last executing test programs: 1h55m1.813224788s ago: executing program 0 (id=314): r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@abs={0x0, 0x0, 0x4e20}, 0x6e) socketpair(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) sendmsg$DEVLINK_CMD_PORT_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) setxattr$incfs_id(&(0x7f0000000080)='\xe9\x1fq\x89Y\x1e\x923aK\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) 1h55m1.663565758s ago: executing program 0 (id=315): r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000000), 0x30b542, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x19, 0x0, &(0x7f0000000040)) r1 = open(&(0x7f0000000100)='./file1\x00', 0x1433c2, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) nanosleep(0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/system', 0x0, 0x0) r2 = socket(0x1, 0x3, 0x0) recvmsg$inet_nvme(r2, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}, 0x0) close(r3) ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x5450, 0x0) 1h54m59.05816741s ago: executing program 0 (id=321): r0 = openat$cuse(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000040)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) getgroups(0x2, &(0x7f0000002080)=[0xffffffffffffffff, 0xffffffffffffffff]) r5 = getegid() fstat(0xffffffffffffffff, &(0x7f00000020c0)={0x0, 0x0, 0x0, 0x0, 0x0}) statx(0xffffffffffffff9c, &(0x7f0000002140)='./file0\x00', 0x6000, 0x20, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002280)={0x0, 0x0}, &(0x7f00000022c0)=0xc) r9 = getegid() fstat(0xffffffffffffffff, &(0x7f0000002300)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0186405, &(0x7f0000002380)={0x9, 0x1, {}, {0xee00}}) getgroups(0x4, &(0x7f00000023c0)=[0xee01, 0xee01, 0xee00, 0xee01]) write$FUSE_DIRENTPLUS(r0, &(0x7f0000002400)={0x3c0, 0x0, r1, [{{0x5, 0x1, 0x10, 0x80000000, 0x6, 0x6, {0x6, 0x2, 0x6, 0x3ff, 0x7, 0x0, 0x7ff, 0x5, 0x0, 0x8000, 0xffffffff, 0x0, r4, 0x4, 0x7}}, {0x1, 0xcd1, 0x4, 0x2, '+(}-'}}, {{0x1, 0x1, 0x91, 0x200, 0x1, 0x0, {0x6, 0x1, 0x1, 0x1, 0x4, 0x9, 0x3, 0x10000, 0x60b, 0x1000, 0xf37b, 0xffffffffffffffff, r5, 0x39e5, 0x6}}, {0x2, 0x4, 0x0, 0x8001}}, {{0x2, 0x2, 0x5, 0x9, 0x40, 0x4, {0x2, 0x2, 0x7, 0x5, 0x5, 0x8, 0x5, 0xda3d, 0x9, 0x4000, 0x3, r6, r7, 0x8, 0x7f}}, {0x5, 0x3, 0x2, 0x6, '**'}}, {{0x5, 0x0, 0x3, 0xbb91, 0xfa, 0xfffff001, {0x3, 0x6, 0xb25, 0xfffffffffffffff9, 0x6, 0x8, 0x0, 0x3ff, 0x4, 0x4000, 0x0, r8, r9, 0x5, 0x9}}, {0x2, 0x6, 0x0, 0x7}}, {{0x4, 0x2, 0x9, 0x6b29, 0x9, 0x5, {0x5, 0x1ae5ed1e, 0x9, 0xfffffffffffff820, 0xff, 0x28, 0xcf, 0x5, 0x4, 0x4000, 0x7, r10, 0xee01, 0x9e5e, 0xfffffff7}}, {0x6, 0x47, 0x8, 0x0, '}[-@-&$!'}}, {{0x4, 0x1, 0x8e3e, 0x10, 0x19e, 0x3, {0x5, 0x4263, 0x81, 0x401, 0x9, 0x101, 0x0, 0x2, 0x9, 0xe000, 0x6ee5, r11, r12, 0x2, 0x2}}, {0x0, 0x84c, 0x2, 0x5, '^]'}}]}, 0x3c0) setfsuid(r6) setgid(r12) mount$fuseblk(&(0x7f00000027c0), &(0x7f0000002800)='./file0\x00', &(0x7f0000002840), 0x118000, &(0x7f0000002880)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, r3}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x80000000}}, {@allow_other}, {}, {@allow_other}, {@max_read={'max_read', 0x3d, 0x8}}, {@max_read={'max_read', 0x3d, 0xff}}], [{@context={'context', 0x3d, 'user_u'}}, {@seclabel}, {@appraise}, {@appraise}]}}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(0xffffffffffffffff, 0x8982, &(0x7f00000029c0)) fcntl$addseals(r0, 0x409, 0xc) statx(0xffffffffffffff9c, &(0x7f0000002a00)='./file0\x00', 0x800, 0x6, &(0x7f0000002a40)) fstatat64(0xffffff9c, &(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80), 0x800) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000002c00)={{0x0, 0x8000000000000001, 0xffffffffffffffff, 0xd, 0x7fffffff, 0x6, 0xb, 0x3, 0xffffffff, 0x0, 0x9, 0x8, 0x7, 0xb8c7}, 0x18, [0x0, 0x0, 0x0]}) setfsgid(r4) r13 = signalfd(r0, &(0x7f0000002cc0)={[0x8, 0x52]}, 0x8) write$P9_RGETLOCK(r13, &(0x7f0000002d00)={0x1e, 0x37, 0x1, {0x0, 0x7, 0x10, r2}}, 0x1e) ioctl$SNAPSHOT_ATOMIC_RESTORE(r13, 0x3304) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0086426, &(0x7f0000002d80)={0x4, &(0x7f0000002d40)=[{0x0}, {}, {}, {}]}) ioctl$DRM_IOCTL_SWITCH_CTX(r13, 0x40086424, &(0x7f0000002dc0)={r14, 0x2}) r15 = socket$igmp(0x2, 0x3, 0x2) ioctl$FITRIM(r15, 0xc0185879, &(0x7f0000002e00)={0x800, 0x7f, 0x1}) r16 = openat2(0xffffffffffffff9c, &(0x7f0000002e40)='./file0\x00', &(0x7f0000002e80)={0x220003, 0x88, 0x1}, 0x18) ioctl$sock_inet_SIOCRTMSG(r16, 0x890d, &(0x7f0000002f00)={0x0, {0x2, 0x4e20, @empty}, {0x2, 0x4e23, @private=0xa010102}, {0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x106, 0x0, 0x0, 0x0, 0x5, &(0x7f0000002ec0)='pimreg1\x00', 0x3, 0x7, 0x9}) 1h54m58.580686302s ago: executing program 0 (id=322): r0 = openat$selinux_mls(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$selinux_status(0xffffff9c, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) move_mount(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00', 0x0) ioctl$SYNC_IOC_FILE_INFO(r0, 0x5451, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040), 0xd11cc2b7dce0325b, 0x0) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000440)={0x1d, 0x0, 0x1, {0x0, 0xf0, 0x7}}, 0x18) mkdir(&(0x7f0000000080)='./file0\x00', 0x150) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x42181, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0xc0189436, &(0x7f0000000440)={0x0, @adiantum, 0x0, @desc3}) close_range(r2, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x14) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x10}, 0x20048000) 1h54m58.29270887s ago: executing program 0 (id=323): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/icmp6\x00') setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000040)=0x8, 0x4) bind$netlink(r0, &(0x7f0000000080)={0x10, 0x0, 0x25dfdbfb, 0x10000}, 0xc) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), r0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f00000001c0)={'gretap0\x00', &(0x7f0000000140)={'sit0\x00', 0x0, 0x8000, 0x10, 0xbd, 0x4, {{0xa, 0x4, 0x2, 0x3, 0x28, 0x66, 0x0, 0x68, 0x2f, 0x0, @broadcast, @broadcast, {[@rr={0x7, 0xb, 0xb3, [@loopback, @multicast2]}, @ra={0x94, 0x4, 0x1}, @ra={0x94, 0x4, 0x1}]}}}}}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'lo\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f00000002c0)={'ip6gre0\x00', &(0x7f0000000240)={'syztnl0\x00', 0x0, 0x2f, 0x1, 0x4, 0x5, 0x655e0196e3bc70a2, @private0, @private0, 0x8000, 0x80, 0x0, 0x3}}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'syztnl1\x00', 0x0, 0x4, 0x2, 0x0, 0xf8, 0x50, @mcast2, @mcast2, 0x80, 0x8, 0x3ff}}) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r0, &(0x7f0000000540)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000500)={&(0x7f00000003c0)={0x114, r1, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}]}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x7}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @remote}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e24}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}]}, @MPTCP_PM_ATTR_ADDR={0x44, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @mcast1}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @private=0xa010101}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r4}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}, @MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r5}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}]}, 0x114}, 0x1, 0x0, 0x0, 0x2040000}, 0x40040) r6 = fcntl$dupfd(r0, 0x406, r0) ioctl$SNDCTL_TMR_SELECT(r0, 0x40045408) r7 = openat$cgroup(r6, &(0x7f0000000580)='syz0\x00', 0x200002, 0x0) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r7, 0x40047211, &(0x7f00000005c0)=0x10) pipe(&(0x7f0000000600)) fsetxattr$trusted_overlay_upper(r6, &(0x7f0000000640), &(0x7f0000000680)={0x0, 0xfb, 0xd9, 0x1, 0xfc, "937fedee4d09659fdacf34a15ee8b02a", "0413aa2f9b35893f16cfc6e32a93345e9bd2696a8327d0565b423b2b00fbc20041f706bc85dcc4057cac51174dca790ee5428548f1df273b17459d273f8f119cb4f7b24ecb3e22e8e904e0620f8253a2b7a4ce07e6f4580a964015aa42ddaab936d76b2fd122043144c486740ab30c2e061df105c0fcd1e5c1c4f5402b0c6017be731f9f949bef6f32f164d5d8e8fb11d5dd1217b1a2fd5fb61f8a093e6dee3b1f1b85d23a77d27f278c0201febfea8a03360e1ed0e3654ef1ed7024fa94bd8596db46a7"}, 0xd9, 0x2) r8 = openat$binfmt_format(0xffffff9c, &(0x7f0000000780)='/proc/sys/fs/binfmt_misc/syz2\x00', 0x2, 0x0) readahead(r8, 0xc, 0x0) openat$full(0xffffff9c, &(0x7f00000007c0), 0x4000, 0x0) ioctl$SNDCTL_SEQ_GETINCOUNT(r6, 0x80045105, &(0x7f0000000840)) 1h54m57.462459035s ago: executing program 0 (id=324): r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x682843, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4008800}, 0x40040000) 1h54m57.462084355s ago: executing program 32 (id=324): r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x682843, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4008800}, 0x40040000) 1h45m20.675646172s ago: executing program 1 (id=1253): r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x4000814) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000327b5705a2c872c250d000000080034fdff000000000000000900c6080000ce5f0500330000000000080039000100"], 0x3c}}, 0x2400c904) 1h45m19.817616348s ago: executing program 1 (id=1255): r0 = openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/power/sync_on_suspend', 0x482, 0x1) ioctl$BTRFS_IOC_DEFRAG_RANGE(r0, 0x40309410, &(0x7f0000000040)={0x7fff, 0x1000, 0x3, 0x1, 0x2, [0x3, 0x3, 0x0, 0x3]}) setsockopt$MRT_DONE(r0, 0x0, 0xc9, 0x0, 0x0) ioctl$KDSKBLED(r0, 0x4b65, 0xa38) ioctl$RTC_WIE_OFF(r0, 0x7010) ioctl$KDGKBLED(r0, 0x4b64, &(0x7f0000000080)) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f00000000c0)=0x9) read$rfkill(r0, &(0x7f0000000100), 0x8) recvfrom$llc(r0, &(0x7f0000000140)=""/147, 0x93, 0x2, &(0x7f0000000200)={0x1a, 0x308, 0x9, 0x8, 0x8, 0x70, @remote}, 0x10) ioctl$RTC_EPOCH_SET(r0, 0x4004700e, 0x80000000) statx(r0, &(0x7f0000000240)='./file0\x00', 0x400, 0x20, &(0x7f0000000280)) r1 = openat$tun(0xffffff9c, &(0x7f0000000380), 0x101000, 0x0) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="cbbed3d37879b071a21f9b140b0af8e56c5ab8e986696c902cd4bae4253434fbdf0362581a6e507579b359c2e70a39a41431d5fcf951a6f2d1f4debb90953e53d571cb4892be715fafd84aa6623926489621476635c178df94b9f4d2fed43bbfcc6bc48801ce5e9c3e0240189afbbf2c4756ba123093a8f87169a743d21a1757c1f1383f572daa14814a01fb321258336f480886fe777bb50af63383f4099938d10c209a621d1fa345e28eec90f93aeb33192420e087674562c9741bfeb0bb15ae5cd8b1fb9c6adb794d9f24e9d58cb9de3173f61a880ab7c6565ce5d4b29b1912cb6fd0057a31a1bfd048d42c4c2ae843a33ca314fe6e0e480289260a351ca8") ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f00000004c0)="c6d4dc0719b56ea8c1cdbc408fc3ed93103a960a7ac621dd9c69a1e09d567f24e1e1530d6a9ec03800adc2ae658b10a334c100255cc10fe5d64446cb575fe9452912796e7b74a3bcb7ae049516b4378ce7e226d8327783bc3c34523045c5f1f20182b3236d424199fa125fc81ddac0d21ce8b37570f9b61c73085dd586612cebdd82f386af84b86a29e205ff2e6f4ac9eabfcdf2f265f7af8372f1f1cf26626588c6477df1020ae0f4e02681d28282e015e1903beba094bacdee18a9581f056ccf18e4861e0b9e5ea3c8679ff24946c444ac094f44ce7152638405f6b1460efe3c9677730206fc3d7c4b2889309873025abaefdb39d26b2b5c6b26fa28219800") write$char_usb(r0, &(0x7f00000005c0), 0x0) connect$llc(r0, &(0x7f0000000600)={0x1a, 0x103, 0x6, 0x9, 0xd6, 0x6, @random="6d44f4b52727"}, 0x10) r2 = semget(0x1, 0x4, 0x101) semctl$GETVAL(r2, 0x3, 0xc, &(0x7f0000000640)=""/95) ioctl$TUNSETDEBUG(0xffffffffffffffff, 0x400454c9, &(0x7f00000006c0)=0x4) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000700)={0x2000}) r3 = syz_open_dev$vcsu(&(0x7f0000000740), 0x5, 0x800) write$UHID_CREATE2(r3, &(0x7f0000000780)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x6, 0x5d0, 0x2, 0x8, 0x2, 0xeca, "4a5cc793e1c3"}}, 0x11e) socket$inet_mptcp(0x2, 0x1, 0x106) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)={0x1b, 0x0, 0x0, 0x6, 0x0, 0x1, 0x7fffffff, '\x00', 0x0, r0, 0x5, 0x2}, 0x50) fsetxattr$security_capability(r4, &(0x7f0000000940), &(0x7f0000000980)=@v1={0x1000000, [{0x9, 0x2}]}, 0xc, 0x2) io_uring_register$IORING_REGISTER_IOWQ_AFF(r0, 0x11, &(0x7f00000009c0)="c923b0438fa75a8c65c944aec12fb74c73fb5d6a13ded4dd6905825092c56768ebeb95376e558798f1cb3c81667d0b523e41a306bfae02d0f7d8fb65068369d6f89a669ca31a86a8e20943f171ef3825ca60862efd56d2666bccd5e4863f39dc3d61b66b43224dc3a9a4477617c86052746843ba4d7d199a86a5f75d9105af91c069f9f4e13cbbffdd06af017d6a18e692a1d453fb188d0cd0e99337762f96787b1cb717806f488bf5c1a5418b5d9c7fa8e0822d8511b6395eceaf48371d7247ada4cb3270dfc0017a6dc0", 0xcb) r5 = socket$inet6_mptcp(0xa, 0x1, 0x106) syncfs(r5) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000ac0)=0x5) ioctl$TUNDETACHFILTER(r3, 0x400854d6, 0x0) 1h45m18.228381864s ago: executing program 1 (id=1256): r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x6, 0x2000) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000040)={'team_slave_0\x00', @multicast}) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r0, 0x3ba0, &(0x7f00000000c0)={0x48, 0x5, 0x0, 0x0, 0xffffffffffffffff, 0x1}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r0, 0x3ba0, &(0x7f0000000140)={0x48, 0x7, r2, 0x0, 0x1, 0x0, 0xa, 0xcdc53, 0x221959}) faccessat2(r0, &(0x7f00000001c0)='./file0\x00', 0x180, 0x300) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_MPATH(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, 0x0, 0x8, 0x70bd26, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}]}, 0x44}, 0x1, 0x0, 0x0, 0x8041}, 0x800) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x7, &(0x7f0000000340)=r0, 0x1) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000440)={'syztnl0\x00', &(0x7f0000000380)={'syztnl1\x00', 0x0, 0x7, 0x875f, 0xc, 0x534c, {{0x22, 0x4, 0x2, 0x8, 0x88, 0x65, 0x0, 0x8, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xb}, @rand_addr=0x64010100, {[@noop, @rr={0x7, 0x17, 0xca, [@private=0xa010101, @multicast2, @empty, @multicast2, @rand_addr=0x64010101]}, @timestamp_addr={0x44, 0x1c, 0xe7, 0x1, 0x9, [{@dev={0xac, 0x14, 0x14, 0x32}, 0x2}, {@empty, 0x2}, {@empty, 0x85b3}]}, @rr={0x7, 0x17, 0xc9, [@multicast2, @rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, @local]}, @cipso={0x86, 0x15, 0x3, [{0x2, 0x2}, {0x0, 0xd, "e6ae6b1e2cb2e6ee740445"}]}, @generic={0x0, 0x12, "5f30b4a4beada41416dea84003acbae1"}]}}}}}) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000480)={@private=0xa010102, @multicast1, r4}, 0xc) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000600)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000640)={{{@in6=@local, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@private1}}, &(0x7f0000000740)=0xe8) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f00000041c0)=0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000004200)={0x0, 0x0, 0x0}, &(0x7f0000004240)=0xc) r9 = openat$drirender128(0xffffff9c, &(0x7f0000004280), 0x8000, 0x0) sendmsg$netlink(r3, &(0x7f0000004300)={&(0x7f00000004c0)=@proc={0x10, 0x0, 0x25dfdbfe, 0x40000000}, 0xc, &(0x7f0000004180)=[{&(0x7f0000000780)={0x35b0, 0x3c, 0x100, 0x70bd26, 0x25dfdbff, "", [@nested={0x11d0, 0xb1, 0x0, 0x1, [@nested={0x4, 0x14f}, @typed={0x14, 0x12, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x14}}, @nested={0x4, 0xfe}, @typed={0x8, 0x124, 0x0, 0x0, @pid=r1}, @typed={0x8, 0x25, 0x0, 0x0, @uid=r5}, @generic="bdc8720004a2d0c69fc2324cc11136e21075ace198c5282f6d66d79b3252949a5836a8c77291edb8de7d0311b09b3d2e8327cedd27837e0a1b1e72dbaf03f943ebe58ecfc038737380cd56293d4466a958cee7c416714ccf9722898fa39893bb0383c84c0755ab8bfaf45351ccd396f8cfb0248860cc1d11656478a9aafbab16b82e72cd5f8066d9241f08ea0d15ba876e320ef7378f684540636cfbad11b538c408767f230ba537df0257df36f4ed5acc00d7d6d3d050783450a1d84782a6500dbc5f8bc75daeb13ce68bea66d0950978855f45592be957fa51c1aaeb0f06f53ee15355c93db3c49fd50b3374944d", @generic="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", @typed={0x8, 0x4c, 0x0, 