last executing test programs:

2m2.430330926s ago: executing program 1 (id=27907):
r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0)
ioctl$RTC_WKALM_SET(r0, 0x4020940d, &(0x7f0000000140))

2m2.242620883s ago: executing program 1 (id=27908):
r0 = socket$kcm(0x29, 0x2, 0x0)
r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
dup3(r0, r1, 0x0)
sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=ANY=[], 0x5c}}, 0x0)

2m2.075537948s ago: executing program 1 (id=27909):
r0 = socket$igmp(0x2, 0x3, 0x2)
setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f00000002c0), 0x4)
setsockopt$MRT_FLUSH(r0, 0x0, 0xd1, &(0x7f0000000000), 0x4)

2m1.872030756s ago: executing program 1 (id=27911):
r0 = gettid()
r1 = socket(0x10, 0x3, 0x0)
bind$netlink(r1, &(0x7f0000177ff4)={0x10, 0x0, 0x1}, 0xc)
write(r1, &(0x7f0000000140)="2600000022004701050000070000000000000020002b1f000a4a51f1ee839cd53400b017ca5b", 0x26)
connect$netlink(r1, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc)
setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000b4bffc), 0x4)
write(r1, &(0x7f0000000000)='\"', 0x1)
tkill(r0, 0x7)

2m1.180663457s ago: executing program 1 (id=27916):
r0 = openat$vsock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0)
close_range(r0, 0xffffffffffffffff, 0x0)
socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x0)

2m0.999371064s ago: executing program 1 (id=27918):
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)={0x1b, 0x0, 0x0, 0x80000000}, 0x48)

44.672583369s ago: executing program 0 (id=28073):
pipe2(&(0x7f0000000000)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
close(r0)
socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$TIPC_NL_BEARER_GET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0)

42.681480666s ago: executing program 0 (id=28074):
r0 = getpid()
r1 = socket$can_raw(0x1d, 0x3, 0x1)
ioctl$sock_FIOSETOWN(r1, 0x8901, &(0x7f0000002140)=r0)

37.484638168s ago: executing program 0 (id=28075):
r0 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$AUDIT_SET(r0, 0x0, 0x0)

36.800085079s ago: executing program 0 (id=28076):
r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
close(r0)
socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f0000000440)={0x14}, 0x14}}, 0x0)

28.535476574s ago: executing program 0 (id=28077):
r0 = eventfd2(0x0, 0x0)
close(r0)
socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_NEW_STATION(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0)

0s ago: executing program 0 (id=28078):
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000003d00)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = fcntl$dupfd(r0, 0x0, r1)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r2, 0x84, 0x65, 0x0, 0x0)

kernel console output (not intermixed with test programs):

