last executing test programs: 15m5.059529909s ago: executing program 1 (id=38): fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) r0 = userfaultfd(0x801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)={0xaa, 0x4}) pselect6(0x40, &(0x7f0000000100)={0x0, 0x3, 0x0, 0xfffffffffffffffd, 0x9}, 0x0, &(0x7f0000000240)={0x1f, 0x3, 0x56d92c88, 0x0, 0x0, 0x10000}, 0x0, 0x0) 15m2.459063377s ago: executing program 1 (id=39): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) madvise(&(0x7f00002e5000/0x400000)=nil, 0x400000, 0xf) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x15, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="050000000000000069111600000000008510000002000000870000000000000095000300000000009500a50500"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x6}, 0x94) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r3, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x64, 0x6, 0x670, 0x2e0, 0xd0, 0x2e0, 0xd0, 0xd0, 0x5a0, 0x5a0, 0x5a0, 0x5a0, 0x5a0, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x5}}}, {{@ipv6={@mcast1, @local, [], [], 'macvtap0\x00', 'ip6tnl0\x00', {}, {}, 0x11}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@broadcast}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_team\x00', 'syzkaller0\x00'}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@unspec=@connmark={{0x30}}, @common=@inet=@socket1={{0x28}}]}, @common=@unspec=@MARK={0x28}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={{0x30}}, @common=@hbh={{0x48}}]}, @inet=@DSCP={0x28}}, {{@uncond, 0x0, 0x138, 0x178, 0x0, {}, [@common=@dst={{0x48}}, @common=@dst={{0x48}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@dev}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6d0) 14m55.263167014s ago: executing program 0 (id=56): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x4, 0x3}, 0x4) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000004c0)={0x0, 0x2007}, 0x4) 14m55.16000457s ago: executing program 0 (id=57): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x207) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000a40)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000140)={'syzkaller0\x00', @random="371692e7f7ef"}) 14m55.040752707s ago: executing program 0 (id=58): r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000840)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000880), &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000640)={'syz', 0x1}, 0x0, 0x0, r1) r3 = add_key$keyring(&(0x7f0000000100), &(0x7f00000002c0)={'syz', 0x2}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000140), &(0x7f0000000680)={'syz', 0x1}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r5) add_key$keyring(&(0x7f00000001c0), 0x0, 0x0, 0x0, r6) 14m54.899838445s ago: executing program 0 (id=59): ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x1c0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="12000000ec0000000800000002"], 0x50) r4 = socket$inet_udp(0x2, 0x2, 0x0) writev(r4, 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000340)={r3, &(0x7f0000019300), &(0x7f0000000280)=@udp=r4}, 0x20) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) r6 = socket(0x10, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r6, 0x89f1, &(0x7f0000000780)={'ip6_vti0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r6, 0x89f3, 0x0) syz_emit_ethernet(0x82, &(0x7f0000000400)=ANY=[@ANYBLOB="bbbbbbbb9ddb958b2ebc8f1044aea0bbbbaaaaaaaaaabb08004500007400f5000000019078ac1e0001ac1414aa03019078036100004600000000000004002f0009ac141410ac1414bb44440001000086dd00000000ac1414bb04000000ac14143200000000e000000100"], 0x0) 14m50.839796125s ago: executing program 1 (id=60): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x206, 0x20182) ioctl$NILFS_IOCTL_GET_VINFO(r0, 0xc0186e86, 0x0) 14m50.738256491s ago: executing program 1 (id=61): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)=ANY=[@ANYBLOB="0f000000040000000800000001"], 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000012c0)={0x15, 0xe, &(0x7f0000001440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200060000000007020000f8ffffffb703000008000000b704000000000000850000000200000018000000000000000000000000000000950000002304f866"], &(0x7f0000000200)='syzkaller\x00', 0x6, 0xe1, &(0x7f0000000240)=""/4096, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffe66}, 0x22) 14m50.610327448s ago: executing program 1 (id=62): r0 = syz_open_dev$loop(&(0x7f0000004940), 0xffffffff, 0xa0800) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, 0x0) 14m50.530601923s ago: executing program 1 (id=63): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) fspick(0xffffffffffffff9c, &(0x7f0000000800)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x1) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x15) r3 = syz_io_uring_setup(0x2532, &(0x7f0000000100)={0x0, 0x0, 0x400, 0x3, 0x20e}, &(0x7f0000000080), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r3, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x2e, &(0x7f0000001800)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getpgid(0x0) r4 = socket$igmp(0x2, 0x3, 0x2) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000100)={'nat\x00', 0x0, [0x9, 0x6, 0x8, 0x5, 0x2]}, &(0x7f0000000180)=0x54) 14m44.870842003s ago: executing program 0 (id=64): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_inet_udp_SIOCINQ(r0, 0x890c, 0x0) 14m44.778756048s ago: executing program 0 (id=65): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) fspick(0xffffffffffffff9c, &(0x7f0000000800)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x1) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x15) r3 = syz_io_uring_setup(0x2532, &(0x7f0000000100)={0x0, 0x0, 0x400, 0x3, 0x20e}, &(0x7f0000000080), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r3, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mincore(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x2e, &(0x7f0000001800)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'nat\x00', 0x0, [0x9, 0x6, 0x8, 0x5, 0x2]}, &(0x7f0000000180)=0x54) 14m4.674435211s ago: executing program 32 (id=63): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) fspick(0xffffffffffffff9c, &(0x7f0000000800)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x1) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x15) r3 = syz_io_uring_setup(0x2532, &(0x7f0000000100)={0x0, 0x0, 0x400, 0x3, 0x20e}, &(0x7f0000000080), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r3, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x2e, &(0x7f0000001800)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getpgid(0x0) r4 = socket$igmp(0x2, 0x3, 0x2) getsockopt$IPT_SO_GET_INFO(r4, 0x0, 0x40, &(0x7f0000000100)={'nat\x00', 0x0, [0x9, 0x6, 0x8, 0x5, 0x2]}, &(0x7f0000000180)=0x54) 13m59.556709891s ago: executing program 33 (id=65): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) fspick(0xffffffffffffff9c, &(0x7f0000000800)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x1) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x15) r3 = syz_io_uring_setup(0x2532, &(0x7f0000000100)={0x0, 0x0, 0x400, 0x3, 0x20e}, &(0x7f0000000080), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f0000000040)=[{0x0}, {0x0}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r3, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) mincore(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x3, 0x2e, &(0x7f0000001800)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000100)={'nat\x00', 0x0, [0x9, 0x6, 0x8, 0x5, 0x2]}, &(0x7f0000000180)=0x54) 13m10.126916302s ago: executing program 2 (id=108): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x4, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x61}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0x14, 0xe40, &(0x7f00000002c0)='\x00\x00\x00\x00\x00\x00\x00\x00', &(0x7f0000000300)=""/8, 0x320e, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) 13m9.686900666s ago: executing program 2 (id=111): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f00000004c0)={0xa, 0x4e24, 0x0, @local, 0x7}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000000000)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000180)="82", 0x1}, {&(0x7f0000000680)='\x00', 0x1}], 0x2}}], 0x1, 0x4400c800) sendto$inet6(r0, &(0x7f0000000400)='\f/', 0x2, 0x3b00, 0x0, 0x0) 13m9.517578976s ago: executing program 2 (id=113): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x2c, 0x2, 0x3, 0x201, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFQA_CFG_CMD={0x8, 0x1, {0x2, 0x0, 0x25}}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x34}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x34}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000}, 0xc0) 13m9.354606635s ago: executing program 2 (id=114): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x167) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x80, &(0x7f00000002c0)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000000080)={0x50, 0x0, r1, {0x7, 0x29, 0x9, 0xffffffff9080edc4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x9}}, 0x50) syz_fuse_handle_req(r0, &(0x7f00000042c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006380)={0x20, 0x0, 0x0, {0x0, 0x1c}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r0, &(0x7f00000063c0)="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", 0x2000, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="b000000000000000fbffffffffffffffffffffffffffffff02000000000000000100000000"], 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x80) getdents64(r2, 0xfffffffffffffffe, 0x29) 13m7.138146291s ago: executing program 2 (id=120): mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x85132, 0xffffffffffffffff, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f000000b4c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x488c4) mlock2(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 13m6.578157473s ago: executing program 2 (id=123): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_int(r3, 0x1, 0x10, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001c00), 0x40000000000017a, 0x40840) 12m51.570314993s ago: executing program 3 (id=129): ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'ip6tnl0\x00', 0x0, 0x4, 0xa, 0x8a, 0xa5e7, 0xc, @remote, @private0={0xfc, 0x0, '\x00', 0x1}, 0x7800, 0x80, 0x3, 0x1}}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="480000001c00110c0000001400000f0007000000", @ANYRES32=r1, @ANYBLOB="800202000a000200577f0000aabb000020000e80050001008f000000050001000100000004000200050001"], 0x48}}, 0x0) 12m50.528170772s ago: executing program 3 (id=130): r0 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0a00000016000000b30000007f"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000099d30000851000000600000018100000", @ANYRES32=r0, @ANYBLOB="00000000000000006600000000000000180000000000000000000000000000009500000000000000360a000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) 12m39.651646069s ago: executing program 3 (id=131): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000015c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0xfffffff9) close_range(r1, r1, 0x2) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$VHOST_SET_VRING_ERR(r0, 0x4008af22, &(0x7f00000002c0)={0x1, r1}) 12m39.478503618s ago: executing program 3 (id=132): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x17, 0x4, &(0x7f0000000480)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x1}]}, 0x0, 0x5}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 12m39.401199182s ago: executing program 3 (id=133): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff}) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000440)) 12m39.391902453s ago: executing program 3 (id=134): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) r0 = io_uring_setup(0x10d7, &(0x7f0000000140)={0x0, 0xbfff, 0x1, 0x2, 0x1f}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r3, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) chdir(0x0) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) socket$netlink(0x10, 0x3, 0x14) writev(0xffffffffffffffff, 0x0, 0x0) lsetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) preadv(r5, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/6, 0x6}], 0x1, 0x0, 0x5245) close_range(r0, 0xffffffffffffffff, 0x0) 12m21.005040995s ago: executing