last executing test programs: 23m37.642769547s ago: executing program 0 (id=2017): syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendmmsg$inet(r0, &(0x7f0000000c40), 0x0, 0x8014) 23m37.322038535s ago: executing program 0 (id=2018): r0 = syz_open_dev$usbfs(&(0x7f0000000080), 0x75, 0x109301) ioctl$USBDEVFS_SUBMITURB(r0, 0x802c550a, &(0x7f0000000500)=@urb_type_control={0x2, {0x0, 0x1}, 0x6, 0xc0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x1676ab34, 0xdffffff9, 0x0}) 23m37.112342616s ago: executing program 0 (id=2019): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_MPP(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010005000000ffffffff1100000008000300", @ANYRES32=r1, @ANYBLOB="0a00060008021100000100"], 0x28}, 0x1, 0x0, 0x0, 0xec0}, 0x40000) 23m36.240541155s ago: executing program 0 (id=2020): r0 = socket$key(0xf, 0x3, 0x2) syz_usb_connect$lan78xx(0x3, 0x3f, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0x424, 0x7850, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d}}]}}, 0x0) sendmsg$key(r0, &(0x7f0000000100)={0x3, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB="0203f3021600000000000000200000000200090008000000e9000000000000000300060000000000020000000000000000000000000000000200010000000000000003fcff000020030005000000000002000000041414aa00000000000000000a0008"], 0xb0}, 0x1, 0x7}, 0x0) 23m35.352268214s ago: executing program 0 (id=2021): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) openat(0xffffffffffffff9c, 0x0, 0x300000d, 0x1) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) unshare(0x6a040000) r4 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f0000000480)={'vcan0\x00', 0x0}) bind$can_j1939(r4, &(0x7f0000000100)={0x1d, r5, 0x0, {0x1, 0x1, 0x4}, 0x1}, 0x18) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r0, 0xc0145401, &(0x7f0000000280)={0x3, 0x0, 0x0, 0x0, 0x7fffffff}) 22m50.784278542s ago: executing program 0 (id=2043): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) r0 = socket$alg(0x26, 0x5, 0x0) close(0x3) bind$alg(r0, &(0x7f0000000540)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="2c385aa3d49100dc6626c892b6bc436a", 0x10) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x100079af, 0x0, 0x1, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x4007, @fd_index=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x2}) io_uring_enter(r1, 0x627, 0x4c1, 0x43, 0x0, 0x30) 22m4.737722252s ago: executing program 32 (id=2043): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) r0 = socket$alg(0x26, 0x5, 0x0) close(0x3) bind$alg(r0, &(0x7f0000000540)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="2c385aa3d49100dc6626c892b6bc436a", 0x10) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x49a, &(0x7f00000000c0)={0x0, 0x100079af, 0x0, 0x1, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x4007, @fd_index=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x2}) io_uring_enter(r1, 0x627, 0x4c1, 0x43, 0x0, 0x30) 21m34.61400984s ago: executing program 2 (id=2054): r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000880)=@newtaction={0x70, 0x30, 0x53b, 0x0, 0x0, {0x9}, [{0x5c, 0x1, [@m_sample={0x58, 0x1, 0x0, 0x0, {{0xb}, {0x48, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0x15}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x0, 0x0, 0xe4}}, @TCA_SAMPLE_RATE={0x8, 0x3, 0x20}]}, {0x4}, {0xc}, {0xc, 0x4}}}]}]}, 0x70}}, 0x0) 21m34.364403314s ago: executing program 2 (id=2061): r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000100)={{0x1, 0x0, 0x0, 0x5}, 'syz0\x00', 0x50}) ioctl$UI_DEV_CREATE(r0, 0x5501) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = dup(r1) write$UHID_INPUT(r2, &(0x7f0000001380)={0x9, {"a2e3ad084fc752f91b2909094bf70e0dd038e7ff7fc6e5539b324c078b089b333b316d1a0890e0878f0e1ac6e7049b076d959b669a240d5b67f3988f7ef319520100ffe8d178708c523c921b1b5b3b300d376d0936cd3b78130daa61d8e809ea889b5802b77f07227227b7ba67e0e78669a6f5c2a874e62a9ccdc0d31a0c9f318c0da1993bd160e233df4a62179c6f30e065cd5b91cd0ae19397d696d0d758f2dc7d1c00305d3f46635eb016d5b1dda98e2d749be7bd1df1fb3b231fdcdb5075a9aaa1b469c3090000000002335875271b286329d169934288fd789aa37d6e98b224fd44b65b31334ffc55cc82cd3ac32ecdb08ced6f9081b4dd0d8b38f3cd4498bee800490841bdb114f6b76383709d8f5c55432a909fda039aec54a1236e80f6a8abadea7662496bddbb42be6bfb2f17959d1fe90a56c71b1931870262f5e801119242ca026bfc821e7e7daf2451138e645bb80c617601000000be70de98ec76a9e40dad47f36fd9f7d0d42a4b5f1185ccdcf16ff46295d8a0fa17713c5802630933a9a34af674f3f39fe23491237c08822dec110911e893d0a8c4f677747abc360934b82910ff85bfd995083bba2987a67399eac427d145d595a40b9f6ff14ac488ec130fb3850a27af9544ae15a7e454dea05918b41243513f000000000000000a3621c56cea8d20fa911a0c41db6ebe8cac64f17679141d54b34bbc9980000000b3309603f1d4ab966203861b5b15a841f2b575a8bd0d78248ebe4d9a80002695104f674c2431dca141fae269cab70e9a66f3c3a9a63e9639e1f59c0ede26c6b5d74b078a5e15c31634e5ae098ce9ee70771aaa18119a867e1088334975e9f73483b6c82fa678ca14ffd9f9db2a7869d85864056526f889af43a6056080572286522449df466c632b3570243f989cce3803f465e41e610c2021d653a5520000008213b704a5000000000000008ef9f190bae97909507041d860420c5664b27921b14dc1db8892fd32d0ad7bc94681359bad8deff4b05f60cea0da7710a80000000000008000bea37ce0d0d4aa202f928f28381aab144a5d429a04a6a2b83c7068ae949ed06e288e810bac9c76600025e19c907f8ea2e20100000082719ef5f8528f227e79c1389dbdfffe492f21579d2c15b8c70cdb1c332d86d87341432750861ec2bc3451edca194b221cfec4603d276bbaa1dfa6d4e38a48a76eafc9a9a0270e4c10d64cd5a62427264f2377fe763c43470833ac96c45f357cbbaba8f1b1fdcc7cbb61a7cdb9744ed7f9129aede2be21ccfdc4e9134f8684b3a4f354da9a795e96334e207dff70f1988037b2ed3aaf575c0b88d8f146684078416d59fdee5325928974d12dad99dac44c3f0008047096a44002bebc2420aed92fa9b6578b4779415d97b9a6d6d5495c118045651cf41c2fc48b778efa5ea5677747430af4162b987b80c3e001cd34e5c92f76cc4c24eeb8bc4e9ac2bed9e53803edf1a4ae3a9737d214060005ea6f1783e287b3bee96e3a726eafe2fdfaa78d1f48c13b64df0784c8f4ceb360c7e658828563e2d25c4aa348561f927e88f63aa70e73a5e69b3df3495903f06572e1e007fa55a2999f596d067312f5779e8dbfdcf3427138f3d444d2639a10477f9bec4b4bbb6e3c04be68981f392203dd0ee3ef478e16dacfc5e3e03cf7ab8e3902f1b0ff034e00000000ca509383815b1b6fc6522d4e48604675fde2b94cf00500a2690891abf8ab9c015073014d9e08d4338b8780bdecd436cf0541359bafffa45237f104b96210403b2de9efed496f42355bc7872c827467cfa5c478b095b68441a34cb51682a8ae4d24ad92f243941ed274549b79a7962fb385a882e8020f06c4c2ba1dd5cac7c18876da865d258734dd73583df292892448039ef799cf0630becdbe6c4579b5561dc825ab829827945e020c1f67ee615feb6243378e0610060f02cca4e91b2f001edb3d78fb4b55668dda93ae62fccfcbb2b75a2183c46eb65ca8124e1b4da7fbb77ab2fc043aead87c32ab875ee7c2e7b7019c982cd3b43e4fb1a5fb135c0c7dcee8fe6516a328032f88c042891824659e9e01feffffffffffff83a2b210520106b8a358b50ab7a1fa89af9c251fe5294b3d1802d5676d95f160ec97b1ad94872cb2044642c37b4a6cc6c04effc1672db7e4b68d787d9a7a508ae54b3cd7369d75f2e8c77d95a3d361c040babb171607caac2a3559ad4f75465f49c0d0ae3716db6e00cb11db4a5fade2a57c10238e204a67737c3b42aa01b20f7694a00f16e2d0174035a2c22656dc00880acebdbe8ddbd75c2f998d8ac2dfad2ba3a50200000045a45957f24d758ed024b3849c11d412a2a03b4047497022d9c30e23ef4df5c89644f48bb536f7945b59d7bcddff754413d135273ea8e75f22f216c6b9990ae71806f2c00b4025c48b75c0f73cdb9a7b8fa367b50028067e7f16f4dd569d462f4f19eacdb3ed70eeebb4483f8fd777d443e8b40426db6fe2907ac0ca3d2414442e8f3a154704b0e51bc664a137b26be719f4f7c9a5678a674dfc95df80b9ce375dd649c8c704e509bd88c8e63d618e462071115c8982ba46af4d6adcc9f68a75b9397b035153faf463661c953fcad6f37525c1a0e94610dd94323f6c15d085197149bfd6655548cfd9c52c9711937f79abb1a124f1210465483cd3b2d78378cfb85ed82e7da0f6eb6d279f2ae455925d0f6f1ba571eba281f2a654fb39ddff3b484439ff158e7cd419e037f3e3ad038f2211f1033195563c7f93cd54b9094f226e783271e1e5a2a2c10712eab625d64931cd4ffe6738d97b9b5ef828ee9fb059fc01af0e79c1e14b1d25988c69a399567c1d93768f7971d31488b8658a20878b7c1dd7ba02fc42939dde3d4a3339a65d507dc59c51097b40517705da56e9ebf0afa53282bf86dbb58c548069ff6eb95aade7cc66d7bbef724779ca1f731b3346ff177050373d79ff7b3e7f9bc0c1b4b266a8878b90baaa039d3e3b63979ac3df6e6f4859afd50238c7547a39b60810938044ae185d2ba3e00a4e73676864ae090d81eaeecf1d0ab378dd4dd891e937c2ea5410e0513005000000000000003911fab964c271550027697b52160687461602f88df165d884b36ec2b6c25a2f33c715687e9d4afb96d6861aca47da73d6f3dd014e5c5ad8fe995754bd9cf32fce1e31919c4b2082fb0a30b9deae84bed4b28045634073c9c58c89d9e99c81769177c6ea94f88a4facfd4c735a20307c737afae5136651b1b9bd522dcb399473296b831dbd933d93994ba3064279b10ea0c5833f41f157ea2302993dbe433b1aa3a37684f4113c48859465c3b415c3432f81db8719539d5bf372aaaea1cc43a6c5cbe59758bfee2916580dac4b008e595f437491d87abed02cefcd9db53d94d02dae17b118e5d6787463183b4b87c105000000302a808d7f5263440613d17ca51055f2f416a44fe180d2d50c312cca7cb14a20dc331f57a9817139a206fc76957227ffff2de20a4b8e3737fbb40100000006376f799eba367e21f94ca598705f5dcb767d6f0900d6b0f6095e53c4c4234d0c1fbe434f6ab83c0013ee93b83946ee7759e89d7bdd1a32d7b311711b757fe43c06d21a35810d8fe98b27faea8aa12bc8716eefc5c97c45ac33eeec964c5214bc3a9359bdea1cccab94f15e36319cb34ebcacedb82c2ed3de5a8a8f0011e8f74e82d7ceec7dc808bf653639d7961939adfdeeeaff19d11efcafb6d546fef271e89d6cc2389e81ff58cefcce3fbf4625a7e7de40e42e07b34449e15e065cc7348663a52190202c7af288a4510de03dab19d26285eda89156d50dd385a602000000000000007007ad1519ad5470de3dd6d6080cafccf8a97406bb6b68a1f0c4000000000000007fb33b72685ec37a2d3f766413a60459516246e5a1d998a2017aef0948a68cf255315ab80dd349e891aef595dc4d470e8ac32a308e15fc37d06aeac289c0523f483e1ff7408c6087f1ab652f2ef91d4f2b01987b0f46da034e5c3f745a7ee8101a3934c54e24b48ec0275e2d0687dc746b0827cbf6529006c6b95f2722e58c05f752ce2126596e1cd7655b904801784c416b22f73d324678e2724f43f1fe687c7e8a60c28b82b6522fb5f6ffcdd56fed88935fcb75912d5ecd36dea3bca0b7427d8392c6289455e8f8d2ab2242729251ae233a9e02210e62df0546a74b333a1c48f95fd54acb5741259e8c5488efeee327415cc19451432c6f14c27693102a5bd84857cd6586fc5ca9a93eb0145fac0662ff86107f998a8ef7df8aa14046c55b03d3d47f88a8d60f7774a2ee08008897fb411a94b3c2fc5d5f0db42c0456ec015f08e5247d33ae2d35603ff8454c16f8342856935125102bb6ce431b63ee356b0c785f2f07b90e29389f22fc5b59a70efaea2bd40195af44863c10ec23ea6283994a7dde4dcb61fea6b651fb1d62458d0741a12830052fcc460db043afe525629b40d7cee458e4cb5e930ed624806c43a006e39336d07c2b80c1c128ad2706f48261f7897484c297a1a6613bc18f5a152ef95ff569e76db2391f4509d7f339d92fdb4a89364949da398000000000000000d80a4fe654578376e599aff3565b1d531f30912b9945030b81ea9935fd46edb44a78f615255490a4b621501f2a9e4d24624c4dac9274118c67584f5d374755534d7f68f679c4ff516a9c861a0e7e65868fcb2bf1cb9aea4e05df72279fdb0d2b9e935c5af3cf474bed79dfc248c1f5aea4b8b32c5d295e57fa9c0fe662a46b7f71cd47744db86c50b704c98ad90295c7b2c7439a2d78ccfa79b5fc2bff6bbf840262bf89394b3e0691953264d2700c838fa2c7b3425260f59554e502dcea39cb313b0000000000004ca7c12f45858d6284ca6270d6b2f0e58fded8a7b4a302a97bc641df07720ba2b26bbfcc807ca0abb1b44322269c21c5ec68cb068ea88067d905ea917bb03eefdaebdeabf2d0dce80997c915c8949de992587c2cb5fe360500000000000000b77940b5f07722e47a08d3679507000000000000934b99b3109af65d77e86abd6859cddf4bbae1f0930462df15fddbc48562ea3511a8065ef028cf12f14dcf6ebecd8d884836174faf1aa609e5f1ee1062dfa13bdc1fa7cfaadba85c72e9758f03a755d0be53f8d2a1df0d07b3d5bd3b01faffd0addbed2881a9700af561ac8c7e36bb2fc4c40e9c766c06817bb903729a7db6ff957697c9ede7885d94ffb0759be0daf60af93109eb1dee72e4363f51af62af6fb2a6df3bec89822a7a0b678058fa3fef86faec216eb6992162f8dcbf719c1484d2f9c55f4901203a9a8a2c3e90f39c3dbc10360a1a49700d1dfbf66d69f6fbaf506c8bcce8bb0d872a02238926407a4eddd5d0000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000510b00", 0x1000}}, 0x1006) 21m33.815869345s ago: executing program 2 (id=2062): fsopen(&(0x7f0000000100)='xfs\x00', 0x1) 21m32.952161592s ago: executing program 2 (id=2063): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000180)=ANY=[], 0x8) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000140)="82", 0x1}, {&(0x7f0000000500)="bd", 0x1}], 0x2}}], 0x1, 0x4400c800) 21m32.374685354s ago: executing program 2 (id=2064): openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x129942, 0x18) timer_create(0x0, &(0x7f0000000080)={0x0, 0x21, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x100000a, 0x204031, 0xffffffffffffffff, 0x1bf5f000) unlinkat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x0) 21m31.386069619s ago: executing program 2 (id=2065): syz_io_uring_setup(0x29c, &(0x7f0000000300)={0x0, 0x14ba, 0x8, 0x1, 0x133}, &(0x7f0000000040), 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000000)={0x1, 0x5}, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000040)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x2, 0xb3, &(0x7f0000000140)=""/179, 0x41100, 0x7b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x38}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(r0, 0x1, &(0x7f0000000100)={0x6, 0x1}, &(0x7f0000000280)) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x6, 0x4, 0x1010, 0x89, 0x0, 0xffffffffffffffff, 0x7}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000380), &(0x7f0000000000), 0x80, r5, 0x0, 0x7}, 0x38) io_uring_setup(0x4b9a, &(0x7f0000000400)={0x0, 0xf819, 0x2000, 0x1, 0x107}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000006c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000680)={&(0x7f0000000900)={0x1a4, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [{{0x8}, {0x188, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x8805}, 0x11) 20m45.591884785s ago: executing program 33 (id=2065): syz_io_uring_setup(0x29c, &(0x7f0000000300)={0x0, 0x14ba, 0x8, 0x1, 0x133}, &(0x7f0000000040), 0x0) write$USERIO_CMD_SET_PORT_TYPE(0xffffffffffffffff, &(0x7f0000000000)={0x1, 0x5}, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000040)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x2, 0xb3, &(0x7f0000000140)=""/179, 0x41100, 0x7b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x38}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(r0, 0x1, &(0x7f0000000100)={0x6, 0x1}, &(0x7f0000000280)) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x48, 0x2, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_REVISION={0x5, 0x4, 0x1}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'hash:mac\x00'}]}, 0x48}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x6, 0x4, 0x1010, 0x89, 0x0, 0xffffffffffffffff, 0x7}, 0x50) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000840)={0x0, &(0x7f0000000780)=""/106, &(0x7f0000000380), &(0x7f0000000000), 0x80, r5, 0x0, 0x7}, 0x38) io_uring_setup(0x4b9a, &(0x7f0000000400)={0x0, 0xf819, 0x2000, 0x1, 0x107}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r4, &(0x7f00000006c0)={&(0x7f00000004c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000680)={&(0x7f0000000900)={0x1a4, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [{{0x8}, {0x188, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @name={{0x24}, {0x5}, {0xe, 0x4, 'broadcast\x00'}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x19, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x1a4}, 0x1, 0x0, 0x0, 0x8805}, 0x11) 15m25.202157927s ago: executing program 3 (id=2481): r0 = socket$kcm(0x2d, 0x2, 0x0) sendmsg$NL80211_CMD_NEW_KEY(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000140)=ANY=[@ANYBLOB='|\x00\x00', @ANYRES16, @ANYBLOB="0108"], 0x7c}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000140)={r0}) 15m24.921972441s ago: executing program 3 (id=2482): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="1802000000000000000000000000000018", @ANYRES32], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x12, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local, @loopback}, 0xc) 15m24.614184857s ago: executing program 3 (id=2483): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_hfsc={{0x9}, {0x14, 0x2, @TCA_HFSC_FSC={0x10, 0x2, {0x4d, 0xfffffffb, 0x7fffffff}}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000000}, 0x20040084) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000001f80)=@newqdisc={0x24, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdf8, {0x0, 0x0, 0x0, r3, {0x10}, {}, {0xa, 0x4}}}, 0x24}, 0x1, 0x0, 0x0, 0x40098}, 0x0) 15m23.988978859s ago: executing program 3 (id=2484): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x800) sendmmsg$alg(r1, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x40800) readv(r1, &(0x7f0000001540)=[{&(0x7f0000000540)=""/4096, 0xfdef}], 0x1) 15m22.470747838s ago: executing program 3 (id=2485): ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000040)={0x82, 0x11fe, 0x0, 0x717e387b, 0x40, "1ae34e0626788a22b2fb12dab240794233a5bd", 0x1, 0x2}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x60081, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x15) ioctl$TCSETS(r0, 0x404c4701, &(0x7f0000000040)={0x1, 0x0, 0x0, 0x400000, 0x35, "3eccd8000000000000000010000000040100"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000180)=0xf9) ioctl$TIOCSTI(r0, 0x5412, &(0x7f00000001c0)=0xd) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000280)=0xb3) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000100)=0x3) 15m19.793793655s ago: executing program 3 (id=2486): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x40f00, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) r1 = openat$sndseq(0xffffff9c, &(0x7f0000000340), 0x404e80) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000380)={0x7, 0x9, 0x1, 'queue0\x00', 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) ioprio_set$pid(0x2, 0x0, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0xc2900, 0x0) sendfile(r4, r5, 0x0, 0x201f00) 15m4.462424995s ago: executing program 1 (id=2500): socket$nl_route(0x10, 0x3, 0x0) ioctl$FS_IOC_GETFSSYSFSPATH(0xffffffffffffffff, 0x80811501, 0x0) io_submit(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000003, 0x4c831, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) ioctl$sock_inet_SIOCGARP(0xffffffffffffffff, 0x8954, 0x0) r0 = socket(0xa, 0x3, 0x3a) setsockopt$MRT6_DEL_MIF(r0, 0x29, 0xc8, 0x0, 0xc000000) r1 = socket$inet6(0xa, 0x3, 0x7) sendmmsg$inet6(r1, &(0x7f0000004580)=[{{&(0x7f0000000080)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='$'], 0x28}}], 0x1, 0x0) 15m3.794954569s ago: executing program 1 (id=2501): r0 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000040), 0x2) r1 = memfd_create(&(0x7f0000000140)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xcda\x9b\x11X\x0e\xa1\xcf\x1a\x98S7\xc9\x00'/47, 0x2) ftruncate(r1, 0xffff) fcntl$addseals(r1, 0x409, 0x7) r2 = ioctl$UDMABUF_CREATE(r0, 0x40187542, &(0x7f0000000000)={r1, 0x0, 0x0, 0x8000}) ioctl$DMA_BUF_IOCTL_SYNC(r2, 0x40086200, &(0x7f00000001c0)) 15m3.064826036s ago: executing program 1 (id=2502): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = getpid() r2 = socket(0x10, 0x2, 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0x4c) fstat(r2, &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f00000000c0)="10", 0x1}], 0x1, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r1, r4}}}, @cred={{0x1c, 0x1, 0x2, {r1, r4, r3}}}], 0x58}, 0x8841) 15m2.518444404s ago: executing program 1 (id=2503): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff0000/0xd000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fe9000/0x3000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) syz_usb_connect$cdc_ncm(0x6, 0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="1201500202000902710002010420040904000001020d0000052406000105240006000d240f0106000000020006000606241a05ed0d1524120004a317a88b045e4f01a607c0ffcb7e392a09058103000258057f0904010000020d00000904010102020d"], 0x0) syz_usb_connect$cdc_ncm(0x4, 0xd1, &(0x7f0000000040)=ANY=[@ANYBLOB="12011003020000182505a1a44000010203010902bf0002010650000900000000020d00000524060001082400a9b30d240f010a0000000300ff000606241a05001407240a050905580c240c00000000a90c0900030424020204240200042406024424"], 0x0) syz_usb_connect(0x3, 0xf5, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000772aed408680070bb96c010203010902e30003dc2000000904003f000e01000505a40600010524007f000d240f0104000000080000000006241a03000a05240101070424020a1524120009a317a88b045e4f01a607c0ffcb7e392a09044c03003a92a2010a240109000102010205240401050c2402"], 0x0) 15m0.654808371s ago: executing program 1 (id=2504): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r1 = socket$packet(0x11, 0x2, 0x300) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000180)=r2, 0x4) syz_emit_ethernet(0x41, &(0x7f0000000040)={@local, @local, @void, {@ipv6={0x86dd, @generic={0x6, 0x6, "540500", 0xb, 0x2c, 0x0, @local, @local, {[@routing={0x3a, 0x0, 0x0, 0x7}], "abc003"}}}}}, 0x0) 14m59.871400291s ago: executing program 1 (id=2505): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbee7, 0x8031, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r4 = syz_create_resource$binfmt(&(0x7f0000000040)='./file1\x00') r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_newnexthop={0x1c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004880}, 0x0) r6 = openat$binfmt(0xffffffffffffff9c, r4, 0x42, 0x1ff) close(r6) r7 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f00000001c0)={0x3, {{0xa, 0x4e24, 0x2, @mcast1, 0xff7ffffd}}, {{0xa, 0x4e08, 0x4a3, @local, 0x4f1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r7, 0x29, 0x30, &(0x7f0000000d40)=ANY=[@ANYBLOB="030000000a004e230000000cff010000000000000000000000000001f8ffffff"], 0x210) mount(&(0x7f0000000040)=@nullb, &(0x7f0000000000)='./cgroup\x00', &(0x7f00000002c0)='adfs\x00', 0x8000, 0x0) 14m33.312407849s ago: executing program 34 (id=2486): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x40f00, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) r1 = openat$sndseq(0xffffff9c, &(0x7f0000000340), 0x404e80) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000380)={0x7, 0x9, 0x1, 'queue0\x00', 0x42}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) ioprio_set$pid(0x2, 0x0, 0x0) r4 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000004002, 0x0) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000100), 0xc2900, 0x0) sendfile(r4, r5, 0x0, 0x201f00) 14m14.235994481s ago: executing program 35 (id=2505): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbee7, 0x8031, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r4 = syz_create_resource$binfmt(&(0x7f0000000040)='./file1\x00') r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_newnexthop={0x1c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004880}, 0x0) r6 = openat$binfmt(0xffffffffffffff9c, r4, 0x42, 0x1ff) close(r6) r7 = socket(0xa, 0x1, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x2e, &(0x7f00000001c0)={0x3, {{0xa, 0x4e24, 0x2, @mcast1, 0xff7ffffd}}, {{0xa, 0x4e08, 0x4a3, @local, 0x4f1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r7, 0x29, 0x30, &(0x7f0000000d40)=ANY=[@ANYBLOB="030000000a004e230000000cff010000000000000000000000000001f8ffffff"], 0x210) mount(&(0x7f0000000040)=@nullb, &(0x7f0000000000)='./cgroup\x00', &(0x7f00000002c0)='adfs\x00', 0x8000, 0x0) 12m20.353280534s ago: executing program 4 (id=2624): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f05ebbee7, 0x8031, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) r4 = syz_create_resource$binfmt(&(0x7f0000000040)='./file1\x00') r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0xffffffffffffffff, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_newnexthop={0x1c, 0x68, 0x1, 0x0, 0x0, {}, [@NHA_BLACKHOLE={0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20004880}, 0x0) openat$binfmt(0xffffffffffffff9c, r4, 0x42, 0x1ff) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2e, &(0x7f00000001c0)={0x3, {{0xa, 0x4e24, 0x2, @mcast1, 0xff7ffffd}}, {{0xa, 0x4e08, 0x4a3, @local, 0x4f1}}}, 0x108) 11m50.223541386s ago: executing program 5 (id=2641): r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f0000000080)={0xc, 0x0, 0x0}) ioctl$IOMMU_VFIO_IOAS$SET(r0, 0x3b88, &(0x7f0000000200)={0xc, r1}) ioctl$IOMMU_VFIO_IOMMU_UNMAP_DMA(r0, 0x3b72, &(0x7f00000003c0)={0x18, 0x2, 0x1, 0x6}) 11m49.95487179s ago: executing program 5 (id=2642): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000001500)={0x1, 0x1, 0x0, &(0x7f0000000480)=""/74, 0x0}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000400)) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x0, 0x0, 0x0, &(0x7f0000000340)=""/185, &(0x7f0000000140)=""/92}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f00000000c0)=0x1) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x1}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, 0x0, 0x1a, 0x0, 0x2}, 0x28) connect$vsock_stream(r1, &(0x7f0000000200)={0x28, 0x0, 0xffffffff, @my=0x1}, 0x10) 11m47.555474994s ago: executing program 5 (id=2643): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) write$nci(r0, &(0x7f0000000340)=@NCI_OP_RF_INTF_ACTIVATED_NTF={0x1, 0x0, 0x3, 0x5, 0x6, @f={0x6, 0x1, 0x2, 0x2, 0x9, 0x8, 0xa, {0x55}, 0x0, 0x9, 0xbd, 0x5}}, 0x11) 11m47.296423707s ago: executing program 5 (id=2644): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001200)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0xa}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x54, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x2c, 0x4, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, @immediate={{0xe}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_IMMEDIATE_DREG={0x8}, @NFTA_IMMEDIATE_DATA={0x8, 0x2, 0x0, 0x1, [@NFTA_DATA_VALUE={0x4}]}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xc8}}, 0x0) 11m47.075631298s ago: executing program 5 (id=2645): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x50, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r2, 0x31, 0x455965fb809f3fbf}, [@IFLA_IFALIASn={0x4}, @IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @bridge_slave={{0x11}, {0x14, 0x5, 0x0, 0x1, [@IFLA_BRPORT_COST={0x8, 0x3, 0x40}, @IFLA_BRPORT_NEIGH_SUPPRESS={0x5, 0x20, 0x1}]}}}]}, 0x50}, 0x1, 0x0, 0x0, 0x20040800}, 0x0) 11m46.394231773s ago: executing program 5 (id=2646): getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], 0x0, 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f0000003280)={0x73622a85, 0xa, 0x4}) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x4, 0x0, &(0x7f0000000100)=[@exit_looper], 0x0, 0x0, 0x0}) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$int_in(r5, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r5, 0xaf02, 0x0) 11m36.285914094s ago: executing program 4 (id=2647): fsopen(&(0x7f0000000040)='debugfs\x00', 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000280)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(sm4)\x00'}, 0x58) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) syz_fuse_handle_req(0xffffffffffffffff, &(0x7f0000000000)="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", 0x2000, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002a00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[], 0xd0}}], 0x1, 0x24044c41) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000140)="2c385aa3d49100dc6626c892b6bc436a", 0x10) creat(&(0x7f0000000040)='./bus\x00', 0x80) pipe2(0x0, 0x0) splice(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x7c1c, 0x8) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xf4, 0x10000}, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000000)=0x7) r1 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x143102) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) syz_pidfd_open(0x0, 0x0) writev(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) r3 = dup3(0xffffffffffffffff, r2, 0x0) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000340)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f00000001c0)={0x4c, 0x0, &(0x7f0000000580)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x58, 0x18, &(0x7f0000000680)={@ptr={0x70742a85, 0x1, &(0x7f0000000440)=""/67, 0x43, 0x0, 0x7}, @flat=@binder={0x73622a85, 0x101, 0x4}, @flat=@binder={0x73622a85, 0x1000}}, &(0x7f0000000240)={0x0, 0x28, 0x40}}, 0x1000}], 0x0, 0x0, 0x0}) 11m33.386650253s ago: executing program 4 (id=2648): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0x26f}], 0x1}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x24044010) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000780)="f4000900062b2c25fe80000000000000dc8b850f238466ccfe807a000000ad6e911b518184", 0x25}], 0x1}, 0x0) 11m32.356176226s ago: executing program 4 (id=2649): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="1f003300d00000000802110000"], 0x3c}}, 0x10) 11m29.071370965s ago: executing program 4 (id=2650): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, 0x0) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) fcntl$lock(r0, 0x24, &(0x7f0000000000)={0x1, 0x2, 0x5284, 0x7fff, r1}) 11m28.711891493s ago: executing program 4 (id=2651): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) 11m0.594525431s ago: executing program 36 (id=2646): getpid() bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], 0x0, 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r3, 0x4018620d, &(0x7f0000003280)={0x73622a85, 0xa, 0x4}) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f0000000080)={0x4, 0x0, &(0x7f0000000100)=[@exit_looper], 0x0, 0x0, 0x0}) r5 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$int_in(r5, 0x40000000af01, 0x0) ioctl$VHOST_NET_SET_BACKEND(r5, 0xaf02, 0x0) 10m43.375592418s ago: executing program 37 (id=2651): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) 10m25.844462001s ago: executing program 6 (id=2652): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) move_mount(0xffffffffffffffff, &(0x7f0000000100)='.\x00', 0xffffffffffffff9c, 0x0, 0x51) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x67cf, 0x2, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={0x0}, 0x1, 0x0, 0x0, 0x4040054}, 0x4000) mount(0x0, 0x0, &(0x7f0000000080)='xfs\x00', 0x2208004, 0x0) mount$cgroup(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0), 0x2010042, 0x0) r3 = syz_open_procfs(r0, &(0x7f00000001c0)='mountinfo\x00') read$FUSE(r3, &(0x7f0000003480)={0x2020}, 0x2020) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) sendmsg$inet6(r4, &(0x7f00000000c0)={&(0x7f00000001c0)={0xa, 0x4e23, 0x80000, @private1={0xfc, 0x1, '\x00', 0x1}}, 0x1c, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="110000000000000029000000", @ANYRES16=r4], 0x18}, 0x2000c8d0) 10m15.74680763s ago: executing program 6 (id=2654): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000f00)={0x4, 0x4, &(0x7f00000003c0)=@framed={{0x18, 0x2, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x87}]}, &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0xe, 0x0, &(0x7f0000000000)="e06921e8682d85ff9782762f86dd", 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 10m15.386002049s ago: executing program 6 (id=2655): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000004c0)=0x79, 0x4) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000280)=[{0x6, 0xfd, 0x0, 0xe4}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200047fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000000c0)=ANY=[], 0x134}}, 0x40008) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000002c0)='bbr', 0x37) write$binfmt_elf64(r1, &(0x7f0000000f80)=ANY=[], 0x540) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r1) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)={0xac, r2, 0x4, 0x70bd27, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x161a, 0x51}}}}, [@NL80211_ATTR_FRAME={0x8c, 0x33, @mgmt_frame=@action={{{0x0, 0x0, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1}, {0x5}, @device_b, @device_b, @from_mac=@broadcast, {0x0, 0x226}, @value=@ver_80211n={0x0, 0x100, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1}}, @tdls_teardown={0xc, 0x3, {0x29, {0x37, 0x52, {0xde, 0x0, "89afeda33f8365b08a87cbdabfe86176", "94c6f8b98fc791ff98bdbf904d1d7fcbcb8276055badd46a823c2e1ed1e78dd5", "c16595490462bc8a1e67a3ef24693ef731ec405b552af55321261c7e507282ff"}}, {0x65, 0x12, {@initial, @device_a, @device_b}}}}}}]}, 0xac}, 0x1, 0x0, 0x0, 0x41c1}, 0x4008000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r1) shutdown(r0, 0x1) 10m14.235909309s ago: executing program 6 (id=2656): r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000000)={0x1d, r1}, 0x10) readv(r0, &(0x7f0000000fc0)=[{&(0x7f0000003880)=""/4102, 0x1006}], 0x1) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f00000003c0)=0x1, 0x4) sendmsg$can_raw(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=@can={{}, 0x7, 0x1, 0x0, 0x0, "0000000000000003"}, 0x10}, 0x1, 0x0, 0x0, 0x4000004}, 0x20004000) 10m11.364495736s ago: executing program 6 (id=2657): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) r3 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x85, &(0x7f0000000ac0), 0x90) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffff85850000007100000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) setpriority(0x0, r0, 0x6) keyctl$restrict_keyring(0xa, 0x0, 0x0, 0x0) 9m58.140386937s ago: executing program 7 (id=2653): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001180)={0x0, 0x0, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0x26f}], 0x1}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, 0x0, 0x24044010) r1 = socket$kcm(0xa, 0x922000000003, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f00000000c0), 0x4) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x0, @mcast1, 0x9}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000780)="f4000900062b2c25fe80000000000000dc8b850f238466ccfe807a000000ad6e911b518184", 0x25}], 0x1}, 0x0) 9m57.476372191s ago: executing program 7 (id=2658): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x6, 0xe, 0x13e, 0x89, 0xffffffff, 0x2}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1) 9m56.672421172s ago: executing program 7 (id=2659): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad00"/16, 0x10) recvmmsg(r1, &(0x7f0000002440), 0x3ffffffffffff67, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000003340)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000003100)=""/221, 0xdd}], 0x1}, 0x2) 9m25.530791626s ago: executing program 38 (id=2657): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file1\x00'}, 0x6e) r3 = socket$kcm(0x2, 0x1, 0x84) setsockopt$sock_attach_bpf(r3, 0x84, 0x85, &(0x7f0000000ac0), 0x90) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000ffffff85850000007100000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) setpriority(0x0, r0, 0x6) keyctl$restrict_keyring(0xa, 0x0, 0x0, 0x0) 9m11.336459197s ago: executing program 39 (id=2659): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000100)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad00"/16, 0x10) recvmmsg(r1, &(0x7f0000002440), 0x3ffffffffffff67, 0x0, 0x0) recvmsg$kcm(r1, &(0x7f0000003340)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000003100)=""/221, 0xdd}], 0x1}, 0x2) 21.564063247s ago: executing program 9 (id=3222): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc200011800e000100636f6e6e6c696d69740000000c00028008000140fffff27414000000110001"], 0x84}, 0x1, 0x0, 0x0, 0x40008d0}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x60}, 0x1, 0x0, 0x0, 0x24000840}, 0x40) 20.422832916s ago: executing program 9 (id=3224): r0 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') name_to_handle_at(r0, &(0x7f0000000000)='./mnt\x00', &(0x7f0000000100)=@raw={0x10, 0x0, {"4eb8de6014f363a6ea50eef493ad"}}, 0x0, 0x600) 19.626124447s ago: executing program 9 (id=3226): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x6, 0x4, 0x4, 0x4, 0x0, 0x1}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0x14, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000080)={r4, 0x1}, 0xc) 16.187499434s ago: executing program 8 (id=3232): r0 = socket$inet6(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000190001000000000000000000021800000000fd000000ed0008000100ac1414000800080004"], 0x2c}}, 0x0) sendto$inet6(r0, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) 15.67390604s ago: executing program 8 (id=3233): memfd_create(&(0x7f0000000540)='y\x105\xfb\xf7u\x83%\x1f\xe09@:r\xc2\xb9x0\x90P\x03\x00\x00\x00\x00\x00\x00\x00\xfe,\x1c\xf1\xdd\xcf]\xac\xbc\t\xbb\xfc\xa4j\x9f\xceX\x8f5=\xaa\xd5\xe9n\xab s\xa5\x18\x8d\tV\t\x91\x18\x06O\xb0=D\xda\xb6F\x1a\xc82\x8b\xc0l\xd0\x89d\xe6\xb7\xd8\x97\xb8\xde\xa3\x89\"%/u\x17\xdam\x8d\x01Lh\x1e^\x9ej\x1c\xc5\xf0\xf6\x92\x05\x9aH\x00\'\xd4\x94d[\v\xfc\xad\x0f\xa8\xc5\xad\x001\x8b%\xaa?