 family 0 port 6081 - 0
[ 4910.989619][T15869] input: syz1 as /devices/virtual/input/input34
[ 4911.129341][T15859] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0
[ 4911.196619][T15859] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0
[ 4911.267852][T15859] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0
[ 4911.350294][T15859] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0
[ 4914.396750][T15916] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=15916 comm=syz.1.20220
[ 4916.147220][T15870] udevd[15870]: setting mode of /dev/vcs21 to 020660 failed: Read-only file system
[ 4916.148231][T15870] udevd[15870]: setting owner of /dev/vcs21 to uid=0, gid=5 failed: Read-only file system
[ 4916.389525][T15934] udevd[15934]: setting mode of /dev/vcsu21 to 020660 failed: Read-only file system
[ 4916.390513][T15934] udevd[15934]: setting owner of /dev/vcsu21 to uid=0, gid=5 failed: Read-only file system
[ 4916.674755][T15936] udevd[15936]: setting mode of /dev/vcsa21 to 020660 failed: Read-only file system
[ 4916.676830][T15936] udevd[15936]: setting owner of /dev/vcsa21 to uid=0, gid=5 failed: Read-only file system
[ 4917.924752][   T30] audit: type=1400 audit(5430.566:605): avc:  denied  { append } for  pid=15961 comm="syz.0.20239" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1
[ 4919.439227][    C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 4919.963860][T15993] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=15993 comm=syz.1.20254
[ 4922.975096][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::ffff:172.20.20.187]:2. Sending cookies.
[ 4923.156432][T16023] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16023 comm=syz.0.20268
[ 4924.920370][   T30] audit: type=1400 audit(5437.556:606): avc:  denied  { setopt } for  pid=16057 comm="syz.1.20286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1
[ 4924.943664][T16058] netlink: 168 bytes leftover after parsing attributes in process `syz.1.20286'.
[ 4925.803594][T16072] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16072 comm=syz.0.20293
[ 4931.163564][T16160] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16160 comm=syz.0.20334
[ 4932.638135][T16175] sctp: [Deprecated]: syz.0.20341 (pid 16175) Use of int in max_burst socket option deprecated.
[ 4932.638135][T16175] Use struct sctp_assoc_value instead
[ 4943.522535][T16315] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=16315 comm=syz.0.20407
[ 4944.294472][T16330] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65534 sclass=netlink_route_socket pid=16330 comm=syz.1.20415
[ 4944.297144][T16330] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16330 comm=syz.1.20415
[ 4945.795478][T16302] udevd[16302]: setting mode of /dev/vcs23 to 020660 failed: Read-only file system
[ 4945.799832][T16302] udevd[16302]: setting owner of /dev/vcs23 to uid=0, gid=5 failed: Read-only file system
[ 4946.032523][T16360] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16360 comm=syz.1.20429
[ 4946.241119][T16359] udevd[16359]: setting mode of /dev/vcsu23 to 020660 failed: Read-only file system
[ 4946.284009][T16359] udevd[16359]: setting owner of /dev/vcsu23 to uid=0, gid=5 failed: Read-only file system
[ 4946.495664][T16361] udevd[16361]: setting mode of /dev/vcsa23 to 020660 failed: Read-only file system
[ 4946.496603][T16361] udevd[16361]: setting owner of /dev/vcsa23 to uid=0, gid=5 failed: Read-only file system
[ 4951.231008][T16442] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16442 comm=syz.0.20468
[ 4952.004124][T16454] veth0_vlan: left promiscuous mode
[ 4954.213848][T16481] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1280 sclass=netlink_tcpdiag_socket pid=16481 comm=syz.1.20486
[ 4961.216019][T16555] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=3 sclass=netlink_xfrm_socket pid=16555 comm=syz.1.20519
[ 4966.967906][T16646] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16646 comm=syz.0.20562
[ 4968.827539][T16676] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=16676 comm=syz.0.20576
[ 4969.057955][T16678] serio: Serial port pts0
[ 4976.048063][T16726] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16726 comm=syz.1.20598
[ 4979.457896][T32165] block device autoloading is deprecated and will be removed.
[ 4979.643419][T16782] udevd[16782]: setting mode of /dev/loop0 to 060660 failed: Read-only file system
[ 4979.644603][T16782] udevd[16782]: setting owner of /dev/loop0 to uid=0, gid=6 failed: Read-only file system
[ 4979.885048][T16793] serio: Serial port pts0
[ 4980.692970][T16802] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16802 comm=syz.0.20634
[ 4984.744454][T16845] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=16845 comm=syz.0.20653
[ 4985.979535][T16784] udevd[16784]: setting mode of /dev/vcs21 to 020660 failed: Read-only file system
[ 4985.981318][T16784] udevd[16784]: setting owner of /dev/vcs21 to uid=0, gid=5 failed: Read-only file system
[ 4986.033190][T16782] udevd[16782]: setting mode of /dev/vcsu21 to 020660 failed: Read-only file system
[ 4986.034244][T16782] udevd[16782]: setting owner of /dev/vcsu21 to uid=0, gid=5 failed: Read-only file system
[ 4986.129460][T16853] udevd[16853]: setting mode of /dev/vcsa21 to 020660 failed: Read-only file system
[ 4986.130420][T16853] udevd[16853]: setting owner of /dev/vcsa21 to uid=0, gid=5 failed: Read-only file system
[ 4986.965737][T16863] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16863 comm=syz.0.20661
[ 4995.832122][   T30] audit: type=1400 audit(5508.466:607): avc:  denied  { lock } for  pid=16934 comm="syz.1.20693" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=162501 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[ 5006.490200][T17044] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17044 comm=syz.1.20743
[ 5012.934950][   T30] audit: type=1400 audit(5525.576:608): avc:  denied  { audit_read } for  pid=17134 comm="syz.1.20788" capability=37  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 5016.398726][T17185] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=17185 comm=syz.0.20812
[ 5016.562652][T17187] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17187 comm=syz.1.20813
[ 5023.486337][T16784] udevd[16784]: setting mode of /dev/vcs20 to 020660 failed: Read-only file system
[ 5023.487291][T16784] udevd[16784]: setting owner of /dev/vcs20 to uid=0, gid=5 failed: Read-only file system
[ 5023.506323][T16782] udevd[16782]: setting mode of /dev/vcsu20 to 020660 failed: Read-only file system
[ 5023.507453][T16782] udevd[16782]: setting owner of /dev/vcsu20 to uid=0, gid=5 failed: Read-only file system
[ 5023.708005][T17261] udevd[17261]: setting mode of /dev/vcsa20 to 020660 failed: Read-only file system
[ 5023.708977][T17261] udevd[17261]: setting owner of /dev/vcsa20 to uid=0, gid=5 failed: Read-only file system
[ 5028.723252][T17321] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=17321 comm=syz.1.20875
[ 5030.265781][T17338] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17338 comm=syz.1.20882
[ 5032.617660][T17376] "syz.0.20902" (17376) uses obsolete ecb(arc4) skcipher
[ 5036.234121][T17424] serio: Serial port pts0
[ 5044.886180][T17465] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17465 comm=syz.1.20940
[ 5047.933527][T17497] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17497 comm=syz.0.20955
[ 5076.201814][    C1] sched: RT throttling activated
[ 5084.124737][T17797] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=17797 comm=syz.0.21090
[ 5085.458474][T17810] serio: Serial port pts0
[ 5094.120459][   T30] audit: type=1400 audit(5606.756:609): avc:  denied  { lock } for  pid=17886 comm="syz.0.21128" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1
[ 5099.664497][T17968] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=17968 comm=syz.0.21166
[ 5101.913515][T17979] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=17979 comm=syz.0.21171
[ 5103.244773][   T30] audit: type=1400 audit(5615.886:610): avc:  denied  { shutdown } for  pid=17988 comm="syz.1.21176" lport=35456 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1
[ 5109.420704][T18040] netlink: 16 bytes leftover after parsing attributes in process `syz.1.21199'.
[ 5110.463186][T18047] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5130 sclass=netlink_xfrm_socket pid=18047 comm=syz.1.21201
[ 5116.117698][T18122] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18122 comm=syz.1.21238
[ 5122.198049][T18153] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=18153 comm=syz.1.21252
[ 5140.338211][T18286] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=18286 comm=syz.1.21315
[ 5147.869772][T18361] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18361 comm=syz.1.21351
[ 5149.003565][T18374] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=18374 comm=syz.1.21358
[ 5153.277948][   T30] audit: type=1400 audit(5665.916:611): avc:  denied  { create } for  pid=18426 comm="syz.0.21381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1
[ 5154.902103][T18446] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=18446 comm=syz.0.21390
[ 5157.590607][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 5159.415117][T18503] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18503 comm=syz.0.21415
[ 5167.983419][T18609] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18609 comm=syz.1.21466
[ 5168.225100][T18611] ./file0: Can't lookup blockdev
[ 5178.475508][T18740] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18740 comm=syz.1.21529
[ 5184.390429][T18811] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2564 sclass=netlink_xfrm_socket pid=18811 comm=syz.1.21563
[ 5191.023489][T18873] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1543 sclass=netlink_route_socket pid=18873 comm=syz.1.21593
[ 5192.324005][T18382] udevd[18382]: setting mode of /dev/vcs22 to 020660 failed: Read-only file system
[ 5192.326130][T18382] udevd[18382]: setting owner of /dev/vcs22 to uid=0, gid=5 failed: Read-only file system
[ 5192.330941][T18191] udevd[18191]: setting mode of /dev/vcsu22 to 020660 failed: Read-only file system
[ 5192.353986][T18191] udevd[18191]: setting owner of /dev/vcsu22 to uid=0, gid=5 failed: Read-only file system
[ 5192.660189][T18892] udevd[18892]: setting mode of /dev/vcsa22 to 020660 failed: Read-only file system
[ 5192.661164][T18892] udevd[18892]: setting owner of /dev/vcsa22 to uid=0, gid=5 failed: Read-only file system
[ 5218.779637][   T30] audit: type=1400 audit(5731.416:612): avc:  denied  { watch } for  pid=19111 comm="syz.0.21703" path="/4604" dev="tmpfs" ino=23579 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[ 5218.787756][   T30] audit: type=1400 audit(5731.416:613): avc:  denied  { watch_sb } for  pid=19111 comm="syz.0.21703" path="/4604" dev="tmpfs" ino=23579 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1
[ 5219.576270][T19121] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19121 comm=syz.0.21707
[ 5225.180255][T19185] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19185 comm=syz.0.21737
[ 5229.346159][T19223] "syz.0.21755" (19223) uses obsolete ecb(arc4) skcipher
[ 5231.841100][T19261] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65498 sclass=netlink_route_socket pid=19261 comm=syz.1.21774
[ 5234.470025][T19295] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19295 comm=syz.1.21790
[ 5245.465403][T19389] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=2051 sclass=netlink_audit_socket pid=19389 comm=syz.1.21835
[ 5247.546579][T19410] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19410 comm=syz.0.21844
[ 5250.176376][T19436] warning: checkpointing journal with EXT4_IOC_CHECKPOINT_FLAG_ZEROOUT can be slow
[ 5259.903420][   T30] audit: type=1400 audit(5772.516:614): avc:  denied  { setattr } for  pid=19507 comm="syz.0.21891" name="SCTP" dev="sockfs" ino=171784 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 5261.215107][T19530] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19530 comm=syz.0.21902
[ 5275.965968][    C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies.
[ 5276.936336][T19700] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=23 sclass=netlink_tcpdiag_socket pid=19700 comm=syz.1.21981
[ 5278.408463][T19713] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19713 comm=syz.0.21985
[ 5281.342827][T19753] serio: Serial port pts0
[ 5297.477469][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 5301.928655][T19877] "syz.0.22062" (19877) uses obsolete ecb(arc4) skcipher
[ 5304.112844][T19909] serio: Serial port pts0
[ 5308.136547][T19947] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=513 sclass=netlink_tcpdiag_socket pid=19947 comm=syz.1.22095
[ 5311.387876][T19993] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19993 comm=syz.0.22117
[ 5314.953142][T20043] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20043 comm=syz.1.22140
[ 5320.208068][T20105] input: syz0 as /devices/virtual/input/input40
[ 5343.209706][T20188] vcan0: tx address claim with dest, not broadcast
[ 5345.195123][    C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 5351.567158][T20283] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20283 comm=syz.0.22250
[ 5355.772659][T20328] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20328 comm=syz.0.22269
[ 5357.154617][T20342] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=20342 comm=syz.0.22276
[ 5358.894691][T20360] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=263 sclass=netlink_route_socket pid=20360 comm=syz.0.22284
[ 5362.605577][T20404] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20404 comm=syz.1.22305
[ 5363.661160][T20419] serio: Serial port pts0
[ 5369.387225][    C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 5371.297908][T20513] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20513 comm=syz.0.22354
[ 5371.560753][T20516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20516 comm=syz.0.22357
[ 5374.717752][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 5375.314041][T20587] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1538 sclass=netlink_tcpdiag_socket pid=20587 comm=syz.0.22391
[ 5376.813233][T20611] serio: Serial port pts0
[ 5383.694199][T20686] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2561 sclass=netlink_route_socket pid=20686 comm=syz.1.22437
[ 5384.142391][T20695] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1025 sclass=netlink_route_socket pid=20695 comm=syz.1.22442
[ 5392.376844][T20752] __find_get_block_slow() failed. block=144115188075855872, b_blocknr=0, b_state=0x00106019, b_size=4096, device vda blocksize: 4096
[ 5392.383180][T20752] grow_buffers: requested out-of-range block 144115188075855872 for device vda
[ 5392.387913][T20752] EXT4-fs warning (device vda): ext4_resize_fs:2018: can't read last block, resize aborted
[ 5395.926392][T20758] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5127 sclass=netlink_xfrm_socket pid=20758 comm=syz.0.22468
[ 5398.719390][   T30] audit: type=1400 audit(5911.356:615): avc:  denied  { setattr } for  pid=20780 comm="syz.0.22480" name="[io_uring]" dev="anon_inodefs" ino=176352 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1
[ 5403.778641][T20843] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20843 comm=syz.1.22507
[ 5406.638968][T20889] "syz.0.22529" (20889) uses obsolete ecb(arc4) skcipher
[ 5408.152323][T20919] serio: Serial port pts0
[ 5417.390854][   T30] audit: type=1400 audit(5930.026:616): avc:  denied  { lock } for  pid=20948 comm="syz.1.22556" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1
[ 5417.658878][T20953] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1014 sclass=netlink_route_socket pid=20953 comm=syz.1.22558
[ 5419.674930][T20968] sctp: [Deprecated]: syz.1.22565 (pid 20968) Use of int in maxseg socket option.
[ 5419.674930][T20968] Use struct sctp_assoc_value instead
[ 5426.839952][T21013] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5125 sclass=netlink_route_socket pid=21013 comm=syz.1.22585
[ 5439.922912][T21169] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 5440.026807][T21169] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 5440.145637][T21169] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 5440.299105][T21169] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 5440.920485][T21169] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0
[ 5441.017931][T21169] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0
[ 5441.112701][T21169] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0
[ 5441.181077][T21169] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0
[ 5449.580029][T21248] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21248 comm=syz.1.22691
[ 5453.841088][T21322] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=21322 comm=syz.0.22727
[ 5461.130889][T21411] sctp: [Deprecated]: syz.1.22769 (pid 21411) Use of int in max_burst socket option deprecated.
[ 5461.130889][T21411] Use struct sctp_assoc_value instead
[ 5466.645995][   T30] audit: type=1400 audit(5979.286:617): avc:  denied  { read write } for  pid=32165 comm="syz-executor" name="loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 5466.654946][   T30] audit: type=1400 audit(5979.286:618): avc:  denied  { open } for  pid=32165 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 5466.656305][   T30] audit: type=1400 audit(5979.286:619): avc:  denied  { ioctl } for  pid=32165 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=639 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 5466.668283][   T30] audit: type=1400 audit(5979.306:620): avc:  denied  { read } for  pid=3078 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
[ 5466.692121][   T30] audit: type=1400 audit(5979.316:621): avc:  denied  { search } for  pid=3078 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 5466.699467][   T30] audit: type=1400 audit(5979.336:622): avc:  denied  { append } for  pid=3078 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 5466.700357][   T30] audit: type=1400 audit(5979.336:623): avc:  denied  { open } for  pid=3078 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 5466.701257][   T30] audit: type=1400 audit(5979.336:624): avc:  denied  { getattr } for  pid=3078 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 5466.789639][   T30] audit: type=1400 audit(5979.426:625): avc:  denied  { read } for  pid=21465 comm="syz.0.22795" name="dlm_plock" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 5466.790819][   T30] audit: type=1400 audit(5979.426:626): avc:  denied  { open } for  pid=21465 comm="syz.0.22795" path="/dev/dlm_plock" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 5472.942378][   T30] kauditd_printk_skb: 25 callbacks suppressed
