last executing test programs: 2m26.881346889s ago: executing program 1 (id=2766): pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = inotify_init() close(r1) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r2, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) connect$unix(r3, &(0x7f0000000040)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) accept$packet(r1, 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x9032, r0, 0x8000000) 2m24.131596095s ago: executing program 1 (id=2767): sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x2c, 0x1d, 0x800, 0x70bd26, 0x25dfdbfc, {0x1c}, [@nested={0x18, 0x72, 0x0, 0x1, [@typed={0x14, 0x3b, 0x0, 0x0, @ipv6=@mcast1}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000011}, 0x2004c004) r0 = openat$sysfs(0xffffff9c, &(0x7f0000000100)='/sys/kernel/notes', 0x90880, 0x110) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x52e98394cd8ac005}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x6c, r1, 0x400, 0x70bd2d, 0x25dfdbff, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x6}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x2}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4010}, 0x4) write$binfmt_misc(r0, &(0x7f00000002c0)="6c7ff5b78fdcc5f1d8e4ee1841e2d14b54645f436f9dec6ff98d76bed453c6082c4cb0ed5c4c306310d5cf89b17816e9a44391752cbba746fd219f8f74881a4489f4b5e5d8b8818a718f3df3d029e883cbe78fb76e525d34ee2ef81a18cc686e27a8fbc4e713dc5d861b181eeb47910931f91fa6fc8dad6003eeee786ca1fa30f7368a4a18beb653001e3a30d65a9fdad46c84423e1c58560c05541ddbcaed58b7cc49ff94e9860392eea2afd6ae892c9cbd63e20101466475f6502336da785e497e2a25b7bbe4464ce5938ec1fb1de9279cc1ae15e1ed0e93471d1a74cefd3786b464ff72789a5b5b6bc96c2cb2258e5cd53ec72c1a469646a2b765b5314dd54368a8513bc14b0951866860c79542c74782007ea2c3257a3fff5058c88e544ec81aaee35f68c573c51b61be1a70765b9c1371b073f669c260f3ed1b90d4045f29f918ab08be5b23ff6531dde1856344086927b418abf855f90214b155f7989f09644cc0c1090efcebf696ca34a8fe6f40326b13969895c4d849f2a4a9e451e5742cff005792e917ff74468b1d1e455d10133ecffd9b9bf85d02a9b1dafb5da82430d286350df3282061f33e04bf1d11501a9387d2b17286deecf6ab0dfcd872a539da9fc739b1d597ea089f80e48a8f1717197acd99175a35ed34c0493bf6dabfbdb7ef6190c656fa280e5f069901be1deffafcf892222a4808f9f3a38a92af26b8da8d7fd780f34f9adcd396970da34300b2fb1f4cd79f2f6d247a095e279d15514ca9ecd7b3559b70924e568cfb49059dea9f53b0d299cf5bf39658494adcc7cf5b18e1fb8622081ab9fe4b9080d7c792c0bb7d2168a66c56b33ac78b25d0c4fd21b691de9dd039e71b56942743ed0369a7bb5dad78088961b46b1efbb02bbbf020c85fc7fca69aa8d3a31dc0cdf62905a12cbbffd9e6389f03bb143863cf51c6f817877f250c879af679dbc37f298fb4e740d99341e257187c0c0b6c2d45ba4cde7a9bae0ef9a1f70be2f39e060a6bc5dfd62d759ab5c4866275417a1481c6a261313983ec17796f1d0a1be815cb464400f60bb9e7d25c4e45ea29f3f2b88a66ee8fe57e96b418eab7cfa22db72e6c8a9adc8ec53cf5eaa0bd12ae0ff657216e256ab703922384c3fbe57626484f3ad600628ad9e5469cb98b061c53c482fe699d5d18ed0c2d0498c71f497dd8a7b2069788332791ccc5c07f6e309866c4406fe3fc7cc92ab92dd5b67bd00a536c52c47cc47ab659dcd08940e3e4e9750b08b24c072423213e23eb20cfdb94574d3e2da193bfc8895c9988c463782120f7f041b1a9eb1622d84b6a7ce440777c6b38787a11c380d41e0f9b4c4c717462898ddb74a94ae78f2dd8eee2b1b409dc6d78255f75133173e742939bb4c644847a366ac53769168c9a290a11809386d7259504715fcdd47c4a1a2220f806789039fb18ca3503fee208344f8c49a9470543d31deec140580575a10f95c5cc7a9f5d6747296115409bd4dff2403ef6389f0e6f3ae9f303ce5ec810b98444216c01070cf2c661f25130df6eab18929f1d11e171f86596ef3a185436fd8c6baadb2dff5f8c931760b31ae167a19316053e3baac4f26b034953695a27514fbfdaf7a868be9e6d689b2d0cf54d62d79670e0337aa9f251a0b8f6bcf0991682781826711e1c9946828f45ea927752860ff4f8f9e789b0fd2ecb53bd8f2effa5447066474069592f0cef60510d052af1e173b46165f23597d257c2ef198e8d5900ac6434985e98edbe3c0fd80e901537b975943bad80d797813643fcc5392dc526b8f65529eb8e1cf9def2e003e5109cfcbc86a220ede358a3c845e03920b15c98b6d68cbf8fb1978a704f51a66cacf28864d2850b22471e57d7b0f65f5a426781b90bba65b0d06c2277f0e5d7372ec49f2d3637474c0ce8d11ada238c2eb495428591d69c4860874b1586ef313eeecd2e98620a9989fa6822dc9ca9048125b34225fc955d19ea5d2207dc77ee1e2337c5e62246e33fbe00f8428174a8aed868f4e9346331e4474f6a8ec424c1896136cbf5f1cd2324b42279a92012af52f6c1b7a75abd39576dac79f8f50cea64e57a754ec4d29905e61ea9c3493d2197460ed6cae8c06a183f3dbcf578011205ae5c349503b172c5002cad87c66c71965479afda968b2bef31818298591c482fb512069d35628ea1669fdf79b310f09f325d0e701e0f2ffc628ca28b5872b927036211a1934405e5ef27aabbe437943a0761b9cde84dbc76e87e886d634a206a6cc2fa0891304f6a213039f6f33afffa5827ca18be7032601642ebd0fce258dcbbfe3e898bd4a9b93722c8a31afb9041d4b39aa938bf71e1b35b7e63787088f7c264aa7bc40a049802dd60f066a487a7a2685831e72a53d50520f3497361e354c66a0812fb16d52a49dd3fa4a7185abe15cce1a723f02cafb8cb822dc4017a51e60dc7f6e305822cc270f6cd6150343bb3a5546df72c9138724eb9d7cf3e8b836fdc7eb7fd636a5c69e0f5b3b1699a298726745a0622ce0c0b82bbf27258e3c41d636da8d47d14dbec604cd556e84b48d5f9836ce576cce8d0728f40cac0161b9113d1c2d28402659435e4657a71004680030f76d62ba39dd3ae63ba93f2c7a971c0d74d0896ce930d69b5cb6a28834d30927bf15eba1bdd861b0e2cd7f720109754e350bade5e16b9ba0b30b135030a3953b514164b645b51c29217f4c0673d335d176c2f43e1b9ff0b332e59d8cbcb5e441db53529bad505245551d63ddcb66b41958e692f7660bdd73ace6d008f97e909f09ae8985e36b294f2c693d857488c446544b1bd7a2618daa81ed6c9839f052832c38c411e6c89e478d244506e5773788b77b4da6c50386a913b4b77ec63ec63c6b31b2e47b1acd46ebad772f2fb60531c66272946832e842cdc0522aada86d40bc7660dd48288665942e2404c30c24b48473f7e7bb2067a35d87eec585c2968ddb9833c9c41a2502a5c668d76afa2b499132749f0a3ca8036292705891b22219b6dd93385ff158f020fe7b35839603730b054ec5b817d6694c13cc797526ea5c40260eadbc1a35c4563a36a5d066c4af548591b315482fc7d774e89fa6f9eec2a00b9ebb9c938877896787942378d584caee68594db053f1b488cd63835dd365a53ff9c8f8da2a9a837b1c5dd4b9527937c6f915196587a380cc123192bfc26ed9e03239e2e82963d208f5ec04503afa3f7cd91d9214aead4de76ccf711bfcba973a208b072702bb4049c2eccb3cef475c2c9f059918eeb7816d2323107c842fa3f5654d9ff4eb0b2f0dd7f7390e74dcbefcde83a96f37e34bb92167cffd517b93f74d1b6ee01c05104160970c738a820db1ded9806219804dcc501b7fed5170f9f35f655fb258573a8820bcaa67f8fc96feaee0f7260626558f732fb2e32e3a4152620d52cf40ca75f8253e229653f679686624f6ff687c1c0d5a3b0dd0a7bc0cb73fcb90403e5b7116a15326c2f763a3396877ec633ed52e3bffbc773ca094aab6801631bf6146bf240ace6cf8ac08714325db24848aeda596db4cf169e4a3caac7d3eda358eb912dcc28614d8913931ce1e5dc9d39b5c497f85a2a1e892065d8218766de46a03caa1c53826352555a13a218686e4aabfa21042bc6b5bcbe8e5e5a28260b2680b10bee2a7abe4b2e86acfdd17bf1d9f6cf88ba611f79b91a105730eb55c47a6b51790b016eef78618f6d1ae022ef5992fb9d7c036d5c2afe5b3b0a649f45da9052db4fb8fd1852f27d37c97c798480516278ca2de5507b8a572f7dbf7097d8b9a447994463bd797b2be393a2d3dba72ae5254bdbaf0c9143f9ebd323a3f2c021e4284e4c535392a38ee814639f8485390fde17f331558dcbe313661b87945635fd3a96183428aafab99e98c483e0818bd6a8bad7ff55744fc2e7fe0d1e55a58d117dc3caba3c60939296c6f8286f9fd662e0b6c7980039b4144d079bae1425b24c3c113b92b877d6cf4b5eb5636c1d61e8c88054885f99ada859af32a60b17f2e3abe6e1765cdd503afdf0acbe7e855e8c732f085677e539cc89cf9bfffe8717175ee77aa622295c11dde8090ca0af4f49c84502122dba22d43175ca53921b0d9797cc48b63b51a0c0242c63f62d3153a6240e81bfc65a4c32d48ca27bc835324240f73ebdcd9d467a2418b75663160c74375e154439d532ba9fb54a90d49bf92ffc2fbba2e7b4b21e16d96b2ac58ac4fda92a054a296aa142c4df6a5fc50af9e192e9e299b0e5573bce02768de8f6bb8ef56d9146670c4e0fe0bf6df178ed29eb59fb9d006594dce6494a4e7d15dc664de62174a8c5b8215e06927ffd2b5556e8ccf6e934c87674e7aad58662e20278960c38d9af5cc1c281374dc1d05a81885428746723122021c1dbb7617beeb9f24b515fb6f715a619fa02d1dd4f176a178c599c9055df8b7856ae6fab3939b44cae0fb9119930438e3532654fe85240ebfa651bc86665821535764ade389d3e152e9bc392fe73fadffe1b4d526e1caee35f954e89400bf4e1f92fa6089454bf05bafca116b876e8ae9daa106d7bd1cf68867f38cc05bc9a64a0d580d739e9679696ac009c18cde610ed297b78b10556dca04d62281d9c1be8d90c4059eedf166c71acbfcf32143b3d87b88e730e66a19b032739d14fc0e23732a382934998a2d24f3634aaa992a88dc8b96dee403d36c18f9b3274c73a684709736932038264653400bf273fc19359884ec65c1bb818ffb22c246d0159577a6019fbd0a152e557300f0074bc9861e209c0e9d6b7207cca700f1c1af258a839b0c0faf94cefeeccf8422134918f939fc55e491dc05eec0088c04b4bc9100613da93e8c8bc05b428b37abaa42800122b6ee4a9f0e9508f22c0157d3aeedbc335ddeec70cd1f47b3b568e9ea5002545c16ac8cba6061c6cd664a2774839e1d3f98b86b31d0d2a201830cb824afac0df6e95169fd36a54f6fe2e63f5b6d7696ea7351a8c71a6e258fd01aecf22ee78e94ebd66aebb21241259ac69eb7d9cd05bb5629f70e4d6247316d2613d7e0a24f39dd7e8ed1268e591d1cf7ef2d7925e44c7a4a12597b3ca01346abaa17d9d32dcab0be9ddc8f70e7c46f71ee259d82418ce288ac454441173a6f420bd6bd50da8665b2087ed498f7bd1b02bac00d95174472c530e66eb9487cab19284c4dfab7a073f423ff725a145d699ee2c55fc07037a4a9ae5ab00c2d6820dc199faa88ad3884a2755b8233d8e085128e2ddb74821d306254624dfa342db7320cb744f95f5bd37afcc16233b0c0795f21ff4848b9d9c6fd97404dfba681be61db310787d70082cf1d59b704d161a7e4c94e9b07dd514e5e0f4d870a96a259af1f5f32ad1496dc2826cfa8e54c5b79350370f2ee359e27d636e4310e029cd554d80a3f3857ef95f730cecb5a58df9950a2e423ba489937357bf27fccf7c287ecf1a0aa4796e32f01f19d69d0aa7a281cde2bf1ab91bb6b74c42cca80e7aedf2b6ed156e13619f87b6fdd2bbe6ac77cd2ef10d2cb845da0addb3d085eb61ca07e5d6569381de3c0199414ea421551666e4074bff47f2847ba974437a89077ad658166b1790618cc910f7006418c189ae322f9a54ff0533a246f8f60b0994bf17529c9f76182b2a94f0fcfe445b6eb3eb8f3abecdf8cfa57d31a918051108044ab627b083172a63fab8f73462cbbbf1db31697c217f904a9c15ba91a12576c99538f0bde9c2a844f98ed0de2800cb2a3a172be4cfee06265c898e3eef098f1b4631f5373473a4c4ab4809745f", 0x1000) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000001300), r0) sendmsg$DEVLINK_CMD_RATE_NEW(r0, &(0x7f00000013c0)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001380)={&(0x7f0000001340)={0x30, r2, 0x300, 0x70bd2a, 0x25dfdbfc, {}, [@DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @DEVLINK_ATTR_RATE_TX_SHARE={0xc, 0xa6, 0x80000001}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x20000040) sendmsg$AUDIT_TRIM(r0, &(0x7f00000014c0)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000001480)={&(0x7f0000001440)={0x10, 0x3f6, 0x2, 0x70bd27, 0x25dfdbfe, "", ["", "", "", "", "", "", ""]}, 0x10}}, 0x40c0) ioctl$TIOCSISO7816(r0, 0xc0285443, &(0x7f0000001500)={0x7, 0x1, 0x3, 0x4, 0x7}) splice(r0, &(0x7f0000001540)=0xfe, r0, &(0x7f0000001580)=0x1000, 0x0, 0x2) timer_create(0x7, &(0x7f00000015c0)={0x0, 0x1f, 0x2}, &(0x7f0000001600)=0x0) r4 = openat$cgroup_ro(r0, &(0x7f0000001640)='cpuacct.usage_percpu\x00', 0x0, 0x0) bind$l2tp6(r0, &(0x7f0000001680)={0xa, 0x0, 0x94, @mcast2, 0x5, 0x3}, 0x20) recvmsg$kcm(r4, &(0x7f0000001e40)={&(0x7f00000016c0)=@sco={0x1f, @fixed}, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001740)=""/90, 0x5a}, {&(0x7f00000017c0)=""/165, 0xa5}, {&(0x7f0000001880)=""/248, 0xf8}, {&(0x7f0000001980)=""/234, 0xea}, {&(0x7f0000001a80)=""/230, 0xe6}, {&(0x7f0000001b80)=""/155, 0x9b}, {&(0x7f0000001c40)=""/177, 0xb1}], 0x7, &(0x7f0000001d40)=""/227, 0xe3}, 0x10100) fchmod(r0, 0x20) ioctl$SNDCTL_DSP_SUBDIVIDE(r4, 0xc0045009, &(0x7f0000001e80)) io_uring_register$IORING_UNREGISTER_PBUF_RING(r4, 0x17, &(0x7f0000004000)={&(0x7f0000003000)={[{&(0x7f0000001ec0)="313f3b01630561e2230a3aa2f8fccfffc148d88db4c67b5e9a92aa4aaf241b7acce4c2b586ce2001f1cfe64014602122be4f8be49c79cabcedd7713d08fab92de751e22bc11ae6f7ce2761f2bff0fb09e8e28b034cbb53615ccb7bb85d01a458c1c5bffa09e123b419135b85f5dfc810b8c3fcfbe20f80110c28aa216be8d9e663ef451a8e178cc032342a9f663ef70bef1ec6cf85c45a73496b2a6f7e40a6c382005bdb3617a991ed350acc9653b0b5ebb973cf149ffe8dc73f6bc1b6e65126def68675f917eac84e1d2886d07c139b9f11527fc765369fcae3dc6db4f86728a499f4ccefbf9590595591", 0xeb, 0x3}, {&(0x7f0000001fc0)="9105ee8e6f423cc765fa", 0xa}, {&(0x7f0000002000)="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", 0x1000}]}, 0x3}, 0x1) r5 = openat$zero(0xffffff9c, &(0x7f0000004040), 0xa1040, 0x0) ioctl$FS_IOC_GETFLAGS(r4, 0x80046601, &(0x7f0000004080)) socket$packet(0x11, 0x2, 0x300) r6 = openat$sndseq(0xffffff9c, &(0x7f00000040c0), 0x202000) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r6, 0xc058534f, &(0x7f0000004100)={{0xe}, 0x0, 0x1000, 0x400, {0x80, 0x1}, 0x8, 0x55}) timer_create(0x4da1d901198afbc5, &(0x7f00000042c0)={0x0, 0x33, 0x5, @thr={&(0x7f0000004180)="ce8d55ed78c37bf2fdf4ae2a6dbe75ff842d064de800adf878ac4f33a9db8e0c000e93154b4e9d51eeeb82d23b99d7b5ce8a4eb0e51f53342e5fde9d090e5c0bcc3eb743077ddab45f52640e837fc62606e56949d5ca1de1f0ad9e56e1f5a395f0cb0d9c91002ea3a6dad197ab0e", &(0x7f0000004200)="11324a0289bfa3c01f4358ffd70fcb2e881b5c9dd974cc5b181a97802ddb1f09380bcc2d5c70644a81d6d9d629d9a8b3776e33edfea28c57d4690ac8d3d92d3bf452f9c8eaa01166c80cef1d5b3cbf275d43f1753b0f6ae2b04ad0a9dd46946be427b6f0cb9d3fa7a5d41a79f29c75a45870faf740a64c032efe7dc7a835a1878e9f574920a5d3aaf3d9876b913d0052387074df704f46635991e9b5e13f17fa9d1e7eab8b9aa8f6e4b25307f42e19c2e7310e91ad2ed38b4306d0e3b8ea9d96"}}, &(0x7f0000004300)) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f0000004340)={0x200, 0x4, 0x0, 'queue1\x00'}) timer_settime(r3, 0x1, &(0x7f0000004400)={{}, {0x77359400}}, &(0x7f0000004440)) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TIMER(r4, 0xc0605345, &(0x7f0000004480)={0x4, 0x0, {0x1, 0x0, 0x3, 0x3, 0x9}, 0x1}) r7 = syz_genetlink_get_family_id$l2tp(&(0x7f0000004540), r5) sendmsg$L2TP_CMD_TUNNEL_GET(r4, &(0x7f0000004600)={&(0x7f0000004500), 0xc, &(0x7f00000045c0)={&(0x7f0000004580)={0x24, r7, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@L2TP_ATTR_PEER_CONN_ID={0x8, 0xa, 0x2}, @L2TP_ATTR_CONN_ID={0x8, 0x9, 0x4}]}, 0x24}, 0x1, 0x0, 0x0, 0x24000000}, 0x40000) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000004680)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000004640)={0xffffffffffffffff}, 0x106, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000046c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x5, @remote, 0x9}, {0xa, 0x4e23, 0x0, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8a3}, r8, 0x2}}, 0x48) 2m21.350407985s ago: executing program 1 (id=2768): r0 = inotify_init() ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5451, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0x5450, 0x0) inotify_init() (async) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0x5451, 0x0) (async) socket$inet(0x2, 0x1, 0x0) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0x5450, 0x0) (async) 2m19.231805999s ago: executing program 1 (id=2769): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='fdinfo\x00') fchdir(r0) exit(0xffff) symlink(&(0x7f0000000000)='./file0\x00', 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2$watch_queue(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0xb82e336200000000) dup3(r1, r2, 0x0) sendmsg$OSF_MSG_ADD(r2, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={0x0}, 0x1, 0x0, 0x0, 0x40098d0}, 0x40000) openat$zero(0xffffff9c, &(0x7f0000000000), 0x800, 0x0) 2m14.748341106s ago: executing program 1 (id=2770): r0 = openat$udambuf(0xffffff9c, &(0x7f0000000080), 0x2) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), 0xffffffffffffffff) r3 = openat$ubi_ctrl(0xffffff9c, &(0x7f0000001540), 0x22a000, 0x0) close(r3) socket(0x1d, 0x2, 0x6) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x108}}, 0x24040000) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x20, r2, 0x400, 0x70bd28, 0x25dfdbfd, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x8015}, 0x4008000) fstat64(r0, &(0x7f0000000180)) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r4, 0x0, 0x32, 0x0, &(0x7f0000000040)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r6, &(0x7f0000000040)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x80) getpeername(r5, &(0x7f0000001180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000008540)=0x80) r8 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) fcntl$dupfd(r8, 0x0, r8) mq_open(&(0x7f0000000400)='%:\x00\xe0\xb3]u\xb0\xee\x98\f4\x97\x16\x95\x9bL[\xf7m\xc4\xf1\x9e/@\xbb\x96\xd3\x1f\xc1\xc6W\xfb_b\xc8\x11m\xd2D\f\x99d8\xd1\n\x8a\xc3\xa3\x8b\xfd\xd2\x05\xed\x14 v\xc4 \x04\x00\xc9\xa7S\xdd\x8c\xeb\xc5\xb2+g\xc9\xea\xc3.