\x00\x00\x00\x00\x00\x00\x00\nj\x8c\xef\x90\xc0Z\xfa\x1a\xb3\xf0wVq\xe9d\xf8N\x80\xd1g\xd8e\xc8\x16\xad1\x02\xab\xce3\xb2\xb0\xd1\x11\xf0\xc2Gj+kV', 0x2) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="3c0200001900010000000000000000000a0101000000000000000000000000000a01010100000000000000000000000000000003000000000200002008000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fcffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001e0000000000000001000000000000000000000000000000fdffffffffffffffdd02040040000000040000000000000000000100000000008401050020010000000000000000000000000001000000002b00000000000000fc010000000000000000000000000001000000000000ff000000000000000000000000000000000000000000000000000000000100000000320000000000000000000000000000000000fffffffffffffeffffff0000000000000000000000000700000000000000000000000000000000000001000000003c"], 0x23c}}, 0x8000000) 15.411148104s ago: executing program 8 (id=3234): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000002c0), 0x1) write$sndseq(r0, &(0x7f0000000500)=[{0x84, 0x73, 0x0, 0x4, @tick, {}, {}, @note={0x4, 0x7, 0xd, 0x9, 0x98}}], 0x1c) 15.281962651s ago: executing program 8 (id=3235): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xffe0}, {0xffff, 0xffff}, {0x10}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x14, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0xe, 0x3, 0x1, 0x1}}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x51}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000cc0)=@newqdisc={0x138, 0x24, 0xd0f, 0x200000, 0x0, {0x60, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x0, 0xb}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x108, 0x2, [@TCA_GRED_STAB={0x104, 0x2, "abcc61b4e508c02286f1bafc7a22c407a52b0e13291c865d493f15736245f220cd4e40006df455836aa3bd3aaa2c9b95578719c46f89e0179832927deecf7465ea95bd97b018b7afaccdcb28bb42d677b73c44e790f0875fb4b795ca95b7dd712d2c5d69945535f92f74a71236749b077cc85e96554beb53c986a216051bd5979a8cfcfe9f98be58ff7944f6cfda8579dbaedceee578bfd1fb554b6e185e9315425ef0a3fc69d17ede93fc7c46357990604b9f12033688caa0b04adecfc926b3f6ca25bcb5432905e3f30ccbf10cf0f2d00858ba2bbd2702b8d4a7a7c744fbaa2fa35b1c586020d600"}]}}]}, 0x138}}, 0x24040004) 14.944462388s ago: executing program 8 (id=3236): unshare(0x20040600) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000a80)={{0x2, 0x4e23, @empty}, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x4a, {0x2, 0x0, @rand_addr=0x64010101}, 'lo\x00'}) 14.831386494s ago: executing program 8 (id=3237): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = getpgrp(0x0) r4 = syz_pidfd_open(r3, 0x0) fremovexattr(r4, &(0x7f0000000280)=@known='trusted.overlay.nlink\x00') bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x94) 1.092663449s ago: executing program 9 (id=3238): timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x3938700}}, 0x0) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) bpf$PROG_BIND_MAP(0x23, 0x0, 0x0) 342.744351ms ago: executing program 9 (id=3239): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r2, 0x0, {0x2, 0x0, 0x6}, 0xfe}, 0x18) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000280)="81b641f1f3843704b6", 0x9}], 0x1}, 0x4048081) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f0000000400)=[{0x1, 0x0, {0x1, 0xff, 0x4}, {0x2, 0x1}, 0xfe, 0x1}, {0x1, 0x3, {0x2}, {0x0, 0xf0, 0x1}, 0xff, 0x2}], 0x40) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=@newtfilter={0x24, 0x11, 0x1, 0x70bd26, 0x25dfdbfc, {0x0, 0x0, 0x74, r2, {0xb, 0xfff2}, {0xfff1, 0x9}, {0x2, 0xd}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4012}, 0x20000050) 0s ago: executing program 9 (id=3240): mkdir(&(0x7f0000000440)='./file1\x00', 0x0) r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x4f27, 0x5, 0x400005, 0x9, 0x1, 0xcc7, 0xfff, 0x5c952799, 0xfffffffa, 0x1, 0x802, 0x1602, 0x7fff, 0x0, 0x9, 0xe1cb, 0x6, 0x4, 0x3, 0x395, 0x80000089, 0xfffffffd, 0x0, 0x6, 0x1, 0x7, 0x1003c, 0xad79, 0x7, 0x8000000, 0x5]}) kernel console output (not intermixed with test programs): 0" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2580.529204][ T28] audit: type=1400 audit(2580.450:111668): avc: denied { unmount } for pid=17472 comm="syz.8.2830" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2580.640648][ T28] audit: type=1400 audit(2580.560:111669): avc: denied { prog_load } for pid=17475 comm="syz.9.2831" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2580.684926][ T28] audit: type=1400 audit(2580.590:111670): avc: denied { bpf } for pid=17475 comm="syz.9.2831" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2581.224977][ T28] audit: type=1400 audit(2581.140:111671): avc: denied { read } for pid=17475 comm="syz.9.2831" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2581.225324][ T28] audit: type=1400 audit(2581.140:111672): avc: denied { read open } for pid=17475 comm="syz.9.2831" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2583.468469][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 2583.468821][ T28] audit: type=1400 audit(2583.390:111680): avc: denied { create } for pid=17482 comm="syz.8.2832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2583.575074][ T28] audit: type=1400 audit(2583.490:111681): avc: denied { write } for pid=17482 comm="syz.8.2832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2583.609128][ T28] audit: type=1400 audit(2583.520:111682): avc: denied { read } for pid=17482 comm="syz.8.2832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2583.609375][ T28] audit: type=1400 audit(2583.520:111683): avc: denied { read } for pid=17482 comm="syz.8.2832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2589.864098][ T28] audit: type=1400 audit(2589.780:111684): avc: denied { name_bind } for pid=17493 comm="syz.8.2835" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2589.870443][ T28] audit: type=1400 audit(2589.790:111685): avc: denied { node_bind } for pid=17493 comm="syz.8.2835" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2590.402864][ T28] audit: type=1400 audit(2590.320:111686): avc: denied { create } for pid=17497 comm="syz.9.2837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2590.411805][ T28] audit: type=1400 audit(2590.330:111687): avc: denied { bind } for pid=17497 comm="syz.9.2837" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 2590.672691][T17500] A link change request failed with some changes committed already. Interface gre1 may have been left with an inconsistent configuration, please check. [ 2590.882707][ T28] audit: type=1400 audit(2590.800:111688): avc: denied { create } for pid=17503 comm="syz.9.2839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 2590.894679][ T28] audit: type=1400 audit(2590.810:111689): avc: denied { module_request } for pid=17503 comm="syz.9.2839" kmod="net-pf-37" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2591.108998][ T28] audit: type=1400 audit(2591.030:111690): avc: denied { mount } for pid=17503 comm="syz.9.2839" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 2591.127879][ T28] audit: type=1400 audit(2591.050:111691): avc: denied { module_request } for pid=17503 comm="syz.9.2839" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2591.379183][ T28] audit: type=1400 audit(2591.300:111692): avc: denied { sys_module } for pid=17503 comm="syz.9.2839" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2591.382881][ T28] audit: type=1400 audit(2591.300:111693): avc: denied { module_request } for pid=17503 comm="syz.9.2839" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2599.439068][ T28] kauditd_printk_skb: 334 callbacks suppressed [ 2599.439407][ T28] audit: type=1400 audit(2599.360:112028): avc: denied { create } for pid=17530 comm="syz.8.2849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2600.145970][ T28] audit: type=1400 audit(2600.060:112029): avc: denied { write } for pid=17530 comm="syz.8.2849" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2600.146388][ T28] audit: type=1400 audit(2600.060:112030): avc: denied { write open } for pid=17530 comm="syz.8.2849" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2600.172610][ T28] audit: type=1400 audit(2600.090:112031): avc: denied { ioctl } for pid=17530 comm="syz.8.2849" path="/dev/snd/seq" dev="devtmpfs" ino=720 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2601.196863][ T28] audit: type=1400 audit(2601.120:112032): avc: denied { read write } for pid=17538 comm="syz.9.2851" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2601.202689][ T28] audit: type=1400 audit(2601.120:112033): avc: denied { read write open } for pid=17538 comm="syz.9.2851" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2601.212391][ T28] audit: type=1400 audit(2601.130:112034): avc: denied { mounton } for pid=17538 comm="syz.9.2851" path="/89/file0" dev="tmpfs" ino=469 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2601.258231][ T28] audit: type=1400 audit(2601.180:112035): avc: denied { mount } for pid=17538 comm="syz.9.2851" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2603.699565][ T28] audit: type=1400 audit(2603.620:112036): avc: denied { unmount } for pid=16298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2604.002045][ T28] audit: type=1400 audit(2603.920:112037): avc: denied { map_create } for pid=17544 comm="syz.9.2852" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2607.156720][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 2607.158649][ T28] audit: type=1400 audit(2607.080:112042): avc: denied { name_bind } for pid=17550 comm="syz.9.2855" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2607.173297][ T28] audit: type=1400 audit(2607.090:112043): avc: denied { node_bind } for pid=17550 comm="syz.9.2855" saddr=224.0.0.2 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2608.832397][ T28] audit: type=1400 audit(2608.750:112044): avc: denied { read write } for pid=17552 comm="syz.8.2856" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2608.837852][ T28] audit: type=1400 audit(2608.760:112045): avc: denied { read write open } for pid=17552 comm="syz.8.2856" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2608.852333][ T28] audit: type=1400 audit(2608.770:112046): avc: denied { mounton } for pid=17552 comm="syz.8.2856" path="/103/file0" dev="tmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2608.865997][ T28] audit: type=1400 audit(2608.790:112047): avc: denied { mount } for pid=17552 comm="syz.8.2856" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2610.083739][ T28] audit: type=1400 audit(2610.000:112048): avc: denied { create } for pid=17558 comm="syz.9.2858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2610.092955][ T28] audit: type=1400 audit(2610.010:112049): avc: denied { write } for pid=17558 comm="syz.9.2858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2610.107523][ T28] audit: type=1400 audit(2610.030:112050): avc: denied { module_request } for pid=17558 comm="syz.9.2858" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2610.329505][ T28] audit: type=1400 audit(2610.250:112051): avc: denied { read } for pid=17558 comm="syz.9.2858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2612.211560][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 2612.215224][ T28] audit: type=1400 audit(2612.130:112064): avc: denied { read } for pid=17571 comm="syz.9.2861" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2612.217450][ T28] audit: type=1400 audit(2612.130:112065): avc: denied { read open } for pid=17571 comm="syz.9.2861" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2612.231917][ T28] audit: type=1400 audit(2612.150:112066): avc: denied { ioctl } for pid=17571 comm="syz.9.2861" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2613.028446][ T28] audit: type=1400 audit(2612.950:112067): avc: denied { allowed } for pid=17567 comm="syz.8.2860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2613.069857][ T28] audit: type=1400 audit(2612.950:112068): avc: denied { create } for pid=17567 comm="syz.8.2860" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2613.079213][ T28] audit: type=1400 audit(2612.950:112069): avc: denied { map } for pid=17567 comm="syz.8.2860" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36252 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2613.079447][ T28] audit: type=1400 audit(2612.950:112070): avc: denied { read write } for pid=17567 comm="syz.8.2860" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36252 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2613.079564][ T28] audit: type=1400 audit(2612.980:112071): avc: denied { map } for pid=17567 comm="syz.8.2860" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36252 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2613.079604][ T28] audit: type=1400 audit(2612.980:112072): avc: denied { read write } for pid=17567 comm="syz.8.2860" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36252 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2613.200217][ T28] audit: type=1400 audit(2613.120:112073): avc: denied { name_bind } for pid=17578 comm="syz.9.2862" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2618.489142][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 2618.489501][ T28] audit: type=1400 audit(2618.410:112088): avc: denied { unmount } for pid=16298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2618.780935][ T28] audit: type=1400 audit(2618.700:112089): avc: denied { allowed } for pid=17592 comm="syz.9.2865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2618.789053][ T28] audit: type=1400 audit(2618.700:112090): avc: denied { create } for pid=17592 comm="syz.9.2865" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2618.829754][ T28] audit: type=1400 audit(2618.750:112091): avc: denied { name_bind } for pid=17592 comm="syz.9.2865" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2618.847319][ T28] audit: type=1400 audit(2618.770:112092): avc: denied { node_bind } for pid=17592 comm="syz.9.2865" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2619.671544][ T28] audit: type=1400 audit(2619.590:112093): avc: denied { create } for pid=17595 comm="syz.9.2866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2619.693390][ T28] audit: type=1400 audit(2619.610:112094): avc: denied { setopt } for pid=17595 comm="syz.9.2866" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2619.789640][ T28] audit: type=1400 audit(2619.710:112095): avc: denied { create } for pid=17597 comm="syz.9.2868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2619.809486][ T28] audit: type=1400 audit(2619.730:112096): avc: denied { write } for pid=17597 comm="syz.9.2868" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2619.824183][ T28] audit: type=1400 audit(2619.740:112097): avc: denied { module_request } for pid=17597 comm="syz.9.2868" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2621.098885][T17601] netlink: 27 bytes leftover after parsing attributes in process `syz.8.2867'. [ 2624.026054][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 2624.026372][ T28] audit: type=1400 audit(2623.940:112131): avc: denied { allowed } for pid=17620 comm="syz.8.2874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2624.045900][ T28] audit: type=1400 audit(2623.950:112132): avc: denied { sqpoll } for pid=17620 comm="syz.8.2874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2624.052173][ T28] audit: type=1400 audit(2623.970:112133): avc: denied { create } for pid=17620 comm="syz.8.2874" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2624.085196][ T28] audit: type=1400 audit(2624.000:112134): avc: denied { map } for pid=17620 comm="syz.8.2874" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36310 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2624.130645][ T28] audit: type=1400 audit(2624.040:112135): avc: denied { read write } for pid=17620 comm="syz.8.2874" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36310 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2624.191540][ T28] audit: type=1400 audit(2624.110:112136): avc: denied { map } for pid=17620 comm="syz.8.2874" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36310 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2624.193535][ T28] audit: type=1400 audit(2624.110:112137): avc: denied { read write } for pid=17620 comm="syz.8.2874" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=36310 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2624.455462][ T28] audit: type=1400 audit(2624.370:112138): avc: denied { read write } for pid=17620 comm="syz.8.2874" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2624.455878][ T28] audit: type=1400 audit(2624.370:112139): avc: denied { read write open } for pid=17620 comm="syz.8.2874" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2624.590823][ T28] audit: type=1400 audit(2624.480:112140): avc: denied { mounton } for pid=17620 comm="syz.8.2874" path="/109/file0" dev="tmpfs" ino=567 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2629.148469][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 2629.149818][ T28] audit: type=1400 audit(2629.070:112175): avc: denied { name_bind } for pid=17640 comm="syz.8.2880" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 2629.156670][ T28] audit: type=1400 audit(2629.080:112176): avc: denied { node_bind } for pid=17640 comm="syz.8.2880" saddr=::1 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2629.370227][ T28] audit: type=1400 audit(2629.290:112177): avc: denied { allowed } for pid=17642 comm="syz.8.2881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2629.380942][ T28] audit: type=1400 audit(2629.300:112178): avc: denied { create } for pid=17642 comm="syz.8.2881" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2629.393974][ T28] audit: type=1400 audit(2629.310:112179): avc: denied { name_bind } for pid=17642 comm="syz.8.2881" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2629.403699][ T28] audit: type=1400 audit(2629.320:112180): avc: denied { node_bind } for pid=17642 comm="syz.8.2881" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2630.690964][ T28] audit: type=1400 audit(2630.610:112181): avc: denied { read write } for pid=17644 comm="syz.8.2882" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2630.691483][ T28] audit: type=1400 audit(2630.610:112182): avc: denied { read write open } for pid=17644 comm="syz.8.2882" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2630.709249][ T28] audit: type=1400 audit(2630.630:112183): avc: denied { ioctl } for pid=17644 comm="syz.8.2882" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2630.716248][ T28] audit: type=1400 audit(2630.630:112184): avc: denied { ioctl } for pid=17644 comm="syz.8.2882" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2630.722772][T17647] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2630.728621][T17647] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2635.572323][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 2635.573327][ T28] audit: type=1400 audit(2635.490:112194): avc: denied { name_bind } for pid=17651 comm="syz.9.2883" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2635.576721][ T28] audit: type=1400 audit(2635.490:112195): avc: denied { node_bind } for pid=17651 comm="syz.9.2883" saddr=::ffff:172.20.20.11 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2635.927564][ T28] audit: type=1400 audit(2635.850:112196): avc: denied { read write } for pid=17653 comm="syz.9.2884" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2635.930447][ T28] audit: type=1400 audit(2635.850:112197): avc: denied { read write open } for pid=17653 comm="syz.9.2884" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2636.485749][ T28] audit: type=1400 audit(2636.400:112198): avc: denied { read } for pid=17655 comm="syz.9.2885" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2636.502869][ T28] audit: type=1400 audit(2636.420:112199): avc: denied { read open } for pid=17655 comm="syz.9.2885" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2636.518316][ T28] audit: type=1400 audit(2636.440:112200): avc: denied { ioctl } for pid=17655 comm="syz.9.2885" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2636.583612][ T28] audit: type=1400 audit(2636.500:112201): avc: denied { ioctl } for pid=17655 comm="syz.9.2885" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2637.200994][ T28] audit: type=1400 audit(2637.120:112202): avc: denied { allowed } for pid=17661 comm="syz.9.2886" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2637.247291][ T28] audit: type=1400 audit(2637.170:112203): avc: denied { create } for pid=17661 comm="syz.9.2886" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2638.665886][T17666] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 2638.665886][T17666] The task syz.9.2887 (17666) triggered the difference, watch for misbehavior. [ 2640.612190][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 2640.612583][ T28] audit: type=1400 audit(2640.530:112208): avc: denied { create } for pid=17669 comm="syz.9.2889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2640.637586][ T28] audit: type=1400 audit(2640.560:112209): avc: denied { setopt } for pid=17669 comm="syz.9.2889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2641.541068][ T28] audit: type=1400 audit(2641.460:112210): avc: denied { create } for pid=17671 comm="syz.9.2890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2641.564028][ T28] audit: type=1400 audit(2641.480:112211): avc: denied { create } for pid=17671 comm="syz.9.2890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2641.568116][ T28] audit: type=1400 audit(2641.490:112212): avc: denied { ioctl } for pid=17671 comm="syz.9.2890" path="socket:[36373]" dev="sockfs" ino=36373 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2641.651215][ T28] audit: type=1400 audit(2641.570:112213): avc: denied { bind } for pid=17671 comm="syz.9.2890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2641.710330][ T28] audit: type=1400 audit(2641.630:112214): avc: denied { setopt } for pid=17671 comm="syz.9.2890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2641.729657][ T28] audit: type=1400 audit(2641.640:112215): avc: denied { write } for pid=17671 comm="syz.9.2890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2641.756321][ T28] audit: type=1400 audit(2641.680:112216): avc: denied { bind } for pid=17671 comm="syz.9.2890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2641.871316][ T28] audit: type=1400 audit(2641.790:112217): avc: denied { setopt } for pid=17671 comm="syz.9.2890" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2641.979491][ C1] vcan0: j1939_tp_rxtimer: 0x9299ce00: rx timeout, send abort [ 2642.487490][ C1] vcan0: j1939_tp_rxtimer: 0x9299ce00: abort rx timeout. Force session deactivation [ 2645.273408][ C1] vcan0: j1939_tp_rxtimer: 0x9299cb00: rx timeout, send abort [ 2645.772158][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 2645.773506][ T28] audit: type=1400 audit(2645.690:112251): avc: denied { allowed } for pid=17679 comm="syz.9.2894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2645.773785][ C1] vcan0: j1939_tp_rxtimer: 0x9299cb00: abort rx timeout. Force session deactivation [ 2645.802846][ T28] audit: type=1400 audit(2645.720:112252): avc: denied { create } for pid=17679 comm="syz.9.2894" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2645.826026][ T28] audit: type=1400 audit(2645.750:112253): avc: denied { map } for pid=17679 comm="syz.9.2894" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=37132 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2645.860568][ T28] audit: type=1400 audit(2645.750:112254): avc: denied { read write } for pid=17679 comm="syz.9.2894" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=37132 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2645.860914][ T28] audit: type=1400 audit(2645.780:112255): avc: denied { map } for pid=17679 comm="syz.9.2894" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=37132 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2645.861124][ T28] audit: type=1400 audit(2645.780:112256): avc: denied { read write } for pid=17679 comm="syz.9.2894" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=37132 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2645.909784][ T28] audit: type=1400 audit(2645.830:112257): avc: denied { execute } for pid=17679 comm="syz.9.2894" path="/116/cpu.stat" dev="tmpfs" ino=607 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2646.240457][ T28] audit: type=1400 audit(2646.160:112258): avc: denied { allowed } for pid=17685 comm="syz.8.2896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2646.298735][ T28] audit: type=1400 audit(2646.220:112259): avc: denied { create } for pid=17685 comm="syz.8.2896" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2646.725862][ T28] audit: type=1400 audit(2646.650:112260): avc: denied { read } for pid=17687 comm="syz.8.2897" name="pcmC0D0p" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2647.602677][T17694] netlink: 'syz.8.2900': attribute type 1 has an invalid length. [ 2652.738730][ T28] kauditd_printk_skb: 21 callbacks suppressed [ 2652.739115][ T28] audit: type=1400 audit(2652.660:112282): avc: denied { create } for pid=17716 comm="syz.9.2912" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2652.758158][ T28] audit: type=1400 audit(2652.680:112283): avc: denied { setopt } for pid=17716 comm="syz.9.2912" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2652.831556][ T28] audit: type=1400 audit(2652.750:112284): avc: denied { connect } for pid=17716 comm="syz.9.2912" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2652.881801][ T28] audit: type=1400 audit(2652.790:112285): avc: denied { read write } for pid=17718 comm="syz.8.2911" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2652.882270][ T28] audit: type=1400 audit(2652.800:112286): avc: denied { read write open } for pid=17718 comm="syz.8.2911" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2652.901026][ T28] audit: type=1400 audit(2652.820:112287): avc: denied { setopt } for pid=17716 comm="syz.9.2912" laddr=fe80::16 lport=58 faddr=ff02::1 fport=8191 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2652.909307][ T28] audit: type=1400 audit(2652.830:112288): avc: denied { write } for pid=17716 comm="syz.9.2912" path="socket:[36456]" dev="sockfs" ino=36456 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2652.936589][ T28] audit: type=1400 audit(2652.860:112289): avc: denied { write } for pid=17716 comm="syz.9.2912" laddr=fe80::16 lport=58 faddr=ff02::1 fport=8191 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2653.186514][ T28] audit: type=1400 audit(2653.110:112290): avc: denied { name_bind } for pid=17720 comm="syz.8.2913" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2653.189640][ T28] audit: type=1400 audit(2653.110:112291): avc: denied { node_bind } for pid=17720 comm="syz.8.2913" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2653.481912][T17729] fuse: Bad value for 'fd' [ 2654.261356][T17739] fuse: Bad value for 'fd' [ 2656.083556][T17751] fuse: Bad value for 'fd' [ 2658.293214][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 2658.298578][ T28] audit: type=1400 audit(2658.210:112318): avc: denied { create } for pid=17746 comm="syz.8.2926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2658.324151][ T28] audit: type=1400 audit(2658.240:112319): avc: denied { create } for pid=17746 comm="syz.8.2926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2659.405062][T17758] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=17758 comm=syz.8.2926 [ 2660.512420][ T28] audit: type=1400 audit(2660.430:112320): avc: denied { create } for pid=17746 comm="syz.8.2926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2660.560116][ T28] audit: type=1400 audit(2660.480:112321): avc: denied { write } for pid=17746 comm="syz.8.2926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2660.573491][ T28] audit: type=1400 audit(2660.490:112322): avc: denied { allowed } for pid=17746 comm="syz.8.2926" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2660.592017][ T28] audit: type=1400 audit(2660.510:112323): avc: denied { create } for pid=17746 comm="syz.8.2926" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2660.600068][ T28] audit: type=1400 audit(2660.520:112324): avc: denied { read } for pid=17746 comm="syz.8.2926" name="pcmC1D0c" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2660.602418][ T28] audit: type=1400 audit(2660.520:112325): avc: denied { read open } for pid=17746 comm="syz.8.2926" path="/dev/snd/pcmC1D0c" dev="devtmpfs" ino=730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2660.621362][ T28] audit: type=1400 audit(2660.540:112326): avc: denied { ioctl } for pid=17746 comm="syz.8.2926" path="/dev/snd/pcmC1D0c" dev="devtmpfs" ino=730 ioctlcmd=0x4161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2667.392782][ T28] audit: type=1400 audit(2667.310:112327): avc: denied { create } for pid=17760 comm="syz.8.2930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2667.438925][ T28] audit: type=1400 audit(2667.360:112328): avc: denied { write } for pid=17760 comm="syz.8.2930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2667.446261][ T28] audit: type=1400 audit(2667.360:112329): avc: denied { nlmsg_write } for pid=17760 comm="syz.8.2930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2667.755298][ T28] audit: type=1400 audit(2667.670:112330): avc: denied { create } for pid=17762 comm="syz.8.2931" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2667.773422][ T28] audit: type=1400 audit(2667.690:112331): avc: denied { setopt } for pid=17762 comm="syz.8.2931" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2667.787408][ T28] audit: type=1400 audit(2667.710:112332): avc: denied { write } for pid=17762 comm="syz.8.2931" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2667.797917][ T28] audit: type=1400 audit(2667.720:112333): avc: denied { read } for pid=17762 comm="syz.8.2931" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2668.231711][ T28] audit: type=1400 audit(2668.140:112334): avc: denied { read write } for pid=17764 comm="syz.8.2932" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2668.232040][ T28] audit: type=1400 audit(2668.150:112335): avc: denied { read write open } for pid=17764 comm="syz.8.2932" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2668.232247][ T28] audit: type=1400 audit(2668.150:112336): avc: denied { ioctl } for pid=17764 comm="syz.8.2932" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2674.110631][ T28] kauditd_printk_skb: 20 callbacks suppressed [ 2674.111092][ T28] audit: type=1400 audit(2673.540:112357): avc: denied { create } for pid=17779 comm="syz.8.2937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2674.111328][ T28] audit: type=1400 audit(2673.900:112358): avc: denied { read write } for pid=17779 comm="syz.8.2937" name="system" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2674.111545][ T28] audit: type=1400 audit(2673.900:112359): avc: denied { ioctl open } for pid=17779 comm="syz.8.2937" path="/dev/dma_heap/system" dev="devtmpfs" ino=661 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2674.111774][ T28] audit: type=1400 audit(2673.900:112360): avc: denied { ioctl } for pid=17779 comm="syz.8.2937" path="/dev/dma_heap/system" dev="devtmpfs" ino=661 ioctlcmd=0x4800 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2674.111966][ T28] audit: type=1400 audit(2673.900:112361): avc: denied { create } for pid=17779 comm="syz.8.2937" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2680.568787][ T28] audit: type=1400 audit(2680.490:112362): avc: denied { create } for pid=17783 comm="syz.8.2938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 2680.580863][ T28] audit: type=1400 audit(2680.500:112363): avc: denied { write } for pid=17783 comm="syz.8.2938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 2680.807150][ T28] audit: type=1400 audit(2680.730:112364): avc: denied { allowed } for pid=17785 comm="syz.8.2939" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2680.829004][ T28] audit: type=1400 audit(2680.750:112365): avc: denied { name_bind } for pid=17785 comm="syz.8.2939" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2680.849342][ T28] audit: type=1400 audit(2680.770:112366): avc: denied { node_bind } for pid=17785 comm="syz.8.2939" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2683.533863][ T28] audit: type=1400 audit(2683.450:112367): avc: denied { create } for pid=17788 comm="syz.8.2940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2683.542421][ T28] audit: type=1400 audit(2683.460:112368): avc: denied { connect } for pid=17788 comm="syz.8.2940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2683.555030][ T28] audit: type=1400 audit(2683.470:112369): avc: denied { write } for pid=17788 comm="syz.8.2940" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2683.925422][ T28] audit: type=1400 audit(2683.840:112370): avc: denied { create } for pid=17792 comm="syz.8.2942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2683.941682][ T28] audit: type=1400 audit(2683.860:112371): avc: denied { write } for pid=17792 comm="syz.8.2942" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2687.343752][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 2687.350306][ T28] audit: type=1400 audit(2687.260:112378): avc: denied { read } for pid=17799 comm="syz.8.2945" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2687.370198][ T28] audit: type=1400 audit(2687.290:112379): avc: denied { read open } for pid=17799 comm="syz.8.2945" path="mnt:[4026532655]" dev="nsfs" ino=4026532655 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2688.220289][ T28] audit: type=1400 audit(2688.140:112380): avc: denied { mounton } for pid=17803 comm="syz.8.2947" path="/160/file0" dev="tmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2688.236904][T17804] fuse: Bad value for 'fd' [ 2688.561126][ T28] audit: type=1400 audit(2688.480:112381): avc: denied { name_bind } for pid=17805 comm="syz.8.2948" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2688.587241][ T28] audit: type=1400 audit(2688.510:112382): avc: denied { node_bind } for pid=17805 comm="syz.8.2948" saddr=::ffff:172.20.20.11 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2688.923348][ T28] audit: type=1400 audit(2688.840:112383): avc: denied { read write } for pid=17807 comm="syz.8.2949" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2688.936285][ T28] audit: type=1400 audit(2688.860:112384): avc: denied { read write open } for pid=17807 comm="syz.8.2949" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2689.991236][ T28] audit: type=1400 audit(2689.910:112385): avc: denied { ioctl } for pid=17807 comm="syz.8.2949" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x540a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2690.484792][ T28] audit: type=1400 audit(2690.400:112386): avc: denied { mount } for pid=17815 comm="syz.9.2952" name="/" dev="ramfs" ino=37339 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 2690.521768][ T28] audit: type=1400 audit(2690.440:112387): avc: denied { ioctl } for pid=17807 comm="syz.8.2949" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2691.800033][T17821] netlink: 28 bytes leftover after parsing attributes in process `syz.8.2954'. [ 2691.803037][T17821] netlink: 20 bytes leftover after parsing attributes in process `syz.8.2954'. [ 2692.718017][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 2692.724125][ T28] audit: type=1400 audit(2692.640:112392): avc: denied { read write } for pid=17832 comm="syz.8.2958" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2692.742973][ T28] audit: type=1400 audit(2692.660:112393): avc: denied { read write open } for pid=17832 comm="syz.8.2958" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2692.755771][ T28] audit: type=1400 audit(2692.670:112394): avc: denied { mounton } for pid=17832 comm="syz.8.2958" path="/167/file0" dev="tmpfs" ino=865 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2692.785949][ T28] audit: type=1400 audit(2692.700:112395): avc: denied { mount } for pid=17832 comm="syz.8.2958" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2693.395775][ T28] audit: type=1400 audit(2693.300:112396): avc: denied { unmount } for pid=16009 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2694.147190][ T28] audit: type=1400 audit(2694.070:112397): avc: denied { name_bind } for pid=17837 comm="syz.8.2959" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2694.148726][ T28] audit: type=1400 audit(2694.070:112398): avc: denied { node_bind } for pid=17837 comm="syz.8.2959" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2694.326935][ T28] audit: type=1400 audit(2694.250:112399): avc: denied { module_request } for pid=17838 comm="syz.9.2960" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2694.879743][ T28] audit: type=1400 audit(2694.800:112400): avc: denied { module_request } for pid=17838 comm="syz.9.2960" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2695.008003][ T28] audit: type=1400 audit(2694.930:112401): avc: denied { create } for pid=17843 comm="syz.8.2961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2697.867966][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 2697.875067][ T28] audit: type=1400 audit(2697.790:112417): avc: denied { create } for pid=17861 comm="syz.9.2965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2697.938896][ T28] audit: type=1400 audit(2697.860:112418): avc: denied { create } for pid=17861 