for pid=25580 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3966.684699][ T31] audit: type=1400 audit(3966.570:36438): avc: denied { getattr } for pid=25580 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3966.684826][ T31] audit: type=1400 audit(3966.590:36440): avc: denied { module_request } for pid=25629 comm="syz.3.5258" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3967.054395][ T31] audit: type=1400 audit(3966.570:36439): avc: denied { search } for pid=25580 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3967.054729][ T31] audit: type=1400 audit(3966.980:36441): avc: denied { search } for pid=25580 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3967.054960][ T31] audit: type=1400 audit(3966.980:36442): avc: denied { search } for pid=25580 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3974.086706][ T31] kauditd_printk_skb: 54 callbacks suppressed [ 3974.086960][ T31] audit: type=1400 audit(3974.020:36497): avc: denied { create } for pid=25676 comm="syz.3.5263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3974.090818][ T31] audit: type=1400 audit(3974.020:36498): avc: denied { write } for pid=25676 comm="syz.3.5263" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3974.093445][ T31] audit: type=1400 audit(3974.020:36499): avc: denied { module_request } for pid=25676 comm="syz.3.5263" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3977.810344][ T31] audit: type=1400 audit(3977.740:36500): avc: denied { create } for pid=25679 comm="syz.3.5264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3977.814956][ T31] audit: type=1400 audit(3977.750:36501): avc: denied { create } for pid=25679 comm="syz.3.5264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3977.816963][ T31] audit: type=1400 audit(3977.750:36502): avc: denied { write } for pid=25679 comm="syz.3.5264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3977.818856][ T31] audit: type=1400 audit(3977.750:36503): avc: denied { module_request } for pid=25679 comm="syz.3.5264" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3978.384687][ T31] audit: type=1400 audit(3978.260:36504): avc: denied { create } for pid=25679 comm="syz.3.5264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3978.384976][ T31] audit: type=1400 audit(3978.260:36505): avc: denied { prog_load } for pid=25679 comm="syz.3.5264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3978.385120][ T31] audit: type=1400 audit(3978.260:36506): avc: denied { bpf } for pid=25679 comm="syz.3.5264" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3979.314316][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 3979.314554][ T31] audit: type=1400 audit(3979.230:36516): avc: denied { sys_module } for pid=25199 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3979.354458][ T31] audit: type=1400 audit(3979.270:36517): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3980.647422][ T31] audit: type=1400 audit(3980.520:36518): avc: denied { prog_load } for pid=25679 comm="syz.3.5264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3980.648598][ T31] audit: type=1400 audit(3980.520:36519): avc: denied { bpf } for pid=25679 comm="syz.3.5264" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3980.649342][ T31] audit: type=1400 audit(3980.520:36520): avc: denied { perfmon } for pid=25679 comm="syz.3.5264" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3980.653163][ T31] audit: type=1400 audit(3980.520:36521): avc: denied { perfmon } for pid=25679 comm="syz.3.5264" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3981.625564][ T31] audit: type=1400 audit(3980.520:36522): avc: denied { perfmon } for pid=25679 comm="syz.3.5264" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3981.627060][ T31] audit: type=1400 audit(3980.520:36523): avc: denied { perfmon } for pid=25679 comm="syz.3.5264" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3981.627896][ T31] audit: type=1400 audit(3980.560:36524): avc: denied { bpf } for pid=25679 comm="syz.3.5264" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3981.628704][ T31] audit: type=1400 audit(3980.580:36525): avc: denied { module_request } for pid=25679 comm="syz.3.5264" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3986.952550][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 3986.952972][ T31] audit: type=1400 audit(3986.880:36539): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="netdev-batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3991.922547][ T31] audit: type=1400 audit(3991.850:36540): avc: denied { create } for pid=25693 comm="syz.3.5266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3991.935188][T25694] netlink: 'syz.3.5266': attribute type 12 has an invalid length. [ 3991.980871][ T31] audit: type=1400 audit(3991.860:36541): avc: denied { prog_load } for pid=25693 comm="syz.3.5266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3991.981172][ T31] audit: type=1400 audit(3991.860:36542): avc: denied { bpf } for pid=25693 comm="syz.3.5266" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3991.981321][ T31] audit: type=1400 audit(3991.870:36543): avc: denied { create } for pid=25693 comm="syz.3.5266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3991.981448][ T31] audit: type=1400 audit(3991.880:36544): avc: denied { connect } for pid=25693 comm="syz.3.5266" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3991.981570][ T31] audit: type=1400 audit(3991.880:36545): avc: denied { write } for pid=25693 comm="syz.3.5266" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3991.981689][ T31] audit: type=1400 audit(3991.880:36546): avc: denied { create } for pid=25693 comm="syz.3.5266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3991.981810][ T31] audit: type=1400 audit(3991.890:36547): avc: denied { create } for pid=25693 comm="syz.3.5266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3991.981937][ T31] audit: type=1400 audit(3991.890:36548): avc: denied { write } for pid=25693 comm="syz.3.5266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3991.982057][ T31] audit: type=1400 audit(3991.890:36549): avc: denied { read } for pid=25693 comm="syz.3.5266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3991.982180][ T31] audit: type=1400 audit(3991.890:36550): avc: denied { read } for pid=25693 comm="syz.3.5266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3992.450430][T25698] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3992.451003][T25698] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3997.025503][ T31] kauditd_printk_skb: 53 callbacks suppressed [ 3997.025723][ T31] audit: type=1400 audit(3996.960:36604): avc: denied { create } for pid=25713 comm="syz.3.5272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3997.044619][ T31] audit: type=1400 audit(3996.960:36605): avc: denied { create } for pid=25713 comm="syz.3.5272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3997.044920][ T31] audit: type=1400 audit(3996.980:36606): avc: denied { setopt } for pid=25713 comm="syz.3.5272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3997.116716][ T31] audit: type=1400 audit(3997.020:36607): avc: denied { write } for pid=25713 comm="syz.3.5272" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3998.046919][ T31] audit: type=1400 audit(3997.970:36608): avc: denied { create } for pid=25717 comm="syz.3.5273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3998.058660][ T31] audit: type=1400 audit(3997.980:36609): avc: denied { write } for pid=25717 comm="syz.3.5273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4001.084562][ T31] audit: type=1400 audit(3998.460:36610): avc: denied { prog_load } for pid=25719 comm="syz.3.5274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4001.084836][ T31] audit: type=1400 audit(3998.460:36611): avc: denied { bpf } for pid=25719 comm="syz.3.5274" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4001.085069][ T31] audit: type=1400 audit(3998.570:36612): avc: denied { execmem } for pid=25719 comm="syz.3.5274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4001.377590][ T31] audit: type=1400 audit(4001.310:36613): avc: denied { search } for pid=25710 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4001.595349][T25199] hsr_slave_0: entered promiscuous mode [ 4001.654878][T25199] hsr_slave_1: entered promiscuous mode [ 4001.656392][T25199] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 4001.656545][T25199] Cannot create hsr debugfs directory [ 4002.284649][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 4002.284969][ T31] audit: type=1400 audit(4002.200:36616): avc: denied { search } for pid=25580 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4002.464552][ T31] audit: type=1400 audit(4002.380:36617): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="rtnl-link-virt_wifi" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4011.474819][ T31] audit: type=1400 audit(4011.390:36618): avc: denied { create } for pid=25199 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4011.584865][ T31] audit: type=1400 audit(4011.500:36619): avc: denied { write } for pid=25199 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4011.954195][ T31] audit: type=1400 audit(4011.680:36620): avc: denied { read } for pid=25199 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4012.054279][ T31] audit: type=1400 audit(4011.740:36621): avc: denied { read } for pid=25199 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4012.114579][ T31] audit: type=1400 audit(4011.740:36622): avc: denied { write } for pid=25199 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4012.115086][ T31] audit: type=1400 audit(4011.740:36623): avc: denied { read } for pid=25199 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4012.135625][T25199] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 4012.150246][T25199] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 4012.374738][ T31] audit: type=1400 audit(4012.280:36624): avc: denied { create } for pid=25820 comm="syz.3.5275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4012.538152][ T31] audit: type=1400 audit(4012.280:36625): avc: denied { write } for pid=25820 comm="syz.3.5275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 4013.069252][ T31] audit: type=1400 audit(4012.300:36626): avc: denied { create } for pid=25820 comm="syz.3.5275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 4013.604528][ T31] audit: type=1400 audit(4012.310:36627): avc: denied { read } for pid=25820 comm="syz.3.5275" name="sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4013.709475][T25199] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 4014.068556][T25199] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 4015.634562][T25825] syz_tun: entered promiscuous mode [ 4015.635196][T25825] vlan2: entered promiscuous mode [ 4018.621921][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 4018.622187][ T31] audit: type=1400 audit(4018.550:36648): avc: denied { read } for pid=25830 comm="syz.3.5277" dev="nsfs" ino=4026532660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4018.624768][ T31] audit: type=1400 audit(4018.550:36649): avc: denied { read open } for pid=25830 comm="syz.3.5277" path="net:[4026532660]" dev="nsfs" ino=4026532660 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4018.636164][ T31] audit: type=1400 audit(4018.570:36650): avc: denied { create } for pid=25830 comm="syz.3.5277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4018.641666][ T31] audit: type=1400 audit(4018.570:36651): avc: denied { create } for pid=25830 comm="syz.3.5277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4018.654578][ T31] audit: type=1400 audit(4018.580:36652): avc: denied { write } for pid=25830 comm="syz.3.5277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4018.654811][ T31] audit: type=1400 audit(4018.580:36653): avc: denied { module_request } for pid=25830 comm="syz.3.5277" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4018.704456][ T31] audit: type=1400 audit(4018.610:36654): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4019.165255][ T31] audit: type=1400 audit(4019.090:36655): avc: denied { write } for pid=25830 comm="syz.3.5277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4021.706508][ T31] audit: type=1400 audit(4021.580:36656): avc: denied { map_create } for pid=25835 comm="syz.3.5278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4021.710564][ T31] audit: type=1400 audit(4021.580:36657): avc: denied { perfmon } for pid=25835 comm="syz.3.5278" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4025.985058][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 4025.985547][ T31] audit: type=1400 audit(4025.600:36685): avc: denied { prog_load } for pid=25841 comm="syz.3.5280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4026.047887][ T31] audit: type=1400 audit(4025.600:36686): avc: denied { bpf } for pid=25841 comm="syz.3.5280" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4026.048437][ T31] audit: type=1400 audit(4025.620:36687): avc: denied { prog_load } for pid=25841 comm="syz.3.5280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4026.048605][ T31] audit: type=1400 audit(4025.620:36688): avc: denied { bpf } for pid=25841 comm="syz.3.5280" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4027.474997][ T31] audit: type=1400 audit(4027.390:36689): avc: denied { sys_module } for pid=25199 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4027.475259][ T31] audit: type=1400 audit(4027.390:36690): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4028.305103][ T31] audit: type=1400 audit(4028.180:36691): avc: denied { write } for pid=25838 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4028.556008][ T31] audit: type=1400 audit(4028.490:36692): avc: denied { write open } for pid=25838 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4032.234167][ T31] audit: type=1400 audit(4032.140:36693): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4035.104382][ T31] audit: type=1400 audit(4034.890:36694): avc: denied { name_bind } for pid=25848 comm="syz.3.5281" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 4035.104684][ T31] audit: type=1400 audit(4034.890:36695): avc: denied { node_bind } for pid=25848 comm="syz.3.5281" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 4035.904483][ T31] audit: type=1400 audit(4035.380:36696): avc: denied { prog_load } for pid=25850 comm="syz.3.5282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4035.904792][ T31] audit: type=1400 audit(4035.380:36697): avc: denied { bpf } for pid=25850 comm="syz.3.5282" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4035.904948][ T31] audit: type=1400 audit(4035.400:36698): avc: denied { execmem } for pid=25850 comm="syz.3.5282" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 4037.064479][ T31] audit: type=1400 audit(4036.980:36699): avc: denied { sys_module } for pid=25199 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4037.070020][ T31] audit: type=1400 audit(4037.000:36700): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4040.894364][ T31] audit: type=1400 audit(4040.810:36701): avc: denied { write } for pid=25846 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4040.894638][ T31] audit: type=1400 audit(4040.810:36702): avc: denied { write open } for pid=25846 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4041.214557][ T31] audit: type=1400 audit(4040.970:36703): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4041.214878][ T31] audit: type=1400 audit(4041.140:36704): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4041.215026][ T31] audit: type=1400 audit(4041.140:36705): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4041.215154][ T31] audit: type=1400 audit(4041.140:36706): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4042.084171][ T31] audit: type=1400 audit(4041.990:36707): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4042.154516][ T31] audit: type=1400 audit(4042.080:36708): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4042.155019][ T31] audit: type=1400 audit(4042.080:36709): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4042.155279][ T31] audit: type=1400 audit(4042.080:36710): avc: denied { read } for pid=25856 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4046.016241][ T31] kauditd_printk_skb: 63 callbacks suppressed [ 4046.016473][ T31] audit: type=1400 audit(4045.950:36774): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4046.019241][ T31] audit: type=1400 audit(4045.950:36775): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4046.084762][ T31] audit: type=1400 audit(4046.010:36776): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4046.085096][ T31] audit: type=1400 audit(4046.010:36777): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4046.085249][ T31] audit: type=1400 audit(4046.010:36778): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4046.187191][ T31] audit: type=1400 audit(4046.120:36779): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4046.195992][ T31] audit: type=1400 audit(4046.130:36780): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4046.274582][ T31] audit: type=1400 audit(4046.180:36781): avc: denied { read } for pid=25856 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4046.274938][ T31] audit: type=1400 audit(4046.180:36782): avc: denied { read open } for pid=25856 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4046.275106][ T31] audit: type=1400 audit(4046.180:36783): avc: denied { getattr } for pid=25856 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4051.116086][ T31] kauditd_printk_skb: 86 callbacks suppressed [ 4051.116318][ T31] audit: type=1400 audit(4051.050:36870): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4051.166512][ T31] audit: type=1400 audit(4051.100:36871): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4051.195733][ T31] audit: type=1400 audit(4051.130:36872): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4051.217982][ T31] audit: type=1400 audit(4051.150:36873): avc: denied { read } for pid=25856 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4051.284806][ T31] audit: type=1400 audit(4051.200:36874): avc: denied { read open } for pid=25856 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4051.298944][ T31] audit: type=1400 audit(4051.230:36875): avc: denied { getattr } for pid=25856 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4051.484954][ T31] audit: type=1400 audit(4051.390:36876): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4051.485493][ T31] audit: type=1400 audit(4051.390:36877): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4051.485808][ T31] audit: type=1400 audit(4051.390:36878): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4051.486103][ T31] audit: type=1400 audit(4051.390:36879): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4058.034528][ T31] kauditd_printk_skb: 57 callbacks suppressed [ 4058.034865][ T31] audit: type=1400 audit(4057.960:36937): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4058.334308][ T31] audit: type=1400 audit(4058.260:36938): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4058.334588][ T31] audit: type=1400 audit(4058.260:36939): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4058.334734][ T31] audit: type=1400 audit(4058.260:36940): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4058.334904][ T31] audit: type=1400 audit(4058.260:36941): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4058.335032][ T31] audit: type=1400 audit(4058.260:36942): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4058.844891][ T31] audit: type=1400 audit(4058.780:36943): avc: denied { search } for pid=25856 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4058.847144][ T31] audit: type=1400 audit(4058.780:36944): avc: denied { read } for pid=25856 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4058.848591][ T31] audit: type=1400 audit(4058.780:36945): avc: denied { read open } for pid=25856 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4058.854328][ T31] audit: type=1400 audit(4058.780:36946): avc: denied { getattr } for pid=25856 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4060.176242][T25199] 8021q: adding VLAN 0 to HW filter on device bond0 [ 4063.764849][ T31] kauditd_printk_skb: 71 callbacks suppressed [ 4063.765081][ T31] audit: type=1400 audit(4063.700:37018): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4063.766136][ T31] audit: type=1400 audit(4063.700:37019): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4063.767371][ T31] audit: type=1400 audit(4063.700:37020): avc: denied { append } for pid=25846 comm="dhcpcd-run-hook" name="resolv.conf.eth18.link" dev="tmpfs" ino=109 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4063.768571][ T31] audit: type=1400 audit(4063.700:37021): avc: denied { append open } for pid=25846 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth18.link" dev="tmpfs" ino=109 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4063.774162][ T31] audit: type=1400 audit(4063.700:37022): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4063.892031][ T31] audit: type=1400 audit(4063.820:37023): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4063.944577][ T31] audit: type=1400 audit(4063.870:37024): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4063.944834][ T31] audit: type=1400 audit(4063.870:37025): avc: denied { append } for pid=25846 comm="dhcpcd-run-hook" name="resolv.conf.eth18.link" dev="tmpfs" ino=109 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4063.944989][ T31] audit: type=1400 audit(4063.870:37026): avc: denied { append open } for pid=25846 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth18.link" dev="tmpfs" ino=109 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4064.154807][ T31] audit: type=1400 audit(4064.050:37027): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4064.516877][T25879] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4064.517838][T25879] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4072.614409][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 4072.614668][ T31] audit: type=1400 audit(4072.480:37048): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4072.614925][ T31] audit: type=1400 audit(4072.480:37049): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4072.615186][ T31] audit: type=1400 audit(4072.480:37050): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4072.615314][ T31] audit: type=1400 audit(4072.480:37051): avc: denied { getattr } for pid=25846 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth18.link" dev="tmpfs" ino=109 