program 34 (id=123): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_int(r3, 0x1, 0x10, 0x0, 0x0) sendmmsg(r3, &(0x7f0000001c00), 0x40000000000017a, 0x40840) 11m53.930290929s ago: executing program 35 (id=134): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) r0 = io_uring_setup(0x10d7, &(0x7f0000000140)={0x0, 0xbfff, 0x1, 0x2, 0x1f}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x23, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r3, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) chdir(0x0) prctl$PR_SET_VMA(0x53564d41, 0x0, &(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) socket$netlink(0x10, 0x3, 0x14) writev(0xffffffffffffffff, 0x0, 0x0) lsetxattr(0x0, &(0x7f0000000040)=@known='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) r5 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) preadv(r5, &(0x7f00000001c0)=[{&(0x7f0000000200)=""/6, 0x6}], 0x1, 0x0, 0x5245) close_range(r0, 0xffffffffffffffff, 0x0) 11m28.869152149s ago: executing program 5 (id=144): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x1, 0x4, 0x301, 0x0, 0x0, {0xb}, [@NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000400) 11m28.669664141s ago: executing program 5 (id=153): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e26}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x15) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = getpgrp(0x0) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = epoll_create(0x3) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) 10m43.380758087s ago: executing program 36 (id=153): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e26}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x15) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = getpgrp(0x0) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = epoll_create(0x3) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) 10m25.591563085s ago: executing program 4 (id=187): r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x8000000004) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200003, 0x0, 0x0, 0x3}) writev(r1, &(0x7f0000000000)=[{&(0x7f00000001c0)="580000001400add427323b472545b45602117fffffff81000e220e227f000008925a8e0013007b000b00984d000000000000008100ff0000f03a86100003ffffffffffffffffffffffe7ee000000deff0000000200000000", 0x58}], 0x1) 10m25.029766167s ago: executing program 4 (id=188): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuacct.usage_percpu\x00', 0x275a, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000140)={0x1, 0x1, 0x7, 0x5}) fcntl$lock(r0, 0x7, &(0x7f00000000c0)={0x1, 0x2, 0x8, 0x73e9}) 10m24.469526268s ago: executing program 4 (id=189): ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={0xffffffffffffffff, 0xbcc9, 0xffffffffffff0000, 0x2}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, 0x0) r1 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x3, 0x0, @remote, 0x6}, 0x1c) sendmsg(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x4) 10m24.121116178s ago: executing program 4 (id=190): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="440000001a0001002bbd7000000000000a000000", @ANYRES32=0x0, @ANYBLOB="0400000414000300070000000200000000000000000000001400010000000000000000000000ffffff"], 0x44}}, 0x0) 10m23.9146372s ago: executing program 4 (id=191): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) syz_usb_connect$uac2(0x2, 0x8c, &(0x7f0000000040)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x40, 0xffad, 0xa001, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7a, 0x3, 0x1, 0x6, 0xb0, 0x2, {0x8, 0xb, 0x0, 0x1, 0x1, 0xa, 0x20, 0x81}, {{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x20, 0x0, {{0x9, 0x24, 0x1, 0x3, 0xc, 0x1a, 0xa6}, [@output_terminal={0xc, 0x24, 0x3, 0x4, 0x1ff, 0xf, 0x6, 0x0, 0x7}, @selector_unit={0x5}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x20, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x20, 0x8, 0x8, 0xe, {0x8, 0x25, 0x1, 0x2, 0x3, 0xd, 0xe}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x20, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x200, 0x1, 0x2, 0x7, {0x8, 0x25, 0x1, 0x81, 0xc, 0xb9, 0x6}}}}}}}}]}}, &(0x7f0000000500)={0xa, &(0x7f0000000140)={0xa, 0x6, 0x250, 0x8d, 0x5, 0x4, 0xff, 0x3}, 0x0, 0x0}) 10m23.589959068s ago: executing program 4 (id=192): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e26}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) fspick(0xffffffffffffff9c, 0x0, 0x1) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x15) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = getpgrp(0x0) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = epoll_create(0x3) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) 9m37.522604678s ago: executing program 37 (id=192): prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e26}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) fspick(0xffffffffffffff9c, 0x0, 0x1) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x15) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = getpgrp(0x0) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = epoll_create(0x3) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff, 0x1}) 8m8.438842106s ago: executing program 7 (id=329): openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) socket$kcm(0x11, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket(0x400000000010, 0x3, 0x0) r4 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r4, 0x6, 0x0, 0x0, 0x0) r5 = fsmount(r4, 0x0, 0xc) r6 = openat$cgroup_subtree(r5, &(0x7f0000000100), 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000980)=ANY=[@ANYBLOB], 0x1f) r7 = getpid() r8 = syz_pidfd_open(r7, 0x0) setns(r8, 0x24020000) move_mount(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x0, 0x64) ioctl$sock_SIOCETHTOOL(r3, 0x89ff, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000400)=@ethtool_ringparam={0x11, 0x0, 0x20040001, 0x0, 0x7, 0x0, 0x0, 0xa1}}) 7m57.620396659s ago: executing program 7 (id=331): r0 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r0, 0xc02064d2, &(0x7f0000000080)={0x3, 0x80, 0x3}) 7m57.509824815s ago: executing program 7 (id=332): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)={{0x14}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2, 0x0, 0x2}, [@NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @connlimit={{0xe}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_CONNLIMIT_COUNT={0x8, 0x1, 0x1, 0x0, 0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x78}}, 0x0) close(0x3) 7m57.388311722s ago: executing program 7 (id=333): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x4001, 0x7ff, @remote, 0x1}, 0x1c) 7m56.227503298s ago: executing program 7 (id=334): r0 = socket$inet6(0xa, 0x400000000001, 0x0) bind$inet6(r0, &(0x7f0000fa0fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x24000088, &(0x7f00000001c0)={0xa, 0x4e20, 0x8, @loopback, 0xfffffffe}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000200)=0x3fd0, 0x4) sendmmsg$inet6(r0, &(0x7f0000004280)=[{{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="147112e2f560", 0x6}], 0x1}}, {{0x0, 0x0, &(0x7f00000035c0)=[{&(0x7f0000003580)='j', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000003700)=[{&(0x7f0000003600)="1d", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f00000037c0)=[{&(0x7f0000003740)='Z', 0x1}], 0x1}}], 0x4, 0x84) 7m56.028909959s ago: executing program 7 (id=335): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, 0x0, 0x0) writev(r3, &(0x7f0000000100)=[{&(0x7f0000000000)="580000001400192340834b80043f679a10ff3d425f9cc3f4ff7f4e32f61bcdf1e422000000000100804824cabecc4b381eaadc28f23457e792945f64009400050028925aaa000000c600000000000000feff2c707f8f00ff", 0x58}], 0x1) 7m10.13537493s ago: executing program 38 (id=335): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = socket$netlink(0x10, 0x3, 0x4) setsockopt$netlink_NETLINK_NO_ENOBUFS(r3, 0x10e, 0x5, 0x0, 0x0) writev(r3, &(0x7f0000000100)=[{&(0x7f0000000000)="580000001400192340834b80043f679a10ff3d425f9cc3f4ff7f4e32f61bcdf1e422000000000100804824cabecc4b381eaadc28f23457e792945f64009400050028925aaa000000c600000000000000feff2c707f8f00ff", 0x58}], 0x1) 6m3.191586048s ago: executing program 6 (id=440): r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x100000a, 0x204031, 0xffffffffffffffff, 0xec776000) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) read$FUSE(r1, &(0x7f0000002100)={0x2020}, 0x2020) 6m0.609911556s ago: executing program 6 (id=441): socketpair$unix(0x1, 0x1, 0x0, 0x0) quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000000), 0x42, 0x0) syz_open_dev$sndctrl(&(0x7f0000001440), 0x0, 0x801) r0 = syz_open_dev$sndpcmp(&(0x7f0000001200), 0x0, 0xa2c65) ioctl$SNDRV_PCM_IOCTL_REWIND(r0, 0x40084146, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9) unlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0) 6m0.479690284s ago: executing program 6 (id=442): ioctl$IOMMU_TEST_OP_MOCK_DOMAIN(0xffffffffffffffff, 0x3ba0, 0x0) r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000), 0x801, 0x0) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000380)={{0x0, 0x400, 0x4b, 0x9}, 'syz0\x00', 0x11}) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0xfffffffffffffffe, 0x2) dup3(r1, r0, 0x80000) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, 0x0) 6m0.329363303s ago: executing program 6 (id=443): r0 = openat$nci(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f00000002c0)=""/100, 0x64) write$nci(r0, &(0x7f0000000340)=@NCI_OP_CORE_INIT_RSP, 0x14) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) write$nci(r0, &(0x7f0000000400)=@NCI_OP_RF_DISCOVER_MAP_RSP, 0x4) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) 5m55.009740157s ago: executing program 6 (id=448): recvmsg$unix(0xffffffffffffffff, 0x0, 0x20) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000400)=@mangle={'mangle\x00', 0x1f, 0x6, 0x400, 0xc0, 0x338, 0x338, 0x338, 0x338, 0x408, 0x408, 0x408, 0x408, 0x408, 0x6, 0x0, {[{{@ip={@multicast1, @multicast2, 0xff, 0xffffffff, 'vxcan1\x00', 'pim6reg1\x00', {}, {}, 0x84, 0x2, 0xfb944839c7a956f9}, 0x0, 0x70, 0x98}, @TTL={0x28}}, {{@ip={@multicast1, @empty, 0xff, 0x0, 'macvtap0\x00', 'dummy0\x00', {}, {0xff}, 0x32, 0x2, 0x40}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x2d}}}, {{@uncond, 0x0, 0x70, 0x98}, @unspec=@CHECKSUM={0x28}}, {{@uncond, 0x0, 0x70, 0xd0}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x0, [0x0, 0x4, 0x2, 0x1, 0x0, 0x5], 0x2, 0x4}, {0xffffffffffffffff, [0x4, 0x5, 0x7, 0x2, 0x2, 0x3], 0x6, 0x2}}}}, {{@ip={@loopback, @remote, 0x0, 0xff000000, 'syzkaller1\x00', 'veth0_to_bond\x00', {0xff}, {}, 0xfc, 0x2, 0x28}, 0x0, 0x70, 0xd0}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0x4, 0xb, [0x15, 0x1e, 0x10, 0xb, 0x10, 0xc, 0x1f, 0x13, 0x22, 0x2e, 0x17, 0x1, 0x11, 0x28, 0x24, 0x39], 0x2, 0x5, 0x353b}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x460) pselect6(0x40, &(0x7f0000000000)={0xedb7, 0x7d3a2867, 0xd03, 0x6, 0x6, 0x3, 0xd1f}, &(0x7f0000000080)={0x7c, 0x1, 0x4, 0x5, 0x3, 0x2, 0x6b9cae00, 0x9}, &(0x7f00000000c0)={0x2, 0x3ff, 0x0, 0x9e9, 0x4, 0x4, 0xba}, &(0x7f0000000100), &(0x7f0000000180)={&(0x7f0000000140)={[0x1]}, 0x8}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) syz_usb_connect(0x0, 0x2d, &(0x7f0000000040)=ANY=[@ANYBLOB="12010000552a5920240401c05faa0102030109021b00010000100009040a00019428b000090507"], 0x0) 5m54.931032872s ago: executing program 6 (id=449): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d10300001400"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) dup2(0xffffffffffffffff, r0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000040)=ANY=[@ANYRES32], 0x0, 0x2, 0xb3, &(0x7f0000000140)=""/179, 0x41100, 0x7b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x38}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, r1, 0x71096000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180), 0x109842, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r4, 0x80044dff, &(0x7f0000000200)) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x34, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x5c}, 0x1, 0x0, 0x0, 0x4000810}, 0x40) 5m9.912533632s ago: executing program 39 (id=449): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d10300001400"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) dup2(0xffffffffffffffff, r0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000040)=ANY=[@ANYRES32], 