[ 5472.942525][   T30] audit: type=1400 audit(5985.576:652): avc:  denied  { setattr } for  pid=21509 comm="syz.0.22816" name="" dev="pipefs" ino=104192 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1
[ 5473.718033][   T30] audit: type=1400 audit(5986.356:653): avc:  denied  { ioctl } for  pid=21525 comm="syz.0.22824" path="socket:[179402]" dev="sockfs" ino=179402 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 5474.003626][   T30] audit: type=1400 audit(5986.646:654): avc:  denied  { create } for  pid=21531 comm="syz.1.22827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[ 5474.009405][   T30] audit: type=1400 audit(5986.646:655): avc:  denied  { connect } for  pid=21531 comm="syz.1.22827" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[ 5474.133757][   T30] audit: type=1400 audit(5986.776:656): avc:  denied  { execmem } for  pid=21533 comm="syz.0.22828" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[ 5474.138883][   T30] audit: type=1400 audit(5986.776:657): avc:  denied  { execute } for  pid=21533 comm="syz.0.22828" path="/5144/memory.swap.events" dev="tmpfs" ino=26344 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1
[ 5474.280213][   T30] audit: type=1400 audit(5986.916:658): avc:  denied  { setopt } for  pid=21535 comm="syz.0.22829" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[ 5474.528814][   T30] audit: type=1400 audit(5987.166:659): avc:  denied  { ioctl } for  pid=21531 comm="syz.1.22827" path="socket:[178809]" dev="sockfs" ino=178809 ioctlcmd=0x5820 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[ 5474.778028][   T30] audit: type=1400 audit(5987.416:660): avc:  denied  { read } for  pid=21542 comm="syz.0.22832" name="card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1
[ 5474.779204][   T30] audit: type=1400 audit(5987.416:661): avc:  denied  { open } for  pid=21542 comm="syz.0.22832" path="/dev/dri/card1" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1
[ 5479.306779][   T30] kauditd_printk_skb: 21 callbacks suppressed
[ 5479.306891][   T30] audit: type=1400 audit(5991.946:683): avc:  denied  { open } for  pid=21591 comm="syz.0.22854" path="/dev/ptyq5" dev="devtmpfs" ino=118 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1
[ 5479.339054][   T30] audit: type=1400 audit(5991.976:684): avc:  denied  { ioctl } for  pid=21591 comm="syz.0.22854" path="/dev/ptyq5" dev="devtmpfs" ino=118 ioctlcmd=0x542a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1
[ 5479.349835][   T30] audit: type=1400 audit(5991.976:685): avc:  denied  { setopt } for  pid=21592 comm="syz.1.22853" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 5479.597747][   T30] audit: type=1400 audit(5992.236:686): avc:  denied  { create } for  pid=21596 comm="syz.0.22856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[ 5479.616071][   T30] audit: type=1400 audit(5992.246:687): avc:  denied  { write } for  pid=21596 comm="syz.0.22856" path="socket:[178937]" dev="sockfs" ino=178937 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[ 5480.022978][   T30] audit: type=1400 audit(5992.656:688): avc:  denied  { create } for  pid=21603 comm="syz.0.22860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 5480.026832][   T30] audit: type=1400 audit(5992.666:689): avc:  denied  { getopt } for  pid=21603 comm="syz.0.22860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 5480.392022][   T30] audit: type=1400 audit(5993.026:690): avc:  denied  { read } for  pid=21609 comm="syz.1.22862" path="socket:[178951]" dev="sockfs" ino=178951 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[ 5480.411850][   T30] audit: type=1400 audit(5993.046:691): avc:  denied  { read } for  pid=21610 comm="syz.0.22863" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[ 5480.413545][   T30] audit: type=1400 audit(5993.046:692): avc:  denied  { open } for  pid=21610 comm="syz.0.22863" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[ 5485.133415][   T30] kauditd_printk_skb: 3 callbacks suppressed
[ 5485.133515][   T30] audit: type=1400 audit(5997.776:696): avc:  denied  { read } for  pid=21649 comm="syz.1.22882" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1
[ 5485.139717][   T30] audit: type=1400 audit(5997.776:697): avc:  denied  { open } for  pid=21649 comm="syz.1.22882" path="/dev/loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1
[ 5486.089455][   T30] audit: type=1400 audit(5998.726:698): avc:  denied  { create } for  pid=21668 comm="syz.0.22891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1
[ 5486.104792][   T30] audit: type=1400 audit(5998.746:699): avc:  denied  { write } for  pid=21668 comm="syz.0.22891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1
[ 5486.697436][   T30] audit: type=1400 audit(5999.336:700): avc:  denied  { write } for  pid=21679 comm="syz.1.22896" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 5486.706105][   T30] audit: type=1400 audit(5999.346:701): avc:  denied  { ioctl } for  pid=21679 comm="syz.1.22896" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0x6628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 5486.899849][   T30] audit: type=1400 audit(5999.536:702): avc:  denied  { create } for  pid=21684 comm="syz.1.22899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 5486.913824][   T30] audit: type=1400 audit(5999.556:703): avc:  denied  { getopt } for  pid=21684 comm="syz.1.22899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 5487.173142][   T30] audit: type=1400 audit(5999.806:704): avc:  denied  { listen } for  pid=21689 comm="syz.1.22901" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 5487.174725][   T30] audit: type=1400 audit(5999.806:705): avc:  denied  { ioctl } for  pid=21689 comm="syz.1.22901" path="socket:[179120]" dev="sockfs" ino=179120 ioctlcmd=0x5720 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 5488.192911][T21706] nbd0: detected capacity change from 0 to 8388607
[ 5489.160280][T21706] block nbd0: shutting down sockets
[ 5489.176519][    C0] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[ 5489.177345][    C0] Buffer I/O error on dev nbd0, logical block 0, async page read
[ 5489.186893][   T39] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[ 5489.188718][   T39] Buffer I/O error on dev nbd0, logical block 0, async page read
[ 5489.199115][T21709]  nbd0: unable to read partition table
[ 5489.235640][T21711] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1
[ 5489.236330][T21711] Buffer I/O error on dev nbd0, logical block 0, async page read
[ 5489.237425][T21711] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 1
[ 5489.237841][T21711] Buffer I/O error on dev nbd0, logical block 0, async page read
[ 5489.238250][T21711]  nbd0: unable to read partition table
[ 5489.275999][T21709] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[ 5489.285384][T21709] Buffer I/O error on dev nbd0, logical block 0, async page read
[ 5489.286494][T21709] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[ 5489.286889][T21709] Buffer I/O error on dev nbd0, logical block 0, async page read
[ 5489.287442][T21709]  nbd0: unable to read partition table
[ 5489.347928][T21709] I/O error, dev nbd0, sector 8388352 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0
[ 5489.350601][T21709] I/O error, dev nbd0, sector 8388352 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0
[ 5489.351028][T21709] Buffer I/O error on dev nbd0, logical block 1048544, async page read
[ 5490.141047][T21731] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22
[ 5490.491377][T21738] "syz.0.22924" (21738) uses obsolete ecb(arc4) skcipher
[ 5490.494004][   T30] kauditd_printk_skb: 7 callbacks suppressed
[ 5490.494128][   T30] audit: type=1400 audit(6003.126:713): avc:  denied  { bind } for  pid=21737 comm="syz.0.22924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 5490.495864][   T30] audit: type=1400 audit(6003.136:714): avc:  denied  { accept } for  pid=21737 comm="syz.0.22924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 5490.497950][   T30] audit: type=1400 audit(6003.136:715): avc:  denied  { write } for  pid=21737 comm="syz.0.22924" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 5490.675318][   T30] audit: type=1400 audit(6003.316:716): avc:  denied  { ioctl } for  pid=21740 comm="syz.0.22925" path="socket:[180257]" dev="sockfs" ino=180257 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1
[ 5491.378551][   T30] audit: type=1400 audit(6004.016:717): avc:  denied  { connect } for  pid=21748 comm="syz.1.22929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[ 5491.549524][T21753] sctp: [Deprecated]: syz.1.22930 (pid 21753) Use of struct sctp_assoc_value in delayed_ack socket option.
[ 5491.549524][T21753] Use struct sctp_sack_info instead
[ 5492.305696][   T30] audit: type=1400 audit(6004.946:718): avc:  denied  { write } for  pid=21757 comm="syz.0.22932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[ 5493.939481][   T30] audit: type=1400 audit(6006.576:719): avc:  denied  { prog_run } for  pid=21767 comm="syz.0.22936" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1
[ 5494.010037][   T30] audit: type=1400 audit(6006.646:720): avc:  denied  { nlmsg_write } for  pid=21775 comm="syz.1.22939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1
[ 5494.076552][   T30] audit: type=1400 audit(6006.706:721): avc:  denied  { ioctl } for  pid=21775 comm="syz.1.22939" path="socket:[179779]" dev="sockfs" ino=179779 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[ 5495.635911][   T30] audit: type=1400 audit(6008.276:722): avc:  denied  { setopt } for  pid=21794 comm="syz.1.22949" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 5496.550286][   T30] audit: type=1400 audit(6009.186:723): avc:  denied  { name_bind } for  pid=21809 comm="syz.1.22957" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1
[ 5496.551065][   T30] audit: type=1400 audit(6009.186:724): avc:  denied  { node_bind } for  pid=21809 comm="syz.1.22957" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1
[ 5496.563395][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 5496.676114][   T30] audit: type=1400 audit(6009.306:725): avc:  denied  { create } for  pid=21811 comm="syz.0.22956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 5496.695087][   T30] audit: type=1400 audit(6009.336:726): avc:  denied  { write } for  pid=21811 comm="syz.0.22956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 5496.697021][T21812] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=21812 comm=syz.0.22956
[ 5497.177724][   T30] audit: type=1400 audit(6009.816:727): avc:  denied  { getopt } for  pid=21818 comm="syz.0.22961" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[ 5497.433456][   T30] audit: type=1400 audit(6010.066:728): avc:  denied  { write } for  pid=21823 comm="syz.1.22963" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1
[ 5497.526420][   T30] audit: type=1400 audit(6010.166:729): avc:  denied  { setopt } for  pid=21825 comm="syz.0.22964" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 5498.027330][   T30] audit: type=1400 audit(6010.666:730): avc:  denied  { create } for  pid=21832 comm="syz.1.22967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[ 5498.035801][   T30] audit: type=1400 audit(6010.676:731): avc:  denied  { ioctl } for  pid=21832 comm="syz.1.22967" path="socket:[180396]" dev="sockfs" ino=180396 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[ 5499.019947][T21854] serio: Serial port pts0
[ 5499.685963][T21864] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=21864 comm=syz.0.22982
[ 5499.870606][T21866] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21866 comm=syz.0.22983
[ 5500.279439][T21871] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21871 comm=syz.0.22985
[ 5500.703812][   T30] audit: type=1400 audit(6013.336:732): avc:  denied  { setattr } for  pid=21874 comm="syz.0.22987" path="/dev/sequencer2" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sound_device_t tclass=chr_file permissive=1
[ 5501.555398][   T30] audit: type=1400 audit(6014.196:733): avc:  denied  { create } for  pid=21886 comm="syz.1.22992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1
[ 5501.744677][   T30] audit: type=1400 audit(6014.376:734): avc:  denied  { sys_module } for  pid=21885 comm="syz.0.22993" capability=16  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1
[ 5502.223491][   T30] audit: type=1400 audit(6014.866:735): avc:  denied  { write } for  pid=21893 comm="syz.0.22995" lport=12 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[ 5502.423355][   T30] audit: type=1400 audit(6015.056:736): avc:  denied  { create } for  pid=21897 comm="syz.1.22997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[ 5502.424182][   T30] audit: type=1400 audit(6015.056:737): avc:  denied  { write } for  pid=21897 comm="syz.1.22997" path="socket:[180508]" dev="sockfs" ino=180508 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[ 5507.075911][   T30] audit: type=1400 audit(6019.716:738): avc:  denied  { read } for  pid=21944 comm="syz.1.23019" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1
[ 5507.078091][   T30] audit: type=1400 audit(6019.716:739): avc:  denied  { open } for  pid=21944 comm="syz.1.23019" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1
[ 5507.084221][   T30] audit: type=1400 audit(6019.726:740): avc:  denied  { ioctl } for  pid=21944 comm="syz.1.23019" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9371 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1
[ 5507.541009][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 5508.216218][   T30] audit: type=1400 audit(6020.846:741): avc:  denied  { write } for  pid=21966 comm="syz.1.23030" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1
[ 5508.217769][   T30] audit: type=1400 audit(6020.856:742): avc:  denied  { open } for  pid=21966 comm="syz.1.23030" path="/dev/fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1
[ 5508.845698][   T30] audit: type=1400 audit(6021.476:743): avc:  denied  { create } for  pid=21977 comm="syz.1.23035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1
[ 5508.849605][   T30] audit: type=1400 audit(6021.486:744): avc:  denied  { write } for  pid=21977 comm="syz.1.23035" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1
[ 5511.468448][   T30] audit: type=1400 audit(6024.106:745): avc:  denied  { ioctl } for  pid=22020 comm="syz.1.23056" path="socket:[180742]" dev="sockfs" ino=180742 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[ 5512.814653][   T30] audit: type=1400 audit(6025.446:746): avc:  denied  { read } for  pid=22045 comm="syz.1.23066" path="socket:[180783]" dev="sockfs" ino=180783 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[ 5513.441253][   T30] audit: type=1400 audit(6026.076:747): avc:  denied  { create } for  pid=22053 comm="syz.1.23070" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[ 5515.907031][   T30] audit: type=1400 audit(6028.546:748): avc:  denied  { read } for  pid=22098 comm="syz.0.23092" name="fb0" dev="devtmpfs" ino=621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1
[ 5515.920714][   T30] audit: type=1400 audit(6028.556:749): avc:  denied  { ioctl } for  pid=22098 comm="syz.0.23092" path="/dev/fb0" dev="devtmpfs" ino=621 ioctlcmd=0x4c04 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1
[ 5518.248237][   T30] audit: type=1400 audit(6030.886:750): avc:  denied  { connect } for  pid=22130 comm="syz.1.23107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[ 5518.629207][   T30] audit: type=1400 audit(6031.266:751): avc:  denied  { create } for  pid=22139 comm="syz.0.23112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[ 5519.584417][   T30] audit: type=1400 audit(6032.226:752): avc:  denied  { ioctl } for  pid=22158 comm="syz.1.23122" path="socket:[181413]" dev="sockfs" ino=181413 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[ 5519.588364][   T30] audit: type=1400 audit(6032.226:753): avc:  denied  { write } for  pid=22158 comm="syz.1.23122" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1
[ 5519.798122][   T30] audit: type=1400 audit(6032.436:754): avc:  denied  { bind } for  pid=22163 comm="syz.1.23124" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 5520.410400][   T30] audit: type=1400 audit(6033.046:755): avc:  denied  { ioctl } for  pid=22174 comm="syz.0.23129" path="/dev/fuse" dev="devtmpfs" ino=92 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1
[ 5521.506048][T22189] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22189 comm=syz.0.23135
[ 5526.987454][T22250] serio: Serial port pts0
[ 5528.208901][   T30] audit: type=1400 audit(6040.846:756): avc:  denied  { ioctl } for  pid=22258 comm="syz.1.23165" path="/dev/loop-control" dev="devtmpfs" ino=638 ioctlcmd=0x6687 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1
[ 5532.015782][   T30] audit: type=1400 audit(6044.656:757): avc:  denied  { mac_admin } for  pid=22288 comm="syz.1.23179" capability=33  scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1
[ 5532.017329][T22289] SELinux:  Context system_u:object_r:semanage_exec_t:s0 is not valid (left unmapped).
[ 5532.023860][   T30] audit: type=1400 audit(6044.656:758): avc:  denied  { relabelto } for  pid=22288 comm="syz.1.23179" name=".log" dev="tmpfs" ino=8895 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:semanage_exec_t:s0"
[ 5532.029702][   T30] audit: type=1400 audit(6044.656:759): avc:  denied  { associate } for  pid=22288 comm="syz.1.23179" name=".log" dev="tmpfs" ino=8895 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:semanage_exec_t:s0"
[ 5532.133215][   T30] audit: type=1400 audit(6044.766:760): avc:  denied  { unlink } for  pid=14652 comm="syz-executor" name=".log" dev="tmpfs" ino=8895 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:semanage_exec_t:s0"
[ 5532.427184][T22293] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22293 comm=syz.1.23181
[ 5536.149789][T22336] pim6reg1: entered promiscuous mode
[ 5536.150321][T22336] pim6reg1: entered allmulticast mode
[ 5536.620262][   T30] audit: type=1400 audit(6049.256:761): avc:  denied  { connect } for  pid=22341 comm="syz.0.23204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[ 5539.855121][   T30] audit: type=1400 audit(6052.496:762): avc:  denied  { create } for  pid=22384 comm="syz.1.23224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[ 5539.873962][   T30] audit: type=1400 audit(6052.516:763): avc:  denied  { write } for  pid=22384 comm="syz.1.23224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[ 5539.875314][T22385] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=22385 comm=syz.1.23224