0x0, @pid=r1}, @generic="8ee0133b40d56d520b6d1b1308c975352b1e9f9410f72970ab855ca80fde2b0d51c3726f07b9ad60b5ecaf6a6803ad79dd57ba8e032b0afc2445221e912d640b40a29c1fd621838fb3c956288f557b3dfc292be0381293d054f7be8ef87a79087f4b97dfb7b511b25f2bc1dbca96554b109de21a4046513239ce8e45d8620316944c274a7b6c2524993aa8457c6619be504a7e8fe549815dc73322260ca3e24d7574a167a76ef61aa1"]}, @generic="b85110971fdd7e091fccaa46e2b36ea686f2577cdea36c20018710187a36228d6cc56edc61b6f9b27d62dfdfe3dd39626b7e5ba57176264d840ac7fc760189c0f30c1bdee6216cfb1b30ad6c3a9f73f1c022a8b5db5963d044dc9bf40610c6ae951ef06f78ee7c", @generic="60b717ae1b7d2bfdb6ef5079120d776d86594f73924c45b89cf29abb6e72fea2a430c4c5d499b7b4bc7a2100aeb2c02e5f1ae3e21e291967e53f02b0ed91a1d150a5365815b23a7d839aa7310c29956f62c7cbfaac00b1a1c2566ae3a1cdb800859c31df4c9a7502ba53b8775a9bc3987aa6ec6dffe19613616fa5160906b3cec0ff7d97df5171806e9ecd181102a4ed67c0e73868", @nested={0x1288, 0x27, 0x0, 0x1, [@typed={0x1004, 0x1f, 0x0, 0x0, @binary="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"}, @generic="865adf0db654205bce790ca6dc3d814ebba6317dd324b5c2238e9aa1424dd233ab373b78eb2ef97f9bc31cd33f3fb4b522da67f3d1d93fbbd5f9347d9868bd70e32eab39a0ee4dfb5a11f313990567f232879243a182a0fc88203d6413e579dce3fe7d6f408ee81de986f73f895c28cff2662297fa30e7af0bd2380928b81781c4db7fb9d3bc6cc2b5537da78874b796e35bdb8636a9fca3d23f62fe6f9acd2708e74ee3560ac96a7bbbfafc76b7241feb5e14fd5a825b", @generic="fa9768157bae82714fe6e9e450c5537785b569cf2bead87e12539da6fd419e8b7d238d3f59ff0b1294cf1a046937c57e52c2b92fa4048b867903ab947142fbdab65185e61a0a21bc5cf57caebaec49cde2af98728e9b7ce0462d183b6ea500e8af223646420039c32edfb891f4cfe97710a8818c7412a45f2ddd19840d", @typed={0x6, 0x117, 0x0, 0x0, @str='%\x00'}, @generic="b60826157bafad9779016bf2730d17f7014019b80cf130cf8a0b1c13328a5af3e924d6d7ad970daff4187ffd2e73f0541197fe88f1b3553b75e887ca011227853e18073bf622b151cce38a04acff3d6eb5e3c903540bbfd8f056763291d038e17a3c3b443c8753765ece33f608508e233dc398b4c78340940606995ca975739fda65eba82240f56fdcf8f9222cb854c8e87fac57585376", @generic="6cf48ee67a0a90ea2e917c2bbf3a37", @generic="2430e8d05b281fcef945050ada1f68b9c7e7cc02fe2cae89c2c267f8c03cf7421ac79abe629d150be91c65ccde76ebd7452d08e9dc839b395cd4db6fca3f54d3b8f10c2bff4483b82f41cca754b1aa0da2d00eaa0425cfd3a3a2c49a81832105d9a157ffe474a9de9cd58ebb4ecd22c7c0ed1abed33ec16874b222ada2aec1de37c125fb3537f70983e5d3869a2311fe98f290c493504bb3aacc1a490c4e"]}, @typed={0xa, 0x24, 0x0, 0x0, @str='-\x85\'#&\x00'}, @nested={0x8, 0x5f, 0x0, 0x1, [@nested={0x4, 0x3b}]}, @typed={0x11, 0x130, 0x0, 0x0, @str='team_slave_0\x00'}, @nested={0x101c, 0xaa, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @uid=r6}, @typed={0x8, 0x1e, 0x0, 0x0, @fd}, @generic="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", @typed={0x6, 0xd3e, 0x0, 0x0, @str=':\x00'}]}, @typed={0x8, 0x117, 0x0, 0x0, @pid=r1}]}, 0x35b0}, {&(0x7f0000003d40)={0x15c, 0x3c, 0x400, 0x70bd2a, 0x25dfdbfc, "", [@generic="6a9fe9e8d37ba1b29a56c601340ee049d4c22a80f668ae74c2f013e4372f0466ac0bc8b5198e0d2f7e5470af19f577251d6c0c59a2836a28a514ed0254b8f08a5a7d6b6bdd4cdb7cbc1369f0a62bb836c68b7dc424cbb1b5e183df49642e91149b26bbca1e5b19e953cf92eb724a4fbe3394f2dc88ba875e3c8bfb30819da2b1bf3754b0c2a36782cf95155a3942dc2c68455b20e4993be9575498bfc9f71fb45d9e9e241a5e9768aaa31546938fad", @typed={0x8, 0xac, 0x0, 0x0, @ipv4=@remote}, @nested={0x91, 0x11d, 0x0, 0x1, [@nested={0x4, 0xd9}, @nested={0x4, 0x19}, @nested={0x4, 0xb2}, @typed={0x4, 0x28}, @generic="9bbfff5f00a4ea7359c6c3ec3b2455a2a860a0b2f40037304a4568d91a9ec277be4737bf583612a1863c3b2acca617a25a259b5918d0d8f55198c4a591590780a0412117d05b48b29441450ff9acec0ce965f47cb8482ca86958f264e143126f18bb4d388d1b5dce3a8dc9e469a3b7a282a1e97c0deee26236395c9a47"]}]}, 0x15c}, {&(0x7f0000003ec0)={0x1c, 0x2a, 0x400, 0x70bd25, 0x0, "", [@typed={0xa, 0x41, 0x0, 0x0, @str='\xff\xff\xff\xff\xff\xff'}]}, 0x1c}, {&(0x7f0000003f00)={0x26c, 0x34, 0x800, 0x70bd27, 0x25dfdbfe, "", [@nested={0x23d, 0xa, 0x0, 0x1, [@generic="7f2717fb741a7c217ea9e808a508690441d88ba859fc1eec9b921d09b2888ac41f68939cda22a4c75c423577598f314b20448dcbec0b851bc89408776dabec822347187149785b288401873df56e8aa8e5b5d52274f56d3b4502ce46a688d8743ab0837b7bf7ff6254617ec6e8a4e1c95e862acb06d74a9da0c5fdb3e5f068e435a258f7d616f448fc57d4f7db4db5bfb321b2111439c22a3d180f50f4", @nested={0x4, 0xa8}, @generic="e2452450603588f857fd7a0af0e38d2051f98bfab06f4f2f139f1fed8c5eea0aac97c39ca6ef0f0e1cd977452e26d84d5e27d48e02561751bd5cd52e2e174982118a12d0850cdcf8de73e0c8dc2e95fab81b248bb8f8e3244da06a6e1c4d74406469f9d60bc50501f6ac10cf53bffdaa122e64c6ed03402a2fe04019c5150c4fefbca7d6a2e85b871236b121b63474940d678ae407b5b2d1316ec911b4eaeb1583d54e13a56418c077d9573c98977bf109c1593b5f5f18a4a2094f8138c1163328bc83aaf33ca349", @nested={0x4, 0x119}, @generic="5f641e868accabc2bef76789e9ef0a450a8d95430aebd74d259342c0ad127a0f2d7dfa5972694a4c63b07953391c9a7c02668bb29ea9cd383b6f808d87d77d58e1d5ca1a6fcdd652a278ce6560f338e6bc58b4239057671a35c742fd107907ae1508ca5b546693a2fd61651743917845a4d9b83b396ac311914d82deacd1b94b4ee58603394acfddd7622279592a1070bf666e5638d910689d9f8e9894329c099d24ca0f4c350bef6a579902dc0def2b89df192014aa29d0338b6fa6f523599ab17200d5f0a09467", @nested={0x4, 0x96}]}, @nested={0x8, 0x110, 0x0, 0x1, [@nested={0x4, 0x50}]}, @nested={0x14, 0xa7, 0x0, 0x1, [@typed={0x8, 0x11, 0x0, 0x0, @u32=0xa6}, @nested={0x4, 0x72}, @typed={0x4, 0x58}]}]}, 0x26c}], 0x4, &(0x7f00000042c0)=[@cred={{0x18, 0x1, 0x2, {r1, r7, r8}}}, @rights={{0x1c, 0x1, 0x1, [r2, r0, r0, r9]}}], 0x34, 0x40001}, 0x40000) getpriority(0x1, r1) r10 = socket$inet_tcp(0x2, 0x1, 0x0) r11 = syz_genetlink_get_family_id$devlink(&(0x7f0000004380), r3) sendmsg$DEVLINK_CMD_PORT_SPLIT(r0, &(0x7f0000004600)={&(0x7f0000004340)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000045c0)={&(0x7f00000043c0)={0x1e4, r11, 0x4, 0x70bd2c, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x6}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x5}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x7}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0x9, 0x4}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x8}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x3}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0x9, 0x7}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x1}}, {0x8, 0x9, 0x8}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0x9, 0x4}}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x20000000}, 0x20008014) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000004680)={'vlan0\x00', &(0x7f0000004640)=@ethtool_rxfh={0x47, 0x9, 0x43, 0x4, 0x6, "f49fbb", 0x2, [0x9, 0x1, 0x2, 0x3, 0xb, 0x401, 0x623, 0x80000000]}}) r12 = open(&(0x7f00000046c0)='./file0\x00', 0x400, 0x10) sendmsg$unix(r12, &(0x7f0000004980)={&(0x7f0000004700)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000004900)=[{&(0x7f0000004780)="529c3560873fc15de35ac80b7bc43483f369c88945a1baaa646b5a57f789210cb1b28d5628d1cf7ebacd28412450be762433d8157703e2dba143d35c703d454d728f9a4dc4bd659845fe60e43e89802bcef838014dd83b6c1f1d7b79fea1a1be70a727986bb10c77ba93dca1729c25be61750a716aa0b69a9baf93e41b430ee2bf08f7ffb5abe482febca5c343ba3e27608bed3f725e48a70b94f3a7", 0x9c}, {&(0x7f0000004840)="a22292f2be12be590dfd1ed572854fb2b471bac481f374731b545f63b0e99c6674962e5d38972fc1e71b6746de628d567b2a0f9017ee5e304243b921619792fe70e46aee4734ff4167f22e8b892a82d017f85abd4c89c83bb4f6e0e7b4fdc4f5e6ac35b4dd3280295d0920f868db3a769dc2ebfc7456290f9e5ed87374e0694f9650fc4034e437012a00fbd105099a45b9dda523d1b0751a1cd228296d9eb47e0230fec04670e0adb581c637be94defa3952467aebc7ab7405", 0xb9}], 0x2, &(0x7f0000004940)=[@rights={{0x18, 0x1, 0x1, [r12, r2, r12]}}, @rights={{0x1c, 0x1, 0x1, [r2, r10, r12, r12]}}], 0x34, 0x40000}, 0x40800) getsockopt$inet_pktinfo(r10, 0x0, 0x8, &(0x7f00000049c0)={0x0, @broadcast, @remote}, &(0x7f0000004a00)=0xc) io_uring_register$IORING_UNREGISTER_EVENTFD(r12, 0x5, 0x0, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f0000004a40)={{{@in6=@private1, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@private}}, &(0x7f0000004b40)=0xe8) quotactl_fd$Q_SETQUOTA(r0, 0xffffffff80000802, r13, &(0x7f0000004b80)={0x7f, 0x8, 0x8, 0xfffffffffffffff4, 0x4, 0xffffffff, 0xffff, 0xbeb7, 0x8001}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r3, 0x8933, &(0x7f0000004c00)={'batadv_slave_0\x00'}) ioctl$TCSETSW2(r12, 0x402c542c, &(0x7f0000004c40)={0x74a7, 0xffffff00, 0x3, 0x61d6d552, 0x7, "8de8b7242a3b48ee1b05f45551b604b2addd10", 0x1, 0xffff}) 1h45m16.431292292s ago: executing program 1 (id=1259): r0 = socket$netlink(0x10, 0x3, 0x0) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x4000814) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000327b5705a2c872c250d000000080034fdff000000000000000900c6080000ce5f0500330000000000080039000100"], 0x3c}}, 0x2400c904) 1h45m15.259600479s ago: executing program 1 (id=1262): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r1, 0x5450, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) syz_open_procfs$userns(r2, &(0x7f0000000080)) 1h45m14.104562565s ago: executing program 1 (id=1263): pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x82000, 0x0) symlinkat(&(0x7f0000000300)='./file1/file0\x00', r1, &(0x7f0000000340)='./file1\x00') r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) r3 = openat$mice(0xffffff9c, &(0x7f0000000040), 0x1) close(r3) socket$nl_audit(0x10, 0x3, 0x9) getsockname$llc(r3, 0x0, &(0x7f0000000080)) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$kcm(0x10, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000140)={0x4, 0x8}, 0x10) sendto$unix(r5, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg$unix(r4, &(0x7f0000001900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}}], 0x7fffffffffffd12, 0x0, 0x0) write$USERIO_CMD_REGISTER(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) getsockname$inet6(r2, 0x0, &(0x7f00000003c0)) r7 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) inotify_init1(0x0) ioctl$BINDER_SET_MAX_THREADS(r7, 0x5451, 0x0) renameat(r1, &(0x7f0000000040)='./file1/file0\x00', 0xffffffffffffffff, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000800), 0x163281, 0x0) ioctl$IOMMU_IOAS_ALLOW_IOVAS(r2, 0x3b82, &(0x7f0000000400)={0x18, 0x0, 0x2, 0x0, &(0x7f0000000100)=[{0xb2b2, 0x8}, {0x0, 0xffffffffffffffff}]}) r10 = fcntl$dupfd(r9, 0x406, r8) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r10, 0x800455d1, 0x0) r11 = dup(r0) ioctl$sock_inet_tcp_SIOCATMARK(r11, 0x5452, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080)={0x153, 0x6, 0x7, 0x800, 0x9303, 0x7, 0x7, 0x1}, &(0x7f00000000c0)={0xffffffffffffffeb, 0x7, 0x80000000, 0x3000000, 0x4dc, 0x5, 0x3, 0x100000001}, &(0x7f00000001c0)={0x1ff, 0xfffffffffffffffb, 0x6, 0x6, 0x7, 0x7, 0x5, 0xe}, &(0x7f0000000240)={r12, r13+60000000}, &(0x7f0000000380)={&(0x7f00000002c0)={[0xfffffffb, 0xcd]}, 0x8}) 1h44m28.517225842s ago: executing program 33 (id=1263): pipe2$9p(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x82000, 0x0) symlinkat(&(0x7f0000000300)='./file1/file0\x00', r1, &(0x7f0000000340)='./file1\x00') r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) r3 = openat$mice(0xffffff9c, &(0x7f0000000040), 0x1) close(r3) socket$nl_audit(0x10, 0x3, 0x9) getsockname$llc(r3, 0x0, &(0x7f0000000080)) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$kcm(0x10, 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000140)={0x4, 0x8}, 0x10) sendto$unix(r5, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg$unix(r4, &(0x7f0000001900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}}], 0x7fffffffffffd12, 0x0, 0x0) write$USERIO_CMD_REGISTER(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)) getsockname$inet6(r2, 0x0, &(0x7f00000003c0)) r7 = openat$sw_sync_info(0xffffff9c, &(0x7f0000000240), 0x0, 0x0) inotify_init1(0x0) ioctl$BINDER_SET_MAX_THREADS(r7, 0x5451, 0x0) renameat(r1, &(0x7f0000000040)='./file1/file0\x00', 0xffffffffffffffff, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000800), 0x163281, 0x0) ioctl$IOMMU_IOAS_ALLOW_IOVAS(r2, 0x3b82, &(0x7f0000000400)={0x18, 0x0, 0x2, 0x0, &(0x7f0000000100)=[{0xb2b2, 0x8}, {0x0, 0xffffffffffffffff}]}) r10 = fcntl$dupfd(r9, 0x406, r8) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r10, 0x800455d1, 0x0) r11 = dup(r0) ioctl$sock_inet_tcp_SIOCATMARK(r11, 0x5452, &(0x7f0000000180)) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) pselect6(0x40, &(0x7f0000000080)={0x153, 0x6, 0x7, 0x800, 0x9303, 0x7, 0x7, 0x1}, &(0x7f00000000c0)={0xffffffffffffffeb, 0x7, 0x80000000, 0x3000000, 0x4dc, 0x5, 0x3, 0x100000001}, &(0x7f00000001c0)={0x1ff, 0xfffffffffffffffb, 0x6, 0x6, 0x7, 0x7, 0x5, 0xe}, &(0x7f0000000240)={r12, r13+60000000}, &(0x7f0000000380)={&(0x7f00000002c0)={[0xfffffffb, 0xcd]}, 0x8}) 29m51.8835434s ago: executing program 3 (id=4429): r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x3938700}}, &(0x7f0000000040)) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x7, 0x0, 0x4, 0x91, {{0x23, 0x4, 0x0, 0x31, 0x8c, 0x68, 0x0, 0x8, 0x2b, 0x0, @remote, @multicast1, {[@generic={0x83, 0x10, "edc52d594b63f0b75b5a0a88dbef"}, @rr={0x7, 0x23, 0x20, [@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @dev={0xac, 0x14, 0x14, 0x14}, @multicast1, @dev={0xac, 0x14, 0x14, 0x3e}, @broadcast, @broadcast, @dev={0xac, 0x14, 0x14, 0x3f}]}, @noop, @timestamp={0x44, 0xc, 0x58, 0x0, 0xf, [0x5, 0x400]}, @ra={0x94, 0x4}, @cipso={0x86, 0x14, 0x3, [{0x2, 0x9, "e254e2c3ea0c15"}, {0x6, 0x5, "9c15d3"}]}, @ssrr={0x89, 0x1f, 0xda, [@rand_addr=0x64010102, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2, @private=0xa010101]}]}}}}}) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000140)={'sit0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x7, 0x0, 0x4, 0x91, {{0x23, 0x4, 0x0, 0x31, 0x8c, 0x68, 0x0, 0x8, 0x2b, 0x0, @remote, @multicast1, {[@generic={0x83, 0x10, "edc52d594b63f0b75b5a0a88dbef"}, @rr={0x7, 0x23, 0x20, [@initdev={0xac, 0x1e, 0x1, 0x0}, @empty, @dev={0xac, 0x14, 0x14, 0x14}, @multicast1, @dev={0xac, 0x14, 0x14, 0x3e}, @broadcast, @broadcast, @dev={0xac, 0x14, 0x14, 0x3f}]}, @noop, @timestamp={0x44, 0xc, 0x58, 0x0, 0xf, [0x5, 0x400]}, @ra={0x94, 0x4}, @cipso={0x86, 0x14, 0x3, [{0x2, 0x9, "e254e2c3ea0c15"}, {0x6, 0x5, "9c15d3"}]}, @ssrr={0x89, 0x1f, 0xda, [@rand_addr=0x64010102, @remote, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, @broadcast, @multicast2, @private=0xa010101]}]}}}}}) bind$can_j1939(r1, &(0x7f0000000180)={0x1d, r2, 0x3, {0x0, 0x1, 0x4}, 0xfd}, 0x18) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) (async) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x4) getsockopt$SO_J1939_SEND_PRIO(r1, 0x6b, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) syz_open_dev$vcsa(&(0x7f00000002c0), 0x8748, 0x2ea802) (async) r3 = syz_open_dev$vcsa(&(0x7f00000002c0), 0x8748, 0x2ea802) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000300)={{0x2, 0x4e24, @loopback}, {0x1, @random="5b86a6c63f1f"}, 0x36, {0x2, 0x4e23, @remote}, 'vlan1\x00'}) (async) ioctl$sock_inet_SIOCDARP(r3, 0x8953, &(0x7f0000000300)={{0x2, 0x4e24, @loopback}, {0x1, @random="5b86a6c63f1f"}, 0x36, {0x2, 0x4e23, @remote}, 'vlan1\x00'}) r4 = accept$inet6(r3, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, &(0x7f00000003c0)=0x1c) r5 = openat$selinux_enforce(0xffffff9c, &(0x7f0000000400), 0x4a4500, 0x0) r6 = ioctl$TIOCGPTPEER(r5, 0x5441, 0xea) syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r3) (async) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), r3) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000540)={'ip6_vti0\x00', &(0x7f00000004c0)={'ip6_vti0\x00', r2, 0x2b, 0x8, 0x9, 0x60, 0x1, @remote, @dev={0xfe, 0x80, '\x00', 0x23}, 0x8, 0x80, 0x10, 0xc}}) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r3, &(0x7f0000000740)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000700)={&(0x7f0000000580)={0x144, r7, 0x300, 0x70bd2c, 0x25dfdbfb, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x90, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x68, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x144}}, 0x1c) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000780), 0x2, 0x0) (async) openat$cgroup_freezer_state(0xffffffffffffffff, &(0x7f0000000780), 0x2, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) (async) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r5, 0x6612) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) (async) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r9 