0x0, 0x2, 0xb3, &(0x7f0000000140)=""/179, 0x41100, 0x7b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x38}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, r1, 0x71096000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) socket$inet6(0xa, 0x5, 0x0) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180), 0x109842, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(r4, 0x80044dff, &(0x7f0000000200)) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x34, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x5c}, 0x1, 0x0, 0x0, 0x4000810}, 0x40) 18.069866695s ago: executing program 9 (id=972): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r0, &(0x7f0000000080)}, 0x20) 17.990614819s ago: executing program 9 (id=973): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000140)=@newtfilter={0x6c, 0x2c, 0xd27, 0x70bd28, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xfff3, 0x7}, {}, {0xa, 0xfff2}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x3c, 0x2, [@TCA_CGROUP_EMATCHES={0x38, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x2c, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x28, 0x1, 0x0, 0x0, {{0xe37, 0x9, 0x4}, [@TCA_EM_IPT_HOOK={0x8, 0x1, 0x1}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x5}]}}]}]}]}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x4000080}, 0x40010) 17.846803078s ago: executing program 9 (id=975): r0 = openat$nci(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r1) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r2, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) sendmsg$NFC_CMD_START_POLL(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r2, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r2, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) 14.087215953s ago: executing program 9 (id=977): r0 = getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mknod$loop(&(0x7f0000000140)='./file0\x00', 0xfff, 0x1) read$FUSE(0xffffffffffffffff, 0x0, 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) syz_fuse_handle_req(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x80101, 0x101) r4 = dup2(r3, 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000240)=ANY=[@ANYRES32=r4, @ANYBLOB]) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0x3) ioctl$TIOCSLCKTRMIOS(r5, 0x5457, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) 4.568926478s ago: executing program 8 (id=982): r0 = syz_io_uring_setup(0x237, &(0x7f0000000480)={0x0, 0x8901, 0x400, 0x0, 0x2cf}, &(0x7f0000000040)=0x0, &(0x7f0000000600)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) sendmsg$rds(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440), 0x0, 0x0, 0x5f, 0x20000800}, 0x4000008) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f00000001c0)=ANY=[@ANYBLOB='3'], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x24, 0x2007, @fd_index=0x4, 0x800, 0x0, 0x0, 0x18, 0x0, {0x2}}) io_uring_enter(r0, 0x47ba, 0x0, 0x0, 0x0, 0x0) 4.448721106s ago: executing program 9 (id=983): r0 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) mmap(&(0x7f00001ab000/0x2000)=nil, 0x2000, 0x1000002, 0x11012, r0, 0x108000) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xe) 4.37601913s ago: executing program 8 (id=984): lsetxattr$security_ima(&(0x7f0000000000)='./cgroup\x00', &(0x7f0000000080), &(0x7f00000000c0)=@v1={0x2, 'Q'}, 0x2, 0x1) 4.357521561s ago: executing program 9 (id=985): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee7, 0x8031, 0xffffffffffffffff, 0x3000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x1c, 0x4, 0x6, 0x101, 0x0, 0x0, {0x0, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000011}, 0x20000084) 4.21032091s ago: executing program 8 (id=986): r0 = openat$nci(0xffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nfc(0x0, r2) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)={0x1c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}]}, 0x1c}}, 0x0) read$nci(r0, &(0x7f0000000200)=""/100, 0x64) write$nci(r0, &(0x7f0000000280)=@NCI_OP_CORE_RESET_RSP, 0x6) read$nci(r0, &(0x7f0000000380)=""/100, 0x64) sendmsg$NFC_CMD_START_POLL(r2, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000004c0)={0x24, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0xffffffff}]}, 0x24}}, 0x0) read$nci(r0, &(0x7f0000000500)=""/100, 0x64) read$nci(r0, &(0x7f00000005c0)=""/100, 0x64) read$nci(r0, &(0x7f0000000680)=""/100, 0x64) write$nci(r0, &(0x7f0000000700)=@NCI_OP_RF_DISCOVER_RSP, 0x4) write$nci(r0, &(0x7f0000000740)=@NCI_OP_RF_DISCOVER_NTF={0x1, 0x0, 0x3, 0x3, 0x0, @b={0x0, 0x1, 0x1, 0x1, {0x1, "aa"}}}, 0xa) sendmsg$NFC_CMD_ACTIVATE_TARGET(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f00000007c0)={&(0x7f0000000800)={0x2c, r3, 0x1, 0x123, 0x234, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r1}, @NFC_ATTR_TARGET_INDEX={0x8}, @NFC_ATTR_PROTOCOLS={0x8, 0x3, 0x1}]}, 0x2c}}, 0x0) 309.772683ms ago: executing program 8 (id=987): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x5, [@struct={0x3, 0x0, 0x0, 0x4, 0x1, 0x109}]}, {0x0, [0x30, 0x0, 0x61]}}, 0x0, 0x29, 0x0, 0x8}, 0x28) 178.25529ms ago: executing program 8 (id=988): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@ipv4_delroute={0x44, 0x19, 0x901, 0x0, 0x0, {0x2, 0x18, 0x0, 0x0, 0x0, 0x0, 0xfd, 0x1}, [@RTA_DST={0x8, 0x1, @dev}, @RTA_ENCAP={0x10, 0x16, 0x0, 0x1, @ILA_ATTR_LOCATOR={0xc, 0x1, 0xfff}}, @RTA_GATEWAY={0x8, 0x5, @private=0xa010102}, @RTA_ENCAP_TYPE={0x6, 0x15, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 0s ago: executing program 8 (id=989): sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0xb, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, 0x0, 0x0) fsopen(0x0, 0x0) r0 = openat$comedi(0xffffff9c, &(0x7f0000000040)='/dev/comedi2\x00', 0x22780, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000240)={'comedi_parport\x00', [0xafff, 0x33, 0x80010000, 0x4, 0x8, 0x208f, 0x6, 0x8012, 0x1007, 0xc0000000, 0x10000005, 0xfffffffd, 0x1, 0x0, 0x5, 0xfdfffffa, 0xe8, 0x6, 0x9, 0x8e, 0x2000005, 0x5, 0xf, 0xb, 0x4, 0x5, 0xb0c4, 0x6, 0x20002, 0x400002, 0x22]}) kernel console output (not intermixed with test programs): .900:4448): avc: denied { search } for pid=8533 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 736.979490][ T28] audit: type=1400 audit(736.900:4449): avc: denied { read open } for pid=8533 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 736.982812][ T28] audit: type=1400 audit(736.900:4450): avc: denied { getattr } for pid=8533 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 736.995210][ T28] audit: type=1400 audit(736.910:4451): avc: denied { read open } for pid=8533 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 737.004337][ T28] audit: type=1400 audit(736.920:4452): avc: denied { getattr } for pid=8533 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 737.014397][ T28] audit: type=1400 audit(736.930:4453): avc: denied { search } for pid=8533 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 737.014694][ T28] audit: type=1400 audit(736.930:4454): avc: denied { create } for pid=8534 comm="syz.9.500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 737.022767][ T28] audit: type=1400 audit(736.940:4455): avc: denied { search } for pid=8533 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 737.024770][ T28] audit: type=1400 audit(736.940:4456): avc: denied { search } for pid=8533 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 737.060762][ T28] audit: type=1400 audit(736.980:4457): avc: denied { search } for pid=8533 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 742.022364][ T28] kauditd_printk_skb: 227 callbacks suppressed [ 742.022693][ T28] audit: type=1400 audit(741.940:4685): avc: denied { module_request } for pid=8564 comm="syz.8.511" kmod="net-pf-10-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 742.163390][ T28] audit: type=1400 audit(742.080:4686): avc: denied { search } for pid=8574 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 742.176289][ T28] audit: type=1400 audit(742.090:4687): avc: denied { search } for pid=8574 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 742.176783][ T28] audit: type=1400 audit(742.090:4688): avc: denied { search } for pid=8574 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 742.601850][ T28] audit: type=1400 audit(742.520:4689): avc: denied { search } for pid=8553 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 743.227697][ T28] audit: type=1400 audit(743.140:4690): avc: denied { create } for pid=8578 comm="syz.9.512" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 743.717798][ T28] audit: type=1400 audit(743.640:4691): avc: denied { create } for pid=8582 comm="syz.8.514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 743.727930][ T28] audit: type=1400 audit(743.640:4692): avc: denied { setopt } for pid=8582 comm="syz.8.514" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 743.876483][ T28] audit: type=1400 audit(743.790:4693): avc: denied { write } for pid=8583 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 743.876943][ T28] audit: type=1400 audit(743.790:4694): avc: denied { open } for pid=8583 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 744.632368][ T8590] netlink: 'syz.9.516': attribute type 3 has an invalid length. [ 746.102124][ T8590] syz_tun: left promiscuous mode [ 747.091834][ T28] kauditd_printk_skb: 101 callbacks suppressed [ 747.092269][ T28] audit: type=1400 audit(747.010:4796): avc: denied { write } for pid=8598 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 747.092470][ T28] audit: type=1400 audit(747.010:4797): avc: denied { write open } for pid=8598 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 747.609881][ T28] audit: type=1400 audit(747.530:4798): avc: denied { create } for pid=8604 comm="syz.8.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 747.677824][ T28] audit: type=1400 audit(747.590:4799): avc: denied { setopt } for pid=8604 comm="syz.8.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 747.706337][ T28] audit: type=1400 audit(747.620:4800): avc: denied { write } for pid=8603 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 747.706762][ T28] audit: type=1400 audit(747.620:4801): avc: denied { open } for pid=8603 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 747.718397][ T28] audit: type=1400 audit(747.640:4802): avc: denied { search } for pid=8603 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 747.718778][ T28] audit: type=1400 audit(747.640:4803): avc: denied { search } for pid=8603 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 747.718977][ T28] audit: type=1400 audit(747.640:4804): avc: denied { search } for pid=8603 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 747.719054][ T28] audit: type=1400 audit(747.640:4805): avc: denied { search } for pid=8603 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 752.407344][ T28] kauditd_printk_skb: 67 callbacks suppressed [ 752.407887][ T28] audit: type=1400 audit(752.330:4873): avc: denied { create } for pid=8617 comm="syz.9.522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 752.431580][ T28] audit: type=1400 audit(752.350:4874): avc: denied { read } for pid=8617 comm="syz.9.522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 752.603726][ T28] audit: type=1400 audit(752.520:4875): avc: denied { write } for pid=8620 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 752.614030][ T28] audit: type=1400 audit(752.530:4876): avc: denied { open } for pid=8620 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 752.634658][ T28] audit: type=1400 audit(752.550:4877): avc: denied { create } for pid=8624 comm="syz.8.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 752.704702][ T28] audit: type=1400 audit(752.620:4878): avc: denied { write } for pid=8624 comm="syz.8.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 752.911890][ T28] audit: type=1400 audit(752.830:4879): avc: denied { write } for pid=8624 comm="syz.8.