[ 5540.936795][   T30] audit: type=1400 audit(6053.576:764): avc:  denied  { mount } for  pid=22388 comm="syz.1.23226" name="/" dev="ramfs" ino=181793 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1
[ 5541.543583][   T30] audit: type=1400 audit(6054.176:765): avc:  denied  { shutdown } for  pid=22393 comm="syz.1.23228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[ 5541.563005][   T30] audit: type=1400 audit(6054.186:766): avc:  denied  { read } for  pid=22393 comm="syz.1.23228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[ 5542.442598][   T30] audit: type=1400 audit(6055.026:767): avc:  denied  { mount } for  pid=22378 comm="syz.0.23221" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[ 5548.419322][   T30] audit: type=1400 audit(6061.056:768): avc:  denied  { unmount } for  pid=32165 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1
[ 5549.359854][   T30] audit: type=1400 audit(6061.996:769): avc:  denied  { ioctl } for  pid=22436 comm="syz.0.23247" path="ipc:[4026532696]" dev="nsfs" ino=4026532696 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 5553.100611][T22484] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=22484 comm=syz.0.23271
[ 5560.513693][T22581] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=1011 sclass=netlink_xfrm_socket pid=22581 comm=syz.1.23316
[ 5561.732681][   T30] audit: type=1400 audit(6074.366:770): avc:  denied  { write } for  pid=22594 comm="syz.0.23323" name="ip_tables_matches" dev="proc" ino=4026532908 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1
[ 5562.169984][   T30] audit: type=1400 audit(6074.806:771): avc:  denied  { ioctl } for  pid=22602 comm="syz.0.23327" path="socket:[182821]" dev="sockfs" ino=182821 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 5562.393352][   T30] audit: type=1400 audit(6075.026:772): avc:  denied  { setopt } for  pid=22608 comm="syz.1.23330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[ 5562.924702][   T30] audit: type=1400 audit(6075.546:773): avc:  denied  { write } for  pid=22608 comm="syz.1.23330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[ 5563.970801][   T30] audit: type=1400 audit(6076.606:774): avc:  denied  { read } for  pid=22608 comm="syz.1.23330" path="socket:[182831]" dev="sockfs" ino=182831 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[ 5564.425620][   T30] audit: type=1400 audit(6077.056:775): avc:  denied  { ioctl } for  pid=22626 comm="syz.0.23337" path="socket:[182861]" dev="sockfs" ino=182861 ioctlcmd=0x5401 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[ 5565.380600][   T30] audit: type=1400 audit(6078.016:776): avc:  denied  { getopt } for  pid=22635 comm="syz.0.23341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[ 5566.178932][T22640] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2051 sclass=netlink_xfrm_socket pid=22640 comm=syz.1.23343
[ 5569.585938][   T30] audit: type=1400 audit(6082.226:777): avc:  denied  { write } for  pid=22678 comm="syz.1.23361" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[ 5569.750768][   T30] audit: type=1400 audit(6082.386:778): avc:  denied  { create } for  pid=22682 comm="syz.0.23363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1
[ 5569.758801][   T30] audit: type=1400 audit(6082.396:779): avc:  denied  { write } for  pid=22682 comm="syz.0.23363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1
[ 5570.124175][T22687] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22687 comm=syz.0.23365
[ 5570.533952][T22692] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=22692 comm=syz.1.23367
[ 5571.458663][   T30] audit: type=1400 audit(6084.096:780): avc:  denied  { connect } for  pid=22704 comm="syz.1.23373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 5571.979156][   T30] audit: type=1400 audit(6084.616:781): avc:  denied  { read } for  pid=22712 comm="syz.1.23376" path="socket:[182221]" dev="sockfs" ino=182221 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 5573.162651][   T30] audit: type=1400 audit(6085.796:782): avc:  denied  { read } for  pid=22732 comm="syz.0.23386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[ 5574.459865][   T30] audit: type=1400 audit(6087.096:783): avc:  denied  { getopt } for  pid=22754 comm="syz.0.23397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[ 5575.153532][   T30] audit: type=1400 audit(6087.796:784): avc:  denied  { mount } for  pid=22769 comm="syz.1.23404" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[ 5575.177163][   T30] audit: type=1400 audit(6087.816:785): avc:  denied  { read } for  pid=22769 comm="syz.1.23404" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1
[ 5575.180991][   T30] audit: type=1400 audit(6087.816:786): avc:  denied  { open } for  pid=22769 comm="syz.1.23404" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1
[ 5575.607052][   T30] audit: type=1400 audit(6088.246:787): avc:  denied  { setopt } for  pid=22777 comm="syz.0.23408" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[ 5575.985791][   T30] audit: type=1400 audit(6088.626:788): avc:  denied  { getopt } for  pid=22782 comm="syz.0.23410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[ 5578.799781][   T30] audit: type=1400 audit(6091.436:789): avc:  denied  { ioctl } for  pid=22804 comm="syz.1.23420" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x7007 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1
[ 5579.855048][T22817] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22817 comm=syz.1.23425
[ 5580.688028][T22825] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=22825 comm=syz.1.23429
[ 5581.565879][   T30] audit: type=1400 audit(6094.196:790): avc:  denied  { connect } for  pid=22834 comm="syz.0.23433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 5581.568350][   T30] audit: type=1400 audit(6094.206:791): avc:  denied  { name_connect } for  pid=22834 comm="syz.0.23433" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1
[ 5582.089575][   T30] audit: type=1400 audit(6094.726:792): avc:  denied  { accept } for  pid=22834 comm="syz.0.23433" lport=52109 faddr=::ffff:100.1.1.2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 5582.098908][   T30] audit: type=1400 audit(6094.736:793): avc:  denied  { setopt } for  pid=22834 comm="syz.0.23433" lport=52109 faddr=::ffff:100.1.1.2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1
[ 5582.777264][   T30] audit: type=1400 audit(6095.416:794): avc:  denied  { read } for  pid=22838 comm="syz.1.23434" name="usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1
[ 5582.778992][   T30] audit: type=1400 audit(6095.416:795): avc:  denied  { open } for  pid=22838 comm="syz.1.23434" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1
[ 5582.794842][   T30] audit: type=1400 audit(6095.426:796): avc:  denied  { ioctl } for  pid=22838 comm="syz.1.23434" path="/dev/usbmon0" dev="devtmpfs" ino=697 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1
[ 5583.267228][   T30] audit: type=1400 audit(6095.906:797): avc:  denied  { module_load } for  pid=22842 comm="syz.1.23436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1
[ 5588.517778][   T30] audit: type=1400 audit(6101.156:798): avc:  denied  { bind } for  pid=22922 comm="syz.1.23474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 5588.520953][   T30] audit: type=1400 audit(6101.156:799): avc:  denied  { node_bind } for  pid=22922 comm="syz.1.23474" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1
[ 5589.455855][T22937] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=22937 comm=syz.1.23481
[ 5589.526930][   T30] audit: type=1400 audit(6102.166:800): avc:  denied  { read } for  pid=22938 comm="syz.0.23482" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1
[ 5589.530268][   T30] audit: type=1400 audit(6102.166:801): avc:  denied  { open } for  pid=22938 comm="syz.0.23482" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1
[ 5589.539170][   T30] audit: type=1400 audit(6102.176:802): avc:  denied  { ioctl } for  pid=22938 comm="syz.0.23482" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1
[ 5596.842851][   T30] audit: type=1400 audit(6109.476:803): avc:  denied  { shutdown } for  pid=23039 comm="syz.0.23530" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 5598.150500][   T30] audit: type=1400 audit(6110.786:804): avc:  denied  { getopt } for  pid=23054 comm="syz.1.23536" lport=44570 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1
[ 5600.074779][T23072] netlink: 'syz.0.23544': attribute type 11 has an invalid length.
[ 5600.075325][T23072] netlink: 60 bytes leftover after parsing attributes in process `syz.0.23544'.
[ 5600.219077][   T30] audit: type=1400 audit(6112.836:805): avc:  denied  { name_bind } for  pid=23071 comm="syz.0.23544" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1
[ 5600.224042][   T30] audit: type=1400 audit(6112.836:806): avc:  denied  { write } for  pid=23071 comm="syz.0.23544" laddr=::1 lport=20003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 5600.224832][   T30] audit: type=1400 audit(6112.836:807): avc:  denied  { name_connect } for  pid=23071 comm="syz.0.23544" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1
[ 5602.568964][T23080] SELinux:  Context system_u:object_r:policy_config_t:s0 is not valid (left unmapped).
[ 5602.591329][   T30] audit: type=1400 audit(6115.216:808): avc:  denied  { relabelto } for  pid=23079 comm="syz.0.23547" name="5508" dev="tmpfs" ino=28195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:policy_config_t:s0"
[ 5602.605881][   T30] audit: type=1400 audit(6115.216:809): avc:  denied  { associate } for  pid=23079 comm="syz.0.23547" name="5508" dev="tmpfs" ino=28195 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:policy_config_t:s0"
[ 5602.718028][   T30] audit: type=1400 audit(6115.346:810): avc:  denied  { write } for  pid=32165 comm="syz-executor" name="5508" dev="tmpfs" ino=28195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:policy_config_t:s0"
[ 5602.728587][   T30] audit: type=1400 audit(6115.356:811): avc:  denied  { remove_name } for  pid=32165 comm="syz-executor" name="cgroup" dev="tmpfs" ino=28196 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:policy_config_t:s0"
[ 5602.768200][   T30] audit: type=1400 audit(6115.406:812): avc:  denied  { rmdir } for  pid=32165 comm="syz-executor" name="5508" dev="tmpfs" ino=28195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:policy_config_t:s0"
[ 5602.886086][T23083] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=25 sclass=netlink_tcpdiag_socket pid=23083 comm=syz.0.23548
[ 5603.714569][   T30] audit: type=1400 audit(6116.346:813): avc:  denied  { read } for  pid=23098 comm="syz.0.23556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[ 5604.153152][   T30] audit: type=1400 audit(6116.786:814): avc:  denied  { write } for  pid=23106 comm="syz.0.23560" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1
[ 5605.646719][   T30] audit: type=1400 audit(6118.286:815): avc:  denied  { read } for  pid=23135 comm="syz.0.23574" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1
[ 5605.648238][   T30] audit: type=1400 audit(6118.286:816): avc:  denied  { open } for  pid=23135 comm="syz.0.23574" path="/dev/nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1
[ 5605.837109][   T30] audit: type=1400 audit(6118.476:817): avc:  denied  { ioctl } for  pid=23139 comm="syz.0.23576" path="socket:[184921]" dev="sockfs" ino=184921 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1
[ 5606.579658][T23152] sctp: [Deprecated]: syz.0.23582 (pid 23152) Use of struct sctp_assoc_value in delayed_ack socket option.
[ 5606.579658][T23152] Use struct sctp_sack_info instead
[ 5610.352716][T23191] serio: Serial port pts0
[ 5617.405561][   T30] kauditd_printk_skb: 1 callbacks suppressed
[ 5617.405722][   T30] audit: type=1400 audit(6130.046:819): avc:  denied  { setopt } for  pid=23205 comm="syz.1.23605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[ 5618.177725][   T30] audit: type=1400 audit(6130.816:820): avc:  denied  { read } for  pid=23213 comm="syz.1.23609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[ 5623.543804][   T30] audit: type=1400 audit(6136.176:821): avc:  denied  { bind } for  pid=23271 comm="syz.1.23637" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[ 5624.224686][   T30] audit: type=1400 audit(6136.866:822): avc:  denied  { bind } for  pid=23280 comm="syz.1.23640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[ 5627.358138][   T30] audit: type=1400 audit(6139.996:823): avc:  denied  { map } for  pid=23319 comm="syz.1.23659" path="/dev/nbd1" dev="devtmpfs" ino=656 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1
[ 5630.391035][   T30] audit: type=1400 audit(6143.026:824): avc:  denied  { ioctl } for  pid=23366 comm="syz.0.23681" path="socket:[184297]" dev="sockfs" ino=184297 ioctlcmd=0x54de scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[ 5633.480329][T23417] pimreg: left allmulticast mode
[ 5634.865822][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 5635.145213][   T30] audit: type=1400 audit(6147.786:825): avc:  denied  { bind } for  pid=23445 comm="syz.1.23719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[ 5635.148084][   T30] audit: type=1400 audit(6147.786:826): avc:  denied  { listen } for  pid=23445 comm="syz.1.23719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[ 5635.162540][   T30] audit: type=1400 audit(6147.786:827): avc:  denied  { connect } for  pid=23445 comm="syz.1.23719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[ 5635.168768][   T30] audit: type=1400 audit(6147.796:828): avc:  denied  { accept } for  pid=23445 comm="syz.1.23719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[ 5635.515473][   T30] audit: type=1400 audit(6148.156:829): avc:  denied  { read } for  pid=23452 comm="syz.0.23723" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1
[ 5635.516404][   T30] audit: type=1400 audit(6148.156:830): avc:  denied  { open } for  pid=23452 comm="syz.0.23723" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1
[ 5635.592339][   T30] audit: type=1400 audit(6148.226:831): avc:  denied  { ioctl } for  pid=23452 comm="syz.0.23723" path="/dev/snapshot" dev="devtmpfs" ino=85 ioctlcmd=0x3312 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1
[ 5636.443554][   T30] audit: type=1400 audit(6149.076:832): avc:  denied  { ioctl } for  pid=23471 comm="syz.0.23733" path="socket:[186508]" dev="sockfs" ino=186508 ioctlcmd=0x890d scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 5639.849544][T23495] serio: Serial port pts0
[ 5648.119842][   T30] audit: type=1400 audit(6160.756:833): avc:  denied  { mount } for  pid=23577 comm="syz.1.23779" name="/" dev="configfs" ino=127 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1
[ 5651.189088][T23632] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=23632 comm=syz.0.23803
[ 5651.228484][   T30] audit: type=1400 audit(6163.866:834): avc:  denied  { write } for  pid=23631 comm="syz.1.23804" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1
[ 5655.237697][T23672] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23672 comm=syz.0.23823
[ 5656.348068][T23682] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=23682 comm=syz.0.23828
[ 5664.708855][   T30] audit: type=1400 audit(6177.346:835): avc:  denied  { ioctl } for  pid=23725 comm="syz.0.23848" path="/dev/input/mice" dev="devtmpfs" ino=706 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1
[ 5667.567724][   T30] audit: type=1400 audit(6180.206:836): avc:  denied  { ioctl } for  pid=23751 comm="syz.0.23861" path="socket:[186080]" dev="sockfs" ino=186080 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1
[ 5671.874559][T23769] netlink: 4 bytes leftover after parsing attributes in process `syz.0.23869'.
[ 5671.903426][T23769] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23769 comm=syz.0.23869
[ 5675.083827][   T30] audit: type=1400 audit(6187.706:837): avc:  denied  { connect } for  pid=23796 comm="syz.0.23882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[ 5675.605366][   T30] audit: type=1400 audit(6188.246:838): avc:  denied  { getopt } for  pid=23796 comm="syz.0.23882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[ 5676.324592][    C0] vxcan0: j1939_tp_rxtimer: 0x00000000bb15aadd: rx timeout, send abort
[ 5676.825742][    C0] vxcan0: j1939_tp_rxtimer: 0x00000000bb15aadd: abort rx timeout. Force session deactivation
[ 5678.648186][    C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 5681.363686][   T30] audit: type=1400 audit(6193.986:839): avc:  denied  { execute } for  pid=23816 comm="syz-executor" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[ 5681.378598][   T30] audit: type=1400 audit(6194.006:840): avc:  denied  { execute_no_trans } for  pid=23816 comm="syz-executor" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1
[ 5681.782892][   T30] audit: type=1400 audit(6194.416:841): avc:  denied  { mounton } for  pid=23819 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1
[ 5681.796601][   T30] audit: type=1400 audit(6194.436:842): avc:  denied  { mounton } for  pid=23819 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1
[ 5683.828731][ T7227] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 5684.024089][ T7227] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 5684.173979][ T7227] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 5684.339156][ T7227] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 5685.353710][   T30] audit: type=1400 audit(6197.966:843): avc:  denied  { read } for  pid=3123 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1
[ 5689.233527][ T7227] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[ 5689.325947][ T7227] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[ 5689.420322][ T7227] bond0 (unregistering): Released all slaves
[ 5689.752379][   T30] audit: type=1400 audit(6202.386:844): avc:  denied  { search } for  pid=3123 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 5689.784313][   T30] audit: type=1400 audit(6202.406:845): avc:  denied  { read } for  pid=3123 comm="dhcpcd" name="n59" dev="tmpfs" ino=15066 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 5689.785140][   T30] audit: type=1400 audit(6202.406:846): avc:  denied  { open } for  pid=3123 comm="dhcpcd" path="/run/udev/data/n59" dev="tmpfs" ino=15066 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 5689.800415][   T30] audit: type=1400 audit(6202.416:847): avc:  denied  { getattr } for  pid=3123 comm="dhcpcd" path="/run/udev/data/n59" dev="tmpfs" ino=15066 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 5689.953845][ T7227] hsr_slave_0: left promiscuous mode