\xe3\x00\x04\x00\x00\xd4\xba\x06\x9e\xa7\xdb9\x9dC\x00', 0x0, 0x111, 0x0) r9 = mq_open(&(0x7f0000000100)='\x15\xd8\xd5\x00\x00\x00\x00\x11s1\\\x00', 0x40, 0x0, 0x0) pipe(&(0x7f0000000200)) r10 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r10, 0x890b, &(0x7f00000009c0)) ioctl$BTRFS_IOC_INO_LOOKUP(r9, 0x5450, 0x0) write$FUSE_IOCTL(r7, 0x0, 0x0) timer_settime(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000000)) 2m11.180249626s ago: executing program 1 (id=2771): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x90) r2 = io_uring_setup(0xd71, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x2}) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) 1m25.657788047s ago: executing program 32 (id=2771): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) timer_create(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, 0x0, 0x0, 0x90) r2 = io_uring_setup(0xd71, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x2}) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) 28.829218733s ago: executing program 2 (id=2797): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) request_key(0x0, 0x0, 0x0, 0x0) 28.280032156s ago: executing program 2 (id=2798): socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000000080), 0xffffffffffffffff) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0xfffc, 0x2, @loopback, 0xa09c}, {0xa, 0x2, 0xfffffffe, @dev={0xfe, 0x80, '\x00', 0x39}}, r1, 0x40099d}}, 0x48) memfd_create(&(0x7f0000000300)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac\x06\x9c&\xf5\xe3j\xfa\tcqM\xb8R\x86\xd9\xd2.\x9f\x12\xed\x10\f\xbd\x1a|\x8a\xbb\xda\xcfY\x98gU@\xf2M\xc0\xb5\xdf\x9a\x8d\xdb,n\xae\x0eT\x80\x8c\xfd\xd7\xb0\x94\x82t\x96\rKx\xc5\x9b\x8c\x87\x96\x8bc\xbc\xee\xcc\x9f\xe3F\x99V4\x8e;M\xa9\x823\xe3\xb3mG\x8f\xdb\xed\x1b\x05\xec\xfc\xd1\xb5\xfd\xec@\xdeU\xdd\xa4\xc1\xe4L)\x8e\xe5\x91\x8e\xd4\x89\xef\x95T\x05G\xac\xb8\xc1: )mh\xc7\xf1?\xbb\x13;\xad\x95\xd70\xb6\x0e\x7f\x84r\x0e\xbf\xc5\xf6\xd4\xdd\t\x14\x18\xf7\xefi\x93\x03\xd2\xf2\bK\"\xd2\xb5\xaa\xb8\xc8\xe0\xac\x99\xe8su\xcd\xc3E\x12\xd7\xdd\x96!\x16Tu\xe3\xf0\x84#R\xd9\xe3~Wj\xb0r\x87\'\xea\a\xcfOeK\x9daW\xf4\x87@\x9c\xf3\xf1K\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x91\xe6\xdb\xc2\xa5h\'\xdfIn\x97\x0263~\xeb\xbe(i\n\xc2k4\x7f\x12\xa9e`SOs\x8c\xb4\xe7FeQ\xc6$\x92j_U\xfa\b\xea\xb0bYkW\xc0\x05\aC{\xcc\x03T\x17\xa5Sk\x87P\xc2\x97D\xb2\xfa\x1b\x9fe\xf4\x10\x1a\xad\x92\xce\x88\x1b\xbc\xe14\x19\xaa\xd3\r\xf4\xa2\xc3\x9e=\xa0 \xe6j\xe5\x85\xf8\x97\x03\x15\xaa\x920\xdcrI\xd8\b\xfb\xc7\xe7xX\x00>d\xbb\xa71\xad\x9a\xfb\xe6\x13\x87\x93\\\xe5W-\xfc\xfd\xb8O\xb9j\xb8\xf2\x9dx\xb2\x86\xad\x92', 0x3) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r2 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x141102) writev(r2, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) syz_genetlink_get_family_id$mptcp(0x0, 0xffffffffffffffff) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) listen(0xffffffffffffffff, 0x3) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) 25.329656594s ago: executing program 2 (id=2799): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(0xffffffffffffffff, 0x40505330, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$sysctl(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/vm/drop_caches\x00', 0x1, 0x0) writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000140)='2', 0x1}], 0x1) 10.240757011s ago: executing program 2 (id=2801): openat$sequencer(0xffffff9c, 0x0, 0xa0000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x3, 0x3) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000800)={{0x2, 0x4e21, @remote}, {0x1, @remote}, 0x16, {0x2, 0x4e24, @multicast2}, 'bridge0\x00'}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, 0x0, 0x0, 0x0) recvmmsg(r0, 0x0, 0x0, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, 0x0) semget$private(0x0, 0x4, 0x11) r4 = socket$unix(0x1, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0xffffffff, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xc, 0xf}}}, 0x24}, 0x1, 0x0, 0x0, 0x8001}, 0x20008850) socket$unix(0x1, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=@newtfilter={0x24, 0x2c, 0xd27, 0x70bd28, 0xfffff000, {0x0, 0x0, 0x0, 0x0, {0xf000, 0xffff}, {}, {0x7, 0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x84}, 0x20000800) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r5, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40098}, 0x4000000) 9.598954005s ago: executing program 2 (id=2802): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)={0x24, r0, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x3}]}, 0x24}}, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x6, 0x100000b}, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x80202, 0x0) r2 = syz_open_dev$sndmidi(0x0, 0x2, 0x161102) writev(r2, &(0x7f0000000840)=[{0x0}], 0x1) r3 = syz_io_uring_setup(0x497, &(0x7f0000000180)={0x0, 0x4885, 0x100, 0x4, 0x1d}, &(0x7f0000000340)=0x0, &(0x7f0000000600)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) r6 = socket$inet_mptcp(0x2, 0x1, 0x106) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x44040050) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x20, 0x10, r6, 0x0, 0x0, 0x0, 0x322, 0x1, {0x1}}) io_uring_enter(r3, 0x3516, 0x0, 0x0, 0x0, 0x0) 8.951079569s ago: executing program 2 (id=2803): socket$l2tp(0x2, 0x2, 0x73) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x5, 0x0, &(0x7f00000003c0)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) request_key(&(0x7f0000000000)='asymmetric\x00', &(0x7f00000001c0)={'syz', 0x2}, &(0x7f0000000380)='\x00\xb2\xd1)\xda\xff|\xd1\x85b\xad77\x00\fJ\xfc\xb4\x1e\xae\xe8:`\xe9\x9ew\xf5l\xee\x8dg\xc2\'\x88\xe9\xf3\x05\xe02\xe6\v_\xe9\x89\x86s\x8dh#%\xe4\xb1\xd0\x93\xceh\xfcsP)\xd9\xce5+?\xc6\xf7\xc0[G\x15\xde-x\xa9\xe5,\xec\xf6\xfb\xc9~2\xa1\xeb\xb3Pp\x93\x90\x17\xb2\x95\xe7\r\xae^\x92n\xbd\xf3\xb1\xac\xe3sf\xc9X\x05j:\xb6~\xa6#\xbf\x06t\xf2\xb5gd\xd7\xcc\"A_\xecu\xe8\x84\xe3\x92J\xaa!\xae\xa2\xd7\xf3\xc6J\xb9i\x9d\xb4{\xee\xf0|\xd9\x05\xaa\xbb\xfe\x12\xa0\xbb\xecY\x0f \xa3\xba?#\x90\x8c,nNQ\xa1\xed', 0x0) readlink(0x0, 0x0, 0x0) getsockopt$SO_J1939_ERRQUEUE(0xffffffffffffffff, 0x6b, 0x4, 0x0, &(0x7f0000000080)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000000)=0x2003, 0x4) prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r4 = io_uring_setup(0x1ed0, &(0x7f0000000040)={0x0, 0x36d, 0xc000, 0x2, 0x296}) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x24, 0x0, 0x0) io_uring_enter(r4, 0x2219, 0x7721, 0x16, 0x0, 0x0) 4.770481351s ago: executing program 0 (id=2804): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r0}, 0x10) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000640)='/sys/power/pm_test', 0x42, 0x0) io_setup(0x20, &(0x7f0000001140)=0x0) io_submit(r2, 0x1, &(0x7f00000001c0)=[&(0x7f0000000d80)={0xf, 0x400000000000, 0x0, 0x1, 0x0, r1, &(0x7f0000000c40)='\r2', 0x2}]) 4.268954279s ago: executing program 0 (id=2805): waitid(0x2, 0x0, &(0x7f0000002b80), 0x41000004, 0x0) 3.480024129s ago: executing program 0 (id=2806): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)=@delchain={0x490, 0x65, 0x2, 0x70bd27, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x1}, {0x0, 0x2}, {0x0, 0xb}}, [@filter_kind_options=@f_matchall={{0xd}, {0x45c, 0x2, [@TCA_MATCHALL_ACT={0x458, 0x2, [@m_sample={0x11c, 0x5, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0x5}]}, {0xe5, 0x6, "38f25df555191be2c666d9a5f9fbf1c6674d930a6b49548795f779c04738d31476e7b46904303e774f670daac95204b3aa00967b9ec65d764b2e48bd715da197540ac2dbea2e115f4efd22ebb0c4531bf7fcd31b61547bd15f710737fab7ba50f6730bcf7c68fd6f6734dc220ebc37df3b8e187fddc4516e5f783c302bbc133134d2a06ab408a97de6505724f9be2eb62a565a1535810f54b758c56ab347d36db167b672425230830efb7606f51b3a894056ee7b74af7ad106d611b3d7c4a326bbd604993d9eba87f5d9d7c682cf9643bb5648bc70f946ebac22580878bb773b06"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x7}}}}, @m_ctinfo={0x8c, 0x1b, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_CTINFO_ACT={0x18, 0x3, {0x72a0, 0x40, 0xffffffffeffffff1, 0x2, 0x9}}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x7}, @TCA_CTINFO_PARMS_CPMARK_MASK={0x8, 0x7, 0x8001}]}, {0x35, 0x6, "89a75f1f9832982c0a59ad5c7b043805d7ff0d0a67a9df5adf2ac6dab7c5cfad8bbf15a9388f68544ed8dea9946ee57f3f"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_gact={0x110, 0x1d, 0x0, 0x0, {{0x9}, {0x88, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x2, 0xc7f, 0x5}}, @TCA_GACT_PROB={0xc, 0x3, {0x0, 0xa96}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x160e, 0x6}}, @TCA_GACT_PARMS={0x18, 0x2, {0x400, 0x9, 0x5, 0x3, 0x3bc}}, @TCA_GACT_PARMS={0x18, 0x2, {0x4, 0x5, 0x4, 0xe, 0x2800000}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x92a, 0x10000000}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0xfd0, 0x7}}, @TCA_GACT_PARMS={0x18, 0x2, {0x2, 0x8, 0x7, 0xfff, 0x4}}]}, {0x5d, 0x6, "015c581fa268e87cd777a21a4aca6176b1acd3c4573cb5b8a04e655698f2a2beb41a6dd4120f7117c00a0e5775ad33bb1e629bea904fa46de53a7a59512190f5b8772a6c1599cf0fd101865d09219c94c1fb32f139037d6237"}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}, @m_bpf={0x134, 0xa, 0x0, 0x0, {{0x8}, {0x68, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS={0x2c, 0x4, [{0x40, 0x7}, {0x6, 0x9, 0xf8, 0x800}, {0xbcd, 0x5, 0xe, 0x26}, {0x2, 0x80, 0x6, 0x1}, {0x19a0, 0xf, 0xa5, 0xb}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x9, 0x3, 0x2, 0x0, 0x8}}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file1\x00'}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file1\x00'}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x9}]}, {0xa5, 0x6, "1e638ad506923775d90f8bcd4c44f0045fe04bbf0447b151d86b4fcf408268db8ae4c3c80a4fb7af1b2bb5e0176ca651842030412dd105fde756269f3fe28a876f082e530b005a5ec88a1940d9a66d53e1eddaaf7fd6e3ed3a0157a30ec3af5b40380bf19b2c53885be368005ab29f0af3bb9b8ea0fb305edcec3dbab5770293228a2f990afb25b464ebd9cdd39d6254d397cbf0724224d27b0a20f2c95c2ba72d"}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}, @m_mirred={0x68, 0x16, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x1, 0x4, 0x1, 0x8}, 0x3}}]}, {0x1c, 0x6, "605524e3626aca9778df374bbcad3d51d25178b24ec88e3a"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}]}]}}]}, 0x490}, 0x1, 0x0, 0x0, 0x81}, 0x20000080) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000740)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x365}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0xffffffffffffff2f}}], 0x4000000000003b4, 0x2040000, &(0x7f0000003700)={0x77359400}) 2.583452592s ago: executing program 0 (id=2807): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0xa, 0x2, 0x200, @loopback, 0x7}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r0, &(0x7f0000000280)='2', 0x1, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0xffff, @loopback, 0x3}, 0x1c) syz_usb_connect(0x5, 0x24, &(0x7f0000001280)=ANY=[@ANYBLOB="12010003001f66088f0510660548020003010902"], 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood', 0x8) shutdown(r0, 0x1) 1.102810993s ago: executing program 0 (id=2808): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'pcl812\x00', [0x4f27, 0x5, 0x2, 0x401, 0x1, 0xcc7, 0xfff, 0x5c952399, 0x5, 0x3ff, 0x802, 0x1600, 0x1, 0x1, 0x9, 0xe1cb, 0x6, 0x4, 0x3, 0x395, 0x80000089, 0xfffffffd, 0x0, 0xfffffff5, 0xffffeadb, 0x3, 0x3c, 0x8, 0x4, 0x8000000, 0xdffffffa]}) 0s ago: executing program 0 (id=2809): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x4f27, 0x5, 0x2, 0x401, 0x21, 0xcc7, 0xfff, 0x5c952399, 0x5, 0x3ff, 0x0, 0x5, 0x1, 0x0, 0x9, 0xe1cb, 0x4, 0x4, 0x3, 0x395, 0x80000089, 0x2, 0x0, 0x6, 0xffffeadb, 0x3, 0x80000000, 0x8, 0x80000001, 0x8000000, 0x5]}) kernel console output (not intermixed with test programs): .804094][T14577] r5:8320e000 r4:82918840 [ 3305.804107][T14577] [<8021f8bc>] (dump_stack) from [<809870f8>] (should_fail_ex+0x1c4/0x228) [ 3305.804309][T14577] [<80986f34>] (should_fail_ex) from [<8052f608>] (should_failslab+0x6c/0x94) [ 3305.804404][T14577] r8:8320e000 r7:00000000 r6:00000cc0 r5:00000001 r4:83002840 [ 3305.804471][T14577] [<8052f59c>] (should_failslab) from [<8050f0d0>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 3305.804539][T14577] [<8050f084>] (kmem_cache_alloc_noprof) from [<81a3ea28>] (mas_alloc_nodes+0xd4/0x10c) [ 3305.804652][T14577] r10:20fff000 r9:00000000 r8:eb78dcb8 r7:20fff000 r6:00000cc0 r5:00000001 [ 3305.804674][T14577] r4:eb78dcb8 [ 3305.804715][T14577] [<81a3e954>] (mas_alloc_nodes) from [<81a457a0>] (mas_preallocate+0x1b4/0x268) [ 3305.804802][T14577] r7:20fff000 r6:00000cc0 r5:851ae000 r4:eb78dcb8 [ 3305.804831][T14577] [<81a455ec>] (mas_preallocate) from [<804f0fc4>] (__split_vma+0x148/0x438) [ 3305.804937][T14577] r6:82c3e0dc r5:851ae000 r4:85c44980 [ 3305.804980][T14577] [<804f0e7c>] (__split_vma) from [<804f1394>] (vms_gather_munmap_vmas+0xe0/0x404) [ 3305.805052][T14577] r10:eb78df18 r9:00000000 r8:eb78ddb0 r7:82c3e0dc r6:82c3e0e0 r5:85c44980 [ 3305.805091][T14577] r4:eb78dd6c [ 3305.805111][T14577] [<804f12b4>] (vms_gather_munmap_vmas) from [<804f36d4>] (__mmap_region+0x1ac/0xd7c) [ 3305.805222][T14577] r9:84295040 r8:00000000 r7:00000001 r6:20ffc000 r5:eb78dcb8 r4:00000000 [ 3305.805240][T14577] [<804f3528>] (__mmap_region) from [<804f4ee8>] (mmap_region+0x88/0x160) [ 3305.805303][T14577] r10:00000000 r9:84295040 r8:8320e000 r7:00003000 r6:20ffc000 r5:00000000 [ 3305.805323][T14577] r4:00000070 [ 3305.805339][T14577] [<804f4e60>] (mmap_region) from [<804d977c>] (do_mmap+0x368/0x538) [ 3305.805408][T14577] r8:20ffc000 r7:8320e000 r6:00000000 r5:00009032 r4:00003000 [ 3305.805432][T14577] [<804d9414>] (do_mmap) from [<804a5fec>] (vm_mmap_pgoff+0x144/0x20c) [ 3305.805503][T14577] r10:84295040 r9:20ffc000 r8:00003000 r7:eb78df18 r6:00000000 r5:00000000 [ 3305.805521][T14577] r4:00000000 [ 3305.805535][T14577] [<804a5ea8>] (vm_mmap_pgoff) from [<804d8938>] (ksys_mmap_pgoff+0x48/0xec) [ 3305.805676][T14577] r10:000000c0 r9:8320e000 r8:8020029c r7:20ffc000 r6:00003000 r5:00000000 [ 3305.805751][T14577] r4:00009032 [ 3305.805878][T14577] [<804d88f0>] (ksys_mmap_pgoff) from [<804d89f8>] (sys_mmap_pgoff+0x1c/0x24) [ 3305.805989][T14577] r8:8020029c r7:000000c0 r6:00130918 r5:08000000 r4:00000004 [ 3305.806029][T14577] [<804d89dc>] (sys_mmap_pgoff) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3305.806193][T14577] Exception stack(0xeb78dfa8 to 0xeb78dff0) [ 3305.806377][T14577] dfa0: 00000004 08000000 20ffc000 00003000 00000000 00009032 [ 3305.806461][T14577] dfc0: 00000004 08000000 00130918 000000c0 00300000 00000000 00006364 76fee0bc [ 3305.806509][T14577] dfe0: 76fedec0 76fedeb0 0001928c 00132970 [ 3306.267566][ T29] audit: type=1400 audit(3306.190:26677): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3306.276718][ T29] audit: type=1400 audit(3306.200:26678): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3306.282553][ T29] audit: type=1400 audit(3306.200:26679): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3306.755065][ T29] audit: type=1400 audit(3306.670:26680): avc: denied { read } for pid=14564 comm="syz.0.2710" name="fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3306.755549][ T29] audit: type=1400 audit(3306.670:26681): avc: denied { read open } for pid=14564 comm="syz.0.2710" path="/dev/fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3307.498197][ T29] audit: type=1400 audit(3307.420:26682): avc: denied { create } for pid=14578 comm="syz.1.2716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3307.590565][ T29] audit: type=1400 audit(3307.510:26683): avc: denied { setopt } for pid=14578 comm="syz.1.2716" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3311.879025][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 3311.880066][ T29] audit: type=1400 audit(3311.800:26691): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3311.948451][ T29] audit: type=1400 audit(3311.870:26692): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3311.950385][ T29] audit: type=1400 audit(3311.870:26693): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3312.774775][ T29] audit: type=1400 audit(3312.690:26694): avc: denied { create } for pid=14581 comm="syz.1.2717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3312.775153][ T29] audit: type=1400 audit(3312.690:26695): avc: denied { write } for pid=14581 comm="syz.1.2717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3312.775469][ T29] audit: type=1400 audit(3312.690:26696): avc: denied { module_request } for pid=14581 comm="syz.1.2717" kmod="net-pf-16-proto-16-family-TIPC" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3313.235761][ T29] audit: type=1400 audit(3313.150:26697): avc: denied { read } for pid=14581 comm="syz.1.2717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3313.279749][ T29] audit: type=1400 audit(3313.200:26698): avc: denied { create } for pid=14581 comm="syz.1.2717" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3313.282820][ T29] audit: type=1400 audit(3313.200:26699): avc: denied { module_request } for pid=14581 comm="syz.1.2717" kmod="net-pf-2-proto-156-type-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3313.746823][ T29] audit: type=1400 audit(3313.670:26700): avc: denied { module_request } for pid=14581 comm="syz.1.2717" kmod="net-pf-2-proto-156" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3315.893779][T14590] FAULT_INJECTION: forcing a failure. [ 3315.893779][T14590] name failslab, interval 1, probability 0, space 0, times 0 [ 3315.925306][T14590] CPU: 0 UID: 0 PID: 14590 Comm: syz.0.2718 Not tainted syzkaller #0 PREEMPT [ 3315.925452][T14590] Hardware name: ARM-Versatile Express [ 3315.925476][T14590] Call trace: [ 3315.925516][T14590] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3315.925633][T14590] r7:00000000 r6:00000000 r5:60000113 r4:82252568 [ 3315.925650][T14590] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 3315.925701][T14590] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 3315.925754][T14590] r5:851ca400 r4:82918840 [ 3315.925769][T14590] [<8021f8bc>] (dump_stack) from [<809870f8>] (should_fail_ex+0x1c4/0x228) [ 3315.925827][T14590] [<80986f34>] (should_fail_ex) from [<8052f608>] (should_failslab+0x6c/0x94) [ 3315.925898][T14590] r8:851ca400 r7:00000000 r6:00000cc0 r5:85a93440 r4:830a4240 [ 3315.925918][T14590] [<8052f59c>] (should_failslab) from [<8050f0d0>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 3315.925978][T14590] [<8050f084>] (kmem_cache_alloc_noprof) from [<805aea54>] (copy_fs_struct+0x24/0x98) [ 3315.926049][T14590] r10:eaefdea0 r9:00000000 r8:85a93440 r7:eaefde14 r6:851ca400 r5:85a93440 [ 3315.926070][T14590] r4:851cd400 [ 3315.926086][T14590] [<805aea30>] (copy_fs_struct) from [<80250904>] (copy_process+0xc04/0x1730) [ 3315.926149][T14590] r7:eaefde14 r6:851ca400 r5:40020000 r4:851cd400 [ 3315.926165][T14590] [<8024fd00>] (copy_process) from [<80251574>] (kernel_clone+0xac/0x3ec) [ 3315.926242][T14590] r10:851ca400 r9:851ca400 r8:00000000 r7:00000000 r6:eaefdea0 r5:00000058 [ 3315.926262][T14590] r4:40020000 [ 3315.926276][T14590] [<802514c8>] (kernel_clone) from [<802519a8>] (__do_sys_clone3+0xf4/0x128) [ 3315.926342][T14590] r10:000001b3 r9:851ca400 r8:8020029c r7:000001b3 r6:eaefdef4 r5:00000058 [ 3315.926361][T14590] r4:76f78db0 [ 3315.926376][T14590] [<802518b4>] (__do_sys_clone3) from [<80251c9c>] (sys_clone3+0x10/0x14) [ 3315.926432][T14590] r6:00000000 r5:40020000 r4:200003c0 [ 3315.926448][T14590] [<80251c8c>] (sys_clone3) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3315.926497][T14590] Exception stack(0xeaefdfa8 to 0xeaefdff0) [ 3315.926537][T14590] dfa0: 200003c0 40020000 76f78db0 00000058 76f78db0 00000058 [ 3315.926576][T14590] dfc0: 200003c0 40020000 00000000 000001b3 00300000 00000000 00006364 76f790bc [ 3315.926603][T14590] dfe0: 76f78da8 76f78d98 00017270 00132970 [ 3317.295168][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 3317.295756][ T29] audit: type=1400 audit(3317.210:26723): avc: denied { write } for pid=14611 comm="syz.0.2720" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3317.324084][ T29] audit: type=1400 audit(3317.240:26724): avc: denied { write open } for pid=14611 comm="syz.0.2720" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3317.338652][ T29] audit: type=1400 audit(3317.260:26725): avc: denied { read write } for pid=14612 comm="syz.1.2721" name="vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3317.340625][ T29] audit: type=1400 audit(3317.260:26726): avc: denied { read write open } for pid=14612 comm="syz.1.2721" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3317.347006][ T29] audit: type=1400 audit(3317.270:26727): avc: denied { ioctl } for pid=14612 comm="syz.1.2721" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf60 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3317.398698][ T29] audit: type=1400 audit(3317.320:26728): avc: denied { create } for pid=14612 comm="syz.1.2721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3317.451593][ T29] audit: type=1400 audit(3317.370:26729): avc: denied { ioctl } for pid=14611 comm="syz.0.2720" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x1275 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3317.462471][ T29] audit: type=1400 audit(3317.380:26730): avc: denied { ioctl } for pid=14612 comm="syz.1.2721" path="/dev/vhost-vsock" dev="devtmpfs" ino=709 ioctlcmd=0xaf7b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3317.473766][ T29] audit: type=1400 audit(3317.390:26731): avc: denied { create } for pid=14612 comm="syz.1.2721" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3317.508520][ T29] audit: type=1400 audit(3317.430:26732): avc: denied { ioctl } for pid=14611 comm="syz.0.2720" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x942b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3322.326533][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 3322.326888][ T29] audit: type=1400 audit(3322.250:26764): avc: denied { setopt } for pid=14621 comm="syz.0.2723" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3322.377619][ T29] audit: type=1400 audit(3322.300:26765): avc: denied { associate } for pid=14621 comm="syz.0.2723" name="file0" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 3322.855414][ T29] audit: type=1400 audit(3322.770:26766): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3322.905672][ T29] audit: type=1400 audit(3322.820:26767): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3322.976777][ T29] audit: type=1400 audit(3322.900:26768): avc: denied { create } for pid=14626 comm="syz.1.2725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3323.007846][ T29] audit: type=1400 audit(3322.930:26769): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3323.120834][ T29] audit: type=1400 audit(3323.040:26770): avc: denied { write } for pid=14626 comm="syz.1.2725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3323.197737][ T29] audit: type=1400 audit(3323.120:26771): avc: denied { read } for pid=14626 comm="syz.1.2725" path="socket:[33435]" dev="sockfs" ino=33435 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3323.201049][ T29] audit: type=1400 audit(3323.120:26772): avc: denied { read } for pid=14626 comm="syz.1.2725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3323.232670][ T29] audit: type=1400 audit(3323.150:26773): avc: denied { ioctl } for pid=14626 comm="syz.1.2725" path="socket:[33435]" dev="sockfs" ino=33435 ioctlcmd=0x941b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3328.011773][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 3328.012938][ T29] audit: type=1400 audit(3327.930:26812): avc: denied { write } for pid=14636 comm="syz.1.2729" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3328.038263][ T29] audit: type=1400 audit(3327.960:26813): avc: denied { write open } for pid=14636 comm="syz.1.2729" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3328.150177][ T29] audit: type=1400 audit(3328.070:26814): avc: denied { lock } for pid=14636 comm="syz.1.2729" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3328.193727][ T29] audit: type=1400 audit(3328.110:26815): avc: denied { setattr } for pid=14636 comm="syz.1.2729" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3328.241535][ T29] audit: type=1400 audit(3328.160:26816): avc: denied { read write } for pid=14637 comm="syz.0.2730" name="vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3328.244094][ T29] audit: type=1400 audit(3328.160:26817): avc: denied { read write open } for pid=14637 comm="syz.0.2730" path="/dev/vcsu1" dev="devtmpfs" ino=17 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3328.271169][ T29] audit: type=1400 audit(3328.190:26818): avc: denied { ioctl } for pid=14636 comm="syz.1.2729" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3328.300481][ T29] audit: type=1400 audit(3328.220:26819): avc: denied { create } for pid=14636 comm="syz.1.2729" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3328.309736][ T29] audit: type=1400 audit(3328.230:26820): avc: denied { create } for pid=14637 comm="syz.0.2730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3328.337393][ T29] audit: type=1400 audit(3328.260:26821): avc: denied { ioctl } for pid=14636 comm="syz.1.2729" path="socket:[34051]" dev="sockfs" ino=34051 ioctlcmd=0x89f4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3331.640529][T14649] FAULT_INJECTION: forcing a failure. [ 3331.640529][T14649] name failslab, interval 1, probability 0, space 0, times 0 [ 3331.645070][T14649] CPU: 0 UID: 0 PID: 14649 Comm: syz.0.2734 Not tainted syzkaller #0 PREEMPT [ 3331.645224][T14649] Hardware name: ARM-Versatile Express [ 3331.645249][T14649] Call trace: [ 3331.645284][T14649] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3331.645376][T14649] r7:00000c40 r6:00000000 r5:60000113 r4:82252568 [ 3331.645394][T14649] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 3331.645437][T14649] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 3331.645492][T14649] r5:851ce000 r4:82918840 [ 3331.645505][T14649] [<8021f8bc>] (dump_stack) from [<809870f8>] (should_fail_ex+0x1c4/0x228) [ 3331.645557][T14649] [<80986f34>] (should_fail_ex) from [<8052f608>] (should_failslab+0x6c/0x94) [ 3331.645620][T14649] r8:00000000 r7:00000c40 r6:00001000 r5:00001000 r4:830016c0 [ 3331.645634][T14649] [<8052f59c>] (should_failslab) from [<8050a91c>] (__kmalloc_noprof+0x9c/0x568) [ 3331.645682][T14649] [<8050a880>] (__kmalloc_noprof) from [<807d3890>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 3331.645743][T14649] r10:851ce000 r9:8331d000 r8:00000000 r7:836f3c38 r6:85a8ada8 r5:00001000 [ 3331.645759][T14649] r4:00000000 [ 3331.645772][T14649] [<807d3854>] (tomoyo_realpath_from_path) from [<807cf9d4>] (tomoyo_path_number_perm+0xcc/0x22c) [ 3331.645828][T14649] r10:851ce000 r9:00000000 r8:85a8ad80 r7:c400941b r6:00000004 r5:81cd65c8 [ 3331.645847][T14649] r4:85a8ada8 r3:826c1240 [ 3331.645860][T14649] [<807cf908>] (tomoyo_path_number_perm) from [<807d42b4>] (tomoyo_file_ioctl+0x1c/0x20) [ 3331.645914][T14649] r9:00000003 r8:85a8ad80 r7:00000000 r6:00000000 r5:c400941b r4:85a8ad80 [ 3331.645929][T14649] [<807d4298>] (tomoyo_file_ioctl) from [<80780b78>] (security_file_ioctl+0x64/0x1e4) [ 3331.645973][T14649] [<80780b14>] (security_file_ioctl) from [<80578dfc>] (sys_ioctl+0x4c/0xba0) [ 3331.646025][T14649] r7:00000000 r6:85a8ad81 r5:00000000 r4:c400941b [ 3331.646040][T14649] [<80578db0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3331.646079][T14649] Exception stack(0xeb975fa8 to 0xeb975ff0) [ 3331.646112][T14649] 5fa0: 00000000 00000000 00000003 c400941b 00000000 00000000 [ 3331.646142][T14649] 5fc0: 00000000 00000000 00130918 00000036 00300000 00000000 00006364 76f790bc [ 3331.646166][T14649] 5fe0: 76f78ec0 76f78eb0 0001928c 00132970 [ 3331.646196][T14649] r10:00000036 r9:851ce000 r8:8020029c r7:00000036 r6:00130918 r5:00000000 [ 3331.646214][T14649] r4:00000000 [ 3331.659456][T14649] ERROR: Out of memory at tomoyo_realpath_from_path. [ 3333.020874][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 3333.021381][ T29] audit: type=1400 audit(3332.940:26890): avc: denied { write } for pid=14647 comm="syz.1.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3333.048856][ T29] audit: type=1400 audit(3332.970:26891): avc: denied { create } for pid=14647 comm="syz.1.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3333.125276][ T29] audit: type=1400 audit(3333.030:26892): avc: denied { read } for pid=14647 comm="syz.1.2733" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3333.125971][ T29] audit: type=1400 audit(3333.040:26893): avc: denied { write } for pid=14647 comm="syz.1.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3333.179294][ T29] audit: type=1400 audit(3333.100:26894): avc: denied { ioctl } for pid=14647 comm="syz.1.2733" path="socket:[33488]" dev="sockfs" ino=33488 ioctlcmd=0x8940 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3333.182409][ T29] audit: type=1400 audit(3333.100:26895): avc: denied { module_request } for pid=14647 comm="syz.1.2733" kmod="bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3333.186657][ T29] audit: type=1400 audit(3333.110:26896): avc: denied { read open } for pid=14647 comm="syz.1.2733" path="net:[4026532655]" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3333.260201][ T29] audit: type=1400 audit(3333.180:26897): avc: denied { create } for pid=14647 comm="syz.1.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3333.290234][ T29] audit: type=1400 audit(3333.210:26898): avc: denied { create } for pid=14647 comm="syz.1.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3333.395098][ T29] audit: type=1400 audit(3333.310:26899): avc: denied { write } for pid=14647 comm="syz.1.2733" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3338.037520][ T29] kauditd_printk_skb: 126 callbacks suppressed [ 3338.037761][ T29] audit: type=1400 audit(3337.960:27026): avc: denied { create } for pid=14692 comm="syz.0.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3338.109177][ T29] audit: type=1400 audit(3338.030:27027): avc: denied { create } for pid=14692 comm="syz.0.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3338.155233][ T29] audit: type=1400 audit(3338.080:27028): avc: denied { create } for pid=14692 comm="syz.0.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3338.158925][ T29] audit: type=1400 audit(3338.080:27029): avc: denied { create } for pid=14692 comm="syz.0.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3338.166228][ T29] audit: type=1400 audit(3338.090:27030): avc: denied { write } for pid=14692 comm="syz.0.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3338.310606][ T29] audit: type=1400 audit(3338.230:27031): avc: denied { create } for pid=14692 comm="syz.0.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3338.348820][ T29] audit: type=1400 audit(3338.270:27032): avc: denied { create } for pid=14692 comm="syz.0.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3338.352998][ T29] audit: type=1400 audit(3338.270:27033): avc: denied { create } for pid=14692 comm="syz.0.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3338.486539][ T29] audit: type=1400 audit(3338.410:27034): avc: denied { create } for pid=14692 comm="syz.0.