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 752.954426][ T28] audit: type=1400 audit(752.860:4880): avc: denied { write } for pid=8617 comm="syz.9.522" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 752.954624][ T28] audit: type=1400 audit(752.860:4881): avc: denied { read } for pid=8624 comm="syz.8.525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 752.954835][ T28] audit: type=1400 audit(752.870:4882): avc: denied { module_request } for pid=8617 comm="syz.9.522" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 753.627589][ T8634] netlink: 8 bytes leftover after parsing attributes in process `syz.9.527'. [ 755.512847][ T8646] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 756.031247][ T8646] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 756.142483][ T8646] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 756.333443][ T8646] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 756.689960][ T8062] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 756.707448][ T6612] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 756.708535][ T6612] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 756.732795][ T980] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.459975][ T28] kauditd_printk_skb: 35 callbacks suppressed [ 757.463497][ T28] audit: type=1400 audit(757.380:4918): avc: denied { read } for pid=8673 comm="syz.9.535" dev="nsfs" ino=4026532932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 757.471912][ T28] audit: type=1400 audit(757.390:4919): avc: denied { read open } for pid=8673 comm="syz.9.535" path="net:[4026532932]" dev="nsfs" ino=4026532932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 757.472084][ T28] audit: type=1400 audit(757.390:4920): avc: denied { create } for pid=8673 comm="syz.9.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 757.477432][ T28] audit: type=1400 audit(757.400:4921): avc: denied { write } for pid=8673 comm="syz.9.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 757.483237][ T28] audit: type=1400 audit(757.400:4922): avc: denied { module_request } for pid=8673 comm="syz.9.535" kmod=6E65742D70662D31362D70726F746F2D31362D66616D696C792D3830322E31352E34204D4143 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 757.884268][ T28] audit: type=1400 audit(757.800:4923): avc: denied { read } for pid=8673 comm="syz.9.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 757.898666][ T28] audit: type=1400 audit(757.820:4924): avc: denied { write } for pid=8673 comm="syz.9.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 758.173561][ T28] audit: type=1400 audit(758.080:4925): avc: denied { setopt } for pid=8671 comm="syz.8.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 758.173910][ T28] audit: type=1400 audit(758.090:4926): avc: denied { create } for pid=8671 comm="syz.8.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 758.196093][ T28] audit: type=1400 audit(758.110:4927): avc: denied { ioctl } for pid=8671 comm="syz.8.534" path="socket:[13366]" dev="sockfs" ino=13366 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 761.395478][ T8706] netlink: 48 bytes leftover after parsing attributes in process `syz.9.541'. [ 761.897188][ T8710] block nbd8: not configured, cannot reconfigure [ 762.659150][ T28] kauditd_printk_skb: 37 callbacks suppressed [ 762.659535][ T28] audit: type=1400 audit(762.580:4965): avc: denied { ioctl } for pid=8713 comm="syz.9.546" path="/dev/virtual_nci" dev="devtmpfs" ino=659 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 762.674290][ T28] audit: type=1400 audit(762.590:4966): avc: denied { read } for pid=8713 comm="syz.9.546" dev="nsfs" ino=4026532932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 762.674606][ T28] audit: type=1400 audit(762.590:4967): avc: denied { read open } for pid=8713 comm="syz.9.546" path="net:[4026532932]" dev="nsfs" ino=4026532932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 762.690778][ T28] audit: type=1400 audit(762.610:4968): avc: denied { create } for pid=8713 comm="syz.9.546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 762.709892][ T28] audit: type=1400 audit(762.630:4969): avc: denied { write } for pid=8713 comm="syz.9.546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 762.711580][ T28] audit: type=1400 audit(762.630:4970): avc: denied { read } for pid=8713 comm="syz.9.546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 763.165962][ T28] audit: type=1400 audit(763.080:4971): avc: denied { write } for pid=8721 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 763.167593][ T28] audit: type=1400 audit(763.080:4972): avc: denied { open } for pid=8721 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 763.192584][ T28] audit: type=1400 audit(763.110:4973): avc: denied { search } for pid=8721 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 763.215832][ T28] audit: type=1400 audit(763.130:4974): avc: denied { search } for pid=8721 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 767.700515][ T28] kauditd_printk_skb: 58 callbacks suppressed [ 767.700936][ T28] audit: type=1400 audit(767.620:5033): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 767.701073][ T28] audit: type=1400 audit(767.620:5034): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 767.701135][ T28] audit: type=1400 audit(767.620:5035): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 767.706634][ T28] audit: type=1400 audit(767.620:5036): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 767.707004][ T28] audit: type=1400 audit(767.630:5037): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 767.707106][ T28] audit: type=1400 audit(767.630:5038): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 767.711748][ T28] audit: type=1400 audit(767.630:5039): avc: denied { getattr } for pid=8735 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 767.724282][ T28] audit: type=1400 audit(767.640:5040): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 767.724695][ T28] audit: type=1400 audit(767.640:5041): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 767.724787][ T28] audit: type=1400 audit(767.640:5042): avc: denied { search } for pid=8735 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 767.756364][ T8714] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 767.898956][ T8741] netlink: 27 bytes leftover after parsing attributes in process `syz.8.548'. [ 769.240104][ T8758] netlink: 8 bytes leftover after parsing attributes in process `syz.8.553'. [ 769.252318][ T8758] netlink: 8 bytes leftover after parsing attributes in process `syz.8.553'. [ 772.790541][ T28] kauditd_printk_skb: 244 callbacks suppressed [ 772.796723][ T28] audit: type=1400 audit(772.710:5287): avc: denied { create } for pid=8805 comm="syz.8.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 772.819492][ T28] audit: type=1400 audit(772.740:5288): avc: denied { map_create } for pid=8805 comm="syz.8.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 772.831803][ T28] audit: type=1400 audit(772.750:5289): avc: denied { map_read map_write } for pid=8805 comm="syz.8.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 772.843169][ T28] audit: type=1400 audit(772.760:5290): avc: denied { prog_load } for pid=8805 comm="syz.8.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 772.852305][ T28] audit: type=1400 audit(772.770:5291): avc: denied { bpf } for pid=8805 comm="syz.8.564" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 772.869339][ T28] audit: type=1400 audit(772.790:5292): avc: denied { prog_load } for pid=8805 comm="syz.8.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 772.882548][ T28] audit: type=1400 audit(772.800:5293): avc: denied { perfmon } for pid=8805 comm="syz.8.564" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 772.893771][ T28] audit: type=1400 audit(772.810:5294): avc: denied { perfmon } for pid=8805 comm="syz.8.564" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 772.901903][ T28] audit: type=1400 audit(772.820:5295): avc: denied { bpf } for pid=8805 comm="syz.8.564" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 772.920115][ T28] audit: type=1400 audit(772.840:5296): avc: denied { prog_run } for pid=8805 comm="syz.8.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 774.069421][ T8760] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 775.187353][ T8820] syzkaller0: entered promiscuous mode [ 775.188777][ T8820] syzkaller0: entered allmulticast mode [ 777.776725][ T8845] netlink: 228 bytes leftover after parsing attributes in process `syz.9.574'. [ 777.777936][ T8845] netlink: 228 bytes leftover after parsing attributes in process `syz.9.574'. [ 778.139160][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 778.141825][ T28] audit: type=1400 audit(778.060:5330): avc: denied { write } for pid=8831 comm="syz.8.571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 778.332802][ T28] audit: type=1400 audit(778.250:5331): avc: denied { create } for pid=8849 comm="syz.9.576" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 778.350115][ T28] audit: type=1400 audit(778.270:5332): avc: denied { ioctl } for pid=8849 comm="syz.9.576" path="socket:[13564]" dev="sockfs" ino=13564 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 778.487231][ T28] audit: type=1400 audit(778.400:5333): avc: denied { read write } for pid=8851 comm="syz.9.577" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 778.490946][ T28] audit: type=1400 audit(778.410:5334): avc: denied { open } for pid=8851 comm="syz.9.577" path="/dev/virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 778.525415][ T28] audit: type=1400 audit(778.440:5335): avc: denied { read } for pid=8851 comm="syz.9.577" dev="nsfs" ino=4026532932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 778.538183][ T28] audit: type=1400 audit(778.440:5336): avc: denied { open } for pid=8851 comm="syz.9.577" path="net:[4026532932]" dev="nsfs" ino=4026532932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 778.548775][ T28] audit: type=1400 audit(778.450:5337): avc: denied { create } for pid=8851 comm="syz.9.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 778.553656][ T28] audit: type=1400 audit(778.450:5338): avc: denied { write } for pid=8851 comm="syz.9.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 779.044185][ T28] audit: type=1400 audit(778.950:5339): avc: denied { ioctl } for pid=8851 comm="syz.9.577" path="/dev/virtual_nci" dev="devtmpfs" ino=659 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 781.153663][ T8834] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 781.951583][ T8885] netlink: 36752 bytes leftover after parsing attributes in process `syz.8.587'. [ 783.692332][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 783.692709][ T28] audit: type=1400 audit(783.610:5369): avc: denied { create } for pid=8893 comm="syz.8.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 783.704795][ T28] audit: type=1400 audit(783.620:5370): avc: denied { setopt } for pid=8893 comm="syz.8.591" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 784.347884][ T28] audit: type=1400 audit(784.270:5371): avc: denied { read } for pid=8895 comm="syz.9.592" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 784.353129][ T28] audit: type=1400 audit(784.270:5372): avc: denied { open } for pid=8895 comm="syz.9.592" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 784.377464][ T28] audit: type=1400 audit(784.270:5373): avc: denied { ioctl } for pid=8895 comm="syz.9.592" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 784.618752][ T28] audit: type=1400 audit(784.540:5374): avc: denied { block_suspend } for pid=8896 comm="syz.8.593" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 784.642603][ T28] audit: type=1400 audit(784.560:5375): avc: denied { create } for pid=8895 comm="syz.9.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 784.660788][ T28] audit: type=1400 audit(784.580:5376): avc: denied { block_suspend } for pid=8896 comm="syz.8.593" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 784.788236][ T28] audit: type=1400 audit(784.710:5377): avc: denied { read } for pid=8895 comm="syz.9.592" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 784.968583][ T28] audit: type=1400 audit(784.890:5378): avc: denied { read open } for pid=8895 comm="syz.9.592" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 785.152697][ T8897] syzkaller0: entered promiscuous mode [ 785.297240][ T8897] syzkaller0: entered allmulticast mode [ 785.398619][ T8897] 0: reclassify loop, rule prio 0, protocol 800 [ 788.481311][ T8945] geneve1: entered promiscuous mode [ 788.488835][ T8945] macsec1: entered promiscuous mode [ 788.492552][ T8945] macsec1: entered allmulticast mode [ 788.496024][ T8945] geneve1: entered allmulticast mode [ 788.957585][ T28] kauditd_printk_skb: 43 callbacks suppressed [ 788.957990][ T28] audit: type=1400 audit(788.870:5422): avc: denied { create } for pid=8954 comm="syz.8.