[ 5690.035302][ T7227] hsr_slave_1: left promiscuous mode
[ 5690.258464][ T7227] veth1_macvtap: left promiscuous mode
[ 5690.259237][ T7227] veth0_macvtap: left promiscuous mode
[ 5690.260146][ T7227] veth1_vlan: left promiscuous mode
[ 5690.260630][ T7227] veth0_vlan: left promiscuous mode
[ 5692.459254][T23876] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=23876 comm=syz.0.23910
[ 5692.633238][   T30] audit: type=1400 audit(6205.276:848): avc:  denied  { ioctl } for  pid=23877 comm="syz.0.23911" path="socket:[187067]" dev="sockfs" ino=187067 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1
[ 5697.509530][T23905] tap0: tun_chr_ioctl cmd 1074025675
[ 5697.510339][T23905] tap0: persist enabled
[ 5697.511137][T23906] tap0: tun_chr_ioctl cmd 1074025675
[ 5697.517733][T23906] tap0: persist disabled
[ 5698.703814][   T30] audit: type=1400 audit(6211.346:849): avc:  denied  { read } for  pid=23918 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 5698.712486][   T30] audit: type=1400 audit(6211.346:850): avc:  denied  { open } for  pid=23918 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 5698.713341][   T30] audit: type=1400 audit(6211.346:851): avc:  denied  { getattr } for  pid=23918 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=841 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 5698.785694][   T30] audit: type=1400 audit(6211.426:852): avc:  denied  { write } for  pid=23913 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=840 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 5698.787455][   T30] audit: type=1400 audit(6211.426:853): avc:  denied  { add_name } for  pid=23913 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 5698.789316][   T30] audit: type=1400 audit(6211.426:854): avc:  denied  { create } for  pid=23913 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 5698.803718][   T30] audit: type=1400 audit(6211.436:855): avc:  denied  { write } for  pid=23913 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=15070 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 5698.805979][   T30] audit: type=1400 audit(6211.446:856): avc:  denied  { append } for  pid=23913 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=15070 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 5699.337978][   T30] audit: type=1400 audit(6211.976:857): avc:  denied  { remove_name } for  pid=23923 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=15070 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1
[ 5699.338978][   T30] audit: type=1400 audit(6211.976:858): avc:  denied  { unlink } for  pid=23923 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=15070 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1
[ 5699.584210][T23819] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 5699.613631][T23819] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 5703.275917][T23819] hsr_slave_0: entered promiscuous mode
[ 5703.334244][T23819] hsr_slave_1: entered promiscuous mode
[ 5703.393916][T23819] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 5703.394511][T23819] Cannot create hsr debugfs directory
[ 5706.302633][   T30] audit: type=1400 audit(6218.926:859): avc:  denied  { write } for  pid=23984 comm="syz.0.23940" name="nullb0" dev="devtmpfs" ino=673 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1
[ 5706.875837][T23819] netdevsim netdevsim1 netdevsim0: renamed from eth0
[ 5706.904784][T23819] netdevsim netdevsim1 netdevsim1: renamed from eth1
[ 5706.941367][T23819] netdevsim netdevsim1 netdevsim2: renamed from eth2
[ 5706.949314][   T30] audit: type=1400 audit(6219.586:860): avc:  denied  { getopt } for  pid=23988 comm="syz.0.23942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[ 5707.022972][T23819] netdevsim netdevsim1 netdevsim3: renamed from eth3
[ 5709.006695][T23819] 8021q: adding VLAN 0 to HW filter on device bond0
[ 5711.217117][   T30] audit: type=1400 audit(6223.856:861): avc:  denied  { bind } for  pid=24026 comm="syz.0.23947" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[ 5718.073935][T23819] veth0_vlan: entered promiscuous mode
[ 5718.110125][T23819] veth1_vlan: entered promiscuous mode
[ 5718.317478][T23819] veth0_macvtap: entered promiscuous mode
[ 5718.351132][T23819] veth1_macvtap: entered promiscuous mode
[ 5718.569990][T23819] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 5718.570698][T23819] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 5718.571242][T23819] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 5718.593687][T23819] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 5718.871036][   T30] audit: type=1400 audit(6231.506:862): avc:  denied  { mounton } for  pid=23819 comm="syz-executor" path="/syzkaller.AEgUzK/syz-tmp" dev="vda" ino=1758 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[ 5718.962702][   T30] audit: type=1400 audit(6231.596:863): avc:  denied  { unmount } for  pid=23819 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[ 5718.971545][   T30] audit: type=1400 audit(6231.606:864): avc:  denied  { mounton } for  pid=23819 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=1515 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1
[ 5719.006821][   T30] audit: type=1400 audit(6231.626:865): avc:  denied  { mount } for  pid=23819 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1
[ 5724.385728][   T30] audit: type=1400 audit(6237.026:866): avc:  denied  { ioctl } for  pid=24158 comm="syz.1.23992" path="/dev/nullb0" dev="devtmpfs" ino=673 ioctlcmd=0x127e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1
[ 5727.020086][   T30] audit: type=1400 audit(6239.656:867): avc:  denied  { ioctl } for  pid=24184 comm="syz.0.24005" path="socket:[188041]" dev="sockfs" ino=188041 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[ 5730.648579][   T30] audit: type=1400 audit(6243.286:868): avc:  denied  { read } for  pid=24214 comm="syz.0.24020" path="socket:[188658]" dev="sockfs" ino=188658 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[ 5731.226347][T24236] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24236 comm=syz.1.24029
[ 5735.068784][   T30] audit: type=1400 audit(6247.706:869): avc:  denied  { mounton } for  pid=24301 comm="syz.1.24060" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1
[ 5736.693266][   T30] audit: type=1400 audit(6249.336:870): avc:  denied  { name_bind } for  pid=24322 comm="syz.0.24070" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1
[ 5737.679749][   T30] audit: type=1400 audit(6250.316:871): avc:  denied  { sqpoll } for  pid=24333 comm="syz.0.24075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1
[ 5742.394121][T12699] usb 1-1: new high-speed USB device number 17 using dummy_hcd
[ 5742.593278][T12699] usb 1-1: Using ep0 maxpacket: 16
[ 5742.770495][T12699] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0xB has invalid wMaxPacketSize 0
[ 5742.771182][T12699] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 0
[ 5742.773807][T12699] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x8A has invalid wMaxPacketSize 0
[ 5742.774270][T12699] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x8A has invalid maxpacket 0
[ 5742.788837][T12699] usb 1-1: New USB device found, idVendor=04e6, idProduct=0007, bcdDevice= 1.75
[ 5742.789361][T12699] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=5
[ 5742.789782][T12699] usb 1-1: SerialNumber: syz
[ 5742.846966][T12699] usb-storage 1-1:1.0: USB Mass Storage device detected
[ 5742.877383][T12699] usb-storage 1-1:1.0: Quirks match for vid 04e6 pid 0007: 1
[ 5742.884492][T12699] scsi host0: usb-storage 1-1:1.0
[ 5743.005962][T24402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24402 comm=syz.1.24105
[ 5743.071255][T12699] usb 1-1: USB disconnect, device number 17
[ 5748.264886][   T30] audit: type=1400 audit(6260.896:872): avc:  denied  { ioctl } for  pid=24461 comm="syz.0.24133" path="socket:[189073]" dev="sockfs" ino=189073 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[ 5753.265252][   T30] audit: type=1400 audit(6265.906:873): avc:  denied  { write } for  pid=24498 comm="syz.0.24149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1
[ 5753.276459][   T30] audit: type=1400 audit(6265.906:874): avc:  denied  { read } for  pid=24498 comm="syz.0.24149" path="socket:[189673]" dev="sockfs" ino=189673 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1
[ 5756.944598][   T30] audit: type=1400 audit(6269.586:875): avc:  denied  { map } for  pid=24548 comm="syz.0.24172" path="socket:[189764]" dev="sockfs" ino=189764 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1
[ 5757.872278][   T30] audit: type=1400 audit(6270.506:876): avc:  denied  { setopt } for  pid=24559 comm="syz.0.24177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1
[ 5765.060505][   T30] audit: type=1400 audit(6277.696:877): avc:  denied  { create } for  pid=24648 comm="syz.1.24220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1
[ 5765.608400][T24655] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2306 sclass=netlink_route_socket pid=24655 comm=syz.1.24220
[ 5767.590654][T24685] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5132 sclass=netlink_route_socket pid=24685 comm=syz.1.24235
[ 5771.471114][T24751] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24751 comm=syz.1.24268
[ 5775.360856][T24814] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24814 comm=syz.0.24297
[ 5778.710295][   T30] audit: type=1400 audit(6291.346:878): avc:  denied  { setopt } for  pid=24861 comm="syz.1.24320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[ 5780.191314][T24887] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=24887 comm=syz.1.24332
[ 5780.477598][T24890] serio: Serial port pts0
[ 5783.317359][   T30] audit: type=1400 audit(6295.956:879): avc:  denied  { name_bind } for  pid=24912 comm="syz.0.24341" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1
[ 5787.081089][   T30] audit: type=1400 audit(6299.716:880): avc:  denied  { read } for  pid=24932 comm="syz.1.24348" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1
[ 5787.086983][   T30] audit: type=1400 audit(6299.726:881): avc:  denied  { open } for  pid=24932 comm="syz.1.24348" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1
[ 5787.091191][   T30] audit: type=1400 audit(6299.726:882): avc:  denied  { ioctl } for  pid=24932 comm="syz.1.24348" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1
[ 5788.854582][T24963] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24963 comm=syz.0.24363
[ 5794.391110][   T30] audit: type=1400 audit(6307.026:883): avc:  denied  { create } for  pid=25040 comm="syz.1.24401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1
[ 5794.402702][   T30] audit: type=1400 audit(6307.036:884): avc:  denied  { write } for  pid=25040 comm="syz.1.24401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1
[ 5794.669664][   T30] audit: type=1400 audit(6307.306:885): avc:  denied  { append } for  pid=25044 comm="syz.1.24404" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1
[ 5795.353929][   T30] audit: type=1400 audit(6307.996:886): avc:  denied  { bind } for  pid=25055 comm="syz.1.24409" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1
[ 5795.554281][T25059] "syz.1.24410" (25059) uses obsolete ecb(arc4) skcipher
[ 5799.214226][   T30] audit: type=1400 audit(6311.846:887): avc:  denied  { append } for  pid=25092 comm="syz.0.24425" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1
[ 5800.676125][T25109] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=13 sclass=netlink_route_socket pid=25109 comm=syz.0.24433
[ 5802.643695][   T30] audit: type=1400 audit(6315.276:888): avc:  denied  { bind } for  pid=25130 comm="syz.1.24444" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[ 5802.644838][   T30] audit: type=1400 audit(6315.286:889): avc:  denied  { node_bind } for  pid=25130 comm="syz.1.24444" saddr=fe80::bb scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1
[ 5807.617403][T25181] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25181 comm=syz.0.24467
[ 5811.384324][   T30] audit: type=1400 audit(6324.016:890): avc:  denied  { read } for  pid=25237 comm="syz.1.24495" path="socket:[191979]" dev="sockfs" ino=191979 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 5826.517318][   T30] audit: type=1400 audit(6339.156:891): avc:  denied  { setattr } for  pid=25418 comm="syz.0.24580" name="RAW" dev="sockfs" ino=192258 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[ 5831.147005][   T30] audit: type=1400 audit(6343.786:892): avc:  denied  { read write } for  pid=25475 comm="syz.0.24605" name="uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1
[ 5831.152934][   T30] audit: type=1400 audit(6343.786:893): avc:  denied  { open } for  pid=25475 comm="syz.0.24605" path="/dev/uhid" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1
[ 5832.933934][   T30] audit: type=1400 audit(6345.566:894): avc:  denied  { write } for  pid=25495 comm="syz.1.24614" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1
[ 5833.531048][T25507] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25507 comm=syz.1.24619
[ 5834.344293][   T30] audit: type=1400 audit(6346.976:895): avc:  denied  { mounton } for  pid=25520 comm="syz.1.24626" path="/proc/678/task" dev="proc" ino=192960 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1
[ 5834.947481][T25529] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25529 comm=syz.1.24630
[ 5836.440185][T25552] "syz.1.24641" (25552) uses obsolete ecb(arc4) skcipher
[ 5836.845640][   T30] audit: type=1400 audit(6349.486:896): avc:  denied  { lock } for  pid=25555 comm="syz.1.24643" path="socket:[193029]" dev="sockfs" ino=193029 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[ 5840.254211][   T30] audit: type=1400 audit(6352.886:897): avc:  denied  { lock } for  pid=25604 comm="syz.1.24667" path="socket:[193608]" dev="sockfs" ino=193608 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1
[ 5840.335059][T25607] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=25607 comm=syz.0.24668
[ 5844.793453][T25683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=25683 comm=syz.1.24704
[ 5847.757973][T25712] binder: 25711:25712 ioctl 4008941a 20000040 returned -22
[ 5847.759234][   T30] audit: type=1400 audit(6360.386:898): avc:  denied  { write } for  pid=25711 comm="syz.0.24719" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[ 5848.132277][T25716] serio: Serial port pts0
[ 5850.163248][T25735] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy
[ 5850.166467][T25735] misc raw-gadget: fail, usb_gadget_register_driver returned -16
[ 5856.855704][   T30] audit: type=1400 audit(6369.486:899): avc:  denied  { write } for  pid=25792 comm="syz.0.24752" name="loop-control" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1
[ 5857.329850][T25795] udevd[25795]: setting mode of /dev/loop0 to 060660 failed: Read-only file system
[ 5857.358988][T25795] udevd[25795]: setting owner of /dev/loop0 to uid=0, gid=6 failed: Read-only file system
[ 5857.577437][T25794] udevd[25794]: setting mode of /dev/loop0 to 060660 failed: Read-only file system
[ 5857.578351][T25794] udevd[25794]: setting owner of /dev/loop0 to uid=0, gid=6 failed: Read-only file system
[ 5857.836401][T32165] block device autoloading is deprecated and will be removed.
[ 5857.928451][T25794] udevd[25794]: setting mode of /dev/loop0 to 060660 failed: Read-only file system
[ 5857.929396][T25794] udevd[25794]: setting owner of /dev/loop0 to uid=0, gid=6 failed: Read-only file system
[ 5858.905497][    C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies.
[ 5860.221064][   T30] audit: type=1400 audit(6372.856:900): avc:  denied  { lock } for  pid=25814 comm="syz.1.24761" path="time:[4026531834]" dev="nsfs" ino=4026531834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 5860.642914][   T30] audit: type=1400 audit(6373.276:901): avc:  denied  { remount } for  pid=25818 comm="syz.1.24763" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1
[ 5862.491335][T25832] xt_SECMARK: invalid security context 'system_u:object_r:devicekit_exec_t:s0'
[ 5862.844065][   T30] audit: type=1400 audit(6375.476:902): avc:  denied  { map } for  pid=25834 comm="syz.1.24772" path="/dev/hwrng" dev="devtmpfs" ino=83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1
[ 5863.220190][   T30] audit: type=1400 audit(6375.846:903): avc:  denied  { unmount } for  pid=23819 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1
[ 5864.486748][   T30] audit: type=1400 audit(6377.126:904): avc:  denied  { lock } for  pid=25850 comm="syz.1.24779" path="socket:[194046]" dev="sockfs" ino=194046 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1
[ 5869.086661][T25906] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25906 comm=syz.0.24806
[ 5876.781173][T25985] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2049 sclass=netlink_route_socket pid=25985 comm=syz.0.24845
[ 5881.795954][   T30] audit: type=1400 audit(6394.436:905): avc:  denied  { setopt } for  pid=26025 comm="syz.1.24864" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1
[ 5883.132583][   T30] audit: type=1400 audit(6395.766:906): avc:  denied  { map } for  pid=26041 comm="syz.1.24872" path="/dev/vcs" dev="devtmpfs" ino=14 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tty_device_t tclass=chr_file permissive=1
[ 5884.082862][   T30] audit: type=1400 audit(6396.716:907): avc:  denied  { write } for  pid=26049 comm="syz.1.24876" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[ 5887.563180][   T30] audit: type=1400 audit(6400.206:908): avc:  denied  { write } for  pid=26082 comm="syz.1.24892" path="socket:[195066]" dev="sockfs" ino=195066 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1
[ 5894.499443][   T30] audit: type=1400 audit(6407.136:909): avc:  denied  { setopt } for  pid=26144 comm="syz.0.24921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 5894.553823][   T30] audit: type=1400 audit(6407.186:910): avc:  denied  { getopt } for  pid=26145 comm="syz.1.24922" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 5894.934943][T26146] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=109 sclass=netlink_xfrm_socket pid=26146 comm=syz.0.24921
[ 5902.026781][   T30] audit: type=1400 audit(6414.666:911): avc:  denied  { write } for  pid=26233 comm="syz.0.24957" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1
[ 5902.570591][   T30] audit: type=1400 audit(6415.206:912): avc:  denied  { ioctl } for  pid=26239 comm="syz.0.24960" path="socket:[195631]" dev="sockfs" ino=195631 ioctlcmd=0x5451 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1