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3338.490247][ T29] audit: type=1400 audit(3338.410:27035): avc: denied { create } for pid=14692 comm="syz.0.2736" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3343.947306][ T29] kauditd_printk_skb: 73 callbacks suppressed [ 3343.947639][ T29] audit: type=1400 audit(3343.870:27109): avc: denied { create } for pid=14706 comm="syz.0.2741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3344.094625][ T29] audit: type=1400 audit(3343.990:27110): avc: denied { create } for pid=14706 comm="syz.0.2741" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3344.636286][ T29] audit: type=1400 audit(3344.550:27111): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3344.637805][ T29] audit: type=1400 audit(3344.550:27112): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3344.640360][ T29] audit: type=1400 audit(3344.550:27113): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3345.708014][ T29] audit: type=1400 audit(3345.630:27114): avc: denied { read } for pid=14708 comm="syz.0.2742" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3345.721458][ T29] audit: type=1400 audit(3345.640:27115): avc: denied { read open } for pid=14708 comm="syz.0.2742" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3345.737006][ T29] audit: type=1400 audit(3345.660:27116): avc: denied { read } for pid=14708 comm="syz.0.2742" name="mixer" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3345.742443][ T29] audit: type=1400 audit(3345.660:27117): avc: denied { read open } for pid=14708 comm="syz.0.2742" path="/dev/mixer" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3345.764603][ T29] audit: type=1400 audit(3345.680:27118): avc: denied { ioctl } for pid=14708 comm="syz.0.2742" path="/dev/mixer" dev="devtmpfs" ino=729 ioctlcmd=0x1262 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3348.994024][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 3348.995673][ T29] audit: type=1400 audit(3348.910:27125): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3349.108356][ T29] audit: type=1400 audit(3349.030:27126): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3349.125221][ T29] audit: type=1400 audit(3349.030:27127): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3350.622414][T14735] FAULT_INJECTION: forcing a failure. [ 3350.622414][T14735] name failslab, interval 1, probability 0, space 0, times 0 [ 3350.685115][T14735] CPU: 0 UID: 0 PID: 14735 Comm: syz.0.2744 Not tainted syzkaller #0 PREEMPT [ 3350.685274][T14735] Hardware name: ARM-Versatile Express [ 3350.685302][T14735] Call trace: [ 3350.685345][T14735] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 3350.685461][T14735] r7:00000000 r6:00000000 r5:60000113 r4:82252568 [ 3350.685481][T14735] [<80201b08>] (show_stack) from [<8021f8b0>] (dump_stack_lvl+0x70/0x7c) [ 3350.685535][T14735] [<8021f840>] (dump_stack_lvl) from [<8021f8d4>] (dump_stack+0x18/0x1c) [ 3350.685591][T14735] r5:83b81800 r4:82918840 [ 3350.685607][T14735] [<8021f8bc>] (dump_stack) from [<809870f8>] (should_fail_ex+0x1c4/0x228) [ 3350.685667][T14735] [<80986f34>] (should_fail_ex) from [<8052f608>] (should_failslab+0x6c/0x94) [ 3350.685740][T14735] r8:83b81800 r7:00000000 r6:00000dc0 r5:40020000 r4:830a40c0 [ 3350.685758][T14735] [<8052f59c>] (should_failslab) from [<8050f0d0>] (kmem_cache_alloc_noprof+0x4c/0x444) [ 3350.685815][T14735] [<8050f084>] (kmem_cache_alloc_noprof) from [<8025059c>] (copy_process+0x89c/0x1730) [ 3350.685890][T14735] r10:ec469ea0 r9:00000000 r8:00000000 r7:ec469e14 r6:83b81800 r5:40020000 [ 3350.685912][T14735] r4:83b85400 [ 3350.685927][T14735] [<8024fd00>] (copy_process) from [<80251574>] (kernel_clone+0xac/0x3ec) [ 3350.685997][T14735] r10:83b81800 r9:83b81800 r8:00000000 r7:00000000 r6:ec469ea0 r5:00000058 [ 3350.686017][T14735] r4:40020000 [ 3350.686033][T14735] [<802514c8>] (kernel_clone) from [<802519a8>] (__do_sys_clone3+0xf4/0x128) [ 3350.686102][T14735] r10:000001b3 r9:83b81800 r8:8020029c r7:000001b3 r6:ec469ef4 r5:00000058 [ 3350.686121][T14735] r4:76f78db0 [ 3350.686137][T14735] [<802518b4>] (__do_sys_clone3) from [<80251c9c>] (sys_clone3+0x10/0x14) [ 3350.686205][T14735] r6:00000000 r5:40020000 r4:200003c0 [ 3350.686224][T14735] [<80251c8c>] (sys_clone3) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3350.686279][T14735] Exception stack(0xec469fa8 to 0xec469ff0) [ 3350.686324][T14735] 9fa0: 200003c0 40020000 76f78db0 00000058 76f78db0 00000058 [ 3350.686364][T14735] 9fc0: 200003c0 40020000 00000000 000001b3 00300000 00000000 00006364 76f790bc [ 3350.686394][T14735] 9fe0: 76f78da8 76f78d98 00017270 00132970 [ 3351.150925][ T29] audit: type=1400 audit(3351.070:27128): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3351.328217][ T29] audit: type=1400 audit(3351.250:27129): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3351.338059][ T29] audit: type=1400 audit(3351.260:27130): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3352.781359][ T29] audit: type=1400 audit(3352.700:27131): avc: denied { write } for pid=14736 comm="syz.0.2745" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3352.795579][ T29] audit: type=1400 audit(3352.700:27132): avc: denied { write open } for pid=14736 comm="syz.0.2745" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3352.904685][ T29] audit: type=1400 audit(3352.820:27133): avc: denied { lock } for pid=14736 comm="syz.0.2745" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3352.951860][ T29] audit: type=1400 audit(3352.870:27134): avc: denied { setattr } for pid=14736 comm="syz.0.2745" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3353.998260][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 3354.003912][ T29] audit: type=1400 audit(3353.920:27152): avc: denied { write } for pid=14736 comm="syz.0.2745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3354.455109][ T29] audit: type=1400 audit(3354.370:27153): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3354.455611][ T29] audit: type=1400 audit(3354.370:27154): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3354.455971][ T29] audit: type=1400 audit(3354.370:27155): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3356.054895][ T29] audit: type=1400 audit(3355.970:27156): avc: denied { create } for pid=14740 comm="syz.0.2746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3356.116597][ T29] audit: type=1400 audit(3356.030:27157): avc: denied { write } for pid=14740 comm="syz.0.2746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 3356.993512][ T29] audit: type=1400 audit(3356.910:27158): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3357.008541][ T29] audit: type=1400 audit(3356.930:27159): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3357.069534][ T29] audit: type=1400 audit(3356.990:27160): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3357.079926][ T29] audit: type=1400 audit(3357.000:27161): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3358.335982][T14745] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=14745 comm=syz.0.2747 [ 3359.210246][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 3359.216278][ T29] audit: type=1400 audit(3359.130:27170): avc: denied { write } for pid=14746 comm="syz.1.2750" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3359.216503][ T29] audit: type=1400 audit(3359.130:27171): avc: denied { write open } for pid=14746 comm="syz.1.2750" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3359.278418][ T29] audit: type=1400 audit(3359.200:27172): avc: denied { lock } for pid=14746 comm="syz.1.2750" path="/dev/vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3359.389558][ T29] audit: type=1400 audit(3359.310:27173): avc: denied { setattr } for pid=14746 comm="syz.1.2750" name="vcsa" dev="devtmpfs" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3359.398709][ T29] audit: type=1400 audit(3359.320:27174): avc: denied { create } for pid=14748 comm="syz.0.2749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3359.413414][ T29] audit: type=1400 audit(3359.330:27175): avc: denied { setopt } for pid=14748 comm="syz.0.2749" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3359.431204][ T29] audit: type=1400 audit(3359.350:27176): avc: denied { setopt } for pid=14748 comm="syz.0.2749" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3359.438483][ T29] audit: type=1400 audit(3359.360:27177): avc: denied { ioctl } for pid=14746 comm="syz.1.2750" path="/dev/vcsa" dev="devtmpfs" ino=15 ioctlcmd=0x8915 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3359.518717][ T29] audit: type=1400 audit(3359.440:27178): avc: denied { create } for pid=14746 comm="syz.1.2750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3359.564016][ T29] audit: type=1400 audit(3359.480:27179): avc: denied { ioctl } for pid=14746 comm="syz.1.2750" path="socket:[34279]" dev="sockfs" ino=34279 ioctlcmd=0x89f4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3364.538709][ T29] kauditd_printk_skb: 78 callbacks suppressed [ 3364.539080][ T29] audit: type=1400 audit(3364.460:27258): avc: denied { create } for pid=14771 comm="syz.1.2753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3364.586252][ T29] audit: type=1400 audit(3364.510:27259): avc: denied { write } for pid=14771 comm="syz.1.2753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3365.080201][ T29] audit: type=1400 audit(3365.000:27260): avc: denied { map } for pid=14769 comm="syz.0.2752" path="socket:[34299]" dev="sockfs" ino=34299 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 3365.654922][ T29] audit: type=1400 audit(3365.570:27261): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3365.675078][ T29] audit: type=1400 audit(3365.590:27262): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3365.694949][ T29] audit: type=1400 audit(3365.610:27263): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3366.105062][ T29] audit: type=1400 audit(3366.010:27264): avc: denied { prog_load } for pid=14795 comm="syz.1.2754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3366.121415][ T29] audit: type=1400 audit(3366.030:27265): avc: denied { bpf } for pid=14795 comm="syz.1.2754" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3366.121768][ T29] audit: type=1400 audit(3366.040:27266): avc: denied { perfmon } for pid=14795 comm="syz.1.2754" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3366.235131][ T29] audit: type=1400 audit(3366.150:27267): avc: denied { perfmon } for pid=14795 comm="syz.1.2754" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3369.808878][ T29] kauditd_printk_skb: 183 callbacks suppressed [ 3369.809165][ T29] audit: type=1400 audit(3369.730:27451): avc: denied { write } for pid=14797 comm="syz.0.2755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3369.865917][ T29] audit: type=1400 audit(3369.780:27452): avc: denied { search } for pid=14807 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3369.866285][ T29] audit: type=1400 audit(3369.790:27453): avc: denied { search } for pid=14807 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3369.866609][ T29] audit: type=1400 audit(3369.790:27454): avc: denied { search } for pid=14807 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3369.866820][ T29] audit: type=1400 audit(3369.790:27455): avc: denied { getattr } for pid=14807 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=48 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3369.871078][ T29] audit: type=1400 audit(3369.790:27456): avc: denied { search } for pid=14807 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3369.871345][ T29] audit: type=1400 audit(3369.790:27457): avc: denied { search } for pid=14807 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3369.871544][ T29] audit: type=1400 audit(3369.790:27458): avc: denied { search } for pid=14807 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3369.871752][ T29] audit: type=1400 audit(3369.790:27459): avc: denied { search } for pid=14807 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3369.872797][ T29] audit: type=1400 audit(3369.790:27460): avc: denied { remove_name search } for pid=14807 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=48 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3375.913935][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 3375.914161][ T29] audit: type=1400 audit(3375.830:27472): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3375.945059][ T29] audit: type=1400 audit(3375.860:27473): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3375.971774][ T29] audit: type=1400 audit(3375.890:27474): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3376.132417][ T29] audit: type=1400 audit(3376.050:27475): avc: denied { create } for pid=14798 comm="syz.1.2756" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3377.298738][ T29] audit: type=1400 audit(3377.220:27476): avc: denied { create } for pid=14812 comm="syz.0.2758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3377.442146][ T29] audit: type=1400 audit(3377.360:27477): avc: denied { create } for pid=14812 comm="syz.0.2758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3377.498454][ T29] audit: type=1400 audit(3377.420:27478): avc: denied { write } for pid=14812 comm="syz.0.2758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3377.502106][ T29] audit: type=1400 audit(3377.420:27479): avc: denied { module_request } for pid=14812 comm="syz.0.2758" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3378.008254][ T29] audit: type=1400 audit(3377.930:27480): avc: denied { read } for pid=14812 comm="syz.0.2758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3378.055288][ T29] audit: type=1400 audit(3377.970:27481): avc: denied { write } for pid=14812 comm="syz.0.2758" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3382.068449][ T29] kauditd_printk_skb: 19 callbacks suppressed [ 3382.068824][ T29] audit: type=1400 audit(3381.990:27501): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3382.168473][ T29] audit: type=1400 audit(3382.090:27502): avc: denied { read write open } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3382.183022][ T29] audit: type=1400 audit(3382.090:27503): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3383.001403][ T29] audit: type=1400 audit(3382.920:27504): avc: denied { read write } for pid=3099 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3383.047710][ T29] audit: type=1400 audit(3382.970:27505): avc: denied { read write open } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3383.105676][ T29] audit: type=1400 audit(3383.020:27506): avc: denied { ioctl } for pid=3099 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3384.215638][ T29] audit: type=1400 audit(3384.130:27507): avc: denied { create } for pid=14821 comm="syz.0.2759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3384.351327][ T29] audit: type=1400 audit(3384.260:27508): avc: denied { create } for pid=14821 comm="syz.0.2759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3384.371894][ T29] audit: type=1400 audit(3384.290:27509): avc: denied { ioctl } for pid=14821 comm="syz.0.2759" path="socket:[33703]" dev="sockfs" ino=33703 ioctlcmd=0x941b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3384.490846][ T29] audit: type=1400 audit(3384.410:27510): avc: denied { create } for pid=14823 comm="syz.1.2760" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3387.170604][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 3387.170933][ T29] audit: type=1400 audit(3387.090:27552): avc: denied { write } for pid=14827 comm="syz.0.2761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3387.171129][ T29] audit: type=1400 audit(3387.090:27553): avc: denied { module_request } for pid=14827 comm="syz.0.2761" kmod="net-pf-16-proto-16-family-IPVS" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3387.313109][ T29] audit: type=1400 audit(3387.230:27554): avc: denied { read } for pid=14829 comm="syz.1.2762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3387.331480][ T29] audit: type=1400 audit(3387.250:27555): avc: denied { write } for pid=14827 comm="syz.0.2761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3387.578442][ T29] audit: type=1400 audit(3387.500:27556): avc: denied { create } for pid=14829 comm="syz.1.2762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3387.609898][ T29] audit: type=1400 audit(3387.530:27557): avc: denied { getopt } for pid=14829 comm="syz.1.2762" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 3387.758369][ T29] audit: type=1400 audit(3387.680:27558): avc: denied { read } for pid=14827 comm="syz.0.2761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3387.823882][ T29] audit: type=1400 audit(3387.740:27559): avc: denied { module_request } for pid=14829 comm="syz.1.2762" kmod="netdev-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3388.347394][ T29] audit: type=1400 audit(3388.240:27560): avc: denied { sys_module } for pid=14829 comm="syz.1.2762" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3388.347730][ T29] audit: type=1400 audit(3388.260:27561): avc: denied { module_request } for pid=14829 comm="syz.1.2762" kmod="" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3392.047474][ T5325] syz_tun (unregistering): left allmulticast mode [ 3392.218583][T14175] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3392.240357][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 3392.240678][ T29] audit: type=1400 audit(3392.160:27622): avc: denied { module_request } for pid=14852 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3392.316507][T14175] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3392.367718][ T29] audit: type=1400 audit(3392.290:27623): avc: denied { write } for pid=14839 comm="syz.1.2764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3392.390721][ T29] audit: type=1400 audit(3392.310:27624): avc: denied { write } for pid=14839 comm="syz.1.2764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3392.419007][ T29] audit: type=1400 audit(3392.340:27625): avc: denied { module_request } for pid=14839 comm="syz.1.2764" kmod="net-pf-16-proto-16-family-TIPC" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3392.467919][T14175] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3392.538585][ T29] audit: type=1400 audit(3392.460:27626): avc: denied { read } for pid=14839 comm="syz.1.2764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3392.547476][T14175] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3392.800240][ T29] audit: type=1400 audit(3392.720:27627): avc: denied { read } for pid=14839 comm="syz.1.2764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3392.868360][ T29] audit: type=1400 audit(3392.780:27628): avc: denied { sys_module } for pid=14852 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3392.868726][ T29] audit: type=1400 audit(3392.780:27629): avc: denied { module_request } for pid=14852 comm="syz-executor" kmod="nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3392.928480][T14175] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3392.961614][T14175] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3392.966826][T14175] bond0 (unregistering): Released all slaves [ 3393.017362][ T29] audit: type=1400 audit(3392.940:27630): avc: denied { create } for pid=14839 comm="syz.1.2764" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3393.045416][ T29] audit: type=1400 audit(3392.960:27631): avc: denied { ioctl } for pid=14839 comm="syz.1.2764" path="socket:[33743]" dev="sockfs" ino=33743 ioctlcmd=0x8905 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3393.071063][T14175] hsr_slave_0: left promiscuous mode [ 3393.074172][T14175] hsr_slave_1: left promiscuous mode [ 3393.086673][T14175] veth1_macvtap: left promiscuous mode [ 3393.087720][T14175] veth0_macvtap: left promiscuous mode [ 3393.088673][T14175] veth1_vlan: left promiscuous mode [ 3393.089579][T14175] veth0_vlan: left promiscuous mode [ 3397.332879][ T29] kauditd_printk_skb: 184 callbacks suppressed [ 3397.333374][ T29] audit: type=1400 audit(3397.250:27816): avc: denied { module_request } for pid=14852 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3397.535231][ T29] audit: type=1400 audit(3397.450:27817): avc: denied { write } for pid=14950 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3397.539039][ T29] audit: type=1400 audit(3397.460:27818): avc: denied { write open } for pid=14950 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3397.828482][ T29] audit: type=1400 audit(3397.740:27819): avc: denied { module_request } for pid=14852 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3397.939241][ T29] audit: type=1400 audit(3397.860:27820): avc: denied { create } for pid=14955 comm="syz.1.2767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3397.969914][ T29] audit: type=1400 audit(3397.890:27821): avc: denied { write } for pid=14955 comm="syz.1.2767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3398.076676][ T29] audit: type=1400 audit(3398.000:27822): avc: denied { write } for pid=14956 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3398.078464][ T29] audit: type=1400 audit(3398.000:27823): avc: denied { write open } for pid=14956 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3398.084937][ T29] audit: type=1400 audit(3398.000:27824): avc: denied { read } for pid=14955 comm="syz.1.2767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3398.098972][ T29] audit: type=1400 audit(3398.020:27825): avc: denied { read } for pid=14955 comm="syz.1.2767" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3399.649091][T14852] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3399.670151][T14852] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3402.582236][ T29] kauditd_printk_skb: 354 callbacks suppressed [ 3402.582631][ T29] audit: type=1400 audit(3402.500:28180): avc: denied { sys_module } for pid=14852 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3402.603502][ T29] audit: type=1400 audit(3402.520:28181): avc: denied { module_request } for pid=14852 comm="syz-executor" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3402.711972][ T29] audit: type=1400 audit(3402.630:28182): avc: denied { search } for pid=15104 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3402.727057][ T29] audit: type=1400 audit(3402.650:28183): avc: denied { read } for pid=15104 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3402.730430][ T29] audit: type=1400 audit(3402.650:28184): avc: denied { read open } for pid=15104 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3402.737961][ T29] audit: type=1400 audit(3402.660:28185): avc: denied { search } for pid=15104 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3402.756083][ T29] audit: type=1400 audit(3402.670:28186): avc: denied { search } for pid=15104 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3402.756337][ T29] audit: type=1400 audit(3402.670:28187): avc: denied { search } for pid=15104 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3402.756462][ T29] audit: type=1400 audit(3402.670:28188): avc: denied { read } for pid=15104 comm="cmp" name="resolv.conf.eth3.link" dev="tmpfs" ino=51 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3402.756562][ T29] audit: type=1400 audit(3402.670:28189): avc: denied { read open } for pid=15104 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=51 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3403.204292][T14852] hsr_slave_0: entered promiscuous mode [ 3403.206292][T14852] hsr_slave_1: entered promiscuous mode [ 3404.785193][T14852] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 3404.813387][T14852] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 3404.853705][T14852] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 3404.888134][T14852] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 3407.633261][ T29] kauditd_printk_skb: 239 callbacks suppressed [ 3407.633607][ T29] audit: type=1400 audit(3407.550:28429): avc: denied { create } for pid=15235 comm="syz.1.2770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3407.698391][ T29] audit: type=1400 audit(3407.620:28430): avc: denied { create } for pid=15235 comm="syz.1.2770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3407.788636][ T29] audit: type=1400 audit(3407.710:28431): avc: denied { write } for pid=15235 comm="syz.1.2770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3407.830536][ T29] audit: type=1400 audit(3407.750:28432): avc: denied { write } for pid=15240 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3407.835914][ T29] audit: type=1400 audit(3407.760:28433): avc: denied { write open } for pid=15240 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3407.881803][ T29] audit: type=1400 audit(3407.800:28434): avc: denied { module_request } for pid=15235 comm="syz.1.2770" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3408.319061][ T29] audit: type=1400 audit(3408.240:28435): avc: denied { read } for pid=15235 comm="syz.1.2770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3408.346423][ T29] audit: type=1400 audit(3408.270:28436): avc: denied { write } for pid=15242 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3408.349461][ T29] audit: type=1400 audit(3408.270:28437): avc: denied { write open } for pid=15242 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3408.403727][ T29] audit: type=1400 audit(3408.320:28438): avc: denied { create } for pid=15235 comm="syz.1.2770" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3408.484012][T14852] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3412.719690][ T29] kauditd_printk_skb: 368 callbacks suppressed [ 3412.720122][ T29] audit: type=1400 audit(3412.640:28807): avc: denied { search } for pid=15267 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3412.729515][ T29] audit: type=1400 audit(3412.650:28808): avc: denied { read } for pid=15267 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3412.730016][ T29] audit: type=1400 audit(3412.650:28809): avc: denied { read open } for pid=15267 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3412.737424][ T29] audit: type=1400 audit(3412.660:28810): avc: denied { search } for pid=15267 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3412.737964][ T29] audit: type=1400 audit(3412.660:28811): avc: denied { search } for pid=15267 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3412.738050][ T29] audit: type=1400 audit(3412.660:28812): avc: denied { search } for pid=15267 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3412.746491][ T29] audit: type=1400 audit(3412.670:28813): avc: denied { read } for pid=15267 comm="cmp" name="resolv.conf.eth3.link" dev="tmpfs" ino=54 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3412.765709][ T29] audit: type=1400 audit(3412.680:28814): avc: denied { read open } for pid=15267 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=54 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3412.766177][ T29] audit: type=1400 audit(3412.680:28815): avc: denied { getattr } for pid=15267 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3412.766297][ T29] audit: type=1400 audit(3412.680:28816): avc: denied { getattr } for pid=15267 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=54 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3417.910496][ T29] kauditd_printk_skb: 369 callbacks suppressed [ 3417.911002][ T29] audit: type=1400 audit(3417.830:29186): avc: denied { search } for pid=15294 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3417.913639][ T29] audit: type=1400 audit(3417.830:29187): avc: denied { read } for pid=15294 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3417.918051][ T29] audit: type=1400 audit(3417.840:29188): avc: denied { read open } for pid=15294 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3417.925278][ T29] audit: type=1400 audit(3417.840:29189): avc: denied { search } for pid=15294 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3417.935675][ T29] audit: type=1400 audit(3417.860:29190): avc: denied { search } for pid=15294 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3417.936083][ T29] audit: type=1400 audit(3417.860:29191): avc: denied { search } for pid=15294 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3417.937976][ T29] audit: type=1400 audit(3417.860:29192): avc: denied { read } for pid=15294 comm="cmp" name="resolv.conf.eth3.link" dev="tmpfs" ino=56 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3417.938715][ T29] audit: type=1400 audit(3417.860:29193): avc: denied { read open } for pid=15294 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=56 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3417.941428][ T29] audit: type=1400 audit(3417.860:29194): avc: denied { getattr } for pid=15294 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3417.959866][ T29] audit: type=1400 audit(3417.880:29195): avc: denied { sys_module } for pid=14852 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3419.429177][T14852] veth0_vlan: entered promiscuous mode [ 3419.505565][T14852] veth1_vlan: entered promiscuous mode [ 3419.790458][T14852] veth0_macvtap: entered promiscuous mode [ 3419.875493][T14852] veth1_macvtap: entered promiscuous mode [ 3420.150976][T14869] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3420.155825][T14869] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3420.157054][T14869] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3420.158047][T14869] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3422.987902][ T29] kauditd_printk_skb: 382 callbacks suppressed [ 3422.988274][ T29] audit: type=1400 audit(3422.910:29578): avc: denied { create } for pid=15335 comm="syz.0.2773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3423.001091][ T29] audit: type=1400 audit(3422.920:29579): avc: denied { bind } for pid=15335 comm="syz.0.2773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 3423.007322][ T29] audit: type=1400 audit(3422.930:29580): avc: denied { module_request } for pid=15335 comm="syz.0.2773" kmod="crypto-cbc-cast5-avx" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3423.036971][ T29] audit: type=1400 audit(3422.960:29581): avc: denied { search } for pid=15334 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3423.039262][ T29] audit: type=1400 audit(3422.960:29582): avc: denied { read } for pid=15334 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3423.041678][ T29] audit: type=1400 audit(3422.960:29583): avc: denied { read open } for pid=15334 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3423.046826][ T29] audit: type=1400 audit(3422.970:29584): avc: denied { search } for pid=15334 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3423.047052][ T29] audit: type=1400 audit(3422.970:29585): avc: denied { search } for pid=15334 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3423.047094][ T29] audit: type=1400 audit(3422.970:29586): avc: denied { search } for pid=15334 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3423.053185][ T29] audit: type=1400 audit(3422.970:29587): avc: denied { read } for pid=15334 comm="cmp" name="resolv.conf.eth2.dhcp" dev="tmpfs" ino=58 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3423.775508][T12004] usb 1-1: new high-speed USB device number 51 using dummy_hcd [ 3423.954878][T12004] usb 1-1: Using ep0 maxpacket: 32 [ 3423.960380][T12004] usb 1-1: too many configurations: 17, using maximum allowed: 8 [ 3424.013236][T12004] usb 1-1: config 0 has an invalid interface number: 2 but max is 0 [ 3424.014005][T12004] usb 1-1: config 0 has no interface number 0 [ 3424.062290][T12004] usb 1-1: config 0 has an invalid interface number: 2 but max is 0 [ 3424.063048][T12004] usb 1-1: config 0 has no interface number 0 [ 3424.111760][T12004] usb 1-1: config 0 has an invalid interface number: 2 but max is 0 [ 3424.112737][T12004] usb 1-1: config 0 has no interface number 0 [ 3424.169754][T12004] usb 1-1: config 0 has an invalid interface number: 2 but max is 0 [ 3424.170655][T12004] usb 1-1: config 0 has no interface number 0 [ 3424.212342][T12004] usb 1-1: config 0 has an invalid interface number: 2 but max is 0 [ 3424.213107][T12004] usb 1-1: config 0 has no interface number 0 [ 3424.277254][T12004] usb 1-1: config 0 has an invalid interface number: 2 but max is 0 [ 3424.278653][T12004] usb 1-1: config 0 has no interface number 0 [ 3424.319016][T12004] usb 1-1: config 0 has an invalid interface number: 2 but max is 0 [ 3424.319657][T12004] usb 