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 788.979170][ T28] audit: type=1400 audit(788.900:5423): avc: denied { write } for pid=8954 comm="syz.8.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 789.343804][ T28] audit: type=1400 audit(789.260:5424): avc: denied { create } for pid=8954 comm="syz.8.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 789.375499][ T28] audit: type=1400 audit(789.290:5425): avc: denied { write } for pid=8954 comm="syz.8.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 789.988877][ T28] audit: type=1400 audit(789.910:5426): avc: denied { write } for pid=8936 comm="syz.9.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 792.013257][ T28] audit: type=1400 audit(791.930:5427): avc: denied { write } for pid=8936 comm="syz.9.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 793.517791][ T8938] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 793.520628][ T28] audit: type=1400 audit(793.440:5428): avc: denied { module_request } for pid=8954 comm="syz.8.603" kmod="net-pf-16-proto-16-family-nl80211" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 793.712013][ T28] audit: type=1400 audit(793.630:5429): avc: denied { map_create } for pid=8968 comm="syz.9.605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 793.713840][ T28] audit: type=1400 audit(793.630:5430): avc: denied { perfmon } for pid=8968 comm="syz.9.605" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 793.719624][ T28] audit: type=1400 audit(793.630:5431): avc: denied { map_read map_write } for pid=8968 comm="syz.9.605" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 794.077663][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 794.077953][ T28] audit: type=1400 audit(794.000:5443): avc: denied { create } for pid=8977 comm="syz.9.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 794.091751][ T28] audit: type=1400 audit(794.010:5444): avc: denied { create } for pid=8977 comm="syz.9.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 794.093774][ T28] audit: type=1400 audit(794.010:5445): avc: denied { write } for pid=8977 comm="syz.9.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 794.097628][ T28] audit: type=1400 audit(794.010:5446): avc: denied { read } for pid=8977 comm="syz.9.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 794.135492][ T28] audit: type=1400 audit(794.050:5447): avc: denied { module_request } for pid=8976 comm="syz.8.609" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 794.257613][ T28] audit: type=1400 audit(794.170:5448): avc: denied { sys_module } for pid=8976 comm="syz.8.609" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 794.257975][ T28] audit: type=1400 audit(794.170:5449): avc: denied { module_request } for pid=8976 comm="syz.8.609" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 794.352189][ T28] audit: type=1400 audit(794.270:5450): avc: denied { read write } for pid=8982 comm="syz.9.610" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 794.359993][ T28] audit: type=1400 audit(794.280:5451): avc: denied { open } for pid=8982 comm="syz.9.610" path="/dev/virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 794.398354][ T28] audit: type=1400 audit(794.320:5452): avc: denied { ioctl } for pid=8982 comm="syz.9.610" path="/dev/virtual_nci" dev="devtmpfs" ino=659 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 798.400178][ T9007] netlink: 8 bytes leftover after parsing attributes in process `syz.8.614'. [ 798.430204][ T9007] hsr0: entered promiscuous mode [ 798.439375][ T9007] macvlan2: entered allmulticast mode [ 798.440426][ T9007] hsr0: entered allmulticast mode [ 798.443677][ T9007] hsr_slave_0: entered allmulticast mode [ 798.444937][ T9007] hsr_slave_1: entered allmulticast mode [ 799.353530][ T28] kauditd_printk_skb: 24 callbacks suppressed [ 799.354947][ T28] audit: type=1400 audit(799.270:5477): avc: denied { read } for pid=9021 comm="syz.8.616" dev="nsfs" ino=4026532668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 799.357548][ T28] audit: type=1400 audit(799.270:5478): avc: denied { read open } for pid=9021 comm="syz.8.616" path="net:[4026532668]" dev="nsfs" ino=4026532668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 799.367486][ T28] audit: type=1400 audit(799.290:5479): avc: denied { create } for pid=9021 comm="syz.8.616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 799.372618][ T28] audit: type=1400 audit(799.290:5480): avc: denied { create } for pid=9021 comm="syz.8.616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 799.373073][ T28] audit: type=1400 audit(799.290:5481): avc: denied { write } for pid=9021 comm="syz.8.616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 799.437091][ T8983] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 799.441461][ T28] audit: type=1400 audit(799.360:5482): avc: denied { read } for pid=9021 comm="syz.8.616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 799.633971][ T28] audit: type=1400 audit(799.550:5483): avc: denied { module_request } for pid=9028 comm="syz.8.617" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 799.780293][ T28] audit: type=1400 audit(799.690:5484): avc: denied { sys_module } for pid=9028 comm="syz.8.617" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 799.782002][ T28] audit: type=1400 audit(799.700:5485): avc: denied { module_request } for pid=9028 comm="syz.8.617" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 799.801839][ T28] audit: type=1400 audit(799.720:5486): avc: denied { create } for pid=9030 comm="syz.9.618" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 804.506513][ T28] kauditd_printk_skb: 31 callbacks suppressed [ 804.507023][ T28] audit: type=1400 audit(804.420:5518): avc: denied { map_create } for pid=9071 comm="syz.9.627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 804.516391][ T28] audit: type=1400 audit(804.430:5519): avc: denied { bpf } for pid=9071 comm="syz.9.627" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 804.519763][ T28] audit: type=1400 audit(804.440:5520): avc: denied { map_create } for pid=9071 comm="syz.9.627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 804.520028][ T28] audit: type=1400 audit(804.440:5521): avc: denied { map_read map_write } for pid=9071 comm="syz.9.627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 804.524706][ T28] audit: type=1400 audit(804.440:5522): avc: denied { create } for pid=9071 comm="syz.9.627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 804.558207][ T28] audit: type=1400 audit(804.480:5523): avc: denied { create } for pid=9071 comm="syz.9.627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 804.563474][ T28] audit: type=1400 audit(804.480:5524): avc: denied { write } for pid=9071 comm="syz.9.627" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 804.661733][ T28] audit: type=1400 audit(804.580:5525): avc: denied { module_request } for pid=9073 comm="syz.9.628" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 804.800049][ T28] audit: type=1400 audit(804.720:5526): avc: denied { sys_module } for pid=9073 comm="syz.9.628" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 804.806817][ T28] audit: type=1400 audit(804.720:5527): avc: denied { module_request } for pid=9073 comm="syz.9.628" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 805.304398][ T9044] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 810.110720][ T28] kauditd_printk_skb: 38 callbacks suppressed [ 810.111203][ T28] audit: type=1400 audit(810.030:5566): avc: denied { read write } for pid=9145 comm="syz.8.636" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 810.111445][ T28] audit: type=1400 audit(810.030:5567): avc: denied { open } for pid=9145 comm="syz.8.636" path="/dev/virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 810.141155][ T28] audit: type=1400 audit(810.060:5568): avc: denied { module_request } for pid=9149 comm="syz.9.637" kmod="net-pf-2-proto-0-type-5" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 810.297355][ T28] audit: type=1400 audit(810.210:5569): avc: denied { ioctl } for pid=9145 comm="syz.8.636" path="/dev/virtual_nci" dev="devtmpfs" ino=659 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 810.390384][ T28] audit: type=1400 audit(810.310:5570): avc: denied { read } for pid=9145 comm="syz.8.636" dev="nsfs" ino=4026532668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 810.390823][ T28] audit: type=1400 audit(810.310:5571): avc: denied { open } for pid=9145 comm="syz.8.636" path="net:[4026532668]" dev="nsfs" ino=4026532668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 810.412764][ T28] audit: type=1400 audit(810.330:5572): avc: denied { create } for pid=9145 comm="syz.8.636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 810.423533][ T28] audit: type=1400 audit(810.340:5573): avc: denied { write } for pid=9145 comm="syz.8.636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 810.423806][ T28] audit: type=1400 audit(810.340:5574): avc: denied { read } for pid=9145 comm="syz.8.636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 810.561175][ T28] audit: type=1400 audit(810.470:5575): avc: denied { module_request } for pid=9149 comm="syz.9.637" kmod="net-pf-2-proto-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 815.019227][ T9150] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 815.258447][ T28] kauditd_printk_skb: 17 callbacks suppressed [ 815.258816][ T28] audit: type=1400 audit(815.180:5593): avc: denied { read } for pid=9172 comm="syz.9.639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 815.604733][ T28] audit: type=1400 audit(815.520:5594): avc: denied { create } for pid=9183 comm="syz.8.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 815.624641][ T28] audit: type=1400 audit(815.530:5595): avc: denied { write } for pid=9183 comm="syz.8.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 815.629576][ T28] audit: type=1400 audit(815.550:5596): avc: denied { read } for pid=9183 comm="syz.8.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 815.639487][ T28] audit: type=1400 audit(815.560:5597): avc: denied { write } for pid=9183 comm="syz.8.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 815.855061][ T9186] vlan2: entered allmulticast mode [ 815.855314][ T9186] bond0: entered allmulticast mode [ 815.857562][ T9186] bond_slave_0: entered allmulticast mode [ 815.857858][ T9186] bond_slave_1: entered allmulticast mode [ 815.868839][ T9186] netlink: 14 bytes leftover after parsing attributes in process `syz.9.641'. [ 816.551770][ T28] audit: type=1400 audit(816.470:5598): avc: denied { create } for pid=9193 comm="syz.9.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 816.559624][ T28] audit: type=1400 audit(816.480:5599): avc: denied { module_request } for pid=9194 comm="syz.8.642" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 816.681211][ T9195] geneve2: entered promiscuous mode [ 816.762390][ T28] audit: type=1400 audit(816.680:5600): avc: denied { write } for pid=9193 comm="syz.9.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 817.758613][ T28] audit: type=1400 audit(817.680:5601): avc: denied { prog_load } for pid=9201 comm="syz.8.645" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 817.776408][ T28] audit: type=1400 audit(817.690:5602): avc: denied { bpf } for pid=9201 comm="syz.8.645" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 819.267651][ T9214] netlink: 16 bytes leftover after parsing attributes in process `syz.9.648'. [ 820.299483][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 820.299896][ T28] audit: type=1400 audit(820.150:5622): avc: denied { sys_module } for pid=9218 comm="syz.9.650" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 820.308381][ T28] audit: type=1400 audit(820.220:5623): avc: denied { module_request } for pid=9218 comm="syz.9.650" kmod="batadv0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 820.354213][ T28] audit: type=1400 audit(820.270:5624): avc: denied { write } for pid=9218 comm="syz.9.650" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 820.486244][ T28] audit: type=1400 audit(820.390:5625): avc: denied { prog_load } for pid=9223 comm="syz.8.