comm="syz.9.2965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2697.943294][ T28] audit: type=1400 audit(2697.860:112419): avc: denied { write } for pid=17861 comm="syz.9.2965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2697.964851][ T28] audit: type=1400 audit(2697.880:112420): avc: denied { module_request } for pid=17861 comm="syz.9.2965" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2698.544116][ T28] audit: type=1400 audit(2698.460:112421): avc: denied { ioctl } for pid=17861 comm="syz.9.2965" path="socket:[36644]" dev="sockfs" ino=36644 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2698.582785][ T28] audit: type=1400 audit(2698.470:112422): avc: denied { module_request } for pid=17864 comm="syz.8.2964" kmod="bpf_preload" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2698.688428][ T28] audit: type=1400 audit(2698.610:112423): avc: denied { module_request } for pid=17861 comm="syz.9.2965" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2699.061021][ T28] audit: type=1400 audit(2698.980:112424): avc: denied { write } for pid=17861 comm="syz.9.2965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2699.098067][ T28] audit: type=1400 audit(2699.000:112425): avc: denied { write } for pid=17861 comm="syz.9.2965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2699.098329][ T28] audit: type=1400 audit(2699.020:112426): avc: denied { create } for pid=17861 comm="syz.9.2965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2703.903453][ T28] kauditd_printk_skb: 42 callbacks suppressed [ 2703.915138][ T28] audit: type=1400 audit(2703.820:112469): avc: denied { create } for pid=17903 comm="syz.8.2975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 2703.922108][ T28] audit: type=1400 audit(2703.840:112470): avc: denied { write } for pid=17903 comm="syz.8.2975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 2704.532626][ T28] audit: type=1400 audit(2704.450:112471): avc: denied { read write } for pid=17908 comm="syz.9.2976" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2704.569416][ T28] audit: type=1400 audit(2704.490:112472): avc: denied { read write open } for pid=17908 comm="syz.9.2976" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2704.617870][ T28] audit: type=1400 audit(2704.540:112473): avc: denied { mounton } for pid=17908 comm="syz.9.2976" path="/136/file0" dev="tmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2704.675362][ T28] audit: type=1400 audit(2704.590:112474): avc: denied { mount } for pid=17908 comm="syz.9.2976" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2705.228142][ T28] audit: type=1400 audit(2705.130:112475): avc: denied { map_create } for pid=17908 comm="syz.9.2976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2705.340990][ T28] audit: type=1400 audit(2705.230:112476): avc: denied { write } for pid=17908 comm="syz.9.2976" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 2705.341399][ T28] audit: type=1400 audit(2705.240:112477): avc: denied { write open } for pid=17908 comm="syz.9.2976" path="/136/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 2705.341502][ T28] audit: type=1400 audit(2705.240:112478): avc: denied { ioctl } for pid=17908 comm="syz.9.2976" path="/136/file0/file0" dev="fuse" ino=64 ioctlcmd=0x1269 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 2709.162117][T17930] netlink: 8 bytes leftover after parsing attributes in process `syz.9.2983'. [ 2709.320376][T17930] 8021q: adding VLAN 0 to HW filter on device bond1 [ 2709.470098][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 2709.476521][ T28] audit: type=1400 audit(2709.390:112490): avc: denied { append } for pid=17964 comm="syz.8.2985" name="001" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2709.479287][ T28] audit: type=1400 audit(2709.390:112491): avc: denied { append open } for pid=17964 comm="syz.8.2985" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2709.485077][ T28] audit: type=1400 audit(2709.400:112492): avc: denied { ioctl } for pid=17964 comm="syz.8.2985" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=689 ioctlcmd=0x551b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2709.498148][ T28] audit: type=1400 audit(2709.420:112493): avc: denied { ioctl } for pid=17964 comm="syz.8.2985" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=689 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2709.530899][T17930] bond1: (slave ip6gretap1): Enslaving as a backup interface with an up link [ 2709.545718][ T6397] bond1: Warning: No 802.3ad response from the link partner for any adapters in the bond [ 2709.659921][ T6397] bond1: Warning: No 802.3ad response from the link partner for any adapters in the bond [ 2709.757836][T17930] bond1: (slave veth5): Enslaving as a backup interface with a down link [ 2709.918309][ T28] audit: type=1400 audit(2709.830:112494): avc: denied { read write } for pid=17981 comm="syz.8.2986" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2709.938728][ T28] audit: type=1400 audit(2709.860:112495): avc: denied { read write open } for pid=17981 comm="syz.8.2986" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2709.982109][ T28] audit: type=1400 audit(2709.900:112496): avc: denied { module_request } for pid=17981 comm="syz.8.2986" kmod="fs-" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2710.409879][ T28] audit: type=1400 audit(2710.330:112497): avc: denied { create } for pid=17984 comm="syz.9.2987" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2710.435788][ T28] audit: type=1400 audit(2710.340:112498): avc: denied { ioctl } for pid=17984 comm="syz.9.2987" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=37503 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2710.438335][ T28] audit: type=1400 audit(2710.360:112499): avc: denied { ioctl } for pid=17984 comm="syz.9.2987" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=37503 ioctlcmd=0xaa00 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2712.824157][T17992] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2713.147117][T17992] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2713.656598][T17992] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2713.658187][T17992] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2714.475079][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 2714.476252][ T28] audit: type=1400 audit(2714.390:112531): avc: denied { create } for pid=18002 comm="syz.9.2992" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 2714.561557][ T28] audit: type=1400 audit(2714.480:112532): avc: denied { module_request } for pid=17993 comm="syz.8.2991" kmod="crypto-hmac(md5)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2715.198655][ T28] audit: type=1400 audit(2715.120:112533): avc: denied { read write } for pid=18005 comm="syz.9.2993" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2715.199862][ T28] audit: type=1400 audit(2715.120:112534): avc: denied { read write open } for pid=18005 comm="syz.9.2993" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2715.201634][ T28] audit: type=1400 audit(2715.120:112535): avc: denied { module_request } for pid=17993 comm="syz.8.2991" kmod="crypto-hmac(md5)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2715.218477][ T28] audit: type=1400 audit(2715.140:112536): avc: denied { mounton } for pid=18005 comm="syz.9.2993" path="/144/file0" dev="tmpfs" ino=753 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2716.836298][ T28] audit: type=1400 audit(2716.760:112537): avc: denied { read write } for pid=18010 comm="syz.9.2994" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2716.846407][ T28] audit: type=1400 audit(2716.770:112538): avc: denied { read write open } for pid=18010 comm="syz.9.2994" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2716.860400][ T28] audit: type=1400 audit(2716.780:112539): avc: denied { mounton } for pid=18010 comm="syz.9.2994" path="/145/file0" dev="tmpfs" ino=759 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2716.876923][ T28] audit: type=1400 audit(2716.800:112540): avc: denied { mount } for pid=18010 comm="syz.9.2994" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2719.648064][ T28] kauditd_printk_skb: 16 callbacks suppressed [ 2719.649081][ T28] audit: type=1400 audit(2719.570:112557): avc: denied { module_request } for pid=17993 comm="syz.8.2991" kmod="crypto-cmac(aes)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2719.821574][ T28] audit: type=1400 audit(2719.740:112558): avc: denied { unmount } for pid=16298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2719.933749][ T28] audit: type=1400 audit(2719.850:112559): avc: denied { module_request } for pid=17993 comm="syz.8.2991" kmod="crypto-hmac(sm3)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2720.096184][ T28] audit: type=1400 audit(2720.020:112560): avc: denied { module_request } for pid=17993 comm="syz.8.2991" kmod="crypto-hmac(sm3)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2720.198158][ T28] audit: type=1400 audit(2720.120:112561): avc: denied { create } for pid=18033 comm="syz.9.2997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2720.219409][ T28] audit: type=1400 audit(2720.140:112562): avc: denied { ioctl } for pid=18033 comm="syz.9.2997" path="socket:[37559]" dev="sockfs" ino=37559 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2720.530734][ T28] audit: type=1400 audit(2720.450:112563): avc: denied { read write } for pid=18040 comm="syz.9.2998" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2720.542715][ T28] audit: type=1400 audit(2720.460:112564): avc: denied { read write open } for pid=18040 comm="syz.9.2998" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2720.568616][ T28] audit: type=1400 audit(2720.490:112565): avc: denied { mounton } for pid=18040 comm="syz.9.2998" path="/149/file0" dev="tmpfs" ino=781 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2720.801237][ T28] audit: type=1400 audit(2720.720:112566): avc: denied { module_request } for pid=17993 comm="syz.8.2991" kmod="crypto-ecb(cipher_null)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2725.414158][ T28] kauditd_printk_skb: 47 callbacks suppressed [ 2725.415077][ T28] audit: type=1400 audit(2725.330:112614): avc: denied { name_bind } for pid=18113 comm="syz.8.3010" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2725.420627][ T28] audit: type=1400 audit(2725.340:112615): avc: denied { node_bind } for pid=18113 comm="syz.8.3010" saddr=::ffff:172.20.20.11 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2725.662293][ T28] audit: type=1400 audit(2725.580:112616): avc: denied { execute } for pid=18115 comm="syz.8.3011" name="file0" dev="tmpfs" ino=987 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2725.678093][ T28] audit: type=1400 audit(2725.600:112617): avc: denied { execute_no_trans } for pid=18115 comm="syz.8.3011" path="/191/file0" dev="tmpfs" ino=987 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2725.742991][ T28] audit: type=1400 audit(2725.660:112618): avc: denied { unmount } for pid=16298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2725.918234][ T28] audit: type=1400 audit(2725.840:112619): avc: denied { execmem } for pid=18120 comm="syz.9.3013" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2726.698889][ T28] audit: type=1400 audit(2726.620:112620): avc: denied { name_bind } for pid=18124 comm="syz.8.3015" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2726.701285][ T28] audit: type=1400 audit(2726.620:112621): avc: denied { node_bind } for pid=18124 comm="syz.8.3015" saddr=::ffff:172.20.20.11 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2726.986788][ T28] audit: type=1400 audit(2726.910:112622): avc: denied { create } for pid=18126 comm="syz.8.3016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2727.007824][ T28] audit: type=1400 audit(2726.930:112623): avc: denied { ioctl } for pid=18126 comm="syz.8.3016" path="socket:[37630]" dev="sockfs" ino=37630 ioctlcmd=0x8955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2731.223136][ T28] kauditd_printk_skb: 7 callbacks suppressed [ 2731.223439][ T28] audit: type=1400 audit(2731.140:112631): avc: denied { create } for pid=18137 comm="syz.8.3019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2731.238574][T18138] raw_sendmsg: syz.8.3019 forgot to set AF_INET. Fix it! [ 2731.242986][ T28] audit: type=1400 audit(2731.160:112632): avc: denied { write } for pid=18137 comm="syz.8.3019" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2732.240140][ T28] audit: type=1400 audit(2732.150:112633): avc: denied { name_bind } for pid=18139 comm="syz.8.3020" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2732.240474][ T28] audit: type=1400 audit(2732.160:112634): avc: denied { node_bind } for pid=18139 comm="syz.8.3020" saddr=::ffff:172.20.20.11 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2738.114904][ T28] audit: type=1400 audit(2738.030:112635): avc: denied { read write } for pid=18148 comm="syz.9.3023" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2738.122950][ T28] audit: type=1400 audit(2738.040:112636): avc: denied { read write open } for pid=18148 comm="syz.9.3023" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2738.147894][ T28] audit: type=1400 audit(2738.070:112637): avc: denied { mounton } for pid=18148 comm="syz.9.3023" path="/161/file0" dev="tmpfs" ino=844 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2738.176423][ T28] audit: type=1400 audit(2738.100:112638): avc: denied { mount } for pid=18148 comm="syz.9.3023" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2740.621624][ T28] audit: type=1400 audit(2740.540:112639): avc: denied { unmount } for pid=16298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2740.808345][ T28] audit: type=1400 audit(2740.730:112640): avc: denied { map_create } for pid=18153 comm="syz.9.3024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2740.836996][ T28] audit: type=1400 audit(2740.760:112641): avc: denied { perfmon } for pid=18153 comm="syz.9.3024" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2740.856786][ T28] audit: type=1400 audit(2740.780:112642): avc: denied { map_create } for pid=18153 comm="syz.9.3024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2740.861652][ T28] audit: type=1400 audit(2740.780:112643): avc: denied { map_read map_write } for pid=18153 comm="syz.9.3024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2740.888648][ T28] audit: type=1400 audit(2740.800:112644): avc: denied { prog_load } for pid=18153 comm="syz.9.3024" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2743.367881][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 2743.396087][ T28] audit: type=1400 audit(2743.290:112656): avc: denied { read write } for pid=18163 comm="syz.9.3028" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2743.418600][ T28] audit: type=1400 audit(2743.340:112657): avc: denied { read write open } for pid=18163 comm="syz.9.3028" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2743.523779][ T28] audit: type=1400 audit(2743.440:112658): avc: denied { mounton } for pid=18163 comm="syz.9.3028" path="/165/file0" dev="tmpfs" ino=865 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2743.592119][ T28] audit: type=1400 audit(2743.510:112659): avc: denied { mount } for pid=18163 comm="syz.9.3028" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2744.283422][ T28] audit: type=1400 audit(2744.200:112660): avc: denied { read write } for pid=18167 comm="syz.8.3030" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2744.312766][ T28] audit: type=1400 audit(2744.200:112661): avc: denied { read write open } for pid=18167 comm="syz.8.3030" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2744.589723][ T28] audit: type=1400 audit(2744.510:112662): avc: denied { ioctl } for pid=18167 comm="syz.8.3030" path="/dev/snd/seq" dev="devtmpfs" ino=720 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2745.847402][ T28] audit: type=1400 audit(2745.770:112663): avc: denied { unmount } for pid=16298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2746.170899][ T28] audit: type=1400 audit(2746.090:112664): avc: denied { name_bind } for pid=18170 comm="syz.8.3031" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2746.198050][ T28] audit: type=1400 audit(2746.120:112665): avc: denied { node_bind } for pid=18170 comm="syz.8.3031" saddr=::ffff:172.20.20.11 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2747.176923][T18180] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3035'. [ 2749.946899][ T28] kauditd_printk_skb: 26 callbacks suppressed [ 2749.955257][ T28] audit: type=1400 audit(2749.870:112692): avc: denied { unmount } for pid=16009 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2750.244018][ T28] audit: type=1400 audit(2750.160:112693): avc: denied { module_request } for pid=18197 comm="syz.8.3040" kmod="net-pf-10-proto-0-type-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2750.571404][ T28] audit: type=1400 audit(2750.490:112694): avc: denied { module_request } for pid=18197 comm="syz.8.3040" kmod="net-pf-10-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2750.743245][ T28] audit: type=1400 audit(2750.660:112695): avc: denied { read } for pid=18201 comm="syz.9.3041" name="dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2750.753547][ T28] audit: type=1400 audit(2750.670:112696): avc: denied { read open } for pid=18201 comm="syz.9.3041" path="/dev/dsp1" dev="devtmpfs" ino=731 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2751.125181][ T28] audit: type=1400 audit(2751.040:112697): avc: denied { name_bind } for pid=18204 comm="syz.8.3042" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2751.131258][ T28] audit: type=1400 audit(2751.050:112698): avc: denied { node_bind } for pid=18204 comm="syz.8.3042" saddr=::ffff:172.20.20.11 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2751.316836][ T28] audit: type=1400 audit(2751.240:112699): avc: denied { create } for pid=18201 comm="syz.9.3041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2751.337431][ T28] audit: type=1400 audit(2751.250:112700): avc: denied { bind } for pid=18201 comm="syz.9.3041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2751.365267][ T28] audit: type=1400 audit(2751.280:112701): avc: denied { write } for pid=18201 comm="syz.9.3041" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2752.309558][T18212] could not allocate