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4072.615438][ T31] audit: type=1400 audit(4072.480:37052): avc: denied { write } for pid=25846 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4073.114312][ T31] audit: type=1400 audit(4072.630:37053): avc: denied { write open } for pid=25846 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4073.114570][ T31] audit: type=1400 audit(4072.630:37054): avc: denied { getattr } for pid=25846 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4075.284770][ T31] audit: type=1400 audit(4075.210:37055): avc: denied { ioctl } for pid=25846 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4075.908811][ T31] audit: type=1400 audit(4075.580:37056): avc: denied { create } for pid=25885 comm="syz.3.5292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 4076.150329][ T31] audit: type=1400 audit(4075.600:37057): avc: denied { module_request } for pid=25885 comm="syz.3.5292" kmod="net-pf-42" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4078.417054][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 4078.417334][ T31] audit: type=1400 audit(4078.350:37060): avc: denied { create } for pid=25891 comm="syz.3.5293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4078.505323][ T31] audit: type=1400 audit(4078.350:37061): avc: denied { setopt } for pid=25891 comm="syz.3.5293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 4078.704296][ T31] audit: type=1400 audit(4078.610:37062): avc: denied { read } for pid=25893 comm="syz.3.5294" name="audio" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4078.704542][ T31] audit: type=1400 audit(4078.610:37063): avc: denied { read open } for pid=25893 comm="syz.3.5294" path="/dev/audio" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4078.704680][ T31] audit: type=1400 audit(4078.630:37064): avc: denied { ioctl } for pid=25893 comm="syz.3.5294" path="/dev/audio" dev="devtmpfs" ino=717 ioctlcmd=0x500a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4081.104491][ T31] audit: type=1400 audit(4080.870:37065): avc: denied { create } for pid=25897 comm="syz.3.5296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 4081.104863][ T31] audit: type=1400 audit(4080.900:37066): avc: denied { getopt } for pid=25897 comm="syz.3.5296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 4081.534538][ T31] audit: type=1400 audit(4081.380:37067): avc: denied { write } for pid=25899 comm="syz.3.5297" name="audio" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4081.534805][ T31] audit: type=1400 audit(4081.380:37068): avc: denied { write open } for pid=25899 comm="syz.3.5297" path="/dev/audio" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4081.534991][ T31] audit: type=1400 audit(4081.410:37069): avc: denied { ioctl } for pid=25899 comm="syz.3.5297" path="/dev/audio" dev="devtmpfs" ino=717 ioctlcmd=0x5002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4083.501358][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 4083.501727][ T31] audit: type=1400 audit(4082.830:37073): avc: denied { map_read map_write } for pid=25901 comm="syz.3.5298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4083.501960][ T31] audit: type=1400 audit(4082.830:37074): avc: denied { prog_load } for pid=25901 comm="syz.3.5298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4083.502253][ T31] audit: type=1400 audit(4082.830:37075): avc: denied { bpf } for pid=25901 comm="syz.3.5298" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4087.197855][ T31] audit: type=1400 audit(4087.130:37076): avc: denied { search } for pid=25890 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4087.314383][ T31] audit: type=1400 audit(4087.210:37077): avc: denied { read } for pid=25890 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4087.314637][ T31] audit: type=1400 audit(4087.210:37078): avc: denied { read open } for pid=25890 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4087.314785][ T31] audit: type=1400 audit(4087.210:37079): avc: denied { search } for pid=25890 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4087.314951][ T31] audit: type=1400 audit(4087.210:37080): avc: denied { search } for pid=25890 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4087.315075][ T31] audit: type=1400 audit(4087.210:37081): avc: denied { search } for pid=25890 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4087.474403][ T31] audit: type=1400 audit(4087.380:37082): avc: denied { read } for pid=25890 comm="cmp" name="resolv.conf.eth18.link" dev="tmpfs" ino=109 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4091.255289][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 4091.256001][ T31] audit: type=1400 audit(4089.770:37086): avc: denied { sys_module } for pid=25199 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4091.256176][ T31] audit: type=1400 audit(4090.030:37087): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4093.204387][ T31] audit: type=1400 audit(4092.950:37088): avc: denied { read } for pid=25910 comm="syz.3.5300" name="controlC0" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4093.204912][ T31] audit: type=1400 audit(4092.950:37089): avc: denied { read open } for pid=25910 comm="syz.3.5300" path="/dev/snd/controlC0" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4093.205204][ T31] audit: type=1400 audit(4092.960:37090): avc: denied { ioctl } for pid=25910 comm="syz.3.5300" path="/dev/snd/controlC0" dev="devtmpfs" ino=718 ioctlcmd=0x5516 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4093.205498][ T31] audit: type=1400 audit(4092.980:37091): avc: denied { allowed } for pid=25910 comm="syz.3.5300" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 4093.205788][ T31] audit: type=1400 audit(4092.980:37092): avc: denied { create } for pid=25910 comm="syz.3.5300" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4093.206040][ T31] audit: type=1400 audit(4092.980:37093): avc: denied { map } for pid=25910 comm="syz.3.5300" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=56487 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4093.206293][ T31] audit: type=1400 audit(4092.980:37094): avc: denied { read write } for pid=25910 comm="syz.3.5300" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=56487 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4093.206545][ T31] audit: type=1400 audit(4093.010:37095): avc: denied { map } for pid=25910 comm="syz.3.5300" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=56487 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 4095.107835][T25918] No source specified [ 4096.024597][T25923] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4096.025117][T25923] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4096.404245][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 4096.404539][ T31] audit: type=1400 audit(4095.940:37125): avc: denied { read write open } for pid=25920 comm="syz.3.5304" path="/dev/raw-gadget" dev="devtmpfs" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4096.404729][ T31] audit: type=1400 audit(4095.940:37126): avc: denied { ioctl } for pid=25920 comm="syz.3.5304" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4096.404870][ T31] audit: type=1400 audit(4095.940:37127): avc: denied { ioctl } for pid=25920 comm="syz.3.5304" path="/dev/raw-gadget" dev="devtmpfs" ino=691 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4096.404995][ T31] audit: type=1400 audit(4095.960:37128): avc: denied { read } for pid=25920 comm="syz.3.5304" name="sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4096.405118][ T31] audit: type=1400 audit(4095.970:37129): avc: denied { read open } for pid=25920 comm="syz.3.5304" path="/dev/sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4096.405238][ T31] audit: type=1400 audit(4095.980:37130): avc: denied { read write } for pid=25920 comm="syz.3.5304" name="midiC2D0" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4096.405359][ T31] audit: type=1400 audit(4095.980:37131): avc: denied { read write open } for pid=25920 comm="syz.3.5304" path="/dev/snd/midiC2D0" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4096.735933][ T31] audit: type=1400 audit(4096.630:37132): avc: denied { write } for pid=25920 comm="syz.3.5304" name="i2c-1" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4096.739007][ T31] audit: type=1400 audit(4096.630:37133): avc: denied { write open } for pid=25920 comm="syz.3.5304" path="/dev/i2c-1" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4100.009533][ T31] audit: type=1400 audit(4099.940:37134): avc: denied { search } for pid=25919 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4102.729245][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 4102.729736][ T31] audit: type=1400 audit(4102.660:37137): avc: denied { search } for pid=25846 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4102.996511][ T31] audit: type=1400 audit(4102.930:37138): avc: denied { sys_module } for pid=25199 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4103.035458][ T31] audit: type=1400 audit(4102.960:37139): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4107.134454][ T31] audit: type=1400 audit(4105.190:37140): avc: denied { prog_load } for pid=25928 comm="syz.3.5305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4107.134803][ T31] audit: type=1400 audit(4105.200:37141): avc: denied { bpf } for pid=25928 comm="syz.3.5305" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4107.134993][ T31] audit: type=1400 audit(4105.200:37142): avc: denied { perfmon } for pid=25928 comm="syz.3.5305" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4107.135128][ T31] audit: type=1400 audit(4105.220:37143): avc: denied { create } for pid=25928 comm="syz.3.5305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4107.135254][ T31] audit: type=1400 audit(4105.230:37144): avc: denied { write } for pid=25928 comm="syz.3.5305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4107.605432][ T31] audit: type=1400 audit(4107.510:37145): avc: denied { read } for pid=25930 comm="syz.3.5306" name="sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4107.605913][ T31] audit: type=1400 audit(4107.520:37146): avc: denied { read open } for pid=25930 comm="syz.3.5306" path="/dev/sequencer" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4109.456050][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 4109.456313][ T31] audit: type=1400 audit(4109.330:37149): avc: denied { create } for pid=25935 comm="syz.3.5308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4110.792543][ T31] audit: type=1400 audit(4110.420:37150): avc: denied { create } for pid=25935 comm="syz.3.5308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4110.962863][T25938] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4110.994256][T25938] audit: audit_lost=782 audit_rate_limit=0 audit_backlog_limit=64 [ 4110.994610][T25938] audit: backlog limit exceeded [ 4110.996473][T25938] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4110.996626][T25938] audit: audit_lost=783 audit_rate_limit=0 audit_backlog_limit=64 [ 4110.996770][T25938] audit: backlog limit exceeded [ 4110.998364][T25938] audit: audit_backlog=65 > audit_backlog_limit=64 [ 4110.998532][T25938] audit: audit_lost=784 audit_rate_limit=0 audit_backlog_limit=64 [ 4114.524274][ T31] kauditd_printk_skb: 1131 callbacks suppressed [ 4114.524604][ T31] audit: type=1400 audit(4114.430:37525): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4114.524779][ T31] audit: type=1400 audit(4114.430:37526): avc: denied { write } for pid=25935 comm="syz.3.5308" laddr=fe80::b lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4114.525116][ T31] audit: type=1400 audit(4114.430:37527): avc: denied { write } for pid=25935 comm="syz.3.5308" laddr=fe80::b lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4114.525422][ T31] audit: type=1400 audit(4114.450:37528): avc: denied { write } for pid=25935 comm="syz.3.5308" laddr=fe80::b lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4114.525702][ T31] audit: type=1400 audit(4114.450:37529): avc: denied { write } for pid=25935 comm="syz.3.5308" laddr=fe80::b lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4114.525961][ T31] audit: type=1400 audit(4114.450:37530): avc: denied { write } for pid=25935 comm="syz.3.5308" laddr=fe80::b lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4114.526271][ T31] audit: type=1400 audit(4114.450:37531): avc: denied { write } for pid=25935 comm="syz.3.5308" laddr=fe80::b lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4114.526533][ T31] audit: type=1400 audit(4114.450:37532): avc: denied { write } for pid=25935 comm="syz.3.5308" laddr=fe80::b lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4114.684440][ T31] audit: type=1400 audit(4114.510:37533): avc: denied { write } for pid=25935 comm="syz.3.5308" laddr=fe80::b lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4114.684821][ T31] audit: type=1400 audit(4114.510:37534): avc: denied { write } for pid=25935 comm="syz.3.5308" laddr=fe80::b lport=8 faddr=::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4121.314426][ T31] kauditd_printk_skb: 390 callbacks suppressed [ 4121.314668][ T31] audit: type=1400 audit(4121.230:37925): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4121.554250][ T31] audit: type=1400 audit(4121.360:37926): avc: denied { map_create } for pid=25942 comm="syz.3.5309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4121.554518][ T31] audit: type=1400 audit(4121.360:37927): avc: denied { perfmon } for pid=25942 comm="syz.3.5309" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4121.554593][ T31] audit: type=1400 audit(4121.360:37928): avc: denied { map_read map_write } for pid=25942 comm="syz.3.5309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4121.554642][ T31] audit: type=1400 audit(4121.380:37929): avc: denied { map_create } for pid=25942 comm="syz.3.5309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4121.554682][ T31] audit: type=1400 audit(4121.380:37930): avc: denied { bpf } for pid=25942 comm="syz.3.5309" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4121.554721][ T31] audit: type=1400 audit(4121.380:37931): avc: denied { map_read map_write } for pid=25942 comm="syz.3.5309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4121.554769][ T31] audit: type=1400 audit(4121.390:37932): avc: denied { prog_load } for pid=25942 comm="syz.3.5309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4121.554808][ T31] audit: type=1400 audit(4121.390:37933): avc: denied { bpf } for pid=25942 comm="syz.3.5309" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4121.554867][ T31] audit: type=1400 audit(4121.390:37934): avc: denied { perfmon } for pid=25942 comm="syz.3.5309" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4121.814348][T25946] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4121.815445][T25946] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4127.225904][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 4127.226156][ T31] audit: type=1400 audit(4127.160:37968): avc: denied { sys_module } for pid=25199 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4127.264295][ T31] audit: type=1400 audit(4127.190:37969): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4134.274571][ T31] audit: type=1400 audit(4134.200:37970): avc: denied { module_request } for pid=25199 comm="syz-executor" kmod="netdev-caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4134.854242][ T31] audit: type=1400 audit(4134.750:37971): avc: denied { write } for pid=25953 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4134.944458][ T31] audit: type=1400 audit(4134.860:37972): avc: denied { write open } for pid=25953 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4135.075031][ T31] audit: type=1400 audit(4134.990:37973): avc: denied { search } for pid=25953 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4135.227166][ T31] audit: type=1400 audit(4135.150:37974): avc: denied { search } for pid=25953 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4135.314460][ T31] audit: type=1400 audit(4135.220:37975): avc: denied { search } for pid=25953 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4135.354455][ T31] audit: type=1400 audit(4135.270:37976): avc: denied { search } for pid=25953 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4136.123329][ T31] audit: type=1400 audit(4136.050:37977): avc: denied { create } for pid=25957 comm="syz.3.5312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4136.128820][ T31] audit: type=1400 audit(4136.060:37978): avc: denied { write } for pid=25957 comm="syz.3.5312" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4136.129697][T25958] netlink: 8 bytes leftover after parsing attributes in process `syz.3.5312'. [ 4136.164153][ T31] audit: type=1400 audit(4136.070:37979): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4138.374235][T25961] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 4138.389020][T25961] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 4139.304353][ T31] kauditd_printk_skb: 65 callbacks suppressed [ 4139.304588][ T31] audit: type=1400 audit(4139.230:38045): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4139.304756][ T31] audit: type=1400 audit(4139.230:38046): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4139.304886][ T31] audit: type=1400 audit(4139.230:38047): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4139.305017][ T31] audit: type=1400 audit(4139.230:38048): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4139.305138][ T31] audit: type=1400 audit(4139.230:38049): avc: denied { read } for pid=25956 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4139.504374][ T31] audit: type=1400 audit(4139.430:38050): avc: denied { read open } for pid=25956 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4139.504666][ T31] audit: type=1400 audit(4139.430:38051): avc: denied { getattr } for pid=25956 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4139.504808][ T31] audit: type=1400 audit(4139.430:38052): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4139.504931][ T31] audit: type=1400 audit(4139.430:38053): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4139.714228][ T31] audit: type=1400 audit(4139.630:38054): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4144.484358][ T31] kauditd_printk_skb: 52 callbacks suppressed [ 4144.484647][ T31] audit: type=1400 audit(4144.410:38107): avc: denied { read open } for pid=25956 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4144.484837][ T31] audit: type=1400 audit(4144.410:38108): avc: denied { getattr } for pid=25956 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4144.484972][ T31] audit: type=1400 audit(4144.410:38109): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4145.344457][ T31] audit: type=1400 audit(4145.250:38110): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4145.344754][ T31] audit: type=1400 audit(4145.250:38111): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4145.345214][ T31] audit: type=1400 audit(4145.250:38112): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4145.345414][ T31] audit: type=1400 audit(4145.250:38113): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4145.700323][ T31] audit: type=1400 audit(4145.630:38114): avc: denied { module_request } for pid=25968 comm="syz.3.5315" kmod="crypto-cbc-twofish-3way-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4145.784381][ T31] audit: type=1400 audit(4145.710:38115): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4145.784685][ T31] audit: type=1400 audit(4145.710:38116): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4150.104590][ T31] kauditd_printk_skb: 39 callbacks suppressed [ 4150.104812][ T31] audit: type=1400 audit(4150.030:38156): avc: denied { read } for pid=25956 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4150.105058][ T31] audit: type=1400 audit(4150.030:38157): avc: denied { read open } for pid=25956 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4150.105244][ T31] audit: type=1400 audit(4150.030:38158): avc: denied { getattr } for pid=25956 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4150.105423][ T31] audit: type=1400 audit(4150.030:38159): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4150.105589][ T31] audit: type=1400 audit(4150.030:38160): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4150.430967][ T31] audit: type=1400 audit(4150.360:38161): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4150.594530][ T31] audit: type=1400 audit(4150.520:38162): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4150.594861][ T31] audit: type=1400 audit(4150.520:38163): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4150.595034][ T31] audit: type=1400 audit(4150.520:38164): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4150.595209][ T31] audit: type=1400 audit(4150.520:38165): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4155.865070][ T31] kauditd_printk_skb: 57 callbacks suppressed [ 4155.865289][ T31] audit: type=1400 audit(4155.800:38223): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4155.867045][ T31] audit: type=1400 audit(4155.800:38224): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4156.067190][ T31] audit: type=1400 audit(4156.000:38225): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4156.114344][ T31] audit: type=1400 audit(4156.030:38226): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4156.164502][ T31] audit: type=1400 audit(4156.070:38227): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4156.164792][ T31] audit: type=1400 audit(4156.070:38228): avc: denied { read } for pid=25956 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4156.164969][ T31] audit: type=1400 audit(4156.070:38229): avc: denied { read open } for pid=25956 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4156.165102][ T31] audit: type=1400 audit(4156.070:38230): avc: denied { getattr } for pid=25956 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4156.324292][ T31] audit: type=1400 audit(4156.240:38231): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4156.324554][ T31] audit: type=1400 audit(4156.240:38232): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4161.494202][ T31] kauditd_printk_skb: 53 callbacks suppressed [ 4161.494430][ T31] audit: type=1400 audit(4160.570:38286): avc: denied { module_request } for pid=25984 comm="syz.3.5318" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4161.494606][ T31] audit: type=1400 audit(4160.590:38287): avc: denied { getattr } for pid=25956 