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 820.489890][ T28] audit: type=1400 audit(820.410:5626): avc: denied { bpf } for pid=9223 comm="syz.8.651" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 820.495297][ T28] audit: type=1400 audit(820.410:5627): avc: denied { prog_load } for pid=9223 comm="syz.8.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 820.497812][ T28] audit: type=1400 audit(820.410:5628): avc: denied { perfmon } for pid=9223 comm="syz.8.651" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 820.526818][ T28] audit: type=1400 audit(820.440:5629): avc: denied { bpf } for pid=9223 comm="syz.8.651" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 820.528955][ T28] audit: type=1400 audit(820.440:5630): avc: denied { prog_run } for pid=9223 comm="syz.8.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 820.534918][ T28] audit: type=1400 audit(820.450:5631): avc: denied { prog_load } for pid=9223 comm="syz.8.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 825.316143][ T28] kauditd_printk_skb: 39 callbacks suppressed [ 825.316590][ T28] audit: type=1400 audit(825.230:5671): avc: denied { module_request } for pid=9240 comm="syz.9.657" kmod="crypto-seqiv(rfc4106(gcm(aes)))-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 825.349519][ T28] audit: type=1400 audit(825.260:5672): avc: denied { create } for pid=9248 comm="syz.8.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 825.363789][ T28] audit: type=1400 audit(825.280:5673): avc: denied { setopt } for pid=9248 comm="syz.8.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 825.436465][ T28] audit: type=1400 audit(825.320:5674): avc: denied { write } for pid=9248 comm="syz.8.659" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 825.436788][ T28] audit: type=1400 audit(825.340:5675): avc: denied { open } for pid=9248 comm="syz.8.659" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 825.437087][ T28] audit: type=1400 audit(825.340:5676): avc: denied { ioctl } for pid=9248 comm="syz.8.659" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 825.507523][ T28] audit: type=1400 audit(825.430:5677): avc: denied { create } for pid=9248 comm="syz.8.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 825.529191][ T28] audit: type=1400 audit(825.450:5678): avc: denied { ioctl } for pid=9248 comm="syz.8.659" path="socket:[13072]" dev="sockfs" ino=13072 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 825.947951][ T28] audit: type=1400 audit(825.870:5679): avc: denied { module_request } for pid=9256 comm="syz.9.661" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 826.028447][ T28] audit: type=1400 audit(825.950:5680): avc: denied { create } for pid=9257 comm="syz.8.660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 830.644223][ T28] kauditd_printk_skb: 49 callbacks suppressed [ 830.644627][ T28] audit: type=1400 audit(830.560:5730): avc: denied { prog_load } for pid=9288 comm="syz.8.670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 830.644873][ T28] audit: type=1400 audit(830.560:5731): avc: denied { bpf } for pid=9288 comm="syz.8.670" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 830.645061][ T28] audit: type=1400 audit(830.560:5732): avc: denied { perfmon } for pid=9288 comm="syz.8.670" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 830.645259][ T28] audit: type=1400 audit(830.560:5733): avc: denied { prog_run } for pid=9288 comm="syz.8.670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 830.654324][ T28] audit: type=1400 audit(830.570:5734): avc: denied { create } for pid=9289 comm="syz.9.669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 830.661653][ T28] audit: type=1400 audit(830.580:5735): avc: denied { write } for pid=9289 comm="syz.9.669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 830.906568][ T28] audit: type=1400 audit(830.580:5736): avc: denied { read } for pid=9289 comm="syz.9.669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 830.969505][ T28] audit: type=1400 audit(830.880:5737): avc: denied { write } for pid=9289 comm="syz.9.669" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 831.191351][ T28] audit: type=1400 audit(831.110:5738): avc: denied { module_request } for pid=9293 comm="syz.8.672" kmod="tcp_H" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 831.194199][ T28] audit: type=1400 audit(831.110:5739): avc: denied { create } for pid=9292 comm="syz.9.671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 836.755124][ T9301] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 837.710889][ T28] kauditd_printk_skb: 28 callbacks suppressed [ 837.711164][ T28] audit: type=1400 audit(837.630:5768): avc: denied { create } for pid=9329 comm="syz.8.679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 837.728671][ T28] audit: type=1400 audit(837.650:5769): avc: denied { getopt } for pid=9329 comm="syz.8.679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 838.307289][ T28] audit: type=1400 audit(838.230:5770): avc: denied { create } for pid=9331 comm="syz.8.680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 838.327730][ T28] audit: type=1400 audit(838.250:5771): avc: denied { create } for pid=9331 comm="syz.8.680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 838.348259][ T28] audit: type=1400 audit(838.270:5772): avc: denied { create } for pid=9331 comm="syz.8.680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 838.351155][ T28] audit: type=1400 audit(838.270:5773): avc: denied { module_request } for pid=9331 comm="syz.8.680" kmod="net-pf-36" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 838.868789][ T28] audit: type=1400 audit(838.790:5774): avc: denied { map_create } for pid=9331 comm="syz.8.680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 838.869161][ T28] audit: type=1400 audit(838.790:5775): avc: denied { map_read map_write } for pid=9331 comm="syz.8.680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 838.888234][ T28] audit: type=1400 audit(838.810:5776): avc: denied { prog_load } for pid=9331 comm="syz.8.680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 838.890053][ T28] audit: type=1400 audit(838.810:5777): avc: denied { bpf } for pid=9331 comm="syz.8.680" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 838.959429][ T9332] Driver unsupported XDP return value 0 on prog (id 43) dev N/A, expect packet loss! [ 843.125360][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 843.126312][ T28] audit: type=1400 audit(843.040:5796): avc: denied { name_bind } for pid=9351 comm="syz.8.685" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 843.143767][ T28] audit: type=1400 audit(843.050:5797): avc: denied { node_bind } for pid=9351 comm="syz.8.685" saddr=224.0.0.2 src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 844.120230][ T28] audit: type=1400 audit(844.040:5798): avc: denied { module_request } for pid=9353 comm="syz.8.686" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 844.370684][ T28] audit: type=1400 audit(844.290:5799): avc: denied { sys_module } for pid=9353 comm="syz.8.686" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 844.385546][ T28] audit: type=1400 audit(844.300:5800): avc: denied { module_request } for pid=9353 comm="syz.8.686" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 844.607948][ T28] audit: type=1400 audit(844.530:5801): avc: denied { read } for pid=9353 comm="syz.8.686" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 844.613812][ T28] audit: type=1400 audit(844.530:5802): avc: denied { read open } for pid=9353 comm="syz.8.686" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 844.794538][ T28] audit: type=1400 audit(844.710:5803): avc: denied { ioctl } for pid=9353 comm="syz.8.686" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 845.119014][ T28] audit: type=1400 audit(845.040:5804): avc: denied { create } for pid=9353 comm="syz.8.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 845.391365][ T28] audit: type=1400 audit(845.310:5805): avc: denied { write } for pid=9353 comm="syz.8.686" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 848.984841][ T28] kauditd_printk_skb: 5 callbacks suppressed [ 848.987713][ T28] audit: type=1400 audit(848.900:5811): avc: denied { create } for pid=9364 comm="syz.8.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 849.004371][ T28] audit: type=1400 audit(848.920:5812): avc: denied { prog_load } for pid=9364 comm="syz.8.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 849.011421][ T28] audit: type=1400 audit(848.930:5813): avc: denied { bpf } for pid=9364 comm="syz.8.688" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 849.024740][ T28] audit: type=1400 audit(848.940:5814): avc: denied { perfmon } for pid=9364 comm="syz.8.688" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 849.138000][ T28] audit: type=1400 audit(849.060:5815): avc: denied { create } for pid=9364 comm="syz.8.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 849.162480][ T28] audit: type=1400 audit(849.080:5816): avc: denied { setopt } for pid=9364 comm="syz.8.688" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 849.210491][ T28] audit: type=1400 audit(849.130:5817): avc: denied { setopt } for pid=9364 comm="syz.8.688" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 849.214200][ T28] audit: type=1400 audit(849.130:5818): avc: denied { create } for pid=9364 comm="syz.8.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 849.226454][ T28] audit: type=1400 audit(849.150:5819): avc: denied { write } for pid=9364 comm="syz.8.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 849.228142][ T28] audit: type=1400 audit(849.150:5820): avc: denied { read } for pid=9364 comm="syz.8.688" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 850.707059][ T9380] netlink: 16 bytes leftover after parsing attributes in process `syz.9.693'. [ 851.007290][ T9378] A link change request failed with some changes committed already. Interface vcan0 may have been left with an inconsistent configuration, please check. [ 854.029989][ T28] kauditd_printk_skb: 68 callbacks suppressed [ 854.031099][ T28] audit: type=1400 audit(853.950:5889): avc: denied { accept } for pid=9390 comm="syz.9.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 854.046431][ T28] audit: type=1400 audit(853.950:5890): avc: denied { map_create } for pid=9390 comm="syz.9.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 854.048789][ T28] audit: type=1400 audit(853.950:5891): avc: denied { map_read map_write } for pid=9390 comm="syz.9.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 854.424372][ T28] audit: type=1400 audit(854.340:5892): avc: denied { create } for pid=9393 comm="syz.9.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 854.505956][ T28] audit: type=1400 audit(854.420:5893): avc: denied { bind } for pid=9393 comm="syz.9.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 854.506276][ T28] audit: type=1400 audit(854.420:5894): avc: denied { node_bind } for pid=9393 comm="syz.9.699" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 854.506343][ T28] audit: type=1400 audit(854.420:5895): avc: denied { create } for pid=9393 comm="syz.9.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 854.510760][ T28] audit: type=1400 audit(854.430:5896): avc: denied { setopt } for pid=9393 comm="syz.9.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 854.523136][ T28] audit: type=1400 audit(854.440:5897): avc: denied { map_create } for pid=9393 comm="syz.9.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 854.533853][ T28] audit: type=1400 audit(854.450:5898): avc: denied { prog_load } for pid=9393 comm="syz.9.699" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 855.213953][ T9395] syz_tun: entered promiscuous mode [ 858.312110][ T9432] netlink: 20 bytes leftover after parsing attributes in process `syz.9.717'. [ 858.316529][ T9432] netlink: 36 bytes leftover after parsing attributes in process `syz.9.717'. [ 859.099820][ T28] kauditd_printk_skb: 33 callbacks suppressed [ 859.100061][ T28] audit: type=1400 audit(859.020:5932): avc: denied { sys_module } for pid=9433 comm="syz.9.718" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 859.100226][ T28] audit: type=1400 audit(859.020:5933): avc: denied { module_request } for pid=9433 comm="syz.9.718" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 859.452265][ T28] audit: type=1400 audit(859.370:5934): avc: denied { prog_load } for pid=9444 comm="syz.9.