digest TFM handle sha3-224-ce [ 2753.058789][T18222] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2753.059589][T18222] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2753.292938][T18226] netlink: 12 bytes leftover after parsing attributes in process `syz.8.3049'. [ 2755.442922][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 2755.444082][ T28] audit: type=1400 audit(2755.360:112735): avc: denied { ioctl } for pid=18235 comm="syz.9.3053" path="/dev/snd/pcmC0D0p" dev="devtmpfs" ino=723 ioctlcmd=0x4113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2755.497526][ T28] audit: type=1400 audit(2755.420:112736): avc: denied { create } for pid=18230 comm="syz.8.3051" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2755.780095][ T28] audit: type=1400 audit(2755.700:112737): avc: denied { read write } for pid=18239 comm="syz.8.3054" name="nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2755.782447][ T28] audit: type=1400 audit(2755.700:112738): avc: denied { read write open } for pid=18239 comm="syz.8.3054" path="/dev/nvme-fabrics" dev="devtmpfs" ino=665 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2755.969357][ T28] audit: type=1400 audit(2755.890:112739): avc: denied { execmem } for pid=18241 comm="syz.8.3055" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2757.639776][ T28] audit: type=1400 audit(2757.560:112740): avc: denied { read write } for pid=18244 comm="syz.9.3056" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2757.642736][ T28] audit: type=1400 audit(2757.560:112741): avc: denied { read write open } for pid=18244 comm="syz.9.3056" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2757.658435][ T28] audit: type=1400 audit(2757.580:112742): avc: denied { mounton } for pid=18244 comm="syz.9.3056" path="/176/file0" dev="tmpfs" ino=922 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2757.675691][ T28] audit: type=1400 audit(2757.590:112743): avc: denied { mount } for pid=18244 comm="syz.9.3056" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2757.929756][ T28] audit: type=1400 audit(2757.850:112744): avc: denied { read } for pid=18241 comm="syz.8.3055" dev="nsfs" ino=4026532662 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 2760.521096][ T28] kauditd_printk_skb: 433 callbacks suppressed [ 2760.521556][ T28] audit: type=1400 audit(2760.440:113178): avc: denied { search } for pid=18253 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2760.521699][ T28] audit: type=1400 audit(2760.440:113179): avc: denied { search } for pid=18253 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2760.521758][ T28] audit: type=1400 audit(2760.440:113180): avc: denied { search } for pid=18253 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2760.526286][ T28] audit: type=1400 audit(2760.450:113181): avc: denied { getattr } for pid=18253 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=129 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2760.530993][ T28] audit: type=1400 audit(2760.450:113182): avc: denied { search } for pid=18253 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2760.531354][ T28] audit: type=1400 audit(2760.450:113183): avc: denied { search } for pid=18253 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2760.531438][ T28] audit: type=1400 audit(2760.450:113184): avc: denied { search } for pid=18253 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2760.531508][ T28] audit: type=1400 audit(2760.450:113185): avc: denied { search } for pid=18253 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2760.539375][ T28] audit: type=1400 audit(2760.460:113186): avc: denied { remove_name search } for pid=18253 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=129 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 2760.539860][ T28] audit: type=1400 audit(2760.460:113187): avc: denied { unlink } for pid=18253 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=129 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 2765.787759][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 2765.788134][ T28] audit: type=1400 audit(2765.710:113219): avc: denied { create } for pid=18269 comm="syz.9.3061" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2765.801686][ T28] audit: type=1400 audit(2765.720:113220): avc: denied { setopt } for pid=18269 comm="syz.9.3061" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2765.882893][ T28] audit: type=1400 audit(2765.800:113221): avc: denied { ioctl } for pid=18264 comm="syz.8.3060" path="/dev/sequencer2" dev="devtmpfs" ino=722 ioctlcmd=0x5100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2766.172590][ T28] audit: type=1400 audit(2766.090:113222): avc: denied { read write } for pid=18274 comm="syz.8.3063" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2766.189090][ T28] audit: type=1400 audit(2766.110:113223): avc: denied { read write open } for pid=18274 comm="syz.8.3063" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2766.193567][ T28] audit: type=1400 audit(2766.110:113224): avc: denied { ioctl } for pid=18274 comm="syz.8.3063" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2766.216044][ T28] audit: type=1400 audit(2766.140:113225): avc: denied { ioctl } for pid=18274 comm="syz.8.3063" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2766.226573][T18275] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2766.227395][T18275] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2766.860570][ T28] audit: type=1400 audit(2766.780:113226): avc: denied { create } for pid=18280 comm="syz.8.3065" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2766.890052][ T28] audit: type=1400 audit(2766.810:113227): avc: denied { block_suspend } for pid=18280 comm="syz.8.3065" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2766.939733][ T28] audit: type=1400 audit(2766.860:113228): avc: denied { block_suspend } for pid=18280 comm="syz.8.3065" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2771.232542][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 2771.232865][ T28] audit: type=1400 audit(2771.150:113248): avc: denied { read } for pid=18310 comm="syz.8.3077" name="mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2771.248977][ T28] audit: type=1400 audit(2771.170:113249): avc: denied { read open } for pid=18310 comm="syz.8.3077" path="/dev/input/mice" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2771.281182][ T28] audit: type=1400 audit(2771.200:113250): avc: denied { allowed } for pid=18310 comm="syz.8.3077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2771.380255][ T28] audit: type=1400 audit(2771.300:113251): avc: denied { create } for pid=18310 comm="syz.8.3077" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2771.408687][ T28] audit: type=1400 audit(2771.330:113252): avc: denied { map } for pid=18310 comm="syz.8.3077" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=38084 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2771.422522][ T28] audit: type=1400 audit(2771.340:113253): avc: denied { read write } for pid=18310 comm="syz.8.3077" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=38084 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2771.432429][ T28] audit: type=1400 audit(2771.350:113254): avc: denied { map } for pid=18310 comm="syz.8.3077" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=38084 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2771.476518][ T28] audit: type=1400 audit(2771.400:113255): avc: denied { read write } for pid=18310 comm="syz.8.3077" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=38084 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2771.564890][ T28] audit: type=1400 audit(2771.480:113256): avc: denied { prog_load } for pid=18310 comm="syz.8.3077" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2771.567607][ T28] audit: type=1400 audit(2771.490:113257): avc: denied { bpf } for pid=18310 comm="syz.8.3077" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2774.927383][T18329] fuse: Bad value for 'user_id' [ 2774.927773][T18329] fuse: Bad value for 'user_id' [ 2776.392774][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 2776.398184][ T28] audit: type=1400 audit(2776.310:113276): avc: denied { prog_load } for pid=18334 comm="syz.8.3088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2776.398610][ T28] audit: type=1400 audit(2776.310:113277): avc: denied { bpf } for pid=18334 comm="syz.8.3088" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2776.398691][ T28] audit: type=1400 audit(2776.320:113278): avc: denied { perfmon } for pid=18334 comm="syz.8.3088" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2776.403762][ T28] audit: type=1400 audit(2776.320:113279): avc: denied { prog_load } for pid=18334 comm="syz.8.3088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2776.417939][ T28] audit: type=1400 audit(2776.330:113280): avc: denied { perfmon } for pid=18334 comm="syz.8.3088" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2776.418306][ T28] audit: type=1400 audit(2776.340:113281): avc: denied { perfmon } for pid=18334 comm="syz.8.3088" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2776.426344][ T28] audit: type=1400 audit(2776.350:113282): avc: denied { perfmon } for pid=18334 comm="syz.8.3088" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2776.433571][ T28] audit: type=1400 audit(2776.350:113283): avc: denied { perfmon } for pid=18334 comm="syz.8.3088" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2776.433878][ T28] audit: type=1400 audit(2776.350:113284): avc: denied { bpf } for pid=18334 comm="syz.8.3088" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2776.459497][ T28] audit: type=1400 audit(2776.380:113285): avc: denied { prog_load } for pid=18334 comm="syz.8.3088" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2782.962148][T18339] fuse: Bad value for 'user_id' [ 2782.963749][T18339] fuse: Bad value for 'user_id' [ 2782.983170][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 2782.983470][ T28] audit: type=1400 audit(2782.880:113295): avc: denied { mounton } for pid=18338 comm="syz.8.3090" path="/239/file0" dev="tmpfs" ino=1233 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2783.077048][ T28] audit: type=1400 audit(2783.000:113296): avc: denied { prog_load } for pid=18340 comm="syz.9.3089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2783.080046][ T28] audit: type=1400 audit(2783.000:113297): avc: denied { bpf } for pid=18340 comm="syz.9.3089" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2783.102045][ T28] audit: type=1400 audit(2783.020:113298): avc: denied { execmem } for pid=18340 comm="syz.9.3089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2783.197443][ T28] audit: type=1400 audit(2783.110:113299): avc: denied { mounton } for pid=18342 comm="syz.8.3091" path="/240/file0" dev="tmpfs" ino=1239 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2783.231253][ T28] audit: type=1400 audit(2783.150:113300): avc: denied { map_create } for pid=18342 comm="syz.8.3091" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2784.266888][ T28] audit: type=1400 audit(2784.190:113301): avc: denied { name_bind } for pid=18344 comm="syz.8.3092" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2784.271925][ T28] audit: type=1400 audit(2784.190:113302): avc: denied { node_bind } for pid=18344 comm="syz.8.3092" saddr=::ffff:172.20.20.11 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2784.570959][ T28] audit: type=1400 audit(2784.490:113303): avc: denied { create } for pid=18347 comm="syz.8.3093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2784.584087][ T28] audit: type=1400 audit(2784.500:113304): avc: denied { write } for pid=18347 comm="syz.8.3093" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2785.923791][T18354] fuse: Bad value for 'user_id' [ 2785.929939][T18354] fuse: Bad value for 'user_id' [ 2788.043141][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 2788.043455][ T28] audit: type=1400 audit(2787.960:113318): avc: denied { prog_load } for pid=18361 comm="syz.8.3099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2788.057534][ T28] audit: type=1400 audit(2787.980:113319): avc: denied { bpf } for pid=18361 comm="syz.8.3099" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2788.064048][ T28] audit: type=1400 audit(2787.980:113320): avc: denied { prog_load } for pid=18361 comm="syz.8.3099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2788.084978][ T28] audit: type=1400 audit(2788.000:113321): avc: denied { perfmon } for pid=18361 comm="syz.8.3099" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2788.086926][ T28] audit: type=1400 audit(2788.000:113322): avc: denied { perfmon } for pid=18361 comm="syz.8.3099" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2788.094950][ T28] audit: type=1400 audit(2788.000:113323): avc: denied { perfmon } for pid=18361 comm="syz.8.3099" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2788.102257][ T28] audit: type=1400 audit(2788.000:113324): avc: denied { perfmon } for pid=18361 comm="syz.8.3099" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2788.103894][ T28] audit: type=1400 audit(2788.020:113325): avc: denied { bpf } for pid=18361 comm="syz.8.3099" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2788.117171][ T28] audit: type=1400 audit(2788.020:113326): avc: denied { bpf } for pid=18361 comm="syz.8.3099" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2788.121829][ T28] audit: type=1400 audit(2788.040:113327): avc: denied { prog_run } for pid=18361 comm="syz.8.3099" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2788.823299][T18364] fuse: Bad value for 'fd' [ 2793.132561][ T28] kauditd_printk_skb: 15 callbacks suppressed [ 2793.135800][ T28] audit: type=1400 audit(2793.050:113343): avc: denied { prog_load } for pid=18371 comm="syz.8.3103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2793.137421][ T28] audit: type=1400 audit(2793.050:113344): avc: denied { perfmon } for pid=18371 comm="syz.8.3103" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2793.139165][ T28] audit: type=1400 audit(2793.060:113345): avc: denied { perfmon } for pid=18371 comm="syz.8.3103" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2793.154782][ T28] audit: type=1400 audit(2793.060:113346): avc: denied { perfmon } for pid=18371 comm="syz.8.3103" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2793.155248][ T28] audit: type=1400 audit(2793.060:113347): avc: denied { perfmon } for pid=18371 comm="syz.8.3103" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2793.155409][ T28] audit: type=1400 audit(2793.060:113348): avc: denied { bpf } for pid=18371 comm="syz.8.3103" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2793.155568][ T28] audit: type=1400 audit(2793.060:113349): avc: denied { map_create } for pid=18371 comm="syz.8.3103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2793.431260][ T28] audit: type=1400 audit(2793.350:113350): avc: denied { mounton } for pid=18371 comm="syz.8.3103" path="/252/file0" dev="tmpfs" ino=1303 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2794.717076][ T28] audit: type=1400 audit(2794.640:113351): avc: denied { mounton } for pid=18375 comm="syz.8.3105" path="/254/file0" dev="tmpfs" ino=1314 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2794.717457][T18376] fuse: Bad value for 'fd' [ 2795.880890][ T28] audit: type=1400 audit(2795.800:113352): avc: denied { name_bind } for pid=18379 comm="syz.8.3107" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2796.299926][T18382] ======================================================= [ 2796.299926][T18382] WARNING: The mand mount option has been deprecated and [ 2796.299926][T18382] and is ignored by this kernel. Remove the mand [ 2796.299926][T18382] option from the mount to silence this warning. [ 2796.299926][T18382] ======================================================= [ 2796.305976][T18382] cgroup: Unknown subsys name 'hugetlb' [ 2797.208847][T18386] fuse: Bad value for 'fd' [ 2799.351646][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 2799.357994][ T28] audit: type=1400 audit(2799.270:113362): avc: denied { create } for pid=18383 comm="syz.8.3109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2800.633829][ T28] audit: type=1400 audit(2800.550:113363): avc: denied { create } for pid=18387 comm="syz.9.3111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2800.664054][ T28] audit: type=1400 audit(2800.570:113364): avc: denied { bpf } for pid=18387 comm="syz.9.3111" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2808.644972][ T28] audit: type=1400 audit(2808.560:113365): avc: denied { mounton } for pid=18400 comm="syz.8.3115" path="/262/file0" dev="tmpfs" ino=1356 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2808.658593][T18401] fuse: Bad value for 'fd' [ 2809.142006][ T28] audit: type=1400 audit(2809.060:113366): avc: denied { map_create } for pid=18404 comm="syz.8.3117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2809.163878][ T28] audit: type=1400 audit(2809.080:113367): avc: denied { map_create } for pid=18404 comm="syz.8.3117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2809.188133][ T28] audit: type=1400 audit(2809.100:113368): avc: denied { map_read map_write } for pid=18404 comm="syz.8.3117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2809.219530][ T28] audit: type=1400 audit(2809.140:113369): avc: denied { prog_load } for pid=18404 comm="syz.8.3117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2809.241598][ T28] audit: type=1400 audit(2809.160:113370): avc: denied { bpf } for pid=18404 comm="syz.8.3117" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2809.266803][ T28] audit: type=1400 audit(2809.180:113371): avc: denied { prog_load } for pid=18404 comm="syz.8.3117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2809.289015][ T28] audit: type=1400 audit(2809.210:113372): avc: denied { perfmon } for pid=18404 comm="syz.8.3117" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2809.307888][ T28] audit: type=1400 audit(2809.230:113373): avc: denied { perfmon } for pid=18404 comm="syz.8.3117" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2809.334914][ T28] audit: type=1400 audit(2809.250:113374): avc: denied { perfmon } for pid=18404 comm="syz.8.3117" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2814.917222][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 2814.917409][ T28] audit: type=1400 audit(2814.840:113380): avc: denied { read write } for pid=18410 comm="syz.9.3119" name="vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2814.923431][ T28] audit: type=1400 audit(2814.840:113381): avc: denied { read write open } for pid=18410 comm="syz.9.3119" path="/dev/vhost-vsock" dev="devtmpfs" ino=710 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2814.933880][ T28] audit: type=1400 audit(2814.850:113382): avc: denied { execmem } for pid=18410 comm="syz.9.3119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2815.901067][ T28] audit: type=1400 audit(2815.820:113383): avc: denied { read write } for pid=18413 comm="syz.9.3120" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2815.920293][ T28] audit: type=1400 audit(2815.840:113384): avc: denied { read write open } for pid=18413 comm="syz.9.3120" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2815.932716][ T28] audit: type=1400 audit(2815.850:113385): avc: denied { mounton } for pid=18413 comm="syz.9.3120" path="/194/file0" dev="tmpfs" ino=1014 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2815.942345][T18414] fuse: Bad value for 'fd' [ 2816.122537][ T28] audit: type=1400 audit(2816.040:113386): avc: denied { read write } for pid=18415 comm="syz.9.3121" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2816.131635][ T28] audit: type=1400 audit(2816.050:113387): avc: denied { read write open } for pid=18415 comm="syz.9.3121" path="/dev/sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2816.147936][ T28] audit: type=1400 audit(2816.070:113388): avc: denied { ioctl } for pid=18415 comm="syz.9.3121" path="/dev/sequencer" dev="devtmpfs" ino=721 ioctlcmd=0x5112 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2816.348705][ T28] audit: type=1400 audit(2816.270:113389): avc: denied { create } for pid=18417 comm="syz.9.3122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2822.818966][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 2822.821212][ T28] audit: type=1400 audit(2822.740:113393): avc: denied { prog_load } for pid=18421 comm="syz.8.3123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2822.822278][ T28] audit: type=1400 audit(2822.740:113394): avc: denied { bpf } for pid=18421 comm="syz.8.3123" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2822.828044][ T28] audit: type=1400 audit(2822.750:113395): avc: denied { perfmon } for pid=18421 comm="syz.8.3123" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2822.829722][ T28] audit: type=1400 audit(2822.750:113396): avc: denied { prog_load } for pid=18421 comm="syz.8.3123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2822.835406][ T28] audit: type=1400 audit(2822.750:113397): avc: denied { perfmon } for pid=18421 comm="syz.8.3123" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2822.845945][ T28] audit: type=1400 audit(2822.770:113398): avc: denied { perfmon } for pid=18421 comm="syz.8.3123" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2822.847491][ T28] audit: type=1400 audit(2822.770:113399): avc: denied { perfmon } for pid=18421 comm="syz.8.3123" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2822.849411][ T28] audit: type=1400 audit(2822.770:113400): avc: denied { perfmon } for pid=18421 comm="syz.8.3123" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2822.849648][ T28] audit: type=1400 audit(2822.770:113401): avc: denied { bpf } for pid=18421 comm="syz.8.3123" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2822.852203][ T28] audit: type=1400 audit(2822.770:113402): avc: denied { bpf } for pid=18421 comm="syz.8.3123" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2830.930951][T18428] fuse: Bad value for 'fd' [ 2830.935074][ T28] kauditd_printk_skb: 6 callbacks suppressed [ 2830.935455][ T28] audit: type=1400 audit(2830.850:113409): avc: denied { mounton } for pid=18427 comm="syz.8.3125" path="/268/file0" dev="tmpfs" ino=1389 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2831.845093][ T28] audit: type=1400 audit(2831.760:113410): avc: denied { read write } for pid=18431 comm="syz.9.3127" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2831.845528][ T28] audit: type=1400 audit(2831.760:113411): avc: denied { read write open } for pid=18431 comm="syz.9.3127" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2831.883855][ T28] audit: type=1400 audit(2831.800:113412): avc: denied { map_create } for pid=18431 comm="syz.9.3127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2832.122453][ T28] audit: type=1400 audit(2832.040:113413): avc: denied { name_bind } for pid=18433 comm="syz.8.3128" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2832.138823][ T28] audit: type=1400 audit(2832.060:113414): avc: denied { node_bind } for pid=18433 comm="syz.8.3128" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2832.279258][ T28] audit: type=1400 audit(2832.200:113415): avc: denied { create } for pid=18433 comm="syz.8.3128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2832.355262][ T28] audit: type=1400 audit(2832.270:113416): avc: denied { create } for pid=18433 comm="syz.8.3128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2832.382805][ T28] audit: type=1400 audit(2832.300:113417): avc: denied { write } for pid=18433 comm="syz.8.3128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2832.406557][ T28] audit: type=1400 audit(2832.330:113418): avc: denied { read } for pid=18433 comm="syz.8.3128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2832.659938][T18438] fuse: Invalid rootmode [ 2833.668942][T18450] fuse: Invalid rootmode [ 2834.422027][T18457] fuse: Bad value for 'fd' [ 2834.736198][T18461] fuse: Invalid rootmode [ 2835.688800][T18470] fuse: Bad value for 'fd' [ 2836.021577][ T28] kauditd_printk_skb: 35 callbacks suppressed [ 2836.038285][ T28] audit: type=1400 audit(2835.940:113454): avc: denied { read write } for pid=18472 comm="syz.9.3146" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2836.040982][ T28] audit: type=1400 audit(2835.960:113455): avc: denied { read write open } for pid=18472 comm="syz.9.3146" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2836.053608][T18473] fuse: Bad value for 'rootmode' [ 2836.055354][ T28] audit: type=1400 audit(2835.970:113456): avc: denied { mounton } for pid=18472 comm="syz.9.3146" path="/206/file0" dev="tmpfs" ino=1077 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2836.341433][ T28] audit: type=1400 audit(2836.260:113457): avc: denied { prog_load } for pid=18474 comm="syz.9.3147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2836.360414][ T28] audit: type=1400 audit(2836.280:113458): avc: denied { bpf } for pid=18474 comm="syz.9.3147" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2837.481127][ T28] audit: type=1400 audit(2837.400:113459): avc: denied { mounton } for pid=18478 comm="syz.9.3150" path="/209/file0" dev="tmpfs" ino=1093 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2837.487055][T18479] fuse: Bad value for 'fd' [ 2837.509828][ T28] audit: type=1400 audit(2837.430:113460): avc: denied { map_create } for pid=18478 comm="syz.9.3150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2837.582119][ T28] audit: type=1400 audit(2837.500:113461): avc: denied { create } for pid=18480 comm="syz.8.3149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2837.591128][ T28] audit: type=1400 audit(2837.510:113462): avc: denied { create } for pid=18480 comm="syz.8.3149" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2837.602224][ T28] audit: type=1400 audit(2837.520:113463): avc: denied { ioctl } for pid=18480 comm="syz.8.3149" path="socket:[38312]" dev="sockfs" ino=38312 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2837.868239][T18483] fuse: Bad value for 'rootmode' [ 2837.962169][ C1] vcan0: j1939_tp_rxtimer: 0x92998e00: rx timeout, send abort [ 2838.462869][ C1] vcan0: j1939_tp_rxtimer: 0x92998f00: rx timeout, send abort [ 2838.463437][ C1] vcan0: j1939_tp_rxtimer: 0x92998e00: abort rx timeout. Force session deactivation [ 2838.762956][T18487] netlink: 12 bytes leftover after parsing attributes in process `syz.8.3153'. [ 2838.963362][ C1] vcan0: j1939_tp_rxtimer: 0x92998f00: abort rx timeout. Force session deactivation [ 2839.913946][ C0] vcan0: j1939_tp_rxtimer: 0x92998d00: rx timeout, send abort [ 2840.414745][ C0] vcan0: j1939_tp_rxtimer: 0x85e5d500: rx timeout, send abort [ 2840.415956][ C0] vcan0: j1939_tp_rxtimer: 0x92998d00: abort rx timeout. Force session deactivation [ 2840.915518][ C0] vcan0: j1939_tp_rxtimer: 0x85e5d500: abort rx timeout. Force session deactivation [ 2841.108558][ T28] kauditd_printk_skb: 58 callbacks suppressed [ 2841.116684][ T28] audit: type=1400 audit(2841.030:113522): avc: denied { allowed } for pid=18510 comm="syz.9.3165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2841.151033][ T28] audit: type=1400 audit(2841.070:113523): avc: denied { create } for pid=18510 comm="syz.9.3165" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2841.173894][ T28] audit: type=1400 audit(2841.090:113524): avc: denied { map } for pid=18510 comm="syz.9.3165" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39129 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2841.203631][ T28] audit: type=1400 audit(2841.110:113525): avc: denied { read write } for pid=18510 comm="syz.9.3165" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39129 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2841.229395][ T28] audit: type=1400 audit(2841.150:113526): avc: denied { map } for pid=18510 comm="syz.9.3165" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39129 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2841.240540][ T28] audit: type=1400 audit(2841.160:113527): avc: denied { read write } for pid=18510 comm="syz.9.3165" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39129 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2841.280966][ T28] audit: type=1400 audit(2841.200:113528): avc: denied { create } for pid=18510 comm="syz.9.3165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2841.342679][ T28] audit: type=1400 audit(2841.260:113529): avc: denied { mounton } for pid=18513 comm="syz.8.3166" path="/290/file0" dev="tmpfs" ino=1507 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2841.597385][ T28] audit: type=1400 audit(2841.520:113530): avc: denied { create } for pid=18517 comm="syz.8.3167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2841.602459][ T28] audit: type=1400 audit(2841.520:113531): avc: denied { create } for pid=18517 comm="syz.8.3167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2842.003166][ C0] vcan0: j1939_tp_rxtimer: 0x86c72600: rx timeout, send abort [ 2842.503229][ C0] vcan0: j1939_tp_rxtimer: 0x86c72800: rx timeout, send abort [ 2842.503593][ C0] vcan0: j1939_tp_rxtimer: 0x86c72600: abort rx timeout. Force session deactivation [ 2843.004935][ C0] vcan0: j1939_tp_rxtimer: 0x86c72800: abort rx timeout. Force session deactivation [ 2847.026759][ T28] kauditd_printk_skb: 62 callbacks suppressed [ 2847.027032][ T28] audit: type=1400 audit(2846.950:113594): avc: denied { mounton } for pid=18538 comm="syz.8.3174" path="/296/file0" dev="tmpfs" ino=1538 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2847.027062][T18539] fuse: Unknown parameter 'use00000000000000000000' [ 2848.911080][ T28] audit: type=1400 audit(2848.820:113595): avc: denied { create } for pid=18542 comm="syz.8.3176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2850.388680][ T28] audit: type=1400 audit(2850.310:113596): avc: denied { allowed } for pid=18546 comm="syz.8.3178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 2850.419151][ T28] audit: type=1400 audit(2850.320:113597): avc: denied { create } for pid=18546 comm="syz.8.3178" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2850.423178][ T28] audit: type=1400 audit(2850.320:113598): avc: denied { map } for pid=18546 comm="syz.8.3178" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39157 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2850.425756][ T28] audit: type=1400 audit(2850.320:113599): avc: denied { read write } for pid=18546 comm="syz.8.3178" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39157 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2851.138196][ T28] audit: type=1400 audit(2851.060:113600): avc: denied { mounton } for pid=18548 comm="syz.8.3179" path="/301/file0" dev="tmpfs" ino=1565 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2851.160318][T18549] fuse: Unknown parameter 'use00000000000000000000' [ 2851.569526][ T28] audit: type=1400 audit(2851.490:113601): avc: denied { map_create } for pid=18550 comm="syz.8.3180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2851.587072][ T28] audit: type=1400 audit(2851.510:113602): avc: denied { perfmon } for pid=18550 comm="syz.8.3180" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2851.591920][ T28] audit: type=1400 audit(2851.510:113603): avc: denied { map_create } for pid=18550 comm="syz.8.3180" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2852.409638][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 2852.409954][ T28] audit: type=1400 audit(2852.330:113618): avc: denied { execmem } for pid=18552 comm="syz.8.3181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2855.761229][ T28] audit: type=1400 audit(2855.680:113619): avc: denied { create } for pid=18555 comm="syz.8.3182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2855.789191][ T28] audit: type=1400 audit(2855.710:113620): avc: denied { setopt } for pid=18555 comm="syz.8.3182" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2856.093203][ T28] audit: type=1400 audit(2856.010:113621): avc: denied { create } for pid=18557 comm="syz.8.3183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2856.125265][ T28] audit: type=1400 audit(2856.040:113622): avc: denied { write } for pid=18557 comm="syz.8.3183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2856.391181][ T28] audit: type=1400 audit(2856.310:113623): avc: denied { mounton } for pid=18559 comm="syz.8.3184" path="/306/file0" dev="tmpfs" ino=1591 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2856.391227][T18560] fuse: Unknown parameter 'user_i00000000000000000000' [ 2857.170263][ T28] audit: type=1400 audit(2857.090:113624): avc: denied { create } for pid=18565 comm="syz.8.3187" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2857.193768][ T28] audit: type=1400 audit(2857.110:113625): avc: denied { setopt } for pid=18565 comm="syz.8.3187" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2857.620687][ T28] audit: type=1400 audit(2857.540:113626): avc: denied { mounton } for pid=18569 comm="syz.8.3189" path="/311/file0" dev="tmpfs" ino=1617 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2857.621073][T18570] fuse: Unknown parameter 'user_i00000000000000000000' [ 2857.929987][ T28] audit: type=1400 audit(2857.850:113627): avc: denied { execmem } for pid=18571 comm="syz.8.3190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2858.438075][ T28] audit: type=1400 audit(2858.360:113628): avc: denied { create } for pid=18577 comm="syz.8.3193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2858.449581][ T28] audit: type=1400 audit(2858.370:113629): avc: denied { ioctl } for pid=18577 comm="syz.8.3193" path="socket:[39209]" dev="sockfs" ino=39209 ioctlcmd=0x89f3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2858.951729][ T28] audit: type=1400 audit(2858.870:113630): avc: denied { prog_load } for pid=18583 comm="syz.8.3196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2858.963974][ T28] audit: type=1400 audit(2858.880:113631): avc: denied { bpf } for pid=18583 comm="syz.8.3196" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2858.986460][ T28] audit: type=1400 audit(2858.910:113632): avc: denied { prog_load } for pid=18583 comm="syz.8.3196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2859.004834][ T28] audit: type=1400 audit(2858.920:113633): avc: denied { perfmon } for pid=18583 comm="syz.8.3196" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2859.008022][ T28] audit: type=1400 audit(2858.930:113634): avc: denied { perfmon } for pid=18583 comm="syz.8.3196" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2859.029205][ T28] audit: type=1400 audit(2858.940:113635): avc: denied { mounton } for pid=18582 comm="syz.9.3195" path="/218/file0" dev="tmpfs" ino=1141 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2859.032197][T18585] tmpfs: Unsupported parameter 'huge' [ 2863.191338][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 2863.191646][ T28] audit: type=1400 audit(2863.110:113663): avc: denied { read write } for pid=18600 comm="syz.9.3204" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2863.218419][ T28] audit: type=1400 audit(2863.140:113664): avc: denied { read write open } for pid=18600 comm="syz.9.3204" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2863.293040][ T28] audit: type=1400 audit(2863.210:113665): avc: denied { mounton } for pid=18600 comm="syz.9.3204" path="/222/file0" dev="tmpfs" ino=1163 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 2863.361538][ T28] audit: type=1400 audit(2863.280:113666): avc: denied { mount } for pid=18600 comm="syz.9.3204" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2864.102707][ T28] audit: type=1400 audit(2864.020:113667): avc: denied { unmount } for pid=16298 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 2864.853452][ T28] audit: type=1400 audit(2864.770:113668): avc: denied { create } for pid=18608 comm="syz.9.3206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 2865.033694][ T28] audit: type=1400 audit(2864.950:113669): avc: denied { read write } for pid=18610 comm="syz.9.3207" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2865.039778][ T28] audit: type=1400 audit(2864.950:113670): avc: denied { read write open } for pid=18610 comm="syz.9.3207" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2865.040679][T18611] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2865.041141][T18611] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2865.056976][ T28] audit: type=1400 audit(2864.960:113671): avc: denied { ioctl } for pid=18610 comm="syz.9.3207" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2865.057333][ T28] audit: type=1400 audit(2864.960:113672): avc: denied { ioctl } for pid=18610 comm="syz.9.3207" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2869.191609][ T28] kauditd_printk_skb: 13 callbacks suppressed [ 2869.192030][ T28] audit: type=1400 audit(2869.110:113686): avc: denied { create } for pid=18624 comm="syz.8.3210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2869.203373][ T28] audit: type=1400 audit(2869.120:113687): avc: denied { write } for pid=18624 comm="syz.8.3210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2869.893172][ T28] audit: type=1400 audit(2869.810:113688): avc: denied { create } for pid=18627 comm="syz.8.3211" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2869.991705][ T28] audit: type=1400 audit(2869.910:113689): avc: denied { ioctl } for pid=18627 comm="syz.8.3211" path="socket:[38472]" dev="sockfs" ino=38472 ioctlcmd=0x8916 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 2870.195177][ T28] audit: type=1400 audit(2870.110:113690): avc: denied { module_request } for pid=18627 comm="syz.8.3211" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2870.649947][ T28] audit: type=1400 audit(2870.570:113691): avc: denied { sys_module } for pid=18627 comm="syz.8.3211" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 2870.651881][ T28] audit: type=1400 audit(2870.570:113692): avc: denied { module_request } for pid=18627 comm="syz.8.3211" kmod="wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 2871.261374][ T28] audit: type=1400 audit(2871.180:113693): avc: denied { name_bind } for pid=18631 comm="syz.9.3212" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 2871.367243][ T28] audit: type=1400 audit(2871.280:113694): avc: denied { node_bind } for pid=18631 comm="syz.9.3212" saddr=255.255.255.255 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 2871.944785][ T28] audit: type=1400 audit(2871.860:113695): avc: denied { read write } for pid=18635 comm="syz.9.3214" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2871.947159][T18636] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2871.948632][T18636] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2880.336821][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 2880.338001][ T28] audit: type=1400 audit(2880.260:113700): avc: denied { prog_load } for pid=18647 comm="syz.8.3217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2880.342091][ T28] audit: type=1400 audit(2880.260:113701): avc: denied { bpf } for pid=18647 comm="syz.8.3217" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2880.587997][ T28] audit: type=1400 audit(2880.510:113702): avc: denied { prog_load } for pid=18647 comm="syz.8.3217" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2880.590280][ T28] audit: type=1400 audit(2880.510:113703): avc: denied { bpf } for pid=18647 comm="syz.8.3217" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2880.928912][ T28] audit: type=1400 audit(2880.850:113704): avc: denied { map_create } for pid=18649 comm="syz.8.3218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2880.955024][ T28] audit: type=1400 audit(2880.870:113705): avc: denied { perfmon } for pid=18649 comm="syz.8.3218" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2880.958791][ T28] audit: type=1400 audit(2880.880:113706): avc: denied { map_create } for pid=18649 comm="syz.8.3218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2880.980954][ T28] audit: type=1400 audit(2880.900:113707): avc: denied { map_read map_write } for pid=18649 comm="syz.8.3218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2880.991795][ T28] audit: type=1400 audit(2880.910:113708): avc: denied { prog_load } for pid=18649 comm="syz.8.3218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2880.993255][ T28] audit: type=1400 audit(2880.910:113709): avc: denied { bpf } for pid=18649 comm="syz.8.3218" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2885.455183][ T28] kauditd_printk_skb: 30 callbacks suppressed [ 2885.455511][ T28] audit: type=1400 audit(2885.280:113740): avc: denied { create } for pid=18670 comm="syz.8.3228" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2885.455959][ T28] audit: type=1400 audit(2885.370:113741): avc: denied { map } for pid=18670 comm="syz.8.3228" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39316 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2885.456155][ T28] audit: type=1400 audit(2885.370:113742): avc: denied { read write } for pid=18670 comm="syz.8.3228" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39316 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2885.525295][ T28] audit: type=1400 audit(2885.420:113743): avc: denied { map } for pid=18670 comm="syz.8.3228" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39316 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2885.528569][ T28] audit: type=1400 audit(2885.420:113744): avc: denied { read write } for pid=18670 comm="syz.8.3228" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=39316 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 2885.530633][ T28] audit: type=1400 audit(2885.440:113745): avc: denied { prog_load } for pid=18670 comm="syz.8.3228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2885.532513][ T28] audit: type=1400 audit(2885.440:113746): avc: denied { bpf } for pid=18670 comm="syz.8.3228" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2885.548176][ T28] audit: type=1400 audit(2885.470:113747): avc: denied { accept } for pid=18670 comm="syz.8.3228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 2885.552114][ T28] audit: type=1400 audit(2885.470:113748): avc: denied { accept } for pid=18670 comm="syz.8.3228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 2885.556465][ T28] audit: type=1400 audit(2885.480:113749): avc: denied { accept } for pid=18670 comm="syz.8.3228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 2887.849586][T18680] netlink: 71 bytes leftover after parsing attributes in process `syz.8.3232'. [ 2888.405870][T10762] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2888.716736][T15889] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2890.164864][T12601] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2890.407177][T10762] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2891.445998][T15871] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2891.755717][T15889] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2892.475957][T10762] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2893.216029][ T28] kauditd_printk_skb: 59 callbacks suppressed [ 2893.216366][ T28] audit: type=1400 audit(2893.120:113809): avc: denied { prog_load } for pid=18690 comm="syz.8.3237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 2893.238561][ T28] audit: type=1400 audit(2893.160:113810): avc: denied { bpf } for pid=18690 comm="syz.8.3237" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 2893.523774][T15871] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2894.556151][T10762] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2894.806254][T15889] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2895.605706][T10762] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2895.917561][T15871] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2896.636160][T10762] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2897.705885][T10762] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2898.715598][T15875] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2898.958654][T12601] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2899.765951][T18657] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2899.766492][T18657] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2900.863991][T15875] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2901.059739][T12601] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2901.916562][T10762] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2902.024979][T12601] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2902.736686][ T28] audit: type=1400 audit(2902.660:113811): avc: denied { execmem } for pid=18695 comm="syz.9.3238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 2902.966833][T18692] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 2903.290660][ T28] audit: type=1400 audit(2903.210:113812): avc: denied { create } for pid=18697 comm="syz.9.3239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2903.301126][ T28] audit: type=1400 audit(2903.210:113813): avc: denied { ioctl } for pid=18697 comm="syz.9.3239" path="socket:[39336]" dev="sockfs" ino=39336 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2903.313762][ T28] audit: type=1400 audit(2903.230:113814): avc: denied { bind } for pid=18697 comm="syz.9.3239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2903.346396][ T28] audit: type=1400 audit(2903.250:113815): avc: denied { setopt } for pid=18697 comm="syz.9.3239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2903.348968][ T28] audit: type=1400 audit(2903.270:113816): avc: denied { write } for pid=18697 comm="syz.9.3239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2903.363069][ T28] audit: type=1400 audit(2903.280:113817): avc: denied { setopt } for pid=18697 comm="syz.9.3239" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2903.369731][T18698] netlink: 4 bytes leftover after parsing attributes in process `syz.9.3239'. [ 2903.729616][ T28] audit: type=1400 audit(2903.640:113818): avc: denied { read append } for pid=18703 comm="syz.9.3240" name="comedi3" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2903.734709][ T28] audit: type=1400 audit(2903.650:113819): avc: denied { read open } for pid=18703 comm="syz.9.3240" path="/dev/comedi3" dev="devtmpfs" ino=714 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2903.762977][ T28] audit: type=1400 audit(2903.680:113820): avc: denied { ioctl } for pid=18703 comm="syz.9.3240" path="/dev/comedi3" dev="devtmpfs" ino=714 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 2903.788215][T18704] 8<--- cut here --- [ 2903.788577][T18704] Unable to handle kernel paging request at virtual address fee04f2a when write [ 2903.788720][T18704] [fee04f2a] *pgd=80000080007003, *pmd=00000000 [ 2903.789728][T18704] Internal error: Oops: a06 [#1] SMP ARM [ 2903.791818][T18704] Modules linked in: [ 2903.792480][T18704] CPU: 1 UID: 0 PID: 18704 Comm: syz.9.3240 Tainted: G L syzkaller #0 PREEMPT [ 2903.793233][T18704] Tainted: [L]=SOFTLOCKUP [ 2903.793629][T18704] Hardware name: ARM-Versatile Express [ 2903.793897][T18704] PC is at subdev_8255_io+0x60/0x6c [ 2903.794175][T18704] LR is at subdev_8255_io+0x4c/0x6c [ 2903.794649][T18704] pc : [<81441040>] lr : [<8144102c>] psr: 60000013 [ 2903.795116][T18704] sp : dfa51cb8 ip : dfa51cb8 fp : dfa51cd4 [ 2903.795363][T18704] r10: 00000000 r9 : 00000084 r8 : dfa51da4 [ 2903.795614][T18704] r7 : 00004f27 r6 : 0000009b r5 : 8301acc0 r4 : 00004f2a [ 2903.795939][T18704] r3 : 0000009b r2 : fee04f2a r1 : 00000001 r0 : 8301acc0 [ 2903.796282][T18704] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 2903.796601][T18704] Control: 30c5387d Table: 868c4800 DAC: 00000000 [ 2903.796907][T18704] Register r0 information: slab kmalloc-192 start 8301acc0 pointer offset 0 size 192 [ 2903.798078][T18704] Register r1 information: non-paged memory [ 2903.798567][T18704] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 2903.799165][T18704] Register r3 information: non-paged memory [ 2903.799417][T18704] Register r4 information: non-paged memory [ 2903.799718][T18704] Register r5 information: slab kmalloc-192 start 8301acc0 pointer offset 0 size 192 [ 2903.800139][T18704] Register r6 information: non-paged memory [ 2903.800376][T18704] Register r7 information: non-paged memory [ 2903.800610][T18704] Register r8 information: 2-page vmalloc region starting at 0xdfa50000 allocated at kernel_clone+0xac/0x42c [ 2903.801032][T18704] Register r9 information: non-paged memory [ 2903.801268][T18704] Register r10 information: NULL pointer [ 2903.801511][T18704] Register r11 information: 2-page vmalloc region starting at 0xdfa50000 allocated at kernel_clone+0xac/0x42c [ 2903.801911][T18704] Register r12 information: 2-page vmalloc region starting at 0xdfa50000 allocated at kernel_clone+0xac/0x42c [ 2903.802344][T18704] Process syz.9.3240 (pid: 18704, stack limit = 0xdfa50000) [ 2903.802646][T18704] Stack: (0xdfa51cb8 to 0xdfa52000) [ 2903.802859][T18704] 1ca0: 81440fe0 00004f27 [ 2903.803224][T18704] 1cc0: 8301acc0 00004f27 dfa51cf4 dfa51cd8 81440d1c 81440fec 00004f27 b5403587 [ 2903.803528][T18704] 1ce0: 853c7000 853c7000 dfa51d14 dfa51cf8 814410d4 81440cd0 8301acc0 00000000 [ 2903.803854][T18704] 1d00: 853c7000 00004f27 dfa51d54 dfa51d18 81441284 81441058 dfa51d6c 830f7700 [ 2903.804156][T18704] 1d20: 82821800 00000000 00000000 829d6f04 8301acc0 00000000 dfa51d90 8301acc0 [ 2903.804451][T18704] 1d40: 00000000 82b2f06c dfa51d8c dfa51d58 8142fbcc 8144121c 40946400 00000000 [ 2903.804985][T18704] 1d60: dfa51d7c 200000c0 8301acc0 b5403587 40946400 00000003 00000003 83e16200 [ 2903.805543][T18704] 1d80: dfa51e4c dfa51d90 8142b3d8 8142facc 35353238 00000000 00000000 00000000 [ 2903.805845][T18704] 1da0: 00000000 00004f27 00000005 00400005 00000009 00000001 00000cc7 00000fff [ 2903.806152][T18704] 1dc0: 5c952799 fffffffa 00000001 00000802 00001602 00007fff 00000000 00000009 [ 2903.806449][T18704] 1de0: 0000e1cb 00000006 00000004 00000003 00000395 80000089 fffffffd 00000000 [ 2903.806746][T18704] 1e00: 00000006 00000001 00000007 0001003c 0000ad79 00000007 08000000 00000005 [ 2903.807062][T18704] 1e20: 00000000 514b00b5 00000000 8612d240 8301acc0 200000c0 40946400 00000003 [ 2903.807358][T18704] 1e40: dfa51f14 dfa51e50 8142c6fc 8142b310 dfa51e4c 514b00b5 00000000 00000000 [ 2903.807715][T18704] 1e60: 824b957c dfa51ea4 0000005f 84229408 00000064 8301acf0 dfa51ee4 dfa51e88 [ 2903.808042][T18704] 1e80: 807cf448 807c5820 00000064 00000001 00000000 dfa51ea4 83872850 83418330 [ 2903.808351][T18704] 1ea0: 00006400 0000000b dfa51e98 00000000 dfa51d38 514b00b5 00000000 8612d240 [ 2903.808662][T18704] 1ec0: 40946400 200000c0 200000c0 8612d240 00000003 83e16200 dfa51ef4 dfa51ee8 [ 2903.809001][T18704] 1ee0: 807cf578 514b00b5 dfa51f14 00000000 8612d241 40946400 200000c0 8612d240 [ 2903.809303][T18704] 1f00: 00000003 83e16200 dfa51fa4 dfa51f18 805908e4 8142c3b4 ecac8b10 83e16200 [ 2903.809614][T18704] 1f20: dfa51f3c dfa51f30 81ae5274 81ae5140 dfa51f54 dfa51f40 8025a87c 8028c380 [ 2903.810187][T18704] 1f40: dfa51fb0 40000000 dfa51f84 dfa51f58 80220bf8 8025a838 00000000 8281d2fc [ 2903.810497][T18704] 1f60: dfa51fb0 0013e480 ecac8b10 80220b4c 00000000 514b00b5 dfa51fac 00000000 [ 2903.810803][T18704] 1f80: 00000000 00346310 00000036 8020029c 83e16200 00000036 00000000 dfa51fa8 [ 2903.811118][T18704] 1fa0: 80200060 805906ac 00000000 00000000 00000003 40946400 200000c0 00000000 [ 2903.811427][T18704] 1fc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76ff20dc [ 2903.811770][T18704] 1fe0: 76ff1e88 76ff1e78 00018ba0 001302e0 60000010 00000003 00000000 00000000 [ 2903.812111][T18704] Call trace: [ 2903.812307][T18704] [<81440fe0>] (subdev_8255_io) from [<81440d1c>] (subdev_8255_do_config+0x58/0x60) [ 2903.812709][T18704] r7:00004f27 r6:8301acc0 r5:00004f27 r4:81440fe0 [ 2903.812913][T18704] [<81440cc4>] (subdev_8255_do_config) from [<814410d4>] (subdev_8255_io_init+0x88/0x98) [ 2903.813259][T18704] r4:853c7000 [ 2903.813412][T18704] [<8144104c>] (subdev_8255_io_init) from [<81441284>] (dev_8255_attach+0x74/0x120) [ 2903.813757][T18704] r7:00004f27 r6:853c7000 r5:00000000 r4:8301acc0 [ 2903.813997][T18704] [<81441210>] (dev_8255_attach) from [<8142fbcc>] (comedi_device_attach+0x10c/0x248) [ 2903.814520][T18704] r10:82b2f06c r9:00000000 r8:8301acc0 r7:dfa51d90 r6:00000000 r5:8301acc0 [ 2903.815023][T18704] r4:829d6f04 [ 2903.815187][T18704] [<8142fac0>] (comedi_device_attach) from [<8142b3d8>] (do_devconfig_ioctl+0xd4/0x21c) [ 2903.815542][T18704] r10:83e16200 r9:00000003 r8:00000003 r7:40946400 r6:b5403587 r5:8301acc0 [ 2903.815877][T18704] r4:200000c0 [ 2903.816033][T18704] [<8142b304>] (do_devconfig_ioctl) from [<8142c6fc>] (comedi_unlocked_ioctl+0x354/0x1dbc) [ 2903.816476][T18704] r8:00000003 r7:40946400 r6:200000c0 r5:8301acc0 r4:8612d240 [ 2903.816733][T18704] [<8142c3a8>] (comedi_unlocked_ioctl) from [<805908e4>] (sys_ioctl+0x244/0xb5c) [ 2903.817099][T18704] r10:83e16200 r9:00000003 r8:8612d240 r7:200000c0 r6:40946400 r5:8612d241 [ 2903.817369][T18704] r4:00000000 [ 2903.817527][T18704] [<805906a0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 2903.817854][T18704] Exception stack(0xdfa51fa8 to 0xdfa51ff0) [ 2903.818098][T18704] 1fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 2903.818410][T18704] 1fc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76ff20dc [ 2903.818715][T18704] 1fe0: 76ff1e88 76ff1e78 00018ba0 001302e0 [ 2903.818962][T18704] r10:00000036 r9:83e16200 r8:8020029c r7:00000036 r6:00346310 r5:00000000 [ 2903.819236][T18704] r4:00000000 [ 2903.819637][T18704] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 2903.821791][T18704] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2903.936712][T18704] Kernel panic - not syncing: Fatal exception [ 2903.938320][T18704] Rebooting in 86400 seconds.. VM DIAGNOSIS: 04:05:37 Registers: info registers vcpu 0 CPU#0 R00=dfa99e14 R01=dfa99ee0 R02=00000000 R03=dfa99cc8 R04=84f3c714 R05=00000001 R06=81af1fa8 R07=84f3c714 R08=00000002 R09=dfa99cc0 R10=84f3c708 R11=dfa99c9c R12=dfa99cc0 R13=dfa99c50 R14=81af23e8 R15=81af2400 PSR=a00f0013 N-C- A S svc32 s00=7ed7b928 s01=76f60150 d00=76f601507ed7b928 s02=00000001 s03=76f54a88 d01=76f54a8800000001 s04=fffc0100 s05=fffc0100 d02=fffc0100fffc0100 s06=00000001 s07=00000000 d03=0000000000000001 s08=c0300c00 s09=c0300c03 d04=c0300c03c0300c00 s10=08040201 s11=80402010 d05=8040201008040201 s12=08040201 s13=80402010 d06=8040201008040201 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=822a7fcc R02=00000001 R03=81ae5b40 R04=00000006 R05=828f83c8 R06=dddda3d5 R07=828f83c0 R08=83e16200 R09=828f83c8 R10=00000000 R11=dfa5192c R12=dfa51930 R13=dfa51920 R14=80341910 R15=81ae5b50 PSR=80000193 N--- A S svc32 s00=65746e6f s01=733d7478 d00=733d747865746e6f s02=6964656d s03=64202233 d01=642022336964656d s04=223d7665 s05=74766564 d02=74766564223d7665 s06=7366706d s07=6e692022 d03=6e6920227366706d s08=31373d6f s09=6f692034 d04=6f69203431373d6f s10=636c7463 s11=303d646d d05=303d646d636c7463 s12=30343678 s13=63732030 d06=6373203030343678 s14=65746e6f s15=723d7478 d07=723d747865746e6f s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000