[ 5904.033667][T26258] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1543 sclass=netlink_tcpdiag_socket pid=26258 comm=syz.0.24969
[ 5908.271139][T26303] netlink: 64 bytes leftover after parsing attributes in process `syz.0.24989'.
[ 5910.531098][T26333] sctp: [Deprecated]: syz.0.25003 (pid 26333) Use of int in maxseg socket option.
[ 5910.531098][T26333] Use struct sctp_assoc_value instead
[ 5912.194198][   T30] audit: type=1400 audit(6424.836:913): avc:  denied  { create } for  pid=26346 comm="syz.1.25010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1
[ 5912.235112][   T30] audit: type=1400 audit(6424.876:914): avc:  denied  { write } for  pid=26346 comm="syz.1.25010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1
[ 5914.307164][   T30] audit: type=1400 audit(6426.946:915): avc:  denied  { map } for  pid=26377 comm="syz.1.25025" path="/dev/binderfs/binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1
[ 5914.343994][T26379] binder_alloc: binder_alloc_mmap_handler: 26377 20ffc000-20ffd000 already mapped failed -16
[ 5917.568382][   T30] audit: type=1400 audit(6430.196:916): avc:  denied  { getopt } for  pid=26422 comm="syz.1.25047" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1
[ 5919.158414][   T30] audit: type=1400 audit(6431.786:917): avc:  denied  { setopt } for  pid=26445 comm="syz.0.25059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[ 5919.159508][   T30] audit: type=1400 audit(6431.796:918): avc:  denied  { bind } for  pid=26445 comm="syz.0.25059" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[ 5919.678042][T26457] dvmrp0: entered allmulticast mode
[ 5919.680586][T26457] dvmrp0: left allmulticast mode
[ 5921.029625][   T30] audit: type=1400 audit(6433.666:919): avc:  denied  { write } for  pid=26477 comm="syz.0.25073" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1
[ 5925.950786][   T30] audit: type=1400 audit(6438.586:920): avc:  denied  { getopt } for  pid=26518 comm="syz.0.25091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[ 5926.206593][   T30] audit: type=1400 audit(6438.836:921): avc:  denied  { setopt } for  pid=26521 comm="syz.1.25092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1
[ 5928.035967][   T30] audit: type=1400 audit(6440.666:922): avc:  denied  { accept } for  pid=26557 comm="syz.0.25110" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1
[ 5929.101405][T26580] serio: Serial port pts0
[ 5941.876888][T26654] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5124 sclass=netlink_route_socket pid=26654 comm=syz.0.25155
[ 5943.663850][   T30] audit: type=1400 audit(6456.296:923): avc:  denied  { nlmsg_read } for  pid=26670 comm="syz.0.25163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[ 5943.668248][   T30] audit: type=1400 audit(6456.306:924): avc:  denied  { read } for  pid=26670 comm="syz.0.25163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[ 5945.700226][T26691] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=26691 comm=syz.1.25171
[ 5950.820540][   T30] audit: type=1400 audit(6463.456:925): avc:  denied  { setattr } for  pid=26739 comm="syz.0.25192" name="KCM" dev="sockfs" ino=196390 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1
[ 5951.342213][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 5952.086896][T26758] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26758 comm=syz.0.25201
[ 5956.935744][T26776] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26776 comm=syz.1.25208
[ 5957.825413][T26780] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=26780 comm=syz.1.25208
[ 5961.829569][T26822] serio: Serial port pts0
[ 5978.934086][   T30] audit: type=1400 audit(6491.566:926): avc:  denied  { read } for  pid=27008 comm="syz.1.25313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[ 5980.809522][   T30] audit: type=1400 audit(6493.446:927): avc:  denied  { setattr } for  pid=27031 comm="syz.0.25324" name="NETLINK" dev="sockfs" ino=197912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 5985.283491][T27062] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27062 comm=syz.0.25338
[ 5986.915214][T27087] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=27087 comm=syz.0.25351
[ 5997.366192][   T30] audit: type=1400 audit(6510.006:928): avc:  denied  { create } for  pid=27249 comm="syz.1.25432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1
[ 5997.775504][   T30] audit: type=1400 audit(6510.396:929): avc:  denied  { getattr } for  pid=27254 comm="syz.0.25434" path="pid:[4026532684]" dev="nsfs" ino=4026532684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1
[ 6000.732077][   T30] audit: type=1400 audit(6513.356:930): avc:  denied  { shutdown } for  pid=27276 comm="syz.0.25444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1
[ 6019.835551][T27397] sctp: [Deprecated]: syz.1.25496 (pid 27397) Use of int in maxseg socket option.
[ 6019.835551][T27397] Use struct sctp_assoc_value instead
[ 6022.520413][T27436] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27436 comm=syz.1.25516
[ 6026.747507][T27491] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=27491 comm=syz.0.25542
[ 6028.090423][T27511] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=27511 comm=syz.0.25551
[ 6035.877549][T27572] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=27572 comm=syz.0.25579
[ 6040.287813][   T30] audit: type=1400 audit(6552.926:931): avc:  denied  { read } for  pid=27627 comm="syz.0.25602" path="socket:[200842]" dev="sockfs" ino=200842 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[ 6040.553907][    C0] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies.
[ 6049.870216][   T30] audit: type=1400 audit(6562.506:932): avc:  denied  { write } for  pid=27721 comm="syz.0.25644" path="socket:[201003]" dev="sockfs" ino=201003 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sock_file permissive=1
[ 6063.358657][   T30] audit: type=1400 audit(6575.996:933): avc:  denied  { setopt } for  pid=27943 comm="syz.1.25750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1
[ 6068.059787][T28015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1794 sclass=netlink_route_socket pid=28015 comm=syz.1.25784
[ 6071.935254][T28063] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28063 comm=syz.0.25807
[ 6072.550656][T28071] input: syz0 as /devices/virtual/input/input52
[ 6082.845592][   T30] audit: type=1400 audit(6595.486:934): avc:  denied  { append } for  pid=28146 comm="syz.1.25846" name="urandom" dev="devtmpfs" ino=9 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1
[ 6085.289272][T28160] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1795 sclass=netlink_route_socket pid=28160 comm=syz.1.25852
[ 6102.437704][T28282] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28282 comm=syz.0.25910
[ 6102.844016][   T30] audit: type=1400 audit(6615.486:935): avc:  denied  { write } for  pid=28287 comm="syz.1.25913" path="socket:[202189]" dev="sockfs" ino=202189 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1
[ 6103.556070][T28301] serio: Serial port pts0
[ 6105.258814][   T30] audit: type=1400 audit(6617.896:936): avc:  denied  { create } for  pid=28315 comm="syz.0.25926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1
[ 6114.703441][   T30] audit: type=1400 audit(6627.336:937): avc:  denied  { write } for  pid=28409 comm="syz.0.25965" name="mice" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1
[ 6116.642443][T28425] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5134 sclass=netlink_xfrm_socket pid=28425 comm=syz.0.25972
[ 6116.904677][T28427] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28427 comm=syz.0.25974
[ 6123.289163][T28500] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28500 comm=syz.0.26006
[ 6133.891303][T28575] serio: Serial port pts0
[ 6141.000487][T28606] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=28606 comm=syz.0.26055
[ 6148.602671][   T30] audit: type=1400 audit(6661.236:938): avc:  denied  { nlmsg_read } for  pid=28670 comm="syz.1.26084" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1
[ 6149.230180][T28683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28683 comm=syz.0.26091
[ 6156.378509][T28763] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28763 comm=syz.1.26129
[ 6158.079153][T28785] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=771 sclass=netlink_xfrm_socket pid=28785 comm=syz.1.26139
[ 6161.756614][T28818] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=28818 comm=syz.1.26155
[ 6166.619495][   T30] audit: type=1400 audit(6679.256:939): avc:  denied  { append } for  pid=28872 comm="syz.1.26181" name="system" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[ 6169.513762][T28908] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28908 comm=syz.1.26197
[ 6170.793932][T28921] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=28921 comm=syz.0.26203
[ 6173.039638][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.040255][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.040685][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.041133][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.051303][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.053078][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.053459][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.053833][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.054268][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.054702][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.055099][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.055607][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.056145][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.056529][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.056908][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.057229][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.057673][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.058066][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.058452][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.058901][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.072148][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.072959][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.073391][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.073790][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.074256][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.074795][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.075244][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.075667][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.076104][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.076547][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.076933][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.077370][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.077802][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.078216][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.078671][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.079210][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.079780][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.080172][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.080587][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.080983][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.100590][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.101167][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.104024][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.104596][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.105081][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.105670][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.106063][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.106495][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.106898][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.107357][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.107759][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.108155][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.108547][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.108941][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.109334][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.109742][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.110118][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.110507][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.110908][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.111370][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.129841][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.130267][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.130642][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.131010][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.134833][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.135589][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.135996][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.136378][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.136758][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.137087][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.137476][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.137865][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.138238][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.138619][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.139028][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.139505][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.139894][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.140465][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.140955][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.153044][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.153595][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.153970][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.154445][T27702] hid-generic 0000:0000:0000.0006: unknown main item tag 0x0
[ 6173.177461][T27702] hid-generic 0000:0000:0000.0006: hidraw0: <UNKNOWN> HID v0.00 Device [syz0] on syz0
[ 6176.322603][   T30] audit: type=1400 audit(6688.956:940): avc:  denied  { map } for  pid=29008 comm="syz.0.26244" path="/dev/usbmon0" dev="devtmpfs" ino=697 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1
[ 6183.119347][T29126] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29126 comm=syz.0.26301
[ 6183.345883][   T30] audit: type=1400 audit(6695.986:941): avc:  denied  { nlmsg_write } for  pid=29129 comm="syz.0.26303" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 6185.134513][T29157] serio: Serial port pts0
[ 6198.103196][   T30] audit: type=1400 audit(6710.736:942): avc:  denied  { mounton } for  pid=29272 comm="syz.0.26367" path="/6991/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=fifo_file permissive=1
[ 6201.506847][   T30] audit: type=1400 audit(6714.116:943): avc:  denied  { create } for  pid=29302 comm="syz.1.26380" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1
[ 6209.598051][T29378] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=29378 comm=syz.0.26412
[ 6209.675690][T29379] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2052 sclass=netlink_route_socket pid=29379 comm=syz.1.26411
[ 6210.144944][    C1] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.
[ 6211.526162][T29402] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=29402 comm=syz.0.26423
[ 6214.751024][T29444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29444 comm=syz.1.26442
[ 6217.059199][T29479] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=29479 comm=syz.0.26458
[ 6217.724750][   T30] audit: type=1400 audit(6730.366:944): avc:  denied  { relabelfrom } for  pid=29487 comm="syz.0.26463" name="NETLINK" dev="sockfs" ino=206922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 6220.393216][T29522] serio: Serial port pts0
[ 6241.779002][T29662] serio: Serial port pts0
[ 6241.819207][T29664] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=29664 comm=syz.0.26543
[ 6245.307545][T29707] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=29707 comm=syz.1.26561
[ 6248.489244][T29753] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29753 comm=syz.0.26583
[ 6253.029676][   T30] audit: type=1400 audit(6765.666:945): avc:  denied  { setattr } for  pid=29789 comm="syz.1.26601" path="socket:[207392]" dev="sockfs" ino=207392 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 6254.111141][T29799] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29799 comm=syz.1.26605
[ 6265.313534][   T30] audit: type=1400 audit(6777.956:946): avc:  denied  { bind } for  pid=29884 comm="syz.1.26643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[ 6267.287739][T29905] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=29905 comm=syz.0.26652
[ 6278.298179][T29994] ptrace attach of ""[29995] was attempted by "/syz-executor exec"[29994]
[ 6280.457763][T30036] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=262 sclass=netlink_route_socket pid=30036 comm=syz.0.26714
[ 6280.978604][    C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 6282.925237][T30064] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30064 comm=syz.1.26728
[ 6289.069820][T30135] sctp: [Deprecated]: syz.0.26759 (pid 30135) Use of int in max_burst socket option.
[ 6289.069820][T30135] Use struct sctp_assoc_value instead
[ 6293.585034][T30176] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=30176 comm=syz.0.26780
[ 6294.489308][T30185] serio: Serial port pts0
[ 6298.987226][   T30] audit: type=1400 audit(6811.626:947): avc:  denied  { accept } for  pid=30216 comm="syz.1.26798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[ 6300.239474][T30232] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30232 comm=syz.1.26805
[ 6305.349941][T30276] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=30276 comm=syz.1.26826
[ 6310.742722][T30307] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30307 comm=syz.0.26840
[ 6312.795977][   T30] audit: type=1400 audit(6825.436:948): avc:  denied  { create } for  pid=30342 comm="syz.0.26858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1
[ 6314.594445][T30375] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30375 comm=syz.1.26874
[ 6315.693011][T30390] usb usb1: usbfs: process 30390 (syz.0.26880) did not claim interface 0 before use
[ 6316.369109][   T30] audit: type=1400 audit(6829.006:949): avc:  denied  { setopt } for  pid=30400 comm="syz.0.26885" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[ 6327.534536][T30544] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=30544 comm=syz.1.26951