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 859.459361][ T28] audit: type=1400 audit(859.380:5935): avc: denied { bpf } for pid=9444 comm="syz.9.722" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 859.483187][ T28] audit: type=1400 audit(859.400:5936): avc: denied { create } for pid=9444 comm="syz.9.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 859.506955][ T9445] netlink: 20 bytes leftover after parsing attributes in process `syz.9.722'. [ 859.510108][ T28] audit: type=1400 audit(859.410:5937): avc: denied { write } for pid=9444 comm="syz.9.722" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 860.202417][ T28] audit: type=1400 audit(860.120:5938): avc: denied { create } for pid=9449 comm="syz.9.724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 860.220241][ T28] audit: type=1400 audit(860.140:5939): avc: denied { create } for pid=9450 comm="syz.8.725" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 860.238485][ T28] audit: type=1400 audit(860.150:5940): avc: denied { write } for pid=9450 comm="syz.8.725" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 860.241495][ T28] audit: type=1400 audit(860.160:5941): avc: denied { open } for pid=9450 comm="syz.8.725" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 861.082114][ T9462] netlink: 20 bytes leftover after parsing attributes in process `syz.8.727'. [ 861.082520][ T9462] netlink: 36 bytes leftover after parsing attributes in process `syz.8.727'. [ 865.123964][ T28] kauditd_printk_skb: 29 callbacks suppressed [ 865.124309][ T28] audit: type=1400 audit(865.040:5971): avc: denied { module_request } for pid=9489 comm="syz.9.735" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 865.636852][ T28] audit: type=1400 audit(865.560:5972): avc: denied { sys_module } for pid=9489 comm="syz.9.735" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 865.638752][ T28] audit: type=1400 audit(865.560:5973): avc: denied { module_request } for pid=9489 comm="syz.9.735" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 865.661857][ T28] audit: type=1400 audit(865.580:5974): avc: denied { read } for pid=9489 comm="syz.9.735" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 865.662274][ T28] audit: type=1400 audit(865.580:5975): avc: denied { open } for pid=9489 comm="syz.9.735" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 865.690977][ T28] audit: type=1400 audit(865.610:5976): avc: denied { read } for pid=9489 comm="syz.9.735" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 865.723709][ T28] audit: type=1400 audit(865.610:5977): avc: denied { open } for pid=9489 comm="syz.9.735" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 865.729250][ T28] audit: type=1400 audit(865.650:5978): avc: denied { ioctl } for pid=9489 comm="syz.9.735" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 865.957790][ T28] audit: type=1400 audit(865.880:5979): avc: denied { create } for pid=9489 comm="syz.9.735" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 866.170782][ T28] audit: type=1400 audit(866.090:5980): avc: denied { execute } for pid=9498 comm="syz.9.736" path=2F6D656D66643AFD0F6D33232F202864656C6574656429 dev="tmpfs" ino=1058 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 868.663971][ T9521] netlink: 'syz.8.743': attribute type 30 has an invalid length. [ 870.188021][ T9537] capability: warning: `syz.9.748' uses 32-bit capabilities (legacy support in use) [ 870.479241][ T28] kauditd_printk_skb: 34 callbacks suppressed [ 870.479545][ T28] audit: type=1400 audit(870.400:6015): avc: denied { module_request } for pid=9540 comm="syz.9.750" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 870.709439][ T28] audit: type=1400 audit(870.630:6016): avc: denied { sys_module } for pid=9540 comm="syz.9.750" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 870.711076][ T28] audit: type=1400 audit(870.630:6017): avc: denied { module_request } for pid=9540 comm="syz.9.750" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 870.934581][ T28] audit: type=1400 audit(870.850:6018): avc: denied { read } for pid=9540 comm="syz.9.750" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 870.936775][ T28] audit: type=1400 audit(870.850:6019): avc: denied { open } for pid=9540 comm="syz.9.750" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 870.957256][ T28] audit: type=1400 audit(870.880:6020): avc: denied { ioctl } for pid=9540 comm="syz.9.750" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 870.995506][ T28] audit: type=1400 audit(870.910:6021): avc: denied { create } for pid=9540 comm="syz.9.750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 871.295401][ T28] audit: type=1400 audit(871.210:6022): avc: denied { create } for pid=9550 comm="syz.9.752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 871.323445][ T28] audit: type=1400 audit(871.240:6023): avc: denied { connect } for pid=9550 comm="syz.9.752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 871.328066][ T28] audit: type=1400 audit(871.250:6024): avc: denied { map_create } for pid=9550 comm="syz.9.752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 872.407192][ T9574] gretap0: entered promiscuous mode [ 875.677225][ T28] kauditd_printk_skb: 71 callbacks suppressed [ 875.677606][ T28] audit: type=1400 audit(875.600:6096): avc: denied { read } for pid=9602 comm="syz.9.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 875.689229][ T28] audit: type=1400 audit(875.610:6097): avc: denied { write } for pid=9602 comm="syz.9.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 876.460677][ T28] audit: type=1400 audit(876.380:6098): avc: denied { read write } for pid=9605 comm="syz.9.773" name="zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 876.461181][ T28] audit: type=1400 audit(876.380:6099): avc: denied { open } for pid=9605 comm="syz.9.773" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 877.586311][ T28] audit: type=1400 audit(877.490:6100): avc: denied { module_request } for pid=9607 comm="syz.9.774" kmod="netdev-syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 878.006780][ T28] audit: type=1400 audit(877.930:6101): avc: denied { sys_module } for pid=9607 comm="syz.9.774" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 878.009374][ T28] audit: type=1400 audit(877.930:6102): avc: denied { module_request } for pid=9607 comm="syz.9.774" kmod="syztnl2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 878.264072][ T28] audit: type=1400 audit(878.180:6103): avc: denied { create } for pid=9613 comm="syz.9.776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 878.289765][ T28] audit: type=1400 audit(878.210:6104): avc: denied { bind } for pid=9613 comm="syz.9.776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 878.295139][ T28] audit: type=1400 audit(878.210:6105): avc: denied { listen } for pid=9613 comm="syz.9.776" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 878.598745][ T9615] syz_tun: entered allmulticast mode [ 881.240928][ T28] kauditd_printk_skb: 287 callbacks suppressed [ 881.245038][ T28] audit: type=1400 audit(881.160:6393): avc: denied { create } for pid=9622 comm="syz.8.780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 881.266447][ T28] audit: type=1400 audit(881.180:6394): avc: denied { create } for pid=9622 comm="syz.8.780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 881.269995][ T28] audit: type=1400 audit(881.190:6395): avc: denied { write } for pid=9622 comm="syz.8.780" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 881.285940][ T28] audit: type=1400 audit(881.200:6396): avc: denied { module_request } for pid=9622 comm="syz.8.780" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 881.376287][ T28] audit: type=1400 audit(881.290:6397): avc: denied { create } for pid=9623 comm="syz.9.781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 881.384786][ T28] audit: type=1400 audit(881.300:6398): avc: denied { bind } for pid=9623 comm="syz.9.781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 881.389144][ T28] audit: type=1400 audit(881.310:6399): avc: denied { listen } for pid=9623 comm="syz.9.781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 881.409539][ T28] audit: type=1400 audit(881.320:6400): avc: denied { create } for pid=9623 comm="syz.9.781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 881.420946][ T28] audit: type=1400 audit(881.340:6401): avc: denied { connect } for pid=9623 comm="syz.9.781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 881.428616][ T28] audit: type=1400 audit(881.340:6402): avc: denied { accept } for pid=9623 comm="syz.9.781" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 886.370199][ T28] kauditd_printk_skb: 43 callbacks suppressed [ 886.370671][ T28] audit: type=1400 audit(886.290:6446): avc: denied { add_name } for pid=9657 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 886.386172][ T28] audit: type=1400 audit(886.300:6447): avc: denied { create } for pid=9657 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 886.386602][ T28] audit: type=1400 audit(886.300:6448): avc: denied { write open } for pid=9657 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=98 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 886.386804][ T28] audit: type=1400 audit(886.300:6449): avc: denied { search } for pid=9657 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 886.386842][ T28] audit: type=1400 audit(886.300:6450): avc: denied { search } for pid=9657 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 886.386865][ T28] audit: type=1400 audit(886.300:6451): avc: denied { search } for pid=9657 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 886.386887][ T28] audit: type=1400 audit(886.300:6452): avc: denied { append } for pid=9657 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=98 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 886.386938][ T28] audit: type=1400 audit(886.300:6453): avc: denied { open } for pid=9657 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=98 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 886.386978][ T28] audit: type=1400 audit(886.300:6454): avc: denied { getattr } for pid=9657 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 886.399489][ T28] audit: type=1400 audit(886.320:6455): avc: denied { search } for pid=9657 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 887.394385][ T9666] netlink: 168 bytes leftover after parsing attributes in process `syz.8.796'. [ 888.037251][ T9674] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 888.037622][ T9674] IPv6: NLM_F_CREATE should be set when creating new route [ 893.176282][ T28] kauditd_printk_skb: 64 callbacks suppressed [ 893.185104][ T28] audit: type=1400 audit(893.090:6520): avc: denied { create } for pid=9707 comm="syz.8.810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 893.205239][ T28] audit: type=1400 audit(893.120:6521): avc: denied { allowed } for pid=9707 comm="syz.8.810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 893.212882][ T28] audit: type=1400 audit(893.130:6522): avc: denied { sqpoll } for pid=9707 comm="syz.8.810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 893.221228][ T28] audit: type=1400 audit(893.140:6523): avc: denied { create } for pid=9707 comm="syz.8.810" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 893.240281][ T28] audit: type=1400 audit(893.160:6524): avc: denied { map } for pid=9707 comm="syz.8.810" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15689 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 893.240587][ T28] audit: type=1400 audit(893.160:6525): avc: denied { read write } for pid=9707 comm="syz.8.810" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=15689 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 893.276330][ T28] audit: type=1400 audit(893.190:6526): avc: denied { allowed } for pid=9707 comm="syz.8.810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 893.325974][ T28] audit: type=1400 audit(893.240:6527): avc: denied { map_create } for pid=9707 comm="syz.8.810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 893.753578][ T28] audit: type=1400 audit(893.670:6528): avc: denied { create } for pid=9712 comm="syz.8.