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), r5) (async) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), r5) sendmsg$NL80211_CMD_GET_REG(r9, &(0x7f00000008c0)={&(0x7f00000007c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000880)={&(0x7f0000000840)={0x2c, r10, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'b\x00'}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0xb}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x40805}, 0x8000) ioctl$FS_IOC_MEASURE_VERITY(r6, 0xc0046686, &(0x7f0000000900)={0x0, 0x19, "ef6b72d9297071b32caf3631db7f448ef8f91bf2b9628afd95"}) ioctl$SNDRV_PCM_IOCTL_HWSYNC(0xffffffffffffffff, 0x4122, 0x0) r11 = openat$selinux_commit_pending_bools(0xffffff9c, &(0x7f0000000940), 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r11, 0x8982, &(0x7f0000000980)={0x8, 'veth1_virt_wifi\x00', {'wg1\x00'}}) ioctl$sock_inet_udp_SIOCOUTQ(r11, 0x5411, &(0x7f00000009c0)) close_range(r4, r3, 0x2) (async) close_range(r4, r3, 0x2) r12 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000a40), r11) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000a80)={'vxcan0\x00', 0x0}) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r5, &(0x7f0000000bc0)={&(0x7f0000000a00), 0xc, &(0x7f0000000b80)={&(0x7f0000000ac0)={0xa8, r12, 0x4, 0x70bd28, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x5}, @MPTCP_PM_ATTR_ADDR={0x38, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @remote}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r13}]}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0xe2}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x34, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x4}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xfd}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e20}]}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x4}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x1}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x46}]}, 0xa8}, 0x1, 0x0, 0x0, 0xc1}, 0x0) 29m48.914924357s ago: executing program 3 (id=4431): r0 = openat$dir(0xffffff9c, &(0x7f0000000000)='./file0\x00', 0x380202, 0xa0) r1 = add_key$fscrypt_provisioning(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, &(0x7f00000000c0)={0x2, 0x0, @auto=[0x31, 0x16]}, 0xa, 0xffffffffffffffff) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000100)={@desc={0x1, 0x0, @auto="8ee64cac40325f4c"}, 0x21, r1, '\x00', @c}) r2 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) r3 = add_key(&(0x7f0000000180)='rxrpc_s\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="53a709cc6bf5e01cd0c78cfc862ed430c05e91450af1ae5e0a27b496a5c246310e38c47351c5c1b44f048819fb27ce8d86e33a39ea5b3411", 0x38, r2) ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x2) add_key$fscrypt_provisioning(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)={0x2, 0x0, @b}, 0x48, r2) r4 = add_key(&(0x7f00000003c0)='trusted\x00', &(0x7f0000000400)={'syz', 0x0}, &(0x7f0000000440)="274b8e34e96d55ffa1364c38dbbcec17e8d3fbf03e9ef3b045480c92615ad1aab4500582d7daa3b6a3b6785b8ca2b69522fc36084d467762d3aa00182cdacb664906bd97e67d47f252c9971424042e6fb3268e0cb9d4f6707277", 0x5a, r3) keyctl$read(0xb, r4, &(0x7f00000004c0)=""/4096, 0x1000) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f00000014c0)={r3, 0x6e, 0x78}, &(0x7f0000001500)={'enc=', 'pkcs1', ' hash=', {'sha384-ce\x00'}}, &(0x7f0000001580)="7f473d71a05b5ac136dbbceaa173092311ecd60360e9e85153329e02d16bff1d7d60a410ed4ba75cd3111b79929e5624ccb4c4d25aab9a1c83798d42403d563a98009975b9d3332792d1c420ae0b2e71b780c4d2ea8f84584d8e56e4d3384dd5718cdf06b4c6ff149bceb30f0d23", &(0x7f0000001600)=""/120) keyctl$reject(0x13, r1, 0x5, 0x3, r4) keyctl$clear(0x7, r4) add_key(&(0x7f0000001680)='big_key\x00', &(0x7f00000016c0)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$user(&(0x7f0000001700), &(0x7f0000001740)={'syz', 0x0}, &(0x7f0000001780)="abec75403f8ea2fa796e708da1b122a4c30cd2d20881dcbcecdadb8648188f5c48ed765a7ccf892688b2ed0a31efaa56ce38c8425437b040f833164ff648b6147505ac2cddc83c9d62478d12c08ee5144a480cbcab677245461cf2fbc1117ec3f931ba2cc44ee6e164849f1a4682c52ba26b8f121900441a11421577b8638b0175bbbb4160b7e4ceaec4293c7ff22c89ef8a5d9a8bd9", 0x96, r2) r6 = add_key$fscrypt_provisioning(&(0x7f0000001840), &(0x7f0000001880)={'syz', 0x2}, &(0x7f00000018c0)={0x2, 0x0, @d}, 0x18, 0xfffffffffffffffa) keyctl$describe(0x6, r6, &(0x7f0000001900)=""/175, 0xaf) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f00000019c0)={r5, 0xd1, 0x61}, &(0x7f0000001a00)={'enc=', 'oaep', ' hash=', {'sha384-ce\x00'}}, &(0x7f0000001a80)="e8779f701d26df56a2dd82bf23848e8c1121fd8840cd823dc582d2dd6ac10e121347ab127e2c3fbab685ef12cf71acd342967d6c8b5c2087ebdc2b6cb2ef44c09a342b60e46fca144b6ea94cc2327a9fec30fbc4796112f542728a2fddfa7354beab102d2f4d9fe3ced4db5c2f628289ebd4b18fa3869b548ebd8a02d1529889c5109a207fa583dfb60b14173bf864b98529b44a1a8803ff2dd8c49091184f0cc243f0fa6cf87d98eb21799ce8328751f19d768780d52293c93c8e75168f2a46da0f815b49d20e9fe0d3f4c885525585bb", &(0x7f0000001b80)=""/97) pipe2$watch_queue(&(0x7f0000001c00)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) keyctl$read(0xb, r3, &(0x7f0000001c40)=""/16, 0x10) mmap$snddsp(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000000, 0x8010, r7, 0x6000) r8 = syz_open_dev$ndb(&(0x7f0000001c80), 0x0, 0x2a8800) ioctl$NBD_PRINT_DEBUG(r8, 0xab06) keyctl$join(0x1, &(0x7f0000001cc0)={'syz', 0x0}) keyctl$restrict_keyring(0x1d, r2, &(0x7f0000001d00)='ceph\x00', &(0x7f0000001d40)='fscrypt-provisioning\x00') keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f0000001d80)='syz') openat$mixer(0xffffff9c, &(0x7f0000001dc0), 0x82, 0x0) keyctl$join(0x1, &(0x7f0000001e00)={'syz', 0x0}) keyctl$read(0xb, r3, &(0x7f0000001e40), 0x0) pipe2$watch_queue(&(0x7f0000001e80), 0x80) keyctl$clear(0x7, 0x0) 29m46.119403913s ago: executing program 3 (id=4435): r0 = syz_init_net_socket$llc(0x1a, 0x3, 0x0) r1 = syz_open_dev$I2C(&(0x7f0000000000), 0xf8d54e94, 0x88100) close_range(r0, r1, 0x0) r2 = openat$binderfs_ctrl(0xffffff9c, &(0x7f0000000040)='./binderfs2/binder-control\x00', 0x1, 0x0) ioctl$BINDER_CTL_ADD(r2, 0xc1086201, &(0x7f0000000080)={'custom0\x00'}) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(0xffffffffffffffff, 0x80489439, &(0x7f00000001c0)) ioctl$F2FS_IOC_SET_PIN_FILE(r2, 0x4004f50d, &(0x7f0000000240)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r3, &(0x7f00000002c0)=""/72, 0x48, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000380)={0x6, &(0x7f0000000340)=[{0x4, 0x2, 0x40, 0x400}, {0xfffc, 0xa2, 0xa, 0x3}, {0x400, 0xcf, 0xa, 0xdf}, {0x1ff, 0x6, 0xfb, 0xfffffffe}, {0x6b9e, 0xe, 0x5, 0x8}, {0x1, 0x2, 0x7, 0x9}]}, 0x8) r5 = openat$nvme_fabrics(0xffffff9c, &(0x7f00000003c0), 0x220000, 0x0) ioctl$SNDRV_PCM_IOCTL_STATUS64(r5, 0x80804120, &(0x7f0000000400)) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000900)=0x0) getgroups(0x6, &(0x7f0000000940)=[0xee00, 0xffffffffffffffff, 0x0, 0xee00, 0xee01, 0xee00]) r8 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_lsm={0x1d, 0x1f, &(0x7f0000000980)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x800}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffd}, @exit, @ldst={0x0, 0x3, 0x6, 0x8, 0x3, 0xc, 0x1}, @call={0x85, 0x0, 0x0, 0x75}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x7fffffff}}, @map_fd={0x18, 0x2, 0x1, 0x0, r5}, @jmp={0x5, 0x0, 0xc, 0x9, 0x4, 0x50, 0x4}, @ldst={0x2, 0x0, 0x6, 0xb, 0x1, 0xfffffffffffffff8, 0x4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000a80)='syzkaller\x00', 0xe, 0x99, &(0x7f0000000ac0)=""/153, 0x41000, 0x20, '\x00', 0x0, 0x1b, r5, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000b80)={0x1, 0x10, 0x7, 0x4}, 0x10, 0x0, 0x0, 0x5, &(0x7f0000000bc0)=[r5, r5, r5, r5, r5, 0xffffffffffffffff, r5, r5], &(0x7f0000000c00)=[{0x5, 0x3, 0x7}, {0x1, 0x4, 0x10}, {0x5, 0x5, 0x8, 0x4}, {0x3, 0x2, 0xc, 0x8}, {0x3, 0x3, 0xb, 0x1}], 0x10, 0x81}, 0x94) r9 = gettid() ioctl$DRM_IOCTL_GET_CLIENT(r5, 0xc0186405, &(0x7f0000000d40)={0x7ff, 0xfffff001, {0xffffffffffffffff}, {0xffffffffffffffff}, 0x1, 0x7ff}) fstat(r1, &(0x7f0000000d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = syz_open_dev$sndctrl(&(0x7f0000000e00), 0x2, 0x458080) r13 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000e80)={0x7, &(0x7f0000000e40)=[{0x7, 0x55, 0x8, 0xffff}, {0x8000, 0x1, 0x0, 0x6}, {0x3, 0x9, 0x9, 0x7}, {0x2, 0x1, 0xfe}, {0x8, 0x2, 0x5, 0x9}, {0x5, 0x8, 0x4, 0xcd}, {0x3, 0x8, 0x6, 0x10}]}) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000ec0)={'\x00', 0xfeff, 0x5, 0x3, 0x5, 0x2, 0x0}) fstat(r2, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0}) read$FUSE(r5, &(0x7f0000000fc0)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) sendmsg$unix(r4, &(0x7f0000003100)={&(0x7f0000000480)=@abs={0x1, 0x0, 0x4e22}, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000500)="dc4e3b77065623f1fdd4ea1c50347af866dbc571ca385f868b94738c7a4d00e4bcdc951b61604f447b90171dcc5cf4467328fe59745e968d0036237b8444fe50fe3544d77bc03d6e5a976a25fb10b5900fe61939cafe7e8f2e333f4edc08b0e43570e406f0a4", 0x66}, {&(0x7f0000000580)="17d86d8ddef016b5911bc9fb9c6178fb6f25e6a946950d15b6b654f2753088be870f12c54986177669fd161ed83f712e37aa7b9852d751ec94316fc22318affa933d335357c47a3ffa02eed154f0d5ce89ad8eb163396097fc385f8a64d64857b7dba65236d0d6cebd404a81adb17be22088bb501ef560a5bd4f5e6547d29efc52d7b7a64ba1c0acf8b9a582d147ce8ef43d6ed4a4f31d1319aaa819ac008ac0f7f1f7342920aa5a71cd509698f2c7644c8390e2abd6736fad7af5eca3ce026d7b0c7a68a9dc7aa7c9af436224859d4fa0", 0xd1}, {&(0x7f0000000680)="8049cb9ac1bd76a01ac9374f3d651965f12603989cac212f2bd5444222f83da15ab49c5738dbcfc14df22d49122e64452a8d267d83cdb0a194d296da915c53964c687e5158fd0ac5d5ba3f94441da843c360f74e95c85808a4a3d88cc5e1443cf7bf1780c35d7abbced8f8dad8d7716d73a5dd", 0x73}, {&(0x7f0000000700)="9ed17b20acd95b9fcfab3c40a36a8c902b3294c7afa02a38f1bdf1b7278376bdd41700eefd35c45a5bf333363419cfb66862d955f6a1e175c7ecc476740786b62120a55d1af8703101aa5735a58934af298d67fb91c044f65116ec", 0x5b}, {&(0x7f0000000780)="1c76a1728bd3e5abaa41ba780af0ee04d443641d5ceab1c6300ad6d79522c61b9463c071b4ccaac62f30fe6c4a5e62d54302efc5c8c18ac23a1368c7f5ad139ed0caaa7a6e0d6e8a308092aa5d580251d313b277521dd3182c3e48721b521a781caaa50821d47dc1bc9fa9b2460f4a02139f2e11f1d84e26f1ae28af8b93dba750b272695b62ba76b7c0a2ec42145f2c936c43184513fe6ff7ebdd54f287cefd9afd2779395d062b1927b47a1e58db4ef5a54c42b8eff2c4b2c92cae9c52f53486568bc7940dc31ec611e13753feccdd39caaf4a4888ac8445d61fa47a4a", 0xde}, {&(0x7f0000000880)="e5d440a24b832e4b5c0d1ac416620838f57945385457ae", 0x17}], 0x6, &(0x7f0000003000)=[@cred={{0x18, 0x1, 0x2, {r6, 0xee01, r7}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, r8, r1, r0, r3, r5, r3]}}, @rights={{0x10, 0x1, 0x1, [r1]}}, @rights={{0x14, 0x1, 0x1, [r3, r4]}}, @rights={{0x1c, 0x1, 0x1, [r2, r1, r0, r0]}}, @cred={{0x18, 0x1, 0x2, {r9, r10, r11}}}, @rights={{0x18, 0x1, 0x1, [r12, r3, r13]}}, @cred={{0x18, 0x1, 0x2, {r14, r15, r16}}}], 0xc8}, 0x80) ioctl$XFS_IOC_FSGEOMETRY_V1(r1, 0x80705864, &(0x7f0000003140)) fcntl$lock(r13, 0x0, &(0x7f00000031c0)={0x2, 0x0, 0x1, 0x9, r9}) ioctl$DRM_IOCTL_GEM_FLINK(r5, 0xc008640a, &(0x7f0000003200)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_OPEN(r5, 0xc010640b, &(0x7f0000003240)={r17}) r18 = shmget$private(0x0, 0x3000, 0x40, &(0x7f0000ffc000/0x3000)=nil) shmat(r18, &(0x7f0000ffc000/0x2000)=nil, 0x1000) 29m40.783975307s ago: executing program 3 (id=4439): open(&(0x7f0000000100)='./file0\x00', 0x80ff, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) fcntl$setsig(r0, 0xa, 0x21) fcntl$setlease(r0, 0x400, 0x0) acct(&(0x7f0000000040)='./file0\x00') close_range(r0, 0xffffffffffffffff, 0x0) mq_open(&(0x7f0000001180)='$-.$[}+*:^{]\x00QQP\x80\x10\x11J\x0e\xcd3`\xde/\xb7\xb5\xb0aU\x8co\\\x89\xc5\x01f]\xf2\xcaAL\x8b\xe9\xcf\xd2~\x95\x81\xfaT`\x9f\x96!\x10\v\x93-\x8dI\xf9\nB\x82\xd7\xf5\x83>\xd4\x1b1\xc0\xab\x82\xb3\xc6\xbe\xc6[%\xd09\'/Z!\xf2\xe7y\vl\xc0\xce\xa9\xbd=&\x04\xa2a\xa53\xc3\x83G\xfc\xe51\xe7?\xb0\r\xf8\x11\x9f\xc3v\xc5\xeb\xfaj\xe2\xa4$\xf4\n[9\xf2\xfaM\x1f+\xb4w\xc7s$\x15\xc2\xc7`p\xe6\xd5\xcc\x90\xb5\xf0\xed`\xfeR\xd9`\xa2\xb3\r\xf1\xec#\x85u^&\t\xf7\xe1 \tkq\x16\xb4\xd6kXY\x184\xdc\xc9Z7\x95\xcc\x9b#\fD\xff\xc6iK\xe5\xcc\xf8\xd0\x97\xfec\xfe\\\xfb\x00\x8f\xc6\xfao\xd4NW\xee\xae', 0x800, 0x4a, &(0x7f0000000040)={0x79c, 0xe, 0x8, 0x2}) 29m38.866161054s ago: executing program 3 (id=4440): mq_open(0x0, 0x800, 0x3bf2d30dd33d1679, &(0x7f0000000080)={0x5e, 0x7e77, 0x1000100, 0x2}) 29m37.675539274s ago: executing program 3 (id=4442): capset(0x0, &(0x7f0000000040)={0x200000, 0x200003, 0x0, 0x0, 0x3}) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000000), &(0x7f00000000c0)=0x8) getsockopt$inet_tcp_buf(r0, 0x6, 0x23, &(0x7f0000000080)=""/36, &(0x7f0000000040)=0x24) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000400)={@private2={0xfc, 0x2, '\x00', 0x1}, @multicast2, 0x10, 0x17}}) r2 = openat$mice(0xffffff9c, &(0x7f0000000040), 0x0) close(r2) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x0) close(r3) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001c00)={&(0x7f0000000fc0)={0x14, 0x0, 0x1, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x20000080) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000480)={'veth0_to_hsr\x00'}) mlock(&(0x7f0000000000/0x2000)=nil, 0x2000) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/232, 0xe8, 0x0, &(0x7f0000000280)=""/165, 0xa5}, &(0x7f0000000340)=0x40) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$SOCK_DESTROY(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)={0x14, 0x15, 0x800, 0x70bd26, 0x25dfdbfe, {0x23, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x800) 28m52.628699635s ago: executing program 34 (id=4442): capset(0x0, &(0x7f0000000040)={0x200000, 0x200003, 0x0, 0x0, 0x3}) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IP_SET_OP_VERSION(r0, 0x1, 0x53, &(0x7f0000000000), &(0x7f00000000c0)=0x8) getsockopt$inet_tcp_buf(r0, 0x6, 0x23, &(0x7f0000000080)=""/36, &(0x7f0000000040)=0x24) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r1, 0x89f9, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000400)={@private2={0xfc, 0x2, '\x00', 0x1}, @multicast2, 0x10, 0x17}}) r2 = openat$mice(0xffffff9c, &(0x7f0000000040), 0x0) close(r2) r3 = creat(&(0x7f0000000000)='./file1\x00', 0x0) close(r3) sendmsg$TEAM_CMD_PORT_LIST_GET(r3, &(0x7f0000001c40)={0x0, 0x0, &(0x7f0000001c00)={&(0x7f0000000fc0)={0x14, 0x0, 0x1, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x20000080) ioctl$sock_inet_SIOCGIFPFLAGS(r3, 0x8935, &(0x7f0000000480)={'veth0_to_hsr\x00'}) mlock(&(0x7f0000000000/0x2000)=nil, 0x2000) r4 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r4, 0x6, 0x23, &(0x7f0000000100)={&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/232, 0xe8, 0x0, &(0x7f0000000280)=""/165, 0xa5}, &(0x7f0000000340)=0x40) socket$nl_audit(0x10, 0x3, 0x9) sendmsg$SOCK_DESTROY(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000140)={0x14, 0x15, 0x800, 0x70bd26, 0x25dfdbfe, {0x23, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x800) 1m20.522599351s ago: executing program 2 (id=5982): mprotect(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000300)='pim6reg1\x00', 0x10) 1m20.305838926s ago: executing program 2 (id=5983): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'syztnl0\x00', 0x0, 0x29, 0x5, 0x8, 0xc, 0x21, @ipv4={'\x00', '\xff\xff', @empty}, @mcast2, 0x80, 0x8, 0x3, 0x1}}) 37.426310719s ago: executing program 2 (id=5984): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0x7101}) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xc, 0xf}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8001}, 0x20008850) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000003c0)={'syzkaller0\x00', 0x0}) r6 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)=@getchain={0x24, 0x66, 0x903, 0x70bd2e, 0x25dfdc03, {0x0, 0x0, 0x0, r5, {0xffe0, 0xb}, {0x8, 0xfff1}, {0x6, 0xfff2}}}, 0x24}, 0x1, 0x0, 0x0, 0x8848}, 0x8000) 37.065501173s ago: executing program 2 (id=5987): setuid(0xee00) r0 = socket$inet6(0xa, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000340)=0x80000001, 0x4) 36.485024851s ago: executing program 2 (id=5990): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4000, @remote}, 