[ 6329.830469][   T30] audit: type=1400 audit(6842.466:950): avc:  denied  { mount } for  pid=30571 comm="syz.1.26965" name="/" dev="sockfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1
[ 6332.568346][T30603] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=30603 comm=syz.1.26978
[ 6337.841222][T30678] udevd[30678]: setting mode of /dev/vcs21 to 020660 failed: Read-only file system
[ 6337.877826][T30678] udevd[30678]: setting owner of /dev/vcs21 to uid=0, gid=5 failed: Read-only file system
[ 6338.346458][T30681] udevd[30681]: setting mode of /dev/vcsu21 to 020660 failed: Read-only file system
[ 6338.347562][T30681] udevd[30681]: setting owner of /dev/vcsu21 to uid=0, gid=5 failed: Read-only file system
[ 6338.606475][T30686] udevd[30686]: setting mode of /dev/vcsa21 to 020660 failed: Read-only file system
[ 6338.607714][T30686] udevd[30686]: setting owner of /dev/vcsa21 to uid=0, gid=5 failed: Read-only file system
[ 6341.745513][T30731] netlink: 4 bytes leftover after parsing attributes in process `syz.1.27038'.
[ 6343.833108][T30759] input: syz0 as /devices/virtual/input/input56
[ 6347.056100][T30796] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=261 sclass=netlink_xfrm_socket pid=30796 comm=syz.0.27069
[ 6350.172778][   T30] audit: type=1400 audit(6862.796:951): avc:  denied  { nlmsg_write } for  pid=30834 comm="syz.1.27085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1
[ 6351.121332][T30847] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2561 sclass=netlink_route_socket pid=30847 comm=syz.0.27092
[ 6378.133925][T31099] serio: Serial port pts0
[ 6380.616978][T31109] serio: Serial port pts1
[ 6394.224264][   T30] audit: type=1400 audit(6906.856:952): avc:  denied  { getopt } for  pid=31121 comm="syz.0.27217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1
[ 6403.707318][T31222] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31222 comm=syz.1.27264
[ 6407.064189][T31245] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=31245 comm=syz.0.27274
[ 6408.172606][T31265] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31265 comm=syz.1.27284
[ 6409.110517][T31279] udevd[31279]: setting mode of /dev/vcs23 to 020660 failed: Read-only file system
[ 6409.133346][T31279] udevd[31279]: setting owner of /dev/vcs23 to uid=0, gid=5 failed: Read-only file system
[ 6409.447607][T31281] udevd[31281]: setting mode of /dev/vcsu23 to 020660 failed: Read-only file system
[ 6409.448614][T31281] udevd[31281]: setting owner of /dev/vcsu23 to uid=0, gid=5 failed: Read-only file system
[ 6409.539712][T31283] udevd[31283]: setting mode of /dev/vcsa23 to 020660 failed: Read-only file system
[ 6409.540672][T31283] udevd[31283]: setting owner of /dev/vcsa23 to uid=0, gid=5 failed: Read-only file system
[ 6412.267237][T31310] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=31310 comm=syz.1.27301
[ 6414.379463][T31331] udevd[31331]: setting mode of /dev/vcs20 to 020660 failed: Read-only file system
[ 6414.380455][T31331] udevd[31331]: setting owner of /dev/vcs20 to uid=0, gid=5 failed: Read-only file system
[ 6414.708761][T31338] udevd[31338]: setting mode of /dev/vcsu20 to 020660 failed: Read-only file system
[ 6414.709741][T31338] udevd[31338]: setting owner of /dev/vcsu20 to uid=0, gid=5 failed: Read-only file system
[ 6414.804128][T31340] udevd[31340]: setting mode of /dev/vcsa20 to 020660 failed: Read-only file system
[ 6414.810121][T31340] udevd[31340]: setting owner of /dev/vcsa20 to uid=0, gid=5 failed: Read-only file system
[ 6417.359235][T31375] serio: Serial port pts0
[ 6419.087812][T31338] udevd[31338]: setting mode of /dev/vcs22 to 020660 failed: Read-only file system
[ 6419.088788][T31338] udevd[31338]: setting owner of /dev/vcs22 to uid=0, gid=5 failed: Read-only file system
[ 6419.134588][T31338] udevd[31338]: setting mode of /dev/vcsa22 to 020660 failed: Read-only file system
[ 6419.137437][T31338] udevd[31338]: setting owner of /dev/vcsa22 to uid=0, gid=5 failed: Read-only file system
[ 6424.319054][T31441] input: syz0 as /devices/virtual/input/input57
[ 6425.257726][   T30] audit: type=1400 audit(6937.896:953): avc:  denied  { setattr } for  pid=31453 comm="syz.0.27371" name="pfkey" dev="proc" ino=4026532946 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1
[ 6427.055243][   T30] audit: type=1400 audit(6939.696:954): avc:  denied  { write } for  pid=31473 comm="syz.1.27378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1
[ 6431.636633][T31518] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=31518 comm=syz.0.27399
[ 6433.794947][T31550] block nbd1: shutting down sockets
[ 6434.256088][T31561] serio: Serial port pts0
[ 6438.226163][   T30] audit: type=1400 audit(6950.866:955): avc:  denied  { lock } for  pid=31601 comm="syz.0.27438" path="socket:[213369]" dev="sockfs" ino=213369 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1
[ 6440.176482][T31614] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=31614 comm=syz.0.27443
[ 6448.063771][T31668] serio: Serial port pts1
[ 6454.104758][T31707] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=31707 comm=syz.1.27483
[ 6463.968682][T31780] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=31780 comm=syz.0.27517
[ 6467.105137][   T30] audit: type=1400 audit(6979.746:956): avc:  denied  { create } for  pid=31819 comm="syz.1.27536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1
[ 6476.804279][   T30] audit: type=1400 audit(6989.436:957): avc:  denied  { lock } for  pid=31936 comm="syz.1.27592" path="socket:[213896]" dev="sockfs" ino=213896 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[ 6486.812192][    C0] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 6494.925553][T32174] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=19 sclass=netlink_audit_socket pid=32174 comm=syz.1.27702
[ 6495.819676][T32184] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32184 comm=syz.0.27707
[ 6497.406844][   T30] audit: type=1400 audit(7010.046:958): avc:  denied  { setattr } for  pid=32205 comm="syz.0.27718" name="XDP" dev="sockfs" ino=215397 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1
[ 6500.226469][T32250] sctp: [Deprecated]: syz.0.27738 (pid 32250) Use of int in max_burst socket option deprecated.
[ 6500.226469][T32250] Use struct sctp_assoc_value instead
[ 6500.314002][T32254] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32254 comm=syz.1.27739
[ 6502.443515][T12642] usb 1-1: new high-speed USB device number 18 using dummy_hcd
[ 6502.650848][T12642] usb 1-1: New USB device found, idVendor=249c, idProduct=9002, bcdDevice=de.ad
[ 6502.652521][T12642] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0
[ 6502.673130][T12642] usb 1-1: config 0 descriptor??
[ 6502.898853][T12642] usb 1-1: can't set first interface for hiFace device.
[ 6502.899583][T12642] snd-usb-hiface 1-1:0.0: probe with driver snd-usb-hiface failed with error -5
[ 6502.919022][T12642] usb 1-1: USB disconnect, device number 18
[ 6507.613404][   T30] audit: type=1400 audit(7020.246:959): avc:  denied  { lock } for  pid=32359 comm="syz.0.27785" path="socket:[215611]" dev="sockfs" ino=215611 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1
[ 6508.894248][T32384] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32384 comm=syz.0.27797
[ 6513.150204][T32417] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=32417 comm=syz.0.27812
[ 6514.244888][    C0] vkms_vblank_simulate: vblank timer overrun
[ 6517.392849][T32444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32444 comm=syz.0.27825
[ 6523.144003][T32485] netdevsim netdevsim0 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0
[ 6523.146811][T32485] netdevsim netdevsim0 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0
[ 6523.147565][T32485] netdevsim netdevsim0 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0
[ 6523.148032][T32485] netdevsim netdevsim0 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0
[ 6523.149970][T32485] vxlan0: entered promiscuous mode
[ 6523.150595][T32485] vxlan0: entered allmulticast mode
[ 6523.191944][T32485] netdevsim netdevsim0 netdevsim0: unset [0, 0] type 1 family 0 port 8472 - 0
[ 6523.192583][T32485] netdevsim netdevsim0 netdevsim1: unset [0, 0] type 1 family 0 port 8472 - 0
[ 6523.193047][T32485] netdevsim netdevsim0 netdevsim2: unset [0, 0] type 1 family 0 port 8472 - 0
[ 6523.193502][T32485] netdevsim netdevsim0 netdevsim3: unset [0, 0] type 1 family 0 port 8472 - 0
[ 6527.492629][T32537] serio: Serial port pts0
[ 6530.320728][T32576] netlink: 48 bytes leftover after parsing attributes in process `syz.1.27887'.
[ 6530.336327][   T30] audit: type=1400 audit(7042.966:960): avc:  denied  { read } for  pid=32575 comm="syz.1.27887" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1
[ 6545.579631][T32695] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=32695 comm=syz.0.27944
[ 6546.805721][T32707] "syz.0.27950" (32707) uses obsolete ecb(arc4) skcipher
[ 6571.876818][  T347] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[ 6571.919241][  T347] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[ 6573.904395][  T428] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=428 comm=syz.0.28028
[ 6575.458428][  T347] hsr_slave_0: entered promiscuous mode
[ 6575.526453][  T347] hsr_slave_1: entered promiscuous mode
[ 6575.593668][  T347] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[ 6575.594738][  T347] Cannot create hsr debugfs directory
[ 6576.919743][  T347] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 6577.294478][  T347] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 6577.415210][  T450] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=450 comm=syz.0.28036
[ 6577.698976][  T347] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 6578.047400][  T347] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[ 6579.057976][  T347] netdevsim netdevsim1 netdevsim0: renamed from eth0
[ 6579.120659][  T347] netdevsim netdevsim1 netdevsim1: renamed from eth1
[ 6579.173816][  T347] netdevsim netdevsim1 netdevsim2: renamed from eth2
[ 6579.210075][  T347] netdevsim netdevsim1 netdevsim3: renamed from eth3
[ 6580.935199][  T476] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=476 comm=syz.0.28046
[ 6582.800231][  T347] 8021q: adding VLAN 0 to HW filter on device bond0
[ 6589.554286][    C1] TCP: request_sock_TCP: Possible SYN flooding on port [::]:2. Sending cookies.
[ 6607.693084][  T566] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=29890 sclass=netlink_route_socket pid=566 comm=syz.0.28072
[ 6620.900389][  T347] veth0_vlan: entered promiscuous mode
[ 6621.032407][  T347] veth1_vlan: entered promiscuous mode
[ 6621.777139][  T347] veth0_macvtap: entered promiscuous mode
[ 6621.889233][  T347] veth1_macvtap: entered promiscuous mode
[ 6622.837167][  T347] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[ 6622.838078][  T347] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[ 6622.838772][  T347] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[ 6622.839482][  T347] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[ 6692.813554][    C0] watchdog: BUG: soft lockup - CPU#0 stuck for 23s! [kworker/0:1:4454]
[ 6692.814659][    C0] Modules linked in:
[ 6692.816909][    C0] irq event stamp: 3062090
[ 6692.817444][    C0] hardirqs last  enabled at (3062089): [<ffff8000850e7918>] exit_to_kernel_mode+0x38/0x118
[ 6692.819557][    C0] hardirqs last disabled at (3062090): [<ffff8000850e98bc>] el1_interrupt+0x24/0x54
[ 6692.820768][    C0] softirqs last  enabled at (3062088): [<ffff8000801957a4>] handle_softirqs+0x87c/0xd4c
[ 6692.821609][    C0] softirqs last disabled at (3061773): [<ffff800080010770>] __do_softirq+0x14/0x20
[ 6692.823064][    C0] CPU: 0 UID: 0 PID: 4454 Comm: kworker/0:1 Not tainted 6.11.0-rc2-syzkaller-00004-gb446a2dae984 #0
[ 6692.823870][    C0] Hardware name: linux,dummy-virt (DT)
[ 6692.824714][    C0] Workqueue: events nsim_dev_trap_report_work
[ 6692.825707][    C0] pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 6692.826668][    C0] pc : clear_page+0x18/0x54
[ 6692.827673][    C0] lr : kernel_init_pages+0x64/0xbc
[ 6692.828623][    C0] sp : ffff80008ed97250
[ 6692.829480][    C0] x29: ffff80008ed97250 x28: fffffdffc01b1e00 x27: 1fffffbff80363c6
[ 6692.831396][    C0] x26: 0000000000000000 x25: 0000000000000001 x24: 00000000001d2820
[ 6692.832847][    C0] x23: fffffdffc01b1e40 x22: ffffc1ffc0000000 x21: ffff700010cdd448
[ 6692.834221][    C0] x20: ffff8000866ea240 x19: fffffdffc01b2000 x18: 00000000a2e2b32f
[ 6692.835553][    C0] x17: 0000000000000001 x16: 0000000000000000 x15: ffff00000c302880
[ 6692.836903][    C0] x14: 1fffe0000186050f x13: 1fffe00001860528 x12: ffff7fbff80363c7
[ 6692.838231][    C0] x11: 1fffffbff80363c6 x10: ffff7fbff80363c6 x9 : 0000000000000000
[ 6692.839579][    C0] x8 : ffff600000d90000 x7 : 0000000000000000 x6 : 000000000000003f
[ 6692.840875][    C0] x5 : 0000000000000040 x4 : 0000000000000000 x3 : 0000000000000004
[ 6692.842144][    C0] x2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff000006c78800
[ 6692.843649][    C0] Call trace:
[ 6692.844311][    C0]  clear_page+0x18/0x54
[ 6692.845135][    C0]  post_alloc_hook+0x1cc/0x304
[ 6692.845824][    C0]  get_page_from_freelist+0xa9c/0x2000
[ 6692.846565][    C0]  __alloc_pages_noprof+0x1c4/0x2310
[ 6692.847254][    C0]  alloc_slab_page+0x78/0x144
[ 6692.847941][    C0]  new_slab+0xa8/0x2e0
[ 6692.848648][    C0]  ___slab_alloc+0xa78/0x1474
[ 6692.849336][    C0]  __slab_alloc.constprop.0+0x74/0xe8
[ 6692.850027][    C0]  __kmalloc_node_track_caller_noprof+0x150/0x428
[ 6692.850766][    C0]  kmalloc_reserve+0xd8/0x248
[ 6692.851468][    C0]  __alloc_skb+0x120/0x2f0
[ 6692.852129][    C0]  nsim_dev_trap_report_work+0x1ec/0xa40
[ 6692.852833][    C0]  process_one_work+0x7a0/0x1868
[ 6692.853563][    C0]  worker_thread+0x72c/0xb80
[ 6692.854230][    C0]  kthread+0x27c/0x300
[ 6692.854874][    C0]  ret_from_fork+0x10/0x20
[ 6692.856167][    C0] Sending NMI from CPU 0 to CPUs 1:
[ 6693.569698][    C1] NMI backtrace for cpu 1
[ 6693.570429][    C1] CPU: 1 UID: 0 PID: 32640 Comm: syz.1.27918 Not tainted 6.11.0-rc2-syzkaller-00004-gb446a2dae984 #0
[ 6693.572305][    C1] Hardware name: linux,dummy-virt (DT)
[ 6693.573485][    C1] pstate: 00000005 (nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 6693.575088][    C1] pc : clear_page+0x18/0x54
[ 6693.576145][    C1] lr : kernel_init_pages+0x64/0xbc
[ 6693.577234][    C1] sp : ffff80008def7530
[ 6693.578111][    C1] x29: ffff80008def7530 x28: fffffdffc01b1a40 x27: 1fffffbff803634e
[ 6693.579844][    C1] x26: 0000000000000000 x25: 0000000000000001 x24: 0000000000506dc0
[ 6693.581567][    C1] x23: fffffdffc01b1a80 x22: ffffc1ffc0000000 x21: ffff700010cdd448
[ 6693.583252][    C1] x20: ffff8000866ea240 x19: fffffdffc01b1a80 x18: 00000000ffffffff
[ 6693.585035][    C1] x17: 0000000000000001 x16: 0000000000000000 x15: ffff00000e926480
[ 6693.586744][    C1] x14: 1fffe00001d24c8f x13: 1fffe00001d24c94 x12: ffff7fbff803634f
[ 6693.588470][    C1] x11: 1fffffbff803634e x10: ffff7fbff803634e x9 : 0000000000000000
[ 6693.590220][    C1] x8 : ffff600000d8d400 x7 : 0000000000000000 x6 : 000000000000003f
[ 6693.591895][    C1] x5 : 0000000000000040 x4 : 0000000000000000 x3 : 0000000000000004
[ 6693.593679][    C1] x2 : 0000000000000004 x1 : 0000000000000040 x0 : ffff000006c69a00
[ 6693.595406][    C1] Call trace:
[ 6693.596169][    C1]  clear_page+0x18/0x54
[ 6693.597084][    C1]  post_alloc_hook+0x1cc/0x304
[ 6693.598133][    C1]  get_page_from_freelist+0xa9c/0x2000
[ 6693.599175][    C1]  __alloc_pages_noprof+0x1c4/0x2310
[ 6693.600355][    C1]  ringbuf_map_alloc+0x200/0x614
[ 6693.601393][    C1]  map_create+0x3ac/0x16bc
[ 6693.602331][    C1]  __sys_bpf+0xb6c/0x30e8
[ 6693.603397][    C1]  __arm64_sys_bpf+0x70/0xa4
[ 6693.604415][    C1]  invoke_syscall+0x6c/0x258
[ 6693.605376][    C1]  el0_svc_common.constprop.0+0xac/0x230
[ 6693.606524][    C1]  do_el0_svc+0x40/0x58
[ 6693.607463][    C1]  el0_svc+0x50/0x180
[ 6693.608387][    C1]  el0t_64_sync_handler+0x100/0x12c
[ 6693.609440][    C1]  el0t_64_sync+0x190/0x194
[ 6693.612091][    C0] Kernel panic - not syncing: softlockup: hung tasks
[ 6693.613215][    C0] CPU: 0 UID: 0 PID: 4454 Comm: kworker/0:1 Tainted: G             L     6.11.0-rc2-syzkaller-00004-gb446a2dae984 #0
[ 6693.613751][    C0] Tainted: [L]=SOFTLOCKUP
[ 6693.613975][    C0] Hardware name: linux,dummy-virt (DT)
[ 6693.614217][    C0] Workqueue: events nsim_dev_trap_report_work
[ 6693.614574][    C0] Call trace:
[ 6693.614925][    C0]  dump_backtrace+0x9c/0x11c
[ 6693.615222][    C0]  show_stack+0x18/0x24
[ 6693.615548][    C0]  dump_stack_lvl+0x38/0xf4
[ 6693.615821][    C0]  dump_stack+0x1c/0x28
[ 6693.616022][    C0]  panic+0x5b4/0x63c
[ 6693.616225][    C0]  watchdog_timer_fn+0x448/0x5c8
[ 6693.616455][    C0]  __hrtimer_run_queues+0x55c/0xb28
[ 6693.616685][    C0]  hrtimer_interrupt+0x2a4/0x76c
[ 6693.616911][    C0]  arch_timer_handler_phys+0x40/0x6c
[ 6693.617405][    C0]  handle_percpu_devid_irq+0x19c/0x30c
[ 6693.617731][    C0]  generic_handle_domain_irq+0x78/0xa4
[ 6693.618055][    C0]  gic_handle_irq+0x54/0x184
[ 6693.618339][    C0]  call_on_irq_stack+0x24/0x4c
[ 6693.618574][    C0]  do_interrupt_handler+0x12c/0x150
[ 6693.618836][    C0]  el1_interrupt+0x34/0x54
[ 6693.619195][    C0]  el1h_64_irq_handler+0x18/0x24
[ 6693.619502][    C0]  el1h_64_irq+0x64/0x68
[ 6693.619719][    C0]  clear_page+0x18/0x54
[ 6693.619935][    C0]  post_alloc_hook+0x1cc/0x304
[ 6693.620167][    C0]  get_page_from_freelist+0xa9c/0x2000
[ 6693.620401][    C0]  __alloc_pages_noprof+0x1c4/0x2310
[ 6693.620641][    C0]  alloc_slab_page+0x78/0x144
[ 6693.620856][    C0]  new_slab+0xa8/0x2e0
[ 6693.621068][    C0]  ___slab_alloc+0xa78/0x1474
[ 6693.621292][    C0]  __slab_alloc.constprop.0+0x74/0xe8
[ 6693.621747][    C0]  __kmalloc_node_track_caller_noprof+0x150/0x428
[ 6693.622646][    C0]  kmalloc_reserve+0xd8/0x248
[ 6693.623010][    C0]  __alloc_skb+0x120/0x2f0
[ 6693.623312][    C0]  nsim_dev_trap_report_work+0x1ec/0xa40
[ 6693.623860][    C0]  process_one_work+0x7a0/0x1868
[ 6693.624101][    C0]  worker_thread+0x72c/0xb80
[ 6693.624317][    C0]  kthread+0x27c/0x300
[ 6693.624513][    C0]  ret_from_fork+0x10/0x20
[ 6693.625237][    C0] SMP: stopping secondary CPUs
[ 6693.626181][    C0] Kernel Offset: disabled
[ 6693.626505][    C0] CPU features: 0x04,40001001,a0100000,0200421b
[ 6693.626898][    C0] Memory Limit: none
[ 6693.627734][    C0] Rebooting in 86400 seconds..