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4161.494764][ T31] audit: type=1400 audit(4160.790:38288): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4161.494935][ T31] audit: type=1400 audit(4160.790:38289): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4161.495069][ T31] audit: type=1400 audit(4160.790:38290): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4161.495191][ T31] audit: type=1400 audit(4160.790:38291): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4161.495312][ T31] audit: type=1400 audit(4160.790:38292): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4161.495434][ T31] audit: type=1400 audit(4160.980:38293): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4161.495556][ T31] audit: type=1400 audit(4160.980:38294): avc: denied { search } for pid=25956 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4161.495678][ T31] audit: type=1400 audit(4160.980:38295): avc: denied { read } for pid=25956 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4166.894684][ T31] kauditd_printk_skb: 48 callbacks suppressed [ 4166.895466][ T31] audit: type=1400 audit(4166.820:38344): avc: denied { search } for pid=25953 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4166.895878][ T31] audit: type=1400 audit(4166.820:38345): avc: denied { search } for pid=25953 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4166.896254][ T31] audit: type=1400 audit(4166.820:38346): avc: denied { search } for pid=25953 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4166.896680][ T31] audit: type=1400 audit(4166.820:38347): avc: denied { write search } for pid=25953 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4167.186404][ T31] audit: type=1400 audit(4167.080:38348): avc: denied { add_name search } for pid=25953 comm="dhcpcd-run-hook" name="resolv.conf.eth19.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4167.295329][ T31] audit: type=1400 audit(4167.120:38349): avc: denied { create } for pid=25953 comm="dhcpcd-run-hook" name="resolv.conf.eth19.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4167.295914][ T31] audit: type=1400 audit(4167.200:38350): avc: denied { write open } for pid=25953 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth19.link" dev="tmpfs" ino=110 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 4167.494343][ T31] audit: type=1400 audit(4167.380:38351): avc: denied { search } for pid=25953 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4167.597470][ T31] audit: type=1400 audit(4167.530:38352): avc: denied { search } for pid=25953 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4167.674373][ T31] audit: type=1400 audit(4167.580:38353): avc: denied { search } for pid=25953 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 4168.620113][T25992] fuse: Bad value for 'fd' [ 4171.424901][ T32] INFO: task kworker/1:2:25138 blocked for more than 430 seconds. [ 4171.425250][ T32] Not tainted 6.15.0-rc5-syzkaller #0 [ 4171.425432][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 4171.425707][ T32] task:kworker/1:2 state:D stack:0 pid:25138 tgid:25138 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 4171.426159][ T32] Workqueue: events bpf_prog_free_deferred [ 4171.426507][ T32] Call trace: [ 4171.426901][ T32] [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130) [ 4171.427067][ T32] r10:8291a684 r9:dfcb1d84 r8:00000002 r7:60000113 r6:dfcb1d8c r5:83b0a400 [ 4171.427209][ T32] r4:83b0a400 [ 4171.427334][ T32] [<81a5367c>] (schedule) from [<81a53a90>] (schedule_preempt_disabled+0x18/0x24) [ 4171.427516][ T32] r5:83b0a400 r4:8291a680 [ 4171.427639][ T32] [<81a53a78>] (schedule_preempt_disabled) from [<81a56174>] (__mutex_lock.constprop.0+0x300/0x6f8) [ 4171.427795][ T32] [<81a55e74>] (__mutex_lock.constprop.0) from [<81a56640>] (__mutex_lock_slowpath+0x14/0x18) [ 4171.427988][ T32] r10:8280c8d4 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dfcb1e08 [ 4171.428165][ T32] r4:00000000 [ 4171.428308][ T32] [<81a5662c>] (__mutex_lock_slowpath) from [<81a56680>] (mutex_lock+0x3c/0x40) [ 4171.428463][ T32] [<81a56644>] (mutex_lock) from [<804e78ec>] (_vm_unmap_aliases+0x68/0x240) [ 4171.428620][ T32] [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204) [ 4171.428785][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8908f600 [ 4171.428942][ T32] r4:00000000 [ 4171.429036][ T32] [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50) [ 4171.429225][ T32] r9:83018205 r8:83b0a400 r7:00000000 r6:83018200 r5:00001000 r4:7f2be000 [ 4171.429330][ T32] [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14) [ 4171.429484][ T32] r5:00001000 r4:dfeb3000 [ 4171.429609][ T32] [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4) [ 4171.429842][ T32] [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164) [ 4171.430029][ T32] r5:85cc5b8c r4:85cc5800 [ 4171.430167][ T32] [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4) [ 4171.430327][ T32] r7:ddde2d80 r6:83018200 r5:85cc5b8c r4:8bb9da80 [ 4171.430564][ T32] [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8) [ 4171.430913][ T32] r10:61c88647 r9:83b0a400 r8:8bb9daac r7:82804d40 r6:ddde2d80 r5:ddde2da0 [ 4171.431185][ T32] r4:8bb9da80 [ 4171.431395][ T32] [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280) [ 4171.431702][ T32] r10:00000000 r9:8bb9da80 r8:80287e08 r7:df9e5e60 r6:88e82400 r5:83b0a400 [ 4171.431915][ T32] r4:00000001 [ 4171.432122][ T32] [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4171.432422][ T32] Exception stack(0xdfcb1fb0 to 0xdfcb1ff8) [ 4171.432666][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 4171.432906][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4171.433175][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4171.433406][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [ 4171.433682][ T32] r4:8ba9db00 [ 4171.565657][ T32] INFO: task kworker/1:2:25138 is blocked on a mutex likely owned by task kworker/1:4:25139. [ 4171.566054][ T32] task:kworker/1:4 state:R running task stack:0 pid:25139 tgid:25139 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 4171.566431][ T32] Workqueue: events bpf_prog_free_deferred [ 4171.566747][ T32] Call trace: [ 4171.567054][ T32] [<81a52724>] (__schedule) from [<81a53adc>] (preempt_schedule_irq+0x40/0xa8) [ 4171.567247][ T32] r10:82ac21c4 r9:85020000 r8:80200be4 r7:dfd25d5c r6:ffffffff r5:85020000 [ 4171.567416][ T32] r4:00000000 [ 4171.567577][ T32] [<81a53a9c>] (preempt_schedule_irq) from [<80200c04>] (svc_preempt+0x8/0x18) [ 4171.567729][ T32] Exception stack(0xdfd25d28 to 0xdfd25d70) [ 4171.567867][ T32] 5d20: a6b66000 fe540000 00000001 80239b98 7f2b8000 00000001 [ 4171.567980][ T32] 5d40: 82ac15a0 7f2b8000 fe540000 8280c928 82ac21c4 dfd25da4 dfd25da8 dfd25d78 [ 4171.568119][ T32] 5d60: 80230ad0 80239bb0 80000113 ffffffff [ 4171.568240][ T32] r5:80000113 r4:80239bb0 [ 4171.568357][ T32] [<80230a6c>] (flush_tlb_kernel_range) from [<804e76c0>] (__purge_vmap_area_lazy+0x210/0x3d4) [ 4171.568540][ T32] r4:82ac21e4 [ 4171.568667][ T32] [<804e74b0>] (__purge_vmap_area_lazy) from [<804e7a68>] (_vm_unmap_aliases+0x1e4/0x240) [ 4171.568814][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfd25dc0 r5:dfd25e08 [ 4171.568932][ T32] r4:dfd25dc0 [ 4171.569042][ T32] [<804e7884>] (_vm_unmap_aliases) from [<804eb7c0>] (vfree+0x168/0x204) [ 4171.569191][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:86a48dc0 [ 4171.569323][ T32] r4:00000000 [ 4171.569449][ T32] [<804eb658>] (vfree) from [<8054b224>] (execmem_free+0x30/0x50) [ 4171.569604][ T32] r9:83018205 r8:85020000 r7:00000000 