0x10) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x29, 0x0, &(0x7f0000000100)) 36.299626884s ago: executing program 2 (id=5991): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4000, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) 1.617516704s ago: executing program 4 (id=6037): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r0, 0x0, 0x0) 1.36328547s ago: executing program 4 (id=6038): r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'veth0\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@ipv4_deladdr={0x2c, 0x15, 0x1, 0xfffffffd, 0x8000000, {0x2, 0x1f, 0x0, 0x0, r1}, [@IFA_LABEL={0x14, 0x3, 'xfrm0\x00'}]}, 0x2c}, 0x1, 0x0, 0x0, 0x810}, 0x0) 1.183427532s ago: executing program 4 (id=6039): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x1, 0x10, &(0x7f0000000140)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@call={0x85, 0x0, 0x0, 0x9d}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 730.929252ms ago: executing program 4 (id=6040): r0 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r0, &(0x7f0000000040)={0xa, 0x0, 0xf, @remote}, 0x20) 330.704119ms ago: executing program 4 (id=6041): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0xc, &(0x7f00000000c0)=ANY=[@ANYBLOB="18020000020000000000000000000004850000008700000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000380)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 0s ago: executing program 4 (id=6042): socket$key(0xf, 0x3, 0x2) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$TIOCSERGETLSR(0xffffffffffffffff, 0x5459, 0x0) socket$inet_icmp(0x2, 0x2, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001180)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) kernel console output (not intermixed with test programs): audit: type=1400 audit(6794.370:81131): avc: denied { execmem } for pid=24466 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6794.506229][ T28] audit: type=1400 audit(6794.410:81132): avc: denied { read } for pid=24467 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6794.528524][ T28] audit: type=1400 audit(6794.430:81133): avc: denied { open } for pid=24467 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6794.541488][ T28] audit: type=1400 audit(6794.450:81134): avc: denied { mounton } for pid=24467 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 6794.693303][ T28] audit: type=1400 audit(6794.600:81135): avc: denied { module_request } for pid=24467 comm="syz-executor" kmod="netdev-nr4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6794.792787][T18705] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6794.940497][T18705] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6795.003207][T18705] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6795.016080][ T28] audit: type=1400 audit(6794.920:81136): avc: denied { sys_module } for pid=24467 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 6795.016299][ T28] audit: type=1400 audit(6794.920:81137): avc: denied { module_request } for pid=24467 comm="syz-executor" kmod="nr4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6795.105566][T18705] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 6796.521534][T18705] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 6796.779485][T18705] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 6796.785583][T18705] bond0 (unregistering): Released all slaves [ 6796.919436][T18705] hsr_slave_0: left promiscuous mode [ 6796.921528][T18705] hsr_slave_1: left promiscuous mode [ 6796.972736][T18705] veth1_macvtap: left promiscuous mode [ 6796.973135][T18705] veth0_macvtap: left promiscuous mode [ 6796.973319][T18705] veth1_vlan: left promiscuous mode [ 6796.973410][T18705] veth0_vlan: left promiscuous mode [ 6799.395462][ T28] kauditd_printk_skb: 100 callbacks suppressed [ 6799.396034][ T28] audit: type=1400 audit(6799.300:81238): avc: denied { search } for pid=24490 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6799.410087][ T28] audit: type=1400 audit(6799.310:81239): avc: denied { module_request } for pid=24467 comm="syz-executor" kmod="rtnl-link-team" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6799.549117][ T28] audit: type=1400 audit(6799.450:81240): avc: denied { module_request } for pid=24467 comm="syz-executor" kmod="rtnl-link-nicvf" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6799.744898][ T28] audit: type=1400 audit(6799.650:81241): avc: denied { module_request } for pid=24467 comm="syz-executor" kmod="rtnl-link-caif" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6799.963882][ T28] audit: type=1400 audit(6799.870:81242): avc: denied { module_request } for pid=24467 comm="syz-executor" kmod="rtnl-link-batadv" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6800.059010][ T28] audit: type=1400 audit(6799.960:81243): avc: denied { write } for pid=24545 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6800.059444][ T28] audit: type=1400 audit(6799.960:81244): avc: denied { write open } for pid=24545 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6800.252281][ T28] audit: type=1400 audit(6800.150:81245): avc: denied { write } for pid=24547 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6800.254492][ T28] audit: type=1400 audit(6800.160:81246): avc: denied { open } for pid=24547 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6800.268745][ T28] audit: type=1400 audit(6800.170:81247): avc: denied { search } for pid=24547 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6801.592602][T24467] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 6801.607519][T24467] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 6803.556273][T24467] hsr_slave_0: entered promiscuous mode [ 6803.566532][T24467] hsr_slave_1: entered promiscuous mode [ 6803.572457][T24467] debugfs: 'hsr0' already exists in 'hsr' [ 6803.572854][T24467] Cannot create hsr debugfs directory [ 6804.475052][ T28] kauditd_printk_skb: 307 callbacks suppressed [ 6804.475668][ T28] audit: type=1400 audit(6804.380:81555): avc: denied { write } for pid=24725 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6804.476009][ T28] audit: type=1400 audit(6804.380:81556): avc: denied { write open } for pid=24725 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6804.692400][ T28] audit: type=1400 audit(6804.600:81557): avc: denied { create } for pid=24467 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6804.702588][ T28] audit: type=1400 audit(6804.610:81558): avc: denied { write } for pid=24467 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6804.704871][ T28] audit: type=1400 audit(6804.610:81559): avc: denied { read } for pid=24467 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6804.709770][ T28] audit: type=1400 audit(6804.610:81560): avc: denied { write } for pid=24467 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6804.720899][T24467] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 6804.754493][T24467] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 6804.787060][T24467] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 6804.811720][T24467] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 6804.848865][ T28] audit: type=1400 audit(6804.740:81561): avc: denied { create } for pid=24467 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6804.849279][ T28] audit: type=1400 audit(6804.740:81562): avc: denied { write } for pid=24467 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6804.849671][ T28] audit: type=1400 audit(6804.740:81563): avc: denied { write } for pid=24769 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6804.849905][ T28] audit: type=1400 audit(6804.740:81564): avc: denied { read } for pid=24467 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6806.621110][T24467] 8021q: adding VLAN 0 to HW filter on device bond0 [ 6807.381233][T24816] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6807.383916][T24816] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6809.478963][ T28] kauditd_printk_skb: 366 callbacks suppressed [ 6809.479443][ T28] audit: type=1400 audit(6809.390:81931): avc: denied { search } for pid=24832 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6809.519058][ T28] audit: type=1400 audit(6809.420:81932): avc: denied { search } for pid=24834 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6809.522975][ T28] audit: type=1400 audit(6809.430:81933): avc: denied { search } for pid=24834 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6809.524932][ T28] audit: type=1400 audit(6809.430:81934): avc: denied { search } for pid=24834 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6809.526344][ T28] audit: type=1400 audit(6809.430:81935): avc: denied { read open } for pid=24834 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6809.529451][ T28] audit: type=1400 audit(6809.430:81936): avc: denied { getattr } for pid=24834 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6809.537014][ T28] audit: type=1400 audit(6809.440:81937): avc: denied { search } for pid=24834 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6809.538880][ T28] audit: type=1400 audit(6809.440:81938): avc: denied { search } for pid=24834 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6809.539430][ T28] audit: type=1400 audit(6809.450:81939): avc: denied { search } for pid=24834 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6809.539947][ T28] audit: type=1400 audit(6809.450:81940): avc: denied { search } for pid=24834 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6814.577011][ T28] kauditd_printk_skb: 570 callbacks suppressed [ 6814.577491][ T28] audit: type=1400 audit(6814.480:82511): avc: denied { search } for pid=24876 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6814.595755][ T28] audit: type=1400 audit(6814.500:82512): avc: denied { read } for pid=24876 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6814.596078][ T28] audit: type=1400 audit(6814.500:82513): avc: denied { read open } for pid=24876 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6814.602084][ T28] audit: type=1400 audit(6814.510:82514): avc: denied { search } for pid=24876 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6814.602480][ T28] audit: type=1400 audit(6814.510:82515): avc: denied { search } for pid=24876 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6814.602700][ T28] audit: type=1400 audit(6814.510:82516): avc: denied { search } for pid=24876 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6814.602898][ T28] audit: type=1400 audit(6814.510:82517): avc: denied { read } for pid=24876 comm="cmp" name="resolv.conf.eth14.dhcp" dev="tmpfs" ino=93 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6814.603132][ T28] audit: type=1400 audit(6814.510:82518): avc: denied { open } for pid=24876 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth14.dhcp" dev="tmpfs" ino=93 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6814.610966][ T28] audit: type=1400 audit(6814.510:82519): avc: denied { getattr } for pid=24876 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6814.686231][ T28] audit: type=1400 audit(6814.590:82520): avc: denied { module_request } for pid=24467 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6816.292229][T24467] veth0_vlan: entered promiscuous mode [ 6816.345754][T24467] veth1_vlan: entered promiscuous mode [ 6816.515819][T24467] veth0_macvtap: entered promiscuous mode [ 6816.550934][T24467] veth1_macvtap: entered promiscuous mode [ 6816.690655][T22289] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 6816.690968][T22289] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 6816.691146][T22289] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 6816.691280][T22289] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 6819.811432][ T28] kauditd_printk_skb: 388 callbacks suppressed [ 6819.811856][ T28] audit: type=1400 audit(6819.720:82909): avc: denied { search } for pid=24905 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6819.812165][ T28] audit: type=1400 audit(6819.720:82910): avc: denied { read } for pid=24905 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6819.812293][ T28] audit: type=1400 audit(6819.720:82911): avc: denied { open } for pid=24905 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6819.828496][ T28] audit: type=1400 audit(6819.730:82912): avc: denied { search } for pid=24905 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6819.833052][ T28] audit: type=1400 audit(6819.740:82913): avc: denied { search } for pid=24905 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6819.833586][ T28] audit: type=1400 audit(6819.740:82914): avc: denied { search } for pid=24905 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6819.840025][ T28] audit: type=1400 audit(6819.740:82915): avc: denied { read } for pid=24905 comm="cmp" name="resolv.conf.eth13.link" dev="tmpfs" ino=97 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6819.848359][ T28] audit: type=1400 audit(6819.740:82916): avc: denied { open } for pid=24905 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth13.link" dev="tmpfs" ino=97 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6819.851459][ T28] audit: type=1400 audit(6819.750:82917): avc: denied { getattr } for pid=24905 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 6820.222063][ T28] audit: type=1400 audit(6820.130:82918): avc: denied { search } for pid=24907 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6829.336897][ T28] kauditd_printk_skb: 39 callbacks suppressed [ 6829.337342][ T28] audit: type=1400 audit(6829.240:82958): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6829.360083][ T28] audit: type=1400 audit(6829.270:82959): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6829.385002][ T28] audit: type=1400 audit(6829.290:82960): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6829.385255][ T28] audit: type=1400 audit(6829.290:82961): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6829.385509][ T28] audit: type=1400 audit(6829.290:82962): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6829.403976][ T28] audit: type=1400 audit(6829.310:82963): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6829.411527][ T28] audit: type=1400 audit(6829.320:82964): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6829.412902][ T28] audit: type=1400 audit(6829.320:82965): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6829.482530][ T28] audit: type=1400 audit(6829.390:82966): avc: denied { read write } for pid=24916 comm="syz.4.5730" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6829.486894][ T28] audit: type=1400 audit(6829.390:82967): avc: denied { open } for pid=24916 comm="syz.4.5730" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6829.497067][T24917] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6829.509855][T24917] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6829.825190][T24924] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6829.830364][T24924] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6830.543786][T24939] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=24939 comm=syz.2.5738 [ 6843.229759][ T28] kauditd_printk_skb: 167 callbacks suppressed [ 6843.230067][ T28] audit: type=1400 audit(6843.140:83135): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6843.244933][ T28] audit: type=1400 audit(6843.150:83136): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6843.285787][ T28] audit: type=1400 audit(6843.190:83137): avc: denied { recv } for pid=0 comm="swapper/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6843.290759][ T28] audit: type=1400 audit(6843.190:83138): avc: denied { recv } for pid=0 comm="swapper/1" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6843.302060][ T28] audit: type=1400 audit(6843.190:83139): avc: denied { recv } for pid=0 comm="swapper/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6843.307425][ T28] audit: type=1400 audit(6843.200:83140): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6843.318782][ T28] audit: type=1400 audit(6843.220:83141): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6843.324402][ T28] audit: type=1400 