1-1: config 0 has no interface number 0 [ 3424.376492][T12004] usb 1-1: config 0 has an invalid interface number: 2 but max is 0 [ 3424.377101][T12004] usb 1-1: config 0 has no interface number 0 [ 3424.459035][T12004] usb 1-1: New USB device found, idVendor=108c, idProduct=0168, bcdDevice=84.b2 [ 3424.460931][T12004] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3424.461535][T12004] usb 1-1: Product: syz [ 3424.461894][T12004] usb 1-1: Manufacturer: syz [ 3424.462250][T12004] usb 1-1: SerialNumber: syz [ 3424.474198][T12004] usb 1-1: config 0 descriptor?? [ 3424.562640][T12004] etas_es58x 1-1:0.2: Starting syz syz (Serial Number syz) [ 3424.796756][T12004] etas_es58x 1-1:0.2: could not parse product info: 'à …' [ 3425.022092][T14222] usb 1-1: USB disconnect, device number 51 [ 3425.023918][T14222] etas_es58x 1-1:0.2: Disconnecting syz syz [ 3428.098314][ T29] kauditd_printk_skb: 415 callbacks suppressed [ 3428.102334][ T29] audit: type=1400 audit(3428.020:30003): avc: denied { search } for pid=15381 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3428.115292][ T29] audit: type=1400 audit(3428.020:30004): avc: denied { search } for pid=15381 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3428.115793][ T29] audit: type=1400 audit(3428.020:30005): avc: denied { search } for pid=15381 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3428.144141][ T29] audit: type=1400 audit(3428.060:30006): avc: denied { search } for pid=15376 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3428.585114][ T29] audit: type=1400 audit(3428.480:30007): avc: denied { prog_load } for pid=15373 comm="syz.0.2774" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3428.585514][ T29] audit: type=1400 audit(3428.490:30008): avc: denied { bpf } for pid=15373 comm="syz.0.2774" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3428.585814][ T29] audit: type=1400 audit(3428.490:30009): avc: denied { perfmon } for pid=15373 comm="syz.0.2774" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3428.615037][ T29] audit: type=1400 audit(3428.490:30010): avc: denied { perfmon } for pid=15373 comm="syz.0.2774" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3428.615437][ T29] audit: type=1400 audit(3428.520:30011): avc: denied { perfmon } for pid=15373 comm="syz.0.2774" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3428.615521][ T29] audit: type=1400 audit(3428.520:30012): avc: denied { perfmon } for pid=15373 comm="syz.0.2774" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3433.124901][ T29] kauditd_printk_skb: 279 callbacks suppressed [ 3433.125253][ T29] audit: type=1400 audit(3433.040:30292): avc: denied { search } for pid=15391 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3433.139813][ T29] audit: type=1400 audit(3433.050:30293): avc: denied { search } for pid=15391 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3433.152883][ T29] audit: type=1400 audit(3433.050:30294): avc: denied { search } for pid=15391 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3433.153356][ T29] audit: type=1400 audit(3433.050:30295): avc: denied { append } for pid=15391 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=62 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3433.163362][ T29] audit: type=1400 audit(3433.080:30296): avc: denied { append open } for pid=15391 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=62 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3433.244833][ T29] audit: type=1400 audit(3433.160:30297): avc: denied { search } for pid=15391 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3433.245285][ T29] audit: type=1400 audit(3433.160:30298): avc: denied { search } for pid=15391 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3433.245358][ T29] audit: type=1400 audit(3433.160:30299): avc: denied { search } for pid=15391 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3433.245396][ T29] audit: type=1400 audit(3433.160:30300): avc: denied { append } for pid=15391 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=62 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3433.245467][ T29] audit: type=1400 audit(3433.160:30301): avc: denied { append open } for pid=15391 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=62 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3448.701979][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 3448.702391][ T29] audit: type=1400 audit(3448.620:30343): avc: denied { read write } for pid=14852 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3448.707764][ T29] audit: type=1400 audit(3448.630:30344): avc: denied { read write open } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3448.711373][ T29] audit: type=1400 audit(3448.630:30345): avc: denied { ioctl } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3449.090873][ T29] audit: type=1400 audit(3449.010:30346): avc: denied { read write } for pid=14852 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3449.094284][ T29] audit: type=1400 audit(3449.010:30347): avc: denied { read write open } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3449.113293][ T29] audit: type=1400 audit(3449.030:30348): avc: denied { ioctl } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3449.361662][ T29] audit: type=1400 audit(3449.280:30349): avc: denied { create } for pid=15398 comm="syz.0.2776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3449.540807][ T29] audit: type=1400 audit(3449.460:30350): avc: denied { read write } for pid=14852 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3449.544135][ T29] audit: type=1400 audit(3449.460:30351): avc: denied { read write open } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3449.548828][ T29] audit: type=1400 audit(3449.470:30352): avc: denied { ioctl } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3454.006462][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 3454.007420][ T29] audit: type=1400 audit(3453.930:30410): avc: denied { create } for pid=15409 comm="syz.0.2781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3454.616433][ T29] audit: type=1400 audit(3454.510:30411): avc: denied { execute } for pid=15411 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3454.616908][ T29] audit: type=1400 audit(3454.510:30412): avc: denied { execute_no_trans } for pid=15411 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3454.669912][ T29] audit: type=1400 audit(3454.570:30413): avc: denied { execute } for pid=15411 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 3454.853150][ T29] audit: type=1400 audit(3454.770:30414): avc: denied { execmem } for pid=15411 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3455.023567][ T29] audit: type=1400 audit(3454.940:30415): avc: denied { read } for pid=15413 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3455.049655][ T29] audit: type=1400 audit(3454.970:30416): avc: denied { read open } for pid=15413 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3455.117090][ T29] audit: type=1400 audit(3455.030:30417): avc: denied { mounton } for pid=15413 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 3455.250267][ T29] audit: type=1400 audit(3455.170:30418): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="netdev-nr2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3455.347198][ T29] audit: type=1400 audit(3455.230:30419): avc: denied { read append } for pid=15409 comm="syz.0.2781" name="sequencer" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3458.772819][T14869] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3458.899701][T14869] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3459.000324][T14869] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3459.163725][T14869] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3459.686309][T14869] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 3459.693962][T14869] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 3459.737621][T14869] bond0 (unregistering): Released all slaves [ 3459.786304][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 3459.789652][ T29] audit: type=1400 audit(3459.710:30429): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="netdev-rose2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3459.808261][T14869] hsr_slave_0: left promiscuous mode [ 3459.818553][T14869] hsr_slave_1: left promiscuous mode [ 3459.837908][T14869] veth1_macvtap: left promiscuous mode [ 3459.838309][T14869] veth0_macvtap: left promiscuous mode [ 3459.838532][T14869] veth1_vlan: left promiscuous mode [ 3459.838746][T14869] veth0_vlan: left promiscuous mode [ 3460.282928][ T29] audit: type=1400 audit(3460.200:30430): avc: denied { sys_module } for pid=15413 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3460.295937][ T29] audit: type=1400 audit(3460.220:30431): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="rose2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3461.329884][ T29] audit: type=1400 audit(3461.250:30432): avc: denied { read write } for pid=15413 comm="syz-executor" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3461.332700][ T29] audit: type=1400 audit(3461.250:30433): avc: denied { read write open } for pid=15413 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3461.343109][ T29] audit: type=1400 audit(3461.260:30434): avc: denied { ioctl } for pid=15413 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3461.667794][ T29] audit: type=1400 audit(3461.570:30435): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3462.390329][ T29] audit: type=1400 audit(3462.280:30436): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="rtnl-link-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3462.521875][ T29] audit: type=1400 audit(3462.440:30437): avc: denied { write } for pid=15464 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3462.546558][ T29] audit: type=1400 audit(3462.460:30438): avc: denied { write open } for pid=15464 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3464.805161][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 3464.807759][ T29] audit: type=1400 audit(3464.720:30516): avc: denied { search } for pid=15508 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3464.812906][ T29] audit: type=1400 audit(3464.720:30517): avc: denied { search } for pid=15508 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3464.825574][ T29] audit: type=1400 audit(3464.720:30518): avc: denied { search } for pid=15508 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3464.827658][ T29] audit: type=1400 audit(3464.720:30519): avc: denied { search } for pid=15508 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3464.829392][ T29] audit: type=1400 audit(3464.740:30520): avc: denied { search } for pid=15508 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3464.831032][ T29] audit: type=1400 audit(3464.740:30521): avc: denied { search } for pid=15508 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3464.834909][ T29] audit: type=1400 audit(3464.740:30522): avc: denied { search } for pid=15508 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3464.836662][ T29] audit: type=1400 audit(3464.740:30523): avc: denied { read open } for pid=15508 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3464.849007][ T29] audit: type=1400 audit(3464.770:30524): avc: denied { getattr } for pid=15508 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3464.871949][ T29] audit: type=1400 audit(3464.790:30525): avc: denied { search } for pid=15508 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3469.031278][T15413] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3469.059589][T15413] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3469.830025][ T29] kauditd_printk_skb: 86 callbacks suppressed [ 3469.830266][ T29] audit: type=1400 audit(3469.750:30612): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3469.949692][ T29] audit: type=1400 audit(3469.870:30613): avc: denied { write } for pid=15617 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3469.954098][ T29] audit: type=1400 audit(3469.870:30614): avc: denied { write open } for pid=15617 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3470.175520][ T29] audit: type=1400 audit(3470.100:30615): avc: denied { sys_module } for pid=15413 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3470.178937][ T29] audit: type=1400 audit(3470.100:30616): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3470.306615][ T29] audit: type=1400 audit(3470.230:30617): avc: denied { write } for pid=15619 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3470.311536][ T29] audit: type=1400 audit(3470.230:30618): avc: denied { write open } for pid=15619 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3470.333167][ T29] audit: type=1400 audit(3470.250:30619): avc: denied { search } for pid=15619 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3470.336660][ T29] audit: type=1400 audit(3470.260:30620): avc: denied { search } for pid=15619 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3470.339010][ T29] audit: type=1400 audit(3470.260:30621): avc: denied { search } for pid=15619 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3472.130294][T15413] hsr_slave_0: entered promiscuous mode [ 3472.131846][T15413] hsr_slave_1: entered promiscuous mode [ 3472.132463][T15413] debugfs: 'hsr0' already exists in 'hsr' [ 3472.132574][T15413] Cannot create hsr debugfs directory [ 3472.854966][T14497] usb 1-1: new high-speed USB device number 52 using dummy_hcd [ 3473.025507][T14497] usb 1-1: Using ep0 maxpacket: 8 [ 3473.182211][T14497] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 3473.182547][T14497] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 3473.182934][T14497] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 3473.182999][T14497] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 3473.183086][T14497] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 3473.183124][T14497] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 3473.460648][T14497] usb 1-1: GET_CAPABILITIES returned 0 [ 3473.460965][T14497] usbtmc 1-1:16.0: can't read capabilities [ 3473.487123][T15413] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 3473.503539][T15413] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 3473.528083][T15413] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 3473.543077][T15413] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 3473.684110][T14222] usb 1-1: USB disconnect, device number 52 [ 3474.176334][T15779] netlink: 'syz.0.2784': attribute type 3 has an invalid length. [ 3474.181437][T15779] netlink: 'syz.0.2784': attribute type 3 has an invalid length. [ 3474.849618][ T29] kauditd_printk_skb: 381 callbacks suppressed [ 3474.854739][ T29] audit: type=1400 audit(3474.770:31003): avc: denied { execmem } for pid=15781 comm="syz.0.2785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3474.973883][ T29] audit: type=1400 audit(3474.890:31004): avc: denied { search } for pid=15782 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3474.979452][ T29] audit: type=1400 audit(3474.900:31005): avc: denied { read } for pid=15782 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3474.986403][ T29] audit: type=1400 audit(3474.900:31006): avc: denied { read open } for pid=15782 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3475.001030][ T29] audit: type=1400 audit(3474.920:31007): avc: denied { search } for pid=15782 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3475.015852][ T29] audit: type=1400 audit(3474.930:31008): avc: denied { search } for pid=15782 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3475.016263][ T29] audit: type=1400 audit(3474.930:31009): avc: denied { search } for pid=15782 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3475.016503][ T29] audit: type=1400 audit(3474.930:31010): avc: denied { read } for pid=15782 comm="cmp" name="resolv.conf.eth3.link" dev="tmpfs" ino=65 