r6:83018200 r5:00001000 r4:7f2ba000 [ 4171.569749][ T32] [<8054b1f4>] (execmem_free) from [<803cc36c>] (bpf_jit_free_exec+0x10/0x14) [ 4171.569896][ T32] r5:00001000 r4:dfe73000 [ 4171.570046][ T32] [<803cc35c>] (bpf_jit_free_exec) from [<803cc74c>] (bpf_jit_free+0x68/0xe4) [ 4171.570222][ T32] [<803cc6e4>] (bpf_jit_free) from [<803cd8a8>] (bpf_prog_free_deferred+0x14c/0x164) [ 4171.570401][ T32] r5:85f8038c r4:85f80000 [ 4171.570531][ T32] [<803cd75c>] (bpf_prog_free_deferred) from [<802873bc>] (process_one_work+0x1b4/0x4f4) [ 4171.570733][ T32] r7:ddde2d80 r6:83018200 r5:85f8038c r4:8bb9db00 [ 4171.570889][ T32] [<80287208>] (process_one_work) from [<80288004>] (worker_thread+0x1fc/0x3d8) [ 4171.571072][ T32] r10:61c88647 r9:85020000 r8:8bb9db2c r7:82804d40 r6:ddde2d80 r5:ddde2da0 [ 4171.571171][ T32] r4:8bb9db00 [ 4171.571291][ T32] [<80287e08>] (worker_thread) from [<8028f074>] (kthread+0x12c/0x280) [ 4171.571427][ T32] r10:00000000 r9:8bb9db00 r8:80287e08 r7:df9e5e60 r6:88e82c80 r5:85020000 [ 4171.571524][ T32] r4:00000001 [ 4171.571664][ T32] [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4171.571817][ T32] Exception stack(0xdfd25fb0 to 0xdfd25ff8) [ 4171.571969][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 4171.572138][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4171.572268][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4171.572410][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [ 4171.572539][ T32] r4:8569fc40 SYZFAIL: failed to recv rpc [ 4171.724992][ T32] NMI backtrace for cpu 0 [ 4171.725229][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 4171.725364][ T32] Hardware name: ARM-Versatile Express [ 4171.725385][ T32] Call trace: [ 4171.725494][ T32] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 4171.725604][ T32] r7:00000000 r6:00000113 r5:60000193 r4:82257c34 [ 4171.725617][ T32] [<80201ac8>] (show_stack) from [<8022003c>] (dump_stack_lvl+0x70/0x7c) [ 4171.725671][ T32] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 4171.725776][ T32] r5:00000000 r4:00000001 [ 4171.725785][ T32] [<80220048>] (dump_stack) from [<81a3c88c>] (nmi_cpu_backtrace+0x160/0x17c) [ 4171.725884][ T32] [<81a3c72c>] (nmi_cpu_backtrace) from [<81a3c9d8>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 4171.725953][ T32] r7:00000000 r6:8280c610 r5:8281af00 r4:ffffffff [ 4171.725963][ T32] [<81a3c8a8>] (nmi_trigger_cpumask_backtrace) from [<802304dc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 4171.726086][ T32] r9:0005e85e r8:82ab6564 r7:8280c788 r6:00007f04 r5:8281b4c8 r4:85d53f0c [ 4171.726104][ T32] [<802304c4>] (arch_trigger_cpumask_backtrace) from [<80386ef4>] (watchdog+0x4a8/0x69c) [ 4171.726140][ T32] [<80386a4c>] (watchdog) from [<8028f074>] (kthread+0x12c/0x280) [ 4171.726218][ T32] r10:00000000 r9:00000000 r8:80386a4c r7:833aa200 r6:833aa200 r5:83369800 [ 4171.726245][ T32] r4:00000001 [ 4171.726253][ T32] [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4171.726372][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 4171.726411][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 4171.726496][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4171.726529][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4171.726640][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [ 4171.726653][ T32] r4:833a7700 [ 4171.727234][ T32] Sending NMI from CPU 0 to CPUs 1: [ 4171.727723][ C1] NMI backtrace for cpu 1 [ 4171.727921][ C1] CPU: 1 UID: 0 PID: 23105 Comm: syz.3.4558 Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 4171.727960][ C1] Hardware name: ARM-Versatile Express [ 4171.727988][ C1] PC is at finish_task_switch+0x8c/0x284 [ 4171.728044][ C1] LR is at _raw_spin_unlock+0x2c/0x50 [ 4171.728080][ C1] pc : [<8029ebbc>] lr : [<81a5b9c0>] psr: 20000113 [ 4171.728103][ C1] sp : eb80de68 ip : eb80de58 fp : eb80deac [ 4171.728122][ C1] r10: 00000000 r9 : 84231800 r8 : 855c6c00 [ 4171.728148][ C1] r7 : 84231800 r6 : 81a52c18 r5 : ddde30c0 r4 : 00000000 [ 4171.728182][ C1] r3 : 84231800 r2 : 00000001 r1 : 82257c34 r0 : 00000001 [ 4171.728266][ C1] Flags: nzCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 4171.728305][ C1] Control: 30c5387d Table: 8b9b7700 DAC: 00000000 [ 4171.728340][ C1] Call trace: [ 4171.728364][ C1] [<8029eb30>] (finish_task_switch) from [<81a52c18>] (__schedule+0x4f4/0xf58) [ 4171.728410][ C1] r10:a402b648 r9:8a4be100 r8:00000000 r7:84231800 r6:84231800 r5:ddde30c0 [ 4171.728420][ C1] r4:85020000 [ 4171.728429][ C1] [<81a52724>] (__schedule) from [<81a536a8>] (schedule+0x2c/0x130) [ 4171.728465][ C1] r10:00006364 r9:84231800 r8:00000000 r7:84231800 r6:00000000 r5:eb80dfb0 [ 4171.728475][ C1] r4:84231800 [ 4171.728482][ C1] [<81a5367c>] (schedule) from [<8022b7f4>] (do_work_pending+0x34/0x4f8) [ 4171.728513][ C1] r5:eb80dfb0 r4:84231800 [ 4171.728521][ C1] [<8022b7c0>] (do_work_pending) from [<80200088>] (slow_work_pending+0xc/0x24) [ 4171.728547][ C1] Exception stack(0xeb80dfb0 to 0xeb80dff8) [ 4171.728567][ C1] dfa0: ffffffff 00000004 000001e4 00000000 [ 4171.728584][ C1] dfc0: 00000000 0000eaa2 00000000 00000000 002d0000 00000000 00006364 76b740bc [ 4171.728600][ C1] dfe0: 200002b0 200002b0 00019438 00019438 20000010 ffffffff [ 4171.728618][ C1] r10:00006364 r9:84231800 r8:00000000 r7:84231800 r6:ffffffff r5:20000010 [ 4171.728627][ C1] r4:00019438 [ 4171.805514][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 4171.806975][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc5-syzkaller #0 PREEMPT [ 4171.807627][ T32] Hardware name: ARM-Versatile Express [ 4171.807968][ T32] Call trace: [ 4171.808267][ T32] [<802019e4>] (dump_backtrace) from [<80201ae0>] (show_stack+0x18/0x1c) [ 4171.808848][ T32] r7:00000000 r6:828227fc r5:00000000 r4:82257c34 [ 4171.809237][ T32] [<80201ac8>] (show_stack) from [<80220020>] (dump_stack_lvl+0x54/0x7c) [ 4171.809763][ T32] [<8021ffcc>] (dump_stack_lvl) from [<80220060>] (dump_stack+0x18/0x1c) [ 4171.810211][ T32] r5:00000000 r4:82a70d4c [ 4171.810452][ T32] [<80220048>] (dump_stack) from [<802025f8>] (panic+0x120/0x374) [ 4171.811037][ T32] [<802024d8>] (panic) from [<80386d60>] (watchdog+0x314/0x69c) [ 4171.811645][ T32] r3:00000001 r2:00000000 r1:00000000 r0:822587cc [ 4171.812131][ T32] r7:8280c788 [ 4171.812311][ T32] [<80386a4c>] (watchdog) from [<8028f074>] (kthread+0x12c/0x280) [ 4171.812858][ T32] r10:00000000 r9:00000000 r8:80386a4c r7:833aa200 r6:833aa200 r5:83369800 [ 4171.813325][ T32] r4:00000001 [ 4171.813540][ T32] [<8028ef48>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 4171.814050][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 4171.814353][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 4171.814739][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 4171.815029][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 4171.815243][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8028ef48 [ 4171.815470][ T32] r4:833a7700 [ 4171.816858][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 00:10:19 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000002 R02=ebba5030 R03=00000030 R04=841ae840 R05=ebbb9f08 R06=8295b320 R07=00000000 R08=8282a2b8 R09=00000000 R10=00002f2c R11=ebbb9e6c R12=ebbb9e08 R13=ebbb9e48 R14=81a5bab4 R15=80a62a48 PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=82257c34 R02=00000001 R03=81a50408 R04=00000006 R05=828fac48 R06=00000000 R07=828fac40 R08=855c6c00 R09=00000028 R10=828fac48 R11=df805eb4 R12=df805eb8 R13=df805ea8 R14=803481f4 R15=81a50418 PSR=20000193 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000