audit(6843.220:83142): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6843.365514][ T28] audit: type=1400 audit(6843.270:83143): avc: denied { read } for pid=24962 comm="syz.2.5744" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 6843.373319][ T28] audit: type=1400 audit(6843.280:83144): avc: denied { open } for pid=24962 comm="syz.2.5744" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 6845.590852][T24972] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6845.596330][T24972] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6845.839446][T24976] netlink: 24 bytes leftover after parsing attributes in process `syz.4.5747'. [ 6846.474952][T24991] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6846.476056][T24991] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6848.298533][ T28] kauditd_printk_skb: 67 callbacks suppressed [ 6848.298932][ T28] audit: type=1400 audit(6848.200:83212): avc: denied { write } for pid=25000 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6848.321328][ T28] audit: type=1400 audit(6848.230:83213): avc: denied { open } for pid=25000 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6848.388698][ T28] audit: type=1400 audit(6848.290:83214): avc: denied { search } for pid=25000 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6848.389167][ T28] audit: type=1400 audit(6848.290:83215): avc: denied { search } for pid=25000 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6848.389512][ T28] audit: type=1400 audit(6848.290:83216): avc: denied { search } for pid=25000 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6848.389686][ T28] audit: type=1400 audit(6848.290:83217): avc: denied { search } for pid=25000 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6848.469654][ T28] audit: type=1400 audit(6848.360:83218): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6848.470653][ T28] audit: type=1400 audit(6848.360:83219): avc: denied { search } for pid=25003 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6848.470848][ T28] audit: type=1400 audit(6848.360:83220): avc: denied { search } for pid=25003 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6848.471011][ T28] audit: type=1400 audit(6848.360:83221): avc: denied { search } for pid=25003 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 6849.627585][T25007] Illegal XDP return value 4294967274 on prog (id 17) dev syz_tun, expect packet loss! [ 6858.118527][ T28] kauditd_printk_skb: 163 callbacks suppressed [ 6858.147543][ T28] audit: type=1400 audit(6858.020:83385): avc: denied { create } for pid=25015 comm="syz.4.5754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6858.178584][ T28] audit: type=1400 audit(6858.020:83386): avc: denied { write } for pid=25015 comm="syz.4.5754" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6864.786360][ T28] audit: type=1400 audit(6864.690:83387): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6864.790173][ T28] audit: type=1400 audit(6864.690:83388): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6864.794542][ T28] audit: type=1400 audit(6864.690:83389): avc: denied { recv } for pid=24034 comm="syz-executor" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6864.802467][ T28] audit: type=1400 audit(6864.700:83390): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6864.805003][ T28] audit: type=1400 audit(6864.700:83391): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6864.830482][ T28] audit: type=1400 audit(6864.720:83392): avc: denied { recv } for pid=12743 comm="kworker/u8:4" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6864.830971][ T28] audit: type=1400 audit(6864.730:83393): avc: denied { recv } for pid=12743 comm="kworker/u8:4" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6864.837749][ T28] audit: type=1400 audit(6864.740:83394): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6864.839649][ T28] audit: type=1400 audit(6864.740:83395): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6864.969778][ T28] audit: type=1400 audit(6864.870:83396): avc: denied { read write } for pid=25019 comm="syz.2.5755" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6864.986400][T25020] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6864.995812][T25020] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6865.373177][T25026] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6865.375593][T25026] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6871.717515][ T28] kauditd_printk_skb: 79 callbacks suppressed [ 6871.722039][ T28] audit: type=1400 audit(6871.620:83476): avc: denied { unmount } for pid=24467 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6871.724437][ T28] audit: type=1400 audit(6871.620:83477): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6871.746292][ T28] audit: type=1400 audit(6871.650:83478): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6871.778524][ T28] audit: type=1400 audit(6871.670:83479): avc: denied { recv } for pid=18705 comm="kworker/u8:7" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6871.778783][ T28] audit: type=1400 audit(6871.670:83480): avc: denied { recv } for pid=18705 comm="kworker/u8:7" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6871.778915][ T28] audit: type=1400 audit(6871.670:83481): avc: denied { recv } for pid=18705 comm="kworker/u8:7" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6871.779040][ T28] audit: type=1400 audit(6871.680:83482): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6871.779080][ T28] audit: type=1400 audit(6871.680:83483): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6871.795714][ T28] audit: type=1400 audit(6871.700:83484): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6871.797354][ T28] audit: type=1400 audit(6871.700:83485): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6873.465528][T25174] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6873.471389][T25174] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6876.773950][ T28] kauditd_printk_skb: 68 callbacks suppressed [ 6876.774536][ T28] audit: type=1400 audit(6876.680:83554): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6876.791033][ T28] audit: type=1400 audit(6876.700:83555): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6876.831810][ T28] audit: type=1400 audit(6876.740:83556): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6876.833236][ T28] audit: type=1400 audit(6876.740:83557): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6876.834676][ T28] audit: type=1400 audit(6876.740:83558): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6876.842281][ T28] audit: type=1400 audit(6876.750:83559): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6876.857159][ T28] audit: type=1400 audit(6876.760:83560): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6876.865974][ T28] audit: type=1400 audit(6876.760:83561): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6877.021206][ T28] audit: type=1400 audit(6876.910:83562): avc: denied { allowed } for pid=25190 comm="syz.4.5768" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6877.021618][ T28] audit: type=1400 audit(6876.920:83563): avc: denied { create } for pid=25190 comm="syz.4.5768" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6877.267298][T25193] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6877.272855][T25193] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6877.472122][T25197] netlink: 16 bytes leftover after parsing attributes in process `syz.4.5770'. [ 6881.316303][T18695] hid-generic 0109:607B:0009.0006: unknown main item tag 0x0 [ 6881.316654][T18695] hid-generic 0109:607B:0009.0006: unknown main item tag 0x0 [ 6881.316976][T18695] hid-generic 0109:607B:0009.0006: unknown main item tag 0x0 [ 6881.317122][T18695] hid-generic 0109:607B:0009.0006: unknown main item tag 0x0 [ 6881.317223][T18695] hid-generic 0109:607B:0009.0006: unknown main item tag 0x0 [ 6881.317317][T18695] hid-generic 0109:607B:0009.0006: unknown main item tag 0x0 [ 6881.317449][T18695] hid-generic 0109:607B:0009.0006: unknown main item tag 0x0 [ 6881.317544][T18695] hid-generic 0109:607B:0009.0006: unknown main item tag 0x0 [ 6881.338290][T18695] hid-generic 0109:607B:0009.0006: unknown main item tag 0x0 [ 6881.338647][T18695] hid-generic 0109:607B:0009.0006: unknown main item tag 0x0 [ 6881.354540][T18695] hid-generic 0109:607B:0009.0006: hidraw0: HID v4000.04 Device [syz1] on syz1 [ 6881.791075][ T28] kauditd_printk_skb: 140 callbacks suppressed [ 6881.791964][ T28] audit: type=1400 audit(6881.700:83704): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6881.792286][ T28] audit: type=1400 audit(6881.700:83705): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6881.792441][ T28] audit: type=1400 audit(6881.700:83706): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6881.814973][ T28] audit: type=1400 audit(6881.720:83707): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6881.822900][ T28] audit: type=1400 audit(6881.730:83708): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6881.823355][ T28] audit: type=1400 audit(6881.730:83709): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6881.873994][ T28] audit: type=1400 audit(6881.780:83710): avc: denied { create } for pid=25233 comm="syz.4.5780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6881.903103][ T28] audit: type=1400 audit(6881.800:83711): avc: denied { create } for pid=25233 comm="syz.4.5780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6881.905876][ T28] audit: type=1400 audit(6881.810:83712): avc: denied { write } for pid=25233 comm="syz.4.5780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6881.922687][ T28] audit: type=1400 audit(6881.820:83713): avc: denied { read } for pid=25233 comm="syz.4.5780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6884.016373][T25243] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6884.026193][T25243] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6884.955241][T25255] comedi comedi0: Minor 3 could not be opened [ 6886.006257][T25261] GUP no longer grows the stack in syz.4.5787 (25261): 20004000-20008000 (20002000) [ 6886.013070][T25261] CPU: 0 UID: 0 PID: 25261 Comm: syz.4.5787 Tainted: G L syzkaller #0 PREEMPT [ 6886.013234][T25261] Tainted: [L]=SOFTLOCKUP [ 6886.013303][T25261] Hardware name: ARM-Versatile Express [ 6886.013419][T25261] Call trace: [ 6886.013481][T25261] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 6886.013649][T25261] r7:60000013 r6:60000013 r5:822a4ebc r4:00000000 [ 6886.013676][T25261] [<80201af0>] (show_stack) from [<8021e454>] (dump_stack_lvl+0x5c/0x70) [ 6886.013908][T25261] [<8021e3f8>] (dump_stack_lvl) from [<8021e480>] (dump_stack+0x18/0x1c) [ 6886.013980][T25261] r7:ea6a9db0 r6:00000002 r5:20002000 r4:20002000 [ 6886.014008][T25261] [<8021e468>] (dump_stack) from [<804cfc08>] (gup_vma_lookup+0xbc/0xc0) [ 6886.014080][T25261] [<804cfb4c>] (gup_vma_lookup) from [<804d18b8>] (__get_user_pages+0x108/0x718) [ 6886.014138][T25261] r4:00050082 [ 6886.014187][T25261] [<804d17b0>] (__get_user_pages) from [<804d1fac>] (get_user_pages_remote+0xe4/0x5ac) [ 6886.014262][T25261] r10:ea6a9e20 r9:85db4c4c r8:00050082 r7:00000002 r6:85db4b40 r5:ea6a9db0 [ 6886.014286][T25261] r4:20002000 [ 6886.014305][T25261] [<804d1ec8>] (get_user_pages_remote) from [<804daae4>] (__access_remote_vm+0x264/0x450) [ 6886.014408][T25261] r10:00000ffe r9:82a7f518 r8:dde50578 r7:00000002 r6:82a7e000 r5:20002000 [ 6886.014487][T25261] r4:dde50578 [ 6886.014508][T25261] [<804da880>] (__access_remote_vm) from [<804e5468>] (access_remote_vm+0x1c/0x24) [ 6886.014583][T25261] r10:00000000 r9:20001002 r8:8dfbe000 r7:00001000 r6:858f3000 r5:20001b80 [ 6886.014638][T25261] r4:85db4b40 [ 6886.014691][T25261] [<804e544c>] (access_remote_vm) from [<806341b4>] (proc_pid_cmdline_read+0x26c/0x47c) [ 6886.014758][T25261] [<80633f48>] (proc_pid_cmdline_read) from [<80572520>] (vfs_readv+0x228/0x294) [ 6886.014829][T25261] r10:00000169 r9:00000001 r8:00000001 r7:ea6a9f88 r6:88532240 r5:80633f48 [ 6886.014852][T25261] r4:00000000 [ 6886.014870][T25261] [<805722f8>] (vfs_readv) from [<80572764>] (do_preadv+0x90/0xf0) [ 6886.014928][T25261] r9:84712400 r8:8020029c r7:20000d00 r6:00000001 r5:88532240 r4:88532241 [ 6886.014955][T25261] [<805726d4>] (do_preadv) from [<80574e98>] (sys_preadv+0x20/0x28) [ 6886.015035][T25261] r7:00000169 r6:003463b8 r5:00000000 r4:00000200 [ 6886.015058][T25261] [<80574e78>] (sys_preadv) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 6886.015106][T25261] Exception stack(0xea6a9fa8 to 0xea6a9ff0) [ 6886.015149][T25261] 9fa0: 00000200 00000000 00000003 20000d00 00000001 00000002 [ 6886.015186][T25261] 9fc0: 00000200 00000000 003463b8 00000169 00346378 00000000 00000001 76f2c0dc [ 6886.015216][T25261] 9fe0: 76f2be88 76f2be78 00018734 0012fc20 [ 6886.222489][T25263] netlink: 12 bytes leftover after parsing attributes in process `syz.4.5788'. [ 6886.602698][T25269] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6886.605712][T25269] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6886.798432][ T28] kauditd_printk_skb: 140 callbacks suppressed [ 6886.799586][ T28] audit: type=1400 audit(6886.700:83854): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6886.801986][ T28] audit: type=1400 audit(6886.710:83855): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6886.879307][ T28] audit: type=1400 audit(6886.780:83856): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6886.881598][ T28] audit: type=1400 audit(6886.790:83857): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6886.909143][ T28] audit: type=1400 audit(6886.790:83858): avc: denied { recv } for pid=25249 comm="syz.2.5785" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6886.909582][ T28] audit: type=1400 audit(6886.800:83859): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6886.909918][ T28] audit: type=1400 audit(6886.810:83860): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6887.038657][ T28] audit: type=1400 audit(6886.940:83861): avc: denied { unmount } for pid=24034 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 6887.060659][ T28] audit: type=1400 audit(6886.970:83862): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6887.069231][ T28] audit: type=1400 audit(6886.970:83863): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6893.001293][ T28] kauditd_printk_skb: 70 callbacks suppressed [ 6893.001711][ T28] audit: type=1400 audit(6892.910:83934): avc: denied { map_create } for pid=25292 comm="syz.2.5801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6893.004026][ T28] audit: type=1400 audit(6892.910:83935): avc: denied { read } for pid=25274 comm="syz.4.5793" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6893.005353][ T28] audit: type=1400 audit(6892.910:83936): avc: denied { open } for pid=25274 comm="syz.4.5793" path="net:[4026532655]" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 6893.095950][ T28] audit: type=1400 audit(6892.910:83937): avc: denied { create } for pid=25274 comm="syz.4.5793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6893.151790][ T28] audit: type=1400 audit(6893.060:83938): avc: denied { map_create } for pid=25292 comm="syz.2.5801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6893.152214][ T28] audit: type=1400 audit(6893.060:83939): avc: denied { map_read map_write } for pid=25292 comm="syz.2.5801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6893.425530][ T28] audit: type=1400 audit(6893.330:83940): avc: denied { write } for pid=25274 comm="syz.4.5793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6893.444220][ T28] audit: type=1400 audit(6893.350:83941): avc: denied { prog_load } for pid=25292 comm="syz.2.5801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6893.453531][ T28] audit: type=1400 audit(6893.360:83942): avc: denied { bpf } for pid=25292 comm="syz.2.5801" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 6893.457428][ T28] audit: type=1400 audit(6893.360:83943): avc: denied { prog_load } for pid=25292 comm="syz.2.5801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 6906.863632][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 