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3475.016577][ T29] audit: type=1400 audit(3474.930:31011): avc: denied { read open } for pid=15782 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.link" dev="tmpfs" ino=65 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3475.018340][ T29] audit: type=1400 audit(3474.940:31012): avc: denied { sys_module } for pid=15413 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3476.406625][T15413] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3480.019915][ T29] kauditd_printk_skb: 220 callbacks suppressed [ 3480.021126][ T29] audit: type=1400 audit(3479.940:31233): avc: denied { sys_module } for pid=15413 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3480.026572][ T29] audit: type=1400 audit(3479.950:31234): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3480.068918][ T29] audit: type=1400 audit(3479.990:31235): avc: denied { write } for pid=15804 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3480.078884][ T29] audit: type=1400 audit(3480.000:31236): avc: denied { write open } for pid=15804 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3480.419548][ T29] audit: type=1400 audit(3480.340:31237): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="netdev-nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3480.789418][ T29] audit: type=1400 audit(3480.710:31238): avc: denied { write } for pid=15807 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3480.797054][ T29] audit: type=1400 audit(3480.720:31239): avc: denied { write open } for pid=15807 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3480.948467][ T29] audit: type=1400 audit(3480.860:31240): avc: denied { sys_module } for pid=15413 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3480.950098][ T29] audit: type=1400 audit(3480.870:31241): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="nicvf0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3481.500663][ T29] audit: type=1400 audit(3481.420:31242): avc: denied { write } for pid=15811 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3485.247911][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 3485.249297][ T29] audit: type=1400 audit(3485.160:31264): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3485.462405][ T29] audit: type=1400 audit(3485.380:31265): avc: denied { sys_module } for pid=15413 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3485.468633][ T29] audit: type=1400 audit(3485.390:31266): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3485.600852][ T29] audit: type=1400 audit(3485.520:31267): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3485.773570][ T29] audit: type=1400 audit(3485.690:31268): avc: denied { sys_module } for pid=15413 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3485.777655][ T29] audit: type=1400 audit(3485.700:31269): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3485.899071][ T29] audit: type=1400 audit(3485.820:31270): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3486.231698][ T29] audit: type=1400 audit(3486.150:31271): avc: denied { sys_module } for pid=15413 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3486.234532][ T29] audit: type=1400 audit(3486.150:31272): avc: denied { module_request } for pid=15413 comm="syz-executor" kmod="virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3486.613156][T15413] veth0_vlan: entered promiscuous mode [ 3486.689143][T15413] veth1_vlan: entered promiscuous mode [ 3486.915490][ T29] audit: type=1400 audit(3486.820:31273): avc: denied { read write } for pid=14852 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3486.940291][T15413] veth0_macvtap: entered promiscuous mode [ 3486.989725][T15413] veth1_macvtap: entered promiscuous mode [ 3487.202945][T14869] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3487.207883][T14869] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3487.215303][T14869] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3487.216635][T14869] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3487.385610][T14497] usb 1-1: new high-speed USB device number 53 using dummy_hcd [ 3487.556102][T14497] usb 1-1: Using ep0 maxpacket: 32 [ 3487.656972][T14497] usb 1-1: config 0 has an invalid interface number: 188 but max is 0 [ 3487.658218][T14497] usb 1-1: config 0 has no interface number 0 [ 3487.659099][T14497] usb 1-1: config 0 interface 188 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 3487.781936][T14497] usb 1-1: New USB device found, idVendor=17ef, idProduct=7203, bcdDevice=2e.36 [ 3487.783305][T14497] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3487.785068][T14497] usb 1-1: Product: syz [ 3487.785753][T14497] usb 1-1: Manufacturer: syz [ 3487.786420][T14497] usb 1-1: SerialNumber: syz [ 3487.798684][T14497] usb 1-1: config 0 descriptor?? [ 3487.851940][T15836] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 3488.176419][T15836] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 3490.437438][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 3490.438584][ T29] audit: type=1400 audit(3490.360:31351): avc: denied { ioctl } for pid=15835 comm="syz.0.2786" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3490.451647][ T29] audit: type=1400 audit(3490.370:31352): avc: denied { ioctl } for pid=15835 comm="syz.0.2786" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3490.501702][ T29] audit: type=1400 audit(3490.420:31353): avc: denied { prog_load } for pid=15845 comm="syz.2.2782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3490.505710][ T29] audit: type=1400 audit(3490.420:31354): avc: denied { bpf } for pid=15845 comm="syz.2.2782" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3490.523321][ T29] audit: type=1400 audit(3490.440:31355): avc: denied { perfmon } for pid=15845 comm="syz.2.2782" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3490.533629][ T29] audit: type=1400 audit(3490.450:31356): avc: denied { perfmon } for pid=15845 comm="syz.2.2782" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3490.540366][ T29] audit: type=1400 audit(3490.460:31357): avc: denied { perfmon } for pid=15845 comm="syz.2.2782" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3490.543072][ T29] audit: type=1400 audit(3490.460:31358): avc: denied { perfmon } for pid=15845 comm="syz.2.2782" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3490.558771][ T29] audit: type=1400 audit(3490.480:31359): avc: denied { bpf } for pid=15845 comm="syz.2.2782" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3490.570742][ T29] audit: type=1400 audit(3490.490:31360): avc: denied { create } for pid=15845 comm="syz.2.2782" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 3491.324149][T14497] asix 1-1:0.188 (unnamed net_device) (uninitialized): Failed to write reg index 0x0000: -71 [ 3491.324713][T14497] asix 1-1:0.188 (unnamed net_device) (uninitialized): Failed to write RX_CTL mode to 0x0088: ffffffb9 [ 3491.325176][T14497] asix 1-1:0.188: probe with driver asix failed with error -71 [ 3491.337901][T14497] usb 1-1: USB disconnect, device number 53 [ 3495.463564][ T29] kauditd_printk_skb: 184 callbacks suppressed [ 3495.463939][ T29] audit: type=1400 audit(3495.380:31545): avc: denied { getattr } for pid=15859 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3495.489621][ T29] audit: type=1400 audit(3495.410:31546): avc: denied { search } for pid=15859 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3495.522106][ T29] audit: type=1400 audit(3495.430:31547): avc: denied { getattr } for pid=15859 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3495.555166][ T29] audit: type=1400 audit(3495.430:31548): avc: denied { search } for pid=15859 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3495.555633][ T29] audit: type=1400 audit(3495.430:31549): avc: denied { search } for pid=15859 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3495.555850][ T29] audit: type=1400 audit(3495.430:31550): avc: denied { search } for pid=15859 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3495.558758][ T29] audit: type=1400 audit(3495.480:31551): avc: denied { getattr } for pid=15859 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.ipv4ll" dev="tmpfs" ino=67 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 3495.688380][ T29] audit: type=1400 audit(3495.610:31552): avc: denied { write } for pid=15859 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3495.691604][ T29] audit: type=1400 audit(3495.610:31553): avc: denied { write open } for pid=15859 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3495.824187][ T29] audit: type=1400 audit(3495.700:31554): avc: denied { getattr } for pid=15859 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3497.802954][T15877] netlink: 24 bytes leftover after parsing attributes in process `syz.0.2791'. [ 3499.104828][T15419] usb 1-1: new high-speed USB device number 54 using dummy_hcd [ 3499.305230][T15419] usb 1-1: Using ep0 maxpacket: 8 [ 3499.432671][T15419] usb 1-1: config 2 has an invalid interface number: 31 but max is 0 [ 3499.432981][T15419] usb 1-1: config 2 has no interface number 0 [ 3499.433387][T15419] usb 1-1: config 2 interface 31 has no altsetting 0 [ 3499.585465][T15419] usb 1-1: New USB device found, idVendor=1a86, idProduct=e092, bcdDevice=53.3f [ 3499.585767][T15419] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 3499.586069][T15419] usb 1-1: Product: syz [ 3499.586235][T15419] usb 1-1: Manufacturer: syz [ 3499.586390][T15419] usb 1-1: SerialNumber: syz [ 3500.474069][ T29] kauditd_printk_skb: 85 callbacks suppressed [ 3500.474816][ T29] audit: type=1400 audit(3500.390:31640): avc: denied { ioctl } for pid=15878 comm="syz.0.2792" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3500.508230][ T29] audit: type=1400 audit(3500.420:31641): avc: denied { ioctl } for pid=15878 comm="syz.0.2792" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3500.727252][T15419] ch9200 1-1:2.31: probe with driver ch9200 failed with error -22 [ 3500.745202][ T29] audit: type=1400 audit(3500.660:31642): avc: denied { search } for pid=15887 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3500.745596][T15419] usb 1-1: USB disconnect, device number 54 [ 3500.746431][ T29] audit: type=1400 audit(3500.660:31643): avc: denied { search } for pid=15887 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3500.747875][ T29] audit: type=1400 audit(3500.660:31644): avc: denied { search } for pid=15887 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3500.767516][ T29] audit: type=1400 audit(3500.660:31645): avc: denied { read open } for pid=15887 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3500.767922][ T29] audit: type=1400 audit(3500.660:31646): avc: denied { getattr } for pid=15887 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3500.805954][ T29] audit: type=1400 audit(3500.730:31647): avc: denied { search } for pid=15887 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3500.806347][ T29] audit: type=1400 audit(3500.730:31648): avc: denied { search } for pid=15887 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3500.806439][ T29] audit: type=1400 audit(3500.730:31649): avc: denied { search } for pid=15887 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3506.573073][ T29] kauditd_printk_skb: 218 callbacks suppressed [ 3506.573457][ T29] audit: type=1400 audit(3506.490:31868): avc: denied { write } for pid=15903 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3506.580920][ T29] audit: type=1400 audit(3506.500:31869): avc: denied { write open } for pid=15903 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3506.778720][ T29] audit: type=1400 audit(3506.700:31870): avc: denied { search } for pid=15903 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3506.785675][ T29] audit: type=1400 audit(3506.700:31871): avc: denied { search } for pid=15903 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3506.787201][ T29] audit: type=1400 audit(3506.700:31872): avc: denied { search } for pid=15903 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3506.788392][ T29] audit: type=1400 audit(3506.700:31873): avc: denied { search } for pid=15903 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3507.110952][ T29] audit: type=1400 audit(3507.020:31874): avc: denied { search } for pid=15905 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3507.185479][ T29] audit: type=1400 audit(3507.100:31875): avc: denied { search } for pid=15905 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3507.185863][ T29] audit: type=1400 audit(3507.100:31876): avc: denied { search } for pid=15905 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3507.186072][ T29] audit: type=1400 audit(3507.100:31877): avc: denied { read open } for pid=15905 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3511.581970][ T29] kauditd_printk_skb: 254 callbacks suppressed [ 3511.582172][ T29] audit: type=1400 audit(3511.500:32132): avc: denied { search } for pid=15917 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3511.582321][ T29] audit: type=1400 audit(3511.500:32133): avc: denied { search } for pid=15917 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3511.604661][ T29] audit: type=1400 audit(3511.500:32134): avc: denied { search } for pid=15917 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3511.607747][ T29] audit: type=1400 audit(3511.530:32135): avc: denied { read open } for pid=15917 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3511.610892][ T29] audit: type=1400 audit(3511.530:32136): avc: denied { getattr } for pid=15917 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3511.629267][ T29] audit: type=1400 audit(3511.550:32137): avc: denied { search } for pid=15917 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3511.629438][ T29] audit: type=1400 audit(3511.550:32138): avc: denied { search } for pid=15917 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3511.629496][ T29] audit: type=1400 audit(3511.550:32139): avc: denied { search } for pid=15917 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3511.629544][ T29] audit: type=1400 audit(3511.550:32140): avc: denied { search } for pid=15917 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3511.632221][ T29] audit: type=1400 audit(3511.550:32141): avc: denied { search } for pid=15917 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3516.681531][ T29] kauditd_printk_skb: 152 callbacks suppressed [ 3516.685588][ T29] audit: type=1400 audit(3516.600:32294): avc: denied { create } for pid=15926 comm="syz.2.2799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3516.901623][T15930] syz.2.2799 (15930): drop_caches: 2 [ 3516.902331][ T29] audit: type=1400 audit(3516.810:32295): avc: denied { search } for pid=15928 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3516.914558][ T29] audit: type=1400 audit(3516.830:32296): avc: denied { search } for pid=15928 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3516.914765][ T29] audit: type=1400 audit(3516.830:32297): avc: denied { search } for pid=15928 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3517.354869][ T29] audit: type=1400 audit(3517.250:32298): avc: denied { search } for pid=15914 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 3523.237900][ T29] audit: type=1400 audit(3523.160:32299): avc: denied { read write } for pid=14852 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3523.242911][ T29] audit: type=1400 audit(3523.160:32300): avc: denied { read write open } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3523.321951][ T29] audit: type=1400 audit(3523.170:32301): avc: denied { ioctl } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3523.831375][ T29] audit: type=1400 audit(3523.750:32302): avc: denied { create } for pid=15933 comm="syz.0.2800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3523.877985][ T29] audit: type=1400 audit(3523.800:32303): avc: denied { prog_load } for pid=15933 comm="syz.0.2800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3523.884093][ T29] audit: type=1400 audit(3523.800:32304): avc: denied { bpf } for pid=15933 comm="syz.0.2800" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3523.912660][ T29] audit: type=1400 audit(3523.830:32305): avc: denied { perfmon } for pid=15933 comm="syz.0.2800" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3524.015123][ T29] audit: type=1400 audit(3523.920:32306): avc: denied { perfmon } for pid=15933 comm="syz.0.2800" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3524.059251][ T29] audit: type=1400 audit(3523.980:32307): avc: denied { perfmon } for pid=15933 comm="syz.0.2800" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3524.129643][ T29] audit: type=1400 audit(3524.030:32308): avc: denied { perfmon } for pid=15933 comm="syz.0.2800" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3528.388120][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 3528.388452][ T29] audit: type=1400 audit(3528.310:32312): avc: denied { write } for pid=15933 comm="syz.0.2800" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 3528.468305][ T29] audit: type=1400 audit(3528.390:32313): avc: denied { create } for pid=15933 comm="syz.0.2800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3528.482775][ T29] audit: type=1400 audit(3528.400:32314): avc: denied { getopt } for pid=15933 comm="syz.0.2800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3528.499073][ T29] audit: type=1400 audit(3528.420:32315): avc: denied { allowed } for pid=15933 comm="syz.0.2800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3528.517588][ T29] audit: type=1400 audit(3528.440:32316): avc: denied { prog_load } for pid=15933 comm="syz.0.2800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3528.529959][ T29] audit: type=1400 audit(3528.450:32317): avc: denied { bpf } for pid=15933 comm="syz.0.2800" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3530.038794][ T29] audit: type=1400 audit(3529.960:32318): avc: denied { create } for pid=15938 comm="syz.2.2801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3530.046125][ T29] audit: type=1400 audit(3529.970:32319): avc: denied { ioctl } for pid=15938 comm="syz.2.2801" path="socket:[35795]" dev="sockfs" ino=35795 ioctlcmd=0x8955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3530.075693][ T29] audit: type=1400 audit(3530.000:32320): avc: denied { module_request } for pid=15938 comm="syz.2.2801" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3530.278575][ T29] audit: type=1400 audit(3530.200:32321): avc: denied { sys_module } for pid=15938 comm="syz.2.2801" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3533.743207][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 3533.744964][ T29] audit: type=1400 audit(3533.660:32342): avc: denied { write } for pid=15945 comm="syz.2.2803" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 3533.847689][ T29] audit: type=1400 audit(3533.770:32343): avc: denied { allowed } for pid=15945 comm="syz.2.2803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3533.857250][ T29] audit: type=1400 audit(3533.780:32344): avc: denied { prog_load } for pid=15945 comm="syz.2.2803" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3533.866302][ T29] audit: type=1400 audit(3533.790:32345): avc: denied { bpf } for pid=15945 comm="syz.2.2803" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3535.353543][ T29] audit: type=1400 audit(3535.270:32346): avc: denied { read write } for pid=14852 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3535.360433][ T29] audit: type=1400 audit(3535.280:32347): avc: denied { read write open } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3535.366731][ T29] audit: type=1400 audit(3535.290:32348): avc: denied { ioctl } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3535.572352][ T29] audit: type=1400 audit(3535.490:32349): avc: denied { prog_load } for pid=15950 comm="syz.0.2804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3535.578111][ T29] audit: type=1400 audit(3535.500:32350): avc: denied { bpf } for pid=15950 comm="syz.0.2804" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3535.586586][ T29] audit: type=1400 audit(3535.510:32351): avc: denied { perfmon } for pid=15950 comm="syz.0.2804" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3538.484959][T14497] usb 1-1: new high-speed USB device number 55 using dummy_hcd [ 3538.711289][T14497] usb 1-1: Using ep0 maxpacket: 8 [ 3538.749132][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 3538.750485][ T29] audit: type=1400 audit(3538.670:32383): avc: denied { ioctl } for pid=15956 comm="syz.0.2807" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3538.911504][T14497] usb 1-1: unable to get BOS descriptor or descriptor too short [ 3538.914010][T14497] usb 1-1: unable to read config index 0 descriptor/start: -71 [ 3538.915208][T14497] usb 1-1: can't read configurations, error -71 [ 3539.104948][ T29] audit: type=1400 audit(3539.020:32384): avc: denied { read write } for pid=14852 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3539.107248][ T29] audit: type=1400 audit(3539.030:32385): avc: denied { read write open } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3539.117907][ T29] audit: type=1400 audit(3539.040:32386): avc: denied { ioctl } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3539.769040][ T29] audit: type=1400 audit(3539.690:32387): avc: denied { read append } for pid=15964 comm="syz.0.2808" name="comedi3" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3539.775090][ T29] audit: type=1400 audit(3539.690:32388): avc: denied { read open } for pid=15964 comm="syz.0.2808" path="/dev/comedi3" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3539.801062][ T29] audit: type=1400 audit(3539.720:32389): avc: denied { ioctl } for pid=15964 comm="syz.0.2808" path="/dev/comedi3" dev="devtmpfs" ino=713 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3539.815295][T15965] comedi: valid board names for 8255 driver are: [ 3539.816546][T15965] 8255 [ 3539.817265][T15965] comedi: valid board names for vmk80xx driver are: [ 3539.818091][T15965] vmk80xx [ 3539.818712][T15965] comedi: valid board names for usbduxsigma driver are: [ 3539.820021][T15965] usbduxsigma [ 3539.820765][T15965] comedi: valid board names for usbduxfast driver are: [ 3539.821572][T15965] usbduxfast [ 3539.822159][T15965] comedi: valid board names for usbdux driver are: [ 3539.825276][T15965] usbdux [ 3539.835148][T15965] comedi: valid board names for ni6501 driver are: [ 3539.836424][T15965] ni6501 [ 3539.837135][T15965] comedi: valid board names for dt9812 driver are: [ 3539.838114][T15965] dt9812 [ 3539.838790][T15965] comedi: valid board names for ni_labpc_cs driver are: [ 3539.839644][T15965] ni_labpc_cs [ 3539.840280][T15965] comedi: valid board names for ni_daq_700 driver are: [ 3539.841087][T15965] ni_daq_700 [ 3539.841764][T15965] comedi: valid board names for labpc_pci driver are: [ 3539.842514][T15965] labpc_pci [ 3539.843109][T15965] comedi: valid board names for adl_pci9118 driver are: [ 3539.858752][T15965] pci9118dg [ 3539.863217][T15965] pci9118hg [ 3539.863377][T15965] pci9118hr [ 3539.863417][T15965] comedi: valid board names for 8255_pci driver are: [ 3539.863445][T15965] 8255_pci [ 3539.863461][T15965] comedi: valid board names for comedi_parport driver are: [ 3539.863516][T15965] comedi_parport [ 3539.863539][T15965] comedi: valid board names for comedi_test driver are: [ 3539.863557][T15965] comedi_test [ 3539.863572][T15965] comedi: valid board names for comedi_bond driver are: [ 3539.863588][T15965] comedi_bond [ 3540.274215][ T29] audit: type=1400 audit(3540.180:32390): avc: denied { read write } for pid=14852 comm="syz-executor" name="loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3540.295096][ T29] audit: type=1400 audit(3540.210:32391): avc: denied { read write open } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3540.295526][ T29] audit: type=1400 audit(3540.210:32392): avc: denied { ioctl } for pid=14852 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 3540.769000][T15967] 8<--- cut here --- [ 3540.769151][T15967] Unable to handle kernel paging request at virtual address fee04f2a when write [ 3540.769271][T15967] [fee04f2a] *pgd=80000080007003, *pmd=00000000 [ 3540.770200][T15967] Internal error: Oops: a06 [#1] SMP ARM [ 3540.773768][T15967] Modules linked in: [ 3540.774550][T15967] CPU: 1 UID: 0 PID: 15967 Comm: syz.0.2809 Not tainted syzkaller #0 PREEMPT [ 3540.775380][T15967] Hardware name: ARM-Versatile Express [ 3540.775999][T15967] PC is at subdev_8255_io+0x60/0x6c [ 3540.776663][T15967] LR is at subdev_8255_io+0x4c/0x6c [ 3540.777079][T15967] pc : [<813db868>] lr : [<813db854>] psr: 60000013 [ 3540.777425][T15967] sp : dfb09cb8 ip : dfb09cb8 fp : dfb09cd4 [ 3540.777771][T15967] r10: 00000000 r9 : 00000000 r8 : 00000084 [ 3540.778057][T15967] r7 : 00004f27 r6 : 0000009b r5 : 842013c0 r4 : 00004f2a [ 3540.778392][T15967] r3 : 0000009b r2 : fee04f2a r1 : 00000001 r0 : 842013c0 [ 3540.778905][T15967] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 3540.779306][T15967] Control: 30c5387d Table: 85568600 DAC: 00000000 [ 3540.779648][T15967] Register r0 information: slab kmalloc-192 start 842013c0 pointer offset 0 size 192 [ 3540.780887][T15967] Register r1 information: non-paged memory [ 3540.781421][T15967] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 3540.782127][T15967] Register r3 information: non-paged memory [ 3540.782425][T15967] Register r4 information: non-paged memory [ 3540.782690][T15967] Register r5 information: slab kmalloc-192 start 842013c0 pointer offset 0 size 192 [ 3540.783134][T15967] Register r6 information: non-paged memory [ 3540.783395][T15967] Register r7 information: non-paged memory [ 3540.783658][T15967] Register r8 information: non-paged memory [ 3540.783918][T15967] Register r9 information: NULL pointer [ 3540.784264][T15967] Register r10 information: NULL pointer [ 3540.784625][T15967] Register r11 information: 2-page vmalloc region starting at 0xdfb08000 allocated at kernel_clone+0xac/0x3ec [ 3540.785273][T15967] Register r12 information: 2-page vmalloc region starting at 0xdfb08000 allocated at kernel_clone+0xac/0x3ec [ 3540.785794][T15967] Process syz.0.2809 (pid: 15967, stack limit = 0xdfb08000) [ 3540.786150][T15967] Stack: (0xdfb09cb8 to 0xdfb0a000) [ 3540.786406][T15967] 9ca0: 813db808 842013c0 [ 3540.786837][T15967] 9cc0: 00004f27 00004f27 dfb09cf4 dfb09cd8 813db540 813db814 00004f27 8050a88c [ 3540.787237][T15967] 9ce0: 85b03000 85b03000 dfb09d14 dfb09cf8 813db900 813db4f4 85b03000 842013c0 [ 3540.787591][T15967] 9d00: dfb09da4 00004f27 dfb09d54 dfb09d18 813dbaf4 813db880 8079defc 84898580 [ 3540.787960][T15967] 9d20: 828215f0 00000000 00000000 829d23cc 842013c0 84201404 dfb09d90 842013c0 [ 3540.788394][T15967] 9d40: 00000000 82b25910 dfb09d8c dfb09d58 813ca9ec 813dba44 200000c0 00000000 [ 3540.788769][T15967] 9d60: dfb09d7c 200000c0 842013c0 b5403587 200000c0 84176c00 40946400 00000003 [ 3540.789138][T15967] 9d80: dfb09e4c dfb09d90 813c6538 813ca8f0 35353238 00000000 00000000 00000000 [ 3540.789504][T15967] 9da0: 00000000 00004f27 00000005 00000002 00000401 00000021 00000cc7 00000fff [ 3540.789867][T15967] 9dc0: 5c952399 00000005 000003ff 00000000 00000005 00000001 00000000 00000009 [ 3540.790273][T15967] 9de0: 0000e1cb 00000004 00000004 00000003 00000395 80000089 00000002 00000000 [ 3540.790638][T15967] 9e00: 00000006 ffffeadb 00000003 80000000 00000008 80000001 08000000 00000005 [ 3540.790994][T15967] 9e20: 00000000 fdf00016 00000000 85d30240 842013c0 200000c0 200000c0 84176c00 [ 3540.791378][T15967] 9e40: dfb09f14 dfb09e50 813c7504 813c6444 00000000 dfb09e54 dfb09e54 fdf00016 [ 3540.791739][T15967] 9e60: 00000000 00000000 824625b4 0000005f 83da5210 842013f0 84213abc 84176c00 [ 3540.792159][T15967] 9e80: dfb09ee4 dfb09e90 807a7cbc 8079e0b4 00000064 00000001 00000000 dfb09eac [ 3540.792539][T15967] 9ea0: 8523bc10 834f2aa0 00006400 0000000b dfb09ea0 00000000 dfb09d30 fdf00016 [ 3540.792902][T15967] 9ec0: 85d30240 40946400 200000c0 200000c0 85d30240 00000003 dfb09ef4 dfb09ee8 [ 3540.793282][T15967] 9ee0: 807a7ddc fdf00016 dfb09f14 40946400 00000000 85d30241 200000c0 85d30240 [ 3540.793631][T15967] 9f00: 00000003 84176c00 dfb09fa4 dfb09f18 80578ee0 813c6f34 ecac8b10 84176c00 [ 3540.794018][T15967] 9f20: dfb09f3c dfb09f30 81a60d80 81a60c50 dfb09f54 dfb09f40 8025c484 8028d914 [ 3540.795203][T15967] 9f40: dfb09fb0 40000000 dfb09f84 dfb09f58 802229ec 8025c440 00000000 8281cfb4 [ 3540.795746][T15967] 9f60: dfb09fb0 0014ced0 ecac8b10 80222940 00000000 fdf00016 dfb09fac 00000000 [ 3540.796137][T15967] 9f80: 00000000 00316308 00000036 8020029c 84176c00 00000036 00000000 dfb09fa8 [ 3540.796501][T15967] 9fa0: 80200060 80578dbc 00000000 00000000 00000003 40946400 200000c0 00000000 [ 3540.796870][T15967] 9fc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f7d0bc [ 3540.797258][T15967] 9fe0: 76f7cec0 76f7ceb0 0001928c 00132970 60000010 00000003 00000000 00000000 [ 3540.797629][T15967] Call trace: [ 3540.797872][T15967] [<813db808>] (subdev_8255_io) from [<813db540>] (subdev_8255_do_config+0x58/0x60) [ 3540.798372][T15967] r7:00004f27 r6:00004f27 r5:842013c0 r4:813db808 [ 3540.798643][T15967] [<813db4e8>] (subdev_8255_do_config) from [<813db900>] (subdev_8255_io_init+0x8c/0x9c) [ 3540.799042][T15967] r4:85b03000 [ 3540.799221][T15967] [<813db874>] (subdev_8255_io_init) from [<813dbaf4>] (dev_8255_attach+0xbc/0x114) [ 3540.799633][T15967] r7:00004f27 r6:dfb09da4 r5:842013c0 r4:85b03000 [ 3540.799899][T15967] [<813dba38>] (dev_8255_attach) from [<813ca9ec>] (comedi_device_attach+0x108/0x250) [ 3540.800372][T15967] r10:82b25910 r9:00000000 r8:842013c0 r7:dfb09d90 r6:84201404 r5:842013c0 [ 3540.800745][T15967] r4:829d23cc [ 3540.800910][T15967] [<813ca8e4>] (comedi_device_attach) from [<813c6538>] (do_devconfig_ioctl+0x100/0x220) [ 3540.801318][T15967] r10:00000003 r9:40946400 r8:84176c00 r7:200000c0 r6:b5403587 r5:842013c0 [ 3540.801658][T15967] r4:200000c0 [ 3540.801828][T15967] [<813c6438>] (do_devconfig_ioctl) from [<813c7504>] (comedi_unlocked_ioctl+0x5dc/0x1c50) [ 3540.802262][T15967] r8:84176c00 r7:200000c0 r6:200000c0 r5:842013c0 r4:85d30240 [ 3540.802562][T15967] [<813c6f28>] (comedi_unlocked_ioctl) from [<80578ee0>] (sys_ioctl+0x130/0xba0) [ 3540.802963][T15967] r10:84176c00 r9:00000003 r8:85d30240 r7:200000c0 r6:85d30241 r5:00000000 [ 3540.803311][T15967] r4:40946400 [ 3540.803478][T15967] [<80578db0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 3540.803869][T15967] Exception stack(0xdfb09fa8 to 0xdfb09ff0) [ 3540.804163][T15967] 9fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 3540.804655][T15967] 9fc0: 00000000 00000000 00316308 00000036 00300000 00000000 00006364 76f7d0bc [ 3540.805120][T15967] 9fe0: 76f7cec0 76f7ceb0 0001928c 00132970 [ 3540.805392][T15967] r10:00000036 r9:84176c00 r8:8020029c r7:00000036 r6:00316308 r5:00000000 [ 3540.805735][T15967] r4:00000000 [ 3540.806373][T15967] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 3540.807033][T15967] ---[ end trace 0000000000000000 ]--- [ 3540.807949][T15967] Kernel panic - not syncing: Fatal exception [ 3540.810447][T15967] Rebooting in 86400 seconds.. VM DIAGNOSIS: 00:54:12 Registers: info registers vcpu 0 CPU#0 R00=dddd00c0 R01=5b70d000 R02=0043efe1 R03=81a615b8 R04=00000006 R05=828f7e48 R06=00000000 R07=828f7e40 R08=851cb000 R09=00000028 R10=828f7e48 R11=dfa09bec R12=dfa09bf0 R13=dfa09be0 R14=8033dd04 R15=81a615c8 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=84286440 R01=00000030 R02=eaf0f000 R03=00000000 R04=84b2302f R05=84286440 R06=80a8f244 R07=84b23038 R08=82827128 R09=00000000 R10=0000286f R11=dfb09924 R12=00000002 R13=dfb09918 R14=829594c4 R15=80a8f29c PSR=80000193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000