VM DIAGNOSIS:
17:40:46  Registers:
info registers vcpu 0

CPU#0
 PC=ffff8000802d2870 X00=00000000000000c0 X01=0000000000000000
X02=0000000000000000 X03=1fffe000018603c1 X04=0000000000000000
X05=ffff800086b77940 X06=ffff700010d6ef28 X07=ffff8000876292b0
X08=0000000000000003 X09=dfff800000000000 X10=ffff700010d6ef28
X11=1ffff00010d6ef28 X12=ffff700010d6ef29 X13=1fffe00001860537
X14=1fffe0000186050f X15=ffff00000c302880 X16=0000000000000000
X17=745f74697865205d X18=00000000ec3792da X19=0000000000000001
X20=ffff00000c302948 X21=ffff800086be3c30 X22=0000000000000028
X23=ffff00000c302880 X24=ffff800086a80fc8 X25=ffff8000851983e0
X26=00000000ffffffff X27=00000000000000c0 X28=ffff00000c301e00
X29=ffff800080007790 X30=ffff8000850eb67c  SP=ffff800080007790
PSTATE=000000c5 ---- EL1h     FPCR=00000000 FPSR=00000000
Q00=0000000000000000:0000000000000001 Q01=0000aaaab9d354a4:0000aaaab9d354a0
Q02=0000aaaab9d38b8d:0000aaaab9d38b40 Q03=0000000000000000:0000000000000000
Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000
Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000
Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000
Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000
Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000
Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000
Q16=0000ffffdd969d60:0000ffffdd969d60 Q17=ffffff80ffffffd0:0000ffffdd969d30
Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000
Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000
Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000
Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000
Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000
Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000
Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000
info registers vcpu 1

CPU#1
 PC=ffff80008505e4d4 X00=ffff000006c699c0 X01=0000000000000040
X02=0000000000000004 X03=0000000000000004 X04=0000000000000000
X05=0000000000000040 X06=000000000000003f X07=0000000000000000
X08=ffff600000d8d400 X09=0000000000000000 X10=ffff7fbff803634e
X11=1fffffbff803634e X12=ffff7fbff803634f X13=1fffe00001d24c94
X14=1fffe00001d24c8f X15=ffff00000e926480 X16=0000000000000000
X17=0000000000000001 X18=00000000ffffffff X19=fffffdffc01b1a80
X20=ffff8000866ea240 X21=ffff700010cdd448 X22=ffffc1ffc0000000
X23=fffffdffc01b1a80 X24=0000000000506dc0 X25=0000000000000001
X26=0000000000000000 X27=1fffffbff803634e X28=fffffdffc01b1a40
X29=ffff80008def7530 X30=ffff8000808634c0  SP=ffff80008def7530
PSTATE=00000005 ---- EL1h     FPCR=00000000 FPSR=00000000
Q00=0000000000000000:0000000000000001 Q01=0000aaaab9d354a4:0000aaaab9d354a0
Q02=0000aaaab9d38b8d:0000aaaab9d38b40 Q03=0000000000000000:0000000000000000
Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000
Q06=3000000000000000:3000000000000000 Q07=0000000000000000:0000000000000000
Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000
Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000
Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000
Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000
Q16=0000ffffdd969d60:0000ffffdd969d60 Q17=ffffff80ffffffd0:0000ffffdd969d30
Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000
Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000
Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000
Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000
Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000
Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000
Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000