6906.868448][ T28] audit: type=1400 audit(6906.770:83947): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6906.870950][ T28] audit: type=1400 audit(6906.780:83948): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6906.913547][ T28] audit: type=1400 audit(6906.820:83949): avc: denied { recv } for pid=25274 comm="syz.4.5793" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6906.916401][ T28] audit: type=1400 audit(6906.820:83950): avc: denied { recv } for pid=25274 comm="syz.4.5793" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6906.924992][ T28] audit: type=1400 audit(6906.820:83951): avc: denied { recv } for pid=25274 comm="syz.4.5793" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6906.929959][ T28] audit: type=1400 audit(6906.830:83952): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6906.943921][ T28] audit: type=1400 audit(6906.850:83953): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6906.946597][ T28] audit: type=1400 audit(6906.850:83954): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6906.991923][T25299] netlink: 16 bytes leftover after parsing attributes in process `syz.2.5802'. [ 6906.996932][T25299] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5802'. [ 6907.028796][ T28] audit: type=1400 audit(6906.930:83955): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6907.044590][ T28] audit: type=1400 audit(6906.940:83956): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6912.059625][ T28] kauditd_printk_skb: 57 callbacks suppressed [ 6912.060611][ T28] audit: type=1400 audit(6911.970:84014): avc: denied { module_request } for pid=25313 comm="syz.2.5808" kmod="crypto-ccm(aes)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6912.766425][ T28] audit: type=1400 audit(6912.670:84015): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6912.769776][ T28] audit: type=1400 audit(6912.670:84016): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6912.779593][ T28] audit: type=1400 audit(6912.690:84017): avc: denied { recv } for pid=25302 comm="syz.4.5804" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6912.799328][ T28] audit: type=1400 audit(6912.690:84018): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6912.799798][ T28] audit: type=1400 audit(6912.690:84019): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6912.843919][ T28] audit: type=1400 audit(6912.740:84020): avc: denied { recv } for pid=25302 comm="syz.4.5804" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6912.876140][ T28] audit: type=1400 audit(6912.780:84021): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6912.883488][ T28] audit: type=1400 audit(6912.780:84022): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6913.149170][ T28] audit: type=1400 audit(6913.050:84023): avc: denied { read } for pid=25321 comm="syz.2.5809" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6914.104657][T25324] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6914.106653][T25324] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6914.439747][T25328] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6914.441405][T25328] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6922.741296][ T28] kauditd_printk_skb: 67 callbacks suppressed [ 6922.741808][ T28] audit: type=1400 audit(6922.640:84091): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6922.749810][ T28] audit: type=1400 audit(6922.650:84092): avc: denied { recv } for pid=25340 comm="syz.2.5814" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6922.782038][ T28] audit: type=1400 audit(6922.690:84093): avc: denied { recv } for pid=24467 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6922.783414][ T28] audit: type=1400 audit(6922.690:84094): avc: denied { recv } for pid=24467 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6922.787417][ T28] audit: type=1400 audit(6922.690:84095): avc: denied { recv } for pid=24467 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6922.799195][ T28] audit: type=1400 audit(6922.700:84096): avc: denied { recv } for pid=25340 comm="syz.2.5814" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6922.806489][ T28] audit: type=1400 audit(6922.710:84097): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6922.808505][ T28] audit: type=1400 audit(6922.710:84098): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6923.951300][ T28] audit: type=1400 audit(6923.860:84099): avc: denied { create } for pid=25344 comm="syz.4.5815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6923.981363][ T28] audit: type=1400 audit(6923.890:84100): avc: denied { read write } for pid=25344 comm="syz.4.5815" name="uinput" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6927.093140][T25351] bridge_slave_1: default FDB implementation only supports local addresses [ 6930.565245][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 6930.565561][ T28] audit: type=1400 audit(6930.470:84138): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6930.579960][ T28] audit: type=1400 audit(6930.490:84139): avc: denied { recv } for pid=25344 comm="syz.4.5815" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6930.621214][ T28] audit: type=1400 audit(6930.520:84140): avc: denied { recv } for pid=17532 comm="kworker/1:0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6930.621515][ T28] audit: type=1400 audit(6930.520:84141): avc: denied { recv } for pid=17532 comm="kworker/1:0" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6930.621596][ T28] audit: type=1400 audit(6930.520:84142): avc: denied { recv } for pid=17532 comm="kworker/1:0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6930.621632][ T28] audit: type=1400 audit(6930.530:84143): avc: denied { recv } for pid=25344 comm="syz.4.5815" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6930.636040][ T28] audit: type=1400 audit(6930.540:84144): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6930.639119][ T28] audit: type=1400 audit(6930.540:84145): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6930.976654][ T28] audit: type=1400 audit(6930.880:84146): avc: denied { read } for pid=25357 comm="syz.2.5819" name="rtc0" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6930.977078][ T28] audit: type=1400 audit(6930.880:84147): avc: denied { open } for pid=25357 comm="syz.2.5819" path="/dev/rtc0" dev="devtmpfs" ino=700 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6935.569519][ T28] kauditd_printk_skb: 68 callbacks suppressed [ 6935.570020][ T28] audit: type=1400 audit(6935.480:84216): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6935.617657][ T28] audit: type=1400 audit(6935.520:84217): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6935.618577][ T28] audit: type=1400 audit(6935.520:84218): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6935.618917][ T28] audit: type=1400 audit(6935.520:84219): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6935.631057][ T28] audit: type=1400 audit(6935.540:84220): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6935.639348][ T28] audit: type=1400 audit(6935.550:84221): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6935.641582][ T28] audit: type=1400 audit(6935.550:84222): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6935.708878][ T28] audit: type=1400 audit(6935.610:84223): avc: denied { read } for pid=25375 comm="syz.2.5826" name="sequencer" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6935.714638][ T28] audit: type=1400 audit(6935.620:84224): avc: denied { open } for pid=25375 comm="syz.2.5826" path="/dev/sequencer" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6935.744146][ T28] audit: type=1400 audit(6935.650:84225): avc: denied { execmem } for pid=25375 comm="syz.2.5826" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6938.567091][T25380] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6938.573847][T25380] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6951.210239][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 6951.210554][ T28] audit: type=1400 audit(6951.120:84256): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6951.231503][ T28] audit: type=1400 audit(6951.130:84257): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6951.264876][ T28] audit: type=1400 audit(6951.170:84258): avc: denied { recv } for pid=25383 comm="syz.4.5828" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6951.269280][ T28] audit: type=1400 audit(6951.170:84259): avc: denied { recv } for pid=25383 comm="syz.4.5828" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6951.274867][ T28] audit: type=1400 audit(6951.170:84260): avc: denied { recv } for pid=25383 comm="syz.4.5828" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6951.292863][ T28] audit: type=1400 audit(6951.200:84261): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6951.320134][ T28] audit: type=1400 audit(6951.220:84262): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6951.322470][ T28] audit: type=1400 audit(6951.220:84263): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6951.334866][ T28] audit: type=1400 audit(6951.240:84264): avc: denied { create } for pid=25387 comm="syz.2.5829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6951.354555][ T28] audit: type=1400 audit(6951.260:84265): avc: denied { write } for pid=25387 comm="syz.2.5829" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 6956.373465][ T28] kauditd_printk_skb: 115 callbacks suppressed [ 6956.373870][ T28] audit: type=1400 audit(6956.280:84381): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6956.388856][ T28] audit: type=1400 audit(6956.290:84382): avc: denied { recv } for pid=24467 comm="syz-executor" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6956.424565][ T28] audit: type=1400 audit(6956.330:84383): avc: denied { recv } for pid=25411 comm="syz.2.5837" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6956.425028][ T28] audit: type=1400 audit(6956.330:84384): avc: denied { recv } for pid=25411 comm="syz.2.5837" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6956.425358][ T28] audit: type=1400 audit(6956.330:84385): avc: denied { recv } for pid=25411 comm="syz.2.5837" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6956.443499][ T28] audit: type=1400 audit(6956.350:84386): avc: denied { recv } for pid=25411 comm="syz.2.5837" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6956.470894][ T28] audit: type=1400 audit(6956.360:84387): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6956.471571][ T28] audit: type=1400 audit(6956.360:84388): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6956.560754][ T28] audit: type=1400 audit(6956.470:84389): avc: denied { execmem } for pid=25416 comm="syz.4.5839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 6957.449207][ T28] audit: type=1400 audit(6957.350:84390): avc: denied { create } for pid=25411 comm="syz.2.5837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 6965.746370][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 6965.746716][ T28] audit: type=1400 audit(6965.650:84394): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6965.759398][ T28] audit: type=1400 audit(6965.670:84395): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6965.794241][ T28] audit: type=1400 audit(6965.700:84396): avc: denied { recv } for pid=24034 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6965.801418][ T28] audit: type=1400 audit(6965.700:84397): avc: denied { recv } for pid=24034 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6965.806797][ T28] audit: type=1400 audit(6965.700:84398): avc: denied { recv } for pid=24034 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6965.814389][ T28] audit: type=1400 audit(6965.710:84399): avc: denied { recv } for pid=2809 comm="pr/ttyAMA-1" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6965.818570][ T28] audit: type=1400 audit(6965.720:84400): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6965.822056][ T28] audit: type=1400 audit(6965.720:84401): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6965.903440][ T28] audit: type=1400 audit(6965.810:84402): avc: denied { read } for pid=25421 comm="syz.2.5840" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 6965.905826][ T28] audit: type=1400 audit(6965.810:84403): avc: denied { open } for pid=25421 comm="syz.2.5840" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 6976.908325][ T28] kauditd_printk_skb: 40 callbacks suppressed [ 6976.911770][ T28] audit: type=1400 audit(6976.810:84444): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6976.924847][ T28] audit: type=1400 audit(6976.830:84445): avc: denied { recv } for pid=0 comm="swapper/0" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6976.961961][ T28] audit: type=1400 audit(6976.870:84446): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6976.969880][ T28] audit: type=1400 audit(6976.870:84447): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6976.989340][ T28] audit: type=1400 audit(6976.870:84448): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6976.995686][ T28] audit: type=1400 audit(6976.900:84449): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6976.996583][ T28] audit: type=1400 audit(6976.900:84450): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6977.021347][ T28] audit: type=1400 audit(6976.920:84451): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6977.021855][ T28] audit: type=1400 audit(6976.920:84452): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6977.134917][ T28] audit: type=1400 audit(6977.040:84453): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6979.301128][T25455] netlink: 32 bytes leftover after parsing attributes in process `syz.2.5852'. [ 6979.741925][T25457] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6979.743094][T25457] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6982.424799][ T28] kauditd_printk_skb: 148 callbacks suppressed [ 6982.428767][ T28] audit: type=1400 audit(6982.320:84602): avc: denied { module_request } for pid=25466 comm="syz.2.5857" kmod="net-pf-2-proto-132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6982.867332][ T28] audit: type=1400 audit(6982.770:84603): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6982.867759][ T28] audit: type=1400 audit(6982.770:84604): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6982.911969][ T28] audit: type=1400 audit(6982.820:84605): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6982.913979][ T28] audit: type=1400 audit(6982.820:84606): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6982.916809][ T28] audit: type=1400 audit(6982.820:84607): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6982.960711][ T28] audit: type=1400 audit(6982.830:84608): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6982.968881][ T28] audit: type=1400 audit(6982.850:84609): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6982.969217][ T28] audit: type=1400 audit(6982.850:84610): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6983.415638][ T28] audit: type=1400 audit(6983.320:84611): avc: denied { read write } for pid=25474 comm="syz.2.5858" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6983.462376][T25475] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6983.463150][T25475] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6984.342409][T25480] syzkaller0: entered promiscuous mode [ 6984.351695][T25480] syzkaller0: entered allmulticast mode [ 6987.518495][ T28] kauditd_printk_skb: 132 callbacks suppressed [ 6987.520343][ T28] audit: type=1400 audit(6987.400:84744): avc: denied { allowed } for pid=25509 comm="syz.2.5871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6987.525555][ T28] audit: type=1400 audit(6987.430:84745): avc: denied { sqpoll } for pid=25509 comm="syz.2.5871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 6987.678392][ T28] audit: type=1400 audit(6987.580:84746): avc: denied { create } for pid=25509 comm="syz.2.5871" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6987.696305][ T28] audit: type=1400 audit(6987.580:84747): avc: denied { map } for pid=25509 comm="syz.2.5871" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=67599 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6987.706917][ T28] audit: type=1400 audit(6987.580:84748): avc: denied { read write } for pid=25509 comm="syz.2.5871" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=67599 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6987.724858][ T28] audit: type=1400 audit(6987.580:84749): avc: denied { map } for pid=25509 comm="syz.2.5871" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=67599 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 6987.831355][ T28] audit: type=1400 audit(6987.740:84750): avc: denied { write } for pid=25511 comm="syz.4.5870" name="seq" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6987.833605][ T28] audit: type=1400 audit(6987.740:84751): avc: denied { write open } for pid=25511 comm="syz.4.5870" path="/dev/snd/seq" dev="devtmpfs" ino=722 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6987.970883][ T28] audit: type=1400 audit(6987.880:84752): avc: denied { ioctl } for pid=25511 comm="syz.4.5870" path="/dev/snd/seq" dev="devtmpfs" ino=722 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 6988.234662][ T28] audit: type=1400 audit(6988.140:84753): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6990.599458][T25524] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 6990.601437][T25524] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 6993.947598][ T28] kauditd_printk_skb: 77 callbacks suppressed [ 6993.973106][ T28] audit: type=1400 audit(6993.850:84831): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6993.976736][ T28] audit: type=1400 audit(6993.860:84832): avc: denied { recv } for pid=24034 comm="syz-executor" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6994.000560][ T28] audit: type=1400 audit(6993.900:84833): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6994.001027][ T28] audit: type=1400 audit(6993.910:84834): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6994.004752][ T28] audit: type=1400 audit(6993.910:84835): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6994.019021][ T28] audit: type=1400 audit(6993.920:84836): avc: denied { recv } for pid=16720 comm="kworker/0:3" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6994.037421][ T28] audit: type=1400 audit(6993.940:84837): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6994.038421][ T28] audit: type=1400 audit(6993.940:84838): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6994.401974][T25534] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5879'. [ 6994.525609][T25534] 8021q: adding VLAN 0 to HW filter on device bond1 [ 6994.877804][T25534] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5879'. [ 6995.083255][ T28] audit: type=1400 audit(6994.990:84839): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6995.117344][ T28] audit: type=1400 audit(6995.020:84840): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 6999.140165][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 6999.140849][ T28] audit: type=1400 audit(6999.050:84877): avc: denied { create } for pid=25576 comm="syz.2.5882" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 6999.143545][ T28] audit: type=1400 audit(6999.050:84878): avc: denied { module_request } for pid=25576 comm="syz.2.5882" kmod="net-pf-10-proto-132-type-1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 6999.680141][ T28] audit: type=1400 audit(6999.580:84879): avc: denied { module_request } for pid=25576 comm="syz.2.5882" kmod="net-pf-10-proto-132" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 7000.154309][ T28] audit: type=1400 audit(7000.060:84880): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7000.175165][ T28] audit: type=1400 audit(7000.080:84881): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7000.207143][ T28] audit: type=1400 audit(7000.110:84882): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7000.207627][ T28] audit: type=1400 audit(7000.110:84883): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7000.219566][ T28] audit: type=1400 audit(7000.110:84884): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7000.260362][ T28] audit: type=1400 audit(7000.160:84885): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7000.289062][ T28] audit: type=1400 audit(7000.190:84886): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7003.404113][T25608] syzkaller0: entered promiscuous mode [ 7003.404668][T25608] syzkaller0: entered allmulticast mode [ 7004.164204][ T28] kauditd_printk_skb: 137 callbacks suppressed [ 7004.164605][ T28] audit: type=1400 audit(7004.070:85024): avc: denied { recv } for pid=25521 comm="syz.4.5874" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7004.164839][ T28] audit: type=1400 audit(7004.070:85025): avc: denied { recv } for pid=25521 comm="syz.4.5874" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7004.165049][ T28] audit: type=1400 audit(7004.070:85026): avc: denied { recv } for pid=25521 comm="syz.4.5874" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7004.204051][ T28] audit: type=1400 audit(7004.110:85027): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7004.227112][ T28] audit: type=1400 audit(7004.130:85028): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7004.230058][ T28] audit: type=1400 audit(7004.140:85029): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7004.257152][ T28] audit: type=1400 audit(7004.160:85030): avc: denied { create } for pid=25617 comm="syz.2.5897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7004.280669][ T28] audit: type=1400 audit(7004.190:85031): avc: denied { write } for pid=25617 comm="syz.2.5897" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7004.313592][ T28] audit: type=1400 audit(7004.220:85032): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7004.314042][ T28] audit: type=1400 audit(7004.220:85033): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7005.034660][T25625] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5900'. [ 7005.634217][T25629] SELinux: failed to load policy [ 7009.184863][ T28] kauditd_printk_skb: 144 callbacks suppressed [ 7009.185217][ T28] audit: type=1400 audit(7009.090:85178): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7009.218953][ T28] audit: type=1400 audit(7009.110:85179): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7009.234036][ T28] audit: type=1400 audit(7009.140:85180): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7009.236448][ T28] audit: type=1400 audit(7009.140:85181): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7009.236851][ T28] audit: type=1400 audit(7009.140:85182): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7009.259288][ T28] audit: type=1400 audit(7009.160:85183): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7009.277222][ T28] audit: type=1400 audit(7009.180:85184): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7009.282207][ T28] audit: type=1400 audit(7009.180:85185): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7009.392833][ T28] audit: type=1400 audit(7009.300:85186): avc: denied { read } for pid=25661 comm="syz.4.5914" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 7009.399518][ T28] audit: type=1400 audit(7009.310:85187): avc: denied { open } for pid=25661 comm="syz.4.5914" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 7010.731883][T25687] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=25687 comm=syz.4.5918 [ 7010.737287][T25687] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=8 sclass=netlink_route_socket pid=25687 comm=syz.4.5918 [ 7013.355432][T25710] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5927'. [ 7014.222438][ T28] kauditd_printk_skb: 172 callbacks suppressed [ 7014.222931][ T28] audit: type=1400 audit(7014.130:85360): avc: denied { prog_load } for pid=25713 comm="syz.4.5929" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7014.227071][ T28] audit: type=1400 audit(7014.130:85361): avc: denied { bpf } for pid=25713 comm="syz.4.5929" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7014.665922][ T28] audit: type=1400 audit(7014.570:85362): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7014.675083][ T28] audit: type=1400 audit(7014.580:85363): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7014.718777][ T28] audit: type=1400 audit(7014.620:85364): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7014.719380][ T28] audit: type=1400 audit(7014.620:85365): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7014.719771][ T28] audit: type=1400 audit(7014.620:85366): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7014.733866][ T28] audit: type=1400 audit(7014.630:85367): avc: denied { recv } for pid=17928 comm="kworker/0:2" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7014.778691][ T28] audit: type=1400 audit(7014.650:85368): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7014.789603][ T28] audit: type=1400 audit(7014.650:85369): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7019.454919][ T28] kauditd_printk_skb: 39 callbacks suppressed [ 7019.455280][ T28] audit: type=1400 audit(7019.320:85409): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7019.455539][ T28] audit: type=1400 audit(7019.350:85410): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7019.455745][ T28] audit: type=1400 audit(7019.360:85411): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7019.455949][ T28] audit: type=1400 audit(7019.360:85412): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7019.486108][ T28] audit: type=1400 audit(7019.390:85413): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7019.489617][ T28] audit: type=1400 audit(7019.390:85414): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7019.493118][ T28] audit: type=1400 audit(7019.390:85415): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7020.096613][ T28] audit: type=1400 audit(7019.990:85416): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7020.096967][ T28] audit: type=1400 audit(7020.000:85417): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7020.134779][ T28] audit: type=1400 audit(7020.040:85418): avc: denied { recv } for pid=24467 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7024.892650][ T28] kauditd_printk_skb: 69 callbacks suppressed [ 7024.894029][ T28] audit: type=1400 audit(7024.800:85488): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7024.897500][ T28] audit: type=1400 audit(7024.800:85489): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7024.909904][ T28] audit: type=1400 audit(7024.810:85490): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7024.911065][ T28] audit: type=1400 audit(7024.810:85491): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7024.912178][ T28] audit: type=1400 audit(7024.810:85492): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7024.968383][ T28] audit: type=1400 audit(7024.860:85493): avc: denied { recv } for pid=24467 comm="syz-executor" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7025.046501][ T28] audit: type=1400 audit(7024.950:85494): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7025.050587][ T28] audit: type=1400 audit(7024.950:85495): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7025.233161][ T28] audit: type=1400 audit(7025.140:85496): avc: denied { read } for pid=25746 comm="syz.4.5942" name="vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7025.234479][ T28] audit: type=1400 audit(7025.140:85497): avc: denied { open } for pid=25746 comm="syz.4.5942" path="/dev/vcs" dev="devtmpfs" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7028.461129][T25757] netlink: 'syz.4.5946': attribute type 10 has an invalid length. [ 7028.461663][T25757] netlink: 24 bytes leftover after parsing attributes in process `syz.4.5946'. [ 7030.378894][ T28] kauditd_printk_skb: 53 callbacks suppressed [ 7030.379308][ T28] audit: type=1400 audit(7030.290:85551): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7030.394809][ T28] audit: type=1400 audit(7030.300:85552): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7030.549207][ T28] audit: type=1400 audit(7030.370:85553): avc: denied { recv } for pid=15 comm="rcu_preempt" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7030.552302][ T28] audit: type=1400 audit(7030.420:85554): avc: denied { recv } for pid=15 comm="rcu_preempt" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7030.552411][ T28] audit: type=1400 audit(7030.450:85555): avc: denied { recv } for pid=15 comm="rcu_preempt" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7030.561078][ T28] audit: type=1400 audit(7030.470:85556): avc: denied { recv } for pid=2809 comm="pr/ttyAMA-1" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7030.716660][ T28] audit: type=1400 audit(7030.620:85557): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7030.717039][ T28] audit: type=1400 audit(7030.620:85558): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7030.984155][T25762] netem: change failed [ 7031.103465][ T28] audit: type=1400 audit(7031.010:85559): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7031.110595][ T28] audit: type=1400 audit(7031.010:85560): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7034.238527][T25772] tap0: tun_chr_ioctl cmd 21731 [ 7034.836167][T25778] syz_tun: entered allmulticast mode [ 7034.866408][T25778] SELinux: failure in sel_netif_sid_slow(), invalid network interface (0) [ 7034.867159][T25778] mroute: pending queue full, dropping entries [ 7034.927470][T25778] dvmrp1: entered allmulticast mode [ 7034.958679][T25777] syz_tun: left allmulticast mode [ 7035.393038][ T28] kauditd_printk_skb: 96 callbacks suppressed [ 7035.393591][ T28] audit: type=1400 audit(7035.290:85657): avc: denied { open } for pid=25783 comm="syz.4.5956" path="/dev/snd/controlC0" dev="devtmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7035.416104][ T28] audit: type=1400 audit(7035.320:85658): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7035.438781][ T28] audit: type=1400 audit(7035.340:85659): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7035.461660][ T28] audit: type=1400 audit(7035.370:85660): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7035.463221][ T28] audit: type=1400 audit(7035.370:85661): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7035.466955][ T28] audit: type=1400 audit(7035.370:85662): avc: denied { recv } for pid=14 comm="ksoftirqd/0" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7035.477533][ T28] audit: type=1400 audit(7035.380:85663): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7035.501271][ T28] audit: type=1400 audit(7035.410:85664): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7035.503663][ T28] audit: type=1400 audit(7035.410:85665): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7035.641871][ T28] audit: type=1400 audit(7035.550:85666): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7036.467096][T25797] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 7036.813805][T25804] syzkaller0: entered promiscuous mode [ 7036.819847][T25804] syzkaller0: entered allmulticast mode [ 7037.426674][T25813] syzkaller0: entered promiscuous mode [ 7037.430149][T25813] syzkaller0: entered allmulticast mode [ 7040.423421][ T28] kauditd_printk_skb: 187 callbacks suppressed [ 7040.426509][ T28] audit: type=1400 audit(7040.330:85854): avc: denied { recv } for pid=24034 comm="syz-executor" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7040.429988][ T28] audit: type=1400 audit(7040.330:85855): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7040.436267][ T28] audit: type=1400 audit(7040.330:85856): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7040.448919][ T28] audit: type=1400 audit(7040.350:85857): avc: denied { recv } for pid=12743 comm="kworker/u8:4" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7040.454027][ T28] audit: type=1400 audit(7040.350:85858): avc: denied { recv } for pid=12743 comm="kworker/u8:4" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7040.572200][ T28] audit: type=1400 audit(7040.480:85859): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7040.574675][ T28] audit: type=1400 audit(7040.480:85860): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7040.758538][ T28] audit: type=1400 audit(7040.660:85861): avc: denied { create } for pid=25841 comm="syz.4.5974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7040.765652][ T28] audit: type=1400 audit(7040.670:85862): avc: denied { write } for pid=25841 comm="syz.4.5974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7040.880290][ T28] audit: type=1400 audit(7040.790:85863): avc: denied { write } for pid=25841 comm="syz.4.5974" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 7043.171492][T25850] ªªªªªª: renamed from vlan0 (while UP) [ 7088.184074][ T28] kauditd_printk_skb: 80 callbacks suppressed [ 7088.184349][ T28] audit: type=1400 audit(7088.090:85944): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7088.195005][ T28] audit: type=1400 audit(7088.100:85945): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7088.231345][ T28] audit: type=1400 audit(7088.140:85946): avc: denied { recv } for pid=24034 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7088.233715][ T28] audit: type=1400 audit(7088.140:85947): avc: denied { recv } for pid=24034 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7088.251287][ T28] audit: type=1400 audit(7088.140:85948): avc: denied { recv } for pid=24034 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7088.262988][ T28] audit: type=1400 audit(7088.150:85949): avc: denied { recv } for pid=2898 comm="syslogd" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7088.263769][ T28] audit: type=1400 audit(7088.150:85950): avc: denied { recv } for pid=2898 comm="syslogd" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7088.263882][ T28] audit: type=1400 audit(7088.150:85951): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7088.263948][ T28] audit: type=1400 audit(7088.160:85952): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7088.364323][ T28] audit: type=1400 audit(7088.270:85953): avc: denied { read } for pid=25865 comm="syz.2.5984" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 trawcon="system_u:object_r:apt_var_lib_t:s0" [ 7093.650841][ T28] kauditd_printk_skb: 114 callbacks suppressed [ 7093.656733][ T28] audit: type=1400 audit(7093.550:86068): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7093.660443][ T28] audit: type=1400 audit(7093.550:86069): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7093.662726][ T28] audit: type=1400 audit(7093.550:86070): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7093.673691][ T28] audit: type=1400 audit(7093.550:86071): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7093.676061][ T28] audit: type=1400 audit(7093.560:86072): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7093.700332][ T28] audit: type=1400 audit(7093.600:86073): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7093.710184][ T28] audit: type=1400 audit(7093.610:86074): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7093.711941][ T28] audit: type=1400 audit(7093.620:86075): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7094.718854][ T28] audit: type=1400 audit(7094.620:86076): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7094.722475][ T28] audit: type=1400 audit(7094.620:86077): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7095.614126][T25907] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 7095.616740][T25907] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 7098.600584][T25917] netlink: 136 bytes leftover after parsing attributes in process `syz.4.6001'. [ 7098.688474][ T28] kauditd_printk_skb: 57 callbacks suppressed [ 7098.688842][ T28] audit: type=1400 audit(7098.590:86135): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7098.689081][ T28] audit: type=1400 audit(7098.590:86136): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7098.689292][ T28] audit: type=1400 audit(7098.590:86137): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7098.700674][ T28] audit: type=1400 audit(7098.600:86138): avc: denied { recv } for pid=25525 comm="kworker/0:6" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7098.706166][ T28] audit: type=1400 audit(7098.610:86139): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7098.719875][ T28] audit: type=1400 audit(7098.610:86140): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7103.839293][ T28] audit: type=1400 audit(7103.750:86141): avc: denied { allowed } for pid=25918 comm="syz.4.6002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 7103.868824][ T28] audit: type=1400 audit(7103.770:86142): avc: denied { create } for pid=25918 comm="syz.4.6002" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 7103.885495][ T28] audit: type=1400 audit(7103.790:86143): avc: denied { map } for pid=25918 comm="syz.4.6002" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=68043 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 7103.902763][ T28] audit: type=1400 audit(7103.810:86144): avc: denied { read write } for pid=25918 comm="syz.4.6002" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=68043 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 7104.124023][ T28] audit: type=1400 audit(7104.030:86145): avc: denied { read } for pid=25918 comm="syz.4.6002" name="ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7104.126304][ T28] audit: type=1400 audit(7104.030:86146): avc: denied { read open } for pid=25918 comm="syz.4.6002" path="/dev/ttyS3" dev="devtmpfs" ino=608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7104.181852][ T28] audit: type=1400 audit(7104.090:86147): avc: denied { ioctl } for pid=25918 comm="syz.4.6002" path="/dev/ttyS3" dev="devtmpfs" ino=608 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 7105.332563][ T28] audit: type=1400 audit(7105.240:86148): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7105.340462][ T28] audit: type=1400 audit(7105.250:86149): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7105.383348][ T28] audit: type=1400 audit(7105.290:86150): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7105.657556][T25924] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6004'. [ 7105.666241][T25924] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6004'. [ 7106.856102][T25940] syzkaller0: entered promiscuous mode [ 7106.860517][T25940] syzkaller0: entered allmulticast mode [ 7110.057459][ T28] kauditd_printk_skb: 136 callbacks suppressed [ 7110.059194][ T28] audit: type=1400 audit(7109.960:86287): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7110.074316][ T28] audit: type=1400 audit(7109.980:86288): avc: denied { recv } for pid=25887 comm="syz.2.5991" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7110.110651][ T28] audit: type=1400 audit(7110.020:86289): avc: denied { recv } for pid=24467 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7110.112750][ T28] audit: type=1400 audit(7110.020:86290): avc: denied { recv } for pid=24467 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7110.114848][ T28] audit: type=1400 audit(7110.020:86291): avc: denied { recv } for pid=24467 comm="syz-executor" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7110.155852][ T28] audit: type=1400 audit(7110.040:86292): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7110.156601][ T28] audit: type=1400 audit(7110.060:86293): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7110.156836][ T28] audit: type=1400 audit(7110.060:86294): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7110.261205][ T28] audit: type=1400 audit(7110.170:86295): avc: denied { load_policy } for pid=25951 comm="syz.4.6016" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 7110.274001][T25952] SELinux: failed to load policy [ 7110.302894][ T28] audit: type=1400 audit(7110.210:86296): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7116.497335][ T28] kauditd_printk_skb: 82 callbacks suppressed [ 7116.498495][ T28] audit: type=1400 audit(7116.400:86379): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7116.511473][ T28] audit: type=1400 audit(7116.420:86380): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7116.542736][ T28] audit: type=1400 audit(7116.450:86381): avc: denied { recv } for pid=12743 comm="kworker/u8:4" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7116.543255][ T28] audit: type=1400 audit(7116.450:86382): avc: denied { recv } for pid=12743 comm="kworker/u8:4" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7116.543580][ T28] audit: type=1400 audit(7116.450:86383): avc: denied { recv } for pid=12743 comm="kworker/u8:4" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7116.564562][ T28] audit: type=1400 audit(7116.470:86384): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7116.588874][ T28] audit: type=1400 audit(7116.490:86385): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7116.589450][ T28] audit: type=1400 audit(7116.490:86386): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7116.710171][ T28] audit: type=1400 audit(7116.620:86387): avc: denied { recv } for pid=25970 comm="syz.4.6025" saddr=172.20.20.187 src=16384 daddr=172.20.20.10 dest=50136 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7116.745937][ T28] audit: type=1400 audit(7116.650:86388): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7122.718678][ T28] kauditd_printk_skb: 63 callbacks suppressed [ 7122.719258][ T28] audit: type=1400 audit(7122.610:86452): avc: denied { recv } for pid=3086 comm="syz-executor" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7122.724327][ T28] audit: type=1400 audit(7122.630:86453): avc: denied { recv } for pid=25887 comm="syz.2.5991" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7122.751393][ T28] audit: type=1400 audit(7122.660:86454): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7122.753589][ T28] audit: type=1400 audit(7122.660:86455): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7122.755706][ T28] audit: type=1400 audit(7122.660:86456): avc: denied { recv } for pid=22 comm="ksoftirqd/1" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7122.798923][ T28] audit: type=1400 audit(7122.690:86457): avc: denied { recv } for pid=25887 comm="syz.2.5991" saddr=10.0.2.2 src=41096 daddr=10.0.2.15 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7122.799474][ T28] audit: type=1400 audit(7122.700:86458): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=30000 daddr=127.0.0.1 dest=33824 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7122.799575][ T28] audit: type=1400 audit(7122.700:86459): avc: denied { recv } for pid=3085 comm="sshd-session" saddr=127.0.0.1 src=33824 daddr=127.0.0.1 dest=30000 netif=lo scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 7122.925973][ T28] audit: type=1400 audit(7122.830:86460): avc: denied { read } for pid=25984 comm="syz.4.6032" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7122.926452][ T28] audit: type=1400 audit(7122.830:86461): avc: denied { open } for pid=25984 comm="syz.4.6032" path="net:[4026532655]" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 7131.214748][ T28] kauditd_printk_skb: 216 callbacks suppressed [ 7131.215053][ T28] audit: type=1400 audit(7131.120:86678): avc: denied { create } for pid=26010 comm="syz.4.6042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 7131.231786][ T28] audit: type=1400 audit(7131.140:86679): avc: denied { prog_load } for pid=26010 comm="syz.4.6042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7131.241157][ T28] audit: type=1400 audit(7131.150:86680): avc: denied { bpf } for pid=26010 comm="syz.4.6042" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7131.270830][ T28] audit: type=1400 audit(7131.180:86681): avc: denied { prog_load } for pid=26010 comm="syz.4.6042" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 7131.271159][ T28] audit: type=1400 audit(7131.180:86682): avc: denied { perfmon } for pid=26010 comm="syz.4.6042" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7131.275702][ T28] audit: type=1400 audit(7131.180:86683): avc: denied { bpf } for pid=26010 comm="syz.4.6042" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 7131.391090][T26013] ------------[ cut here ]------------ [ 7131.391991][T26013] WARNING: kernel/bpf/verifier.c:2763 at reg_bounds_sanity_check+0x3c0/0x428, CPU#0: syz.4.6042/26013 [ 7131.396116][T26013] verifier bug: REG INVARIANTS VIOLATION (false_reg1): range bounds violation u64=[0x4000000, 0x0] s64=[0x4000000, 0x0] u32=[0x4000000, 0x0] s32=[0x4000000, 0x0] var_off=(0x0, 0x0) [ 7131.404042][T26013] Modules linked in: [ 7131.406680][T26013] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 7131.407184][T26013] CPU: 0 UID: 0 PID: 26013 Comm: syz.4.6042 Tainted: G L syzkaller #0 PREEMPT [ 7131.407501][T26013] Tainted: [L]=SOFTLOCKUP [ 7131.407662][T26013] Hardware name: ARM-Versatile Express [ 7131.408049][T26013] Call trace: [ 7131.408290][T26013] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 7131.409899][T26013] r7:8281f900 r6:00000000 r5:822a4ebc r4:00000001 [ 7131.415306][T26013] [<80201af0>] (show_stack) from [<8021e454>] (dump_stack_lvl+0x5c/0x70) [ 7131.418410][T26013] [<8021e3f8>] (dump_stack_lvl) from [<8021e480>] (dump_stack+0x18/0x1c) [ 7131.418924][T26013] r7:8281f900 r6:00000000 r5:83f80000 r4:82a7fd14 [ 7131.419411][T26013] [<8021e468>] (dump_stack) from [<802025f4>] (vpanic+0x114/0x320) [ 7131.419822][T26013] [<802024e0>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0x104) [ 7131.420206][T26013] r7:803e024c [ 7131.420403][T26013] [<80202800>] (panic) from [<80250a68>] (get_taint+0x0/0x1c) [ 7131.420956][T26013] r3:8280c544 r2:00000001 r1:8228bc60 r0:82293518 [ 7131.421472][T26013] [<802509f0>] (check_panic_on_warn) from [<80250be4>] (__warn+0x98/0x1ac) [ 7131.422106][T26013] [<80250b4c>] (__warn) from [<80250ee0>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 7131.423257][T26013] r8:00000009 r7:822ab7f4 r6:e02b58c4 r5:83f80000 r4:00000000 [ 7131.423942][T26013] [<80250cfc>] (warn_slowpath_fmt) from [<803e024c>] (reg_bounds_sanity_check+0x3c0/0x428) [ 7131.425196][T26013] r10:85ed8000 r9:04000000 r8:00000000 r7:04000000 r6:00000000 r5:822abf58 [ 7131.426088][T26013] r4:86a892a0 [ 7131.426277][T26013] [<803dfe8c>] (reg_bounds_sanity_check) from [<803ecfe0>] (reg_set_min_max+0x230/0x288) [ 7131.426988][T26013] r10:00000000 r9:00000030 r8:85ed8000 r7:85ede120 r6:85ede0b0 r5:8659a2a0 [ 7131.427468][T26013] r4:86a892a0 [ 7131.427816][T26013] [<803ecdb0>] (reg_set_min_max) from [<803fd370>] (check_cond_jmp_op+0x434/0x1980) [ 7131.428409][T26013] r10:8659a000 r9:00000030 r8:86484b80 r7:00000070 r6:85ed8000 r5:8387b240 [ 7131.429688][T26013] r4:e02b7088 r3:86a892a0 [ 7131.430264][T26013] [<803fcf3c>] (check_cond_jmp_op) from [<80404228>] (do_check_common+0x259c/0x3228) [ 7131.430846][T26013] r10:86484b80 r9:85ed8000 r8:e02b7088 r7:85ede000 r6:00000011 r5:e02b7040 [ 7131.431288][T26013] r4:e02b7000 [ 7131.431934][T26013] [<80401c8c>] (do_check_common) from [<80407e7c>] (bpf_check+0x22e4/0x2d30) [ 7131.433197][T26013] r10:85ede000 r9:00000001 r8:85ed8000 r7:00000a7b r6:85ed88bc r5:00000000 [ 7131.433864][T26013] r4:00000016 [ 7131.434995][T26013] [<80405b98>] (bpf_check) from [<803d959c>] (bpf_prog_load+0x5b8/0xdec) [ 7131.438204][T26013] r10:e02b7000 r9:83f80000 r8:850a9b30 r7:e02b5d18 r6:00000000 r5:00000000 [ 7131.438757][T26013] r4:e02b5eb0 [ 7131.438955][T26013] [<803d8fe4>] (bpf_prog_load) from [<803dadc4>] (__sys_bpf+0x2d8/0x2008) [ 7131.439676][T26013] r10:00000005 r9:00000000 r8:e02b5e50 r7:00000048 r6:83f80000 r5:200054c0 [ 7131.440353][T26013] r4:00000000 [ 7131.440652][T26013] [<803daaec>] (__sys_bpf) from [<803dd08c>] (sys_bpf+0x2c/0x48) [ 7131.445922][T26013] r10:00000182 r9:83f80000 r8:8020029c r7:00000182 r6:00346450 r5:00000000 [ 7131.448304][T26013] r4:00000000 [ 7131.448494][T26013] [<803dd060>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 7131.449032][T26013] Exception stack(0xe02b5fa8 to 0xe02b5ff0) [ 7131.450105][T26013] 5fa0: 00000000 00000000 00000005 200054c0 00000048 00000000 [ 7131.451212][T26013] 5fc0: 00000000 00000000 00346450 00000182 00346418 00000000 00000001 76f0b0dc [ 7131.452340][T26013] 5fe0: 76f0ae88 76f0ae78 00018734 0012fc20 [ 7131.456552][T26013] Rebooting in 86400 seconds..