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 893.764221][ T28] audit: type=1400 audit(893.680:6529): avc: denied { connect } for pid=9712 comm="syz.8.812" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 894.608254][ T9727] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -11 0 [ 898.199358][ T28] kauditd_printk_skb: 67 callbacks suppressed [ 898.199714][ T28] audit: type=1400 audit(898.120:6597): avc: denied { create } for pid=9767 comm="syz.8.833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 898.222584][ T28] audit: type=1400 audit(898.140:6598): avc: denied { write } for pid=9767 comm="syz.8.833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 898.227251][ T28] audit: type=1400 audit(898.150:6599): avc: denied { read } for pid=9767 comm="syz.8.833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 898.246382][ T28] audit: type=1400 audit(898.160:6600): avc: denied { write } for pid=9767 comm="syz.8.833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 898.693806][ T28] audit: type=1400 audit(898.610:6601): avc: denied { remount } for pid=9771 comm="syz.9.835" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 898.941311][ T28] audit: type=1400 audit(898.860:6602): avc: denied { read write } for pid=9772 comm="syz.8.836" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 898.941680][ T28] audit: type=1400 audit(898.860:6603): avc: denied { open } for pid=9772 comm="syz.8.836" path="/dev/virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 899.052839][ T28] audit: type=1400 audit(898.970:6604): avc: denied { ioctl } for pid=9772 comm="syz.8.836" path="/dev/virtual_nci" dev="devtmpfs" ino=659 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 899.072253][ T28] audit: type=1400 audit(898.990:6605): avc: denied { read } for pid=9772 comm="syz.8.836" dev="nsfs" ino=4026532668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 899.072576][ T28] audit: type=1400 audit(898.990:6606): avc: denied { open } for pid=9772 comm="syz.8.836" path="net:[4026532668]" dev="nsfs" ino=4026532668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 899.890365][ T9785] netlink: 'syz.9.838': attribute type 6 has an invalid length. [ 903.448436][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 903.449005][ T28] audit: type=1400 audit(903.220:6616): avc: denied { prog_load } for pid=9786 comm="syz.9.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 903.450064][ T28] audit: type=1400 audit(903.230:6617): avc: denied { bpf } for pid=9786 comm="syz.9.839" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 903.450950][ T28] audit: type=1400 audit(903.250:6618): avc: denied { perfmon } for pid=9786 comm="syz.9.839" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 904.568477][ T28] audit: type=1400 audit(904.490:6619): avc: denied { read write } for pid=9796 comm="syz.8.840" name="rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 904.574991][ T28] audit: type=1400 audit(904.490:6620): avc: denied { open } for pid=9796 comm="syz.8.840" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 904.593477][ T9797] ucma_write: process 569 (syz.8.840) changed security contexts after opening file descriptor, this is not allowed. [ 904.722986][ T28] audit: type=1400 audit(904.640:6621): avc: denied { remount } for pid=9798 comm="syz.8.841" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 904.849857][ T28] audit: type=1400 audit(904.770:6622): avc: denied { create } for pid=9800 comm="syz.8.842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 904.869053][ T28] audit: type=1400 audit(904.780:6623): avc: denied { setopt } for pid=9800 comm="syz.8.842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 905.528273][ T28] audit: type=1400 audit(905.450:6624): avc: denied { setopt } for pid=9800 comm="syz.8.842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 905.533477][ T28] audit: type=1400 audit(905.450:6625): avc: denied { create } for pid=9800 comm="syz.8.842" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 907.360551][ T9819] SELinux: policydb table sizes (8,-536870903) do not match mine (8,9) [ 907.370954][ T9819] SELinux: failed to load policy [ 908.458897][ T28] kauditd_printk_skb: 43 callbacks suppressed [ 908.462190][ T28] audit: type=1400 audit(908.380:6669): avc: denied { bind } for pid=9834 comm="syz.9.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 908.473793][ T28] audit: type=1400 audit(908.390:6670): avc: denied { listen } for pid=9834 comm="syz.9.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 908.481930][ T28] audit: type=1400 audit(908.400:6671): avc: denied { create } for pid=9834 comm="syz.9.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 908.493066][ T28] audit: type=1400 audit(908.410:6672): avc: denied { connect } for pid=9834 comm="syz.9.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 908.510558][ T28] audit: type=1400 audit(908.430:6673): avc: denied { accept } for pid=9834 comm="syz.9.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 908.520545][ T28] audit: type=1400 audit(908.440:6674): avc: denied { map_create } for pid=9834 comm="syz.9.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 908.534743][ T28] audit: type=1400 audit(908.450:6675): avc: denied { read } for pid=9834 comm="syz.9.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 908.817141][ T28] audit: type=1400 audit(908.730:6676): avc: denied { create } for pid=9836 comm="syz.9.859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 908.834024][ T28] audit: type=1400 audit(908.750:6677): avc: denied { ioctl } for pid=9836 comm="syz.9.859" path="socket:[14982]" dev="sockfs" ino=14982 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 908.853931][ T28] audit: type=1400 audit(908.770:6678): avc: denied { bind } for pid=9836 comm="syz.9.859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 910.082799][ T9845] syzkaller0: entered promiscuous mode [ 910.084644][ T9845] syzkaller0: entered allmulticast mode [ 910.167525][ C1] vcan0: j1939_tp_rxtimer: 0x86463000: rx timeout, send abort [ 910.170186][ C1] vcan0: j1939_xtp_rx_abort_one: 0x86463000: 0x20000: (3) A timeout occurred and this is the connection abort to close the session. [ 913.499031][ T28] kauditd_printk_skb: 74 callbacks suppressed [ 913.499306][ T28] audit: type=1400 audit(913.420:6753): avc: denied { read } for pid=9884 comm="syz.8.881" dev="nsfs" ino=4026532668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 913.506823][ T28] audit: type=1400 audit(913.430:6754): avc: denied { open } for pid=9884 comm="syz.8.881" path="net:[4026532668]" dev="nsfs" ino=4026532668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 913.508175][ T28] audit: type=1400 audit(913.430:6755): avc: denied { create } for pid=9884 comm="syz.8.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 913.547480][ T28] audit: type=1400 audit(913.470:6756): avc: denied { write } for pid=9884 comm="syz.8.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 913.559836][ T28] audit: type=1400 audit(913.480:6757): avc: denied { read } for pid=9884 comm="syz.8.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 913.575957][ T28] audit: type=1400 audit(913.490:6758): avc: denied { write } for pid=9884 comm="syz.8.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 913.620137][ T28] audit: type=1400 audit(913.530:6759): avc: denied { name_bind } for pid=9886 comm="syz.9.880" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 913.624470][ T28] audit: type=1400 audit(913.540:6760): avc: denied { node_bind } for pid=9886 comm="syz.9.880" saddr=255.255.255.255 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 913.668580][ T28] audit: type=1400 audit(913.580:6761): avc: denied { write } for pid=9884 comm="syz.8.881" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 913.926472][ T28] audit: type=1400 audit(913.840:6762): avc: denied { read } for pid=9888 comm="syz.8.883" name="iommu" dev="devtmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 915.923630][ T9903] syzkaller0: entered promiscuous mode [ 915.945356][ T9903] syzkaller0: entered allmulticast mode [ 918.511900][ T28] kauditd_printk_skb: 36 callbacks suppressed [ 918.512993][ T28] audit: type=1400 audit(918.430:6799): avc: denied { create } for pid=9915 comm="syz.8.891" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 920.298182][ T28] audit: type=1400 audit(920.220:6800): avc: denied { prog_load } for pid=9938 comm="syz.8.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 920.298586][ T28] audit: type=1400 audit(920.220:6801): avc: denied { bpf } for pid=9938 comm="syz.8.892" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 920.326204][ T28] audit: type=1400 audit(920.240:6802): avc: denied { prog_load } for pid=9938 comm="syz.8.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 920.347016][ T28] audit: type=1400 audit(920.270:6803): avc: denied { bpf } for pid=9938 comm="syz.8.892" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 920.348715][ T28] audit: type=1400 audit(920.270:6804): avc: denied { perfmon } for pid=9938 comm="syz.8.892" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 920.350193][ T28] audit: type=1400 audit(920.270:6805): avc: denied { prog_run } for pid=9938 comm="syz.8.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 920.382270][ T9939] netlink: 'syz.8.892': attribute type 10 has an invalid length. [ 920.390331][ T9939] syz_tun: entered promiscuous mode [ 920.792530][ T28] audit: type=1400 audit(920.710:6806): avc: denied { bind } for pid=9908 comm="syz.9.888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 920.793839][ T28] audit: type=1400 audit(920.710:6807): avc: denied { module_request } for pid=9908 comm="syz.9.888" kmod="crypto-pcrypt(generic-gcm-aesni)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 920.899702][ T28] audit: type=1400 audit(920.820:6808): avc: denied { module_request } for pid=9908 comm="syz.9.888" kmod="crypto-pcrypt(generic-gcm-aesni)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 927.117440][ T9947] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 927.243511][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 927.247268][ T28] audit: type=1400 audit(927.160:6823): avc: denied { map_create } for pid=9959 comm="syz.9.895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 927.259035][ T9962] netlink: 'syz.8.896': attribute type 10 has an invalid length. [ 927.262153][ T28] audit: type=1400 audit(927.170:6824): avc: denied { perfmon } for pid=9959 comm="syz.9.895" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 927.265454][ T28] audit: type=1400 audit(927.180:6825): avc: denied { map_create } for pid=9959 comm="syz.9.895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 927.273010][ T28] audit: type=1400 audit(927.190:6826): avc: denied { map_read map_write } for pid=9959 comm="syz.9.895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 927.278828][ T28] audit: type=1400 audit(927.200:6827): avc: denied { prog_load } for pid=9959 comm="syz.9.895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 927.282078][ T28] audit: type=1400 audit(927.200:6828): avc: denied { bpf } for pid=9959 comm="syz.9.895" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 927.307099][ T28] audit: type=1400 audit(927.220:6829): avc: denied { create } for pid=9959 comm="syz.9.895" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 927.307500][ T28] audit: type=1400 audit(927.220:6830): avc: denied { module_request } for pid=9959 comm="syz.9.895" kmod="net-pf-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 927.318422][ T9962] bond0: (slave bond_slave_1): Releasing backup interface [ 927.389833][ T28] audit: type=1400 audit(927.310:6831): avc: denied { map_create } for pid=9960 comm="syz.8.896" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 927.432051][ T28] audit: type=1400 audit(927.350:6832): avc: denied { bpf } for pid=9960 comm="syz.8.896" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 931.577855][T10003] netlink: 60 bytes leftover after parsing attributes in process `syz.9.906'. [ 931.581506][T10003] netlink: 60 bytes leftover after parsing attributes in process `syz.9.906'. [ 931.584059][T10003] netlink: 60 bytes leftover after parsing attributes in process `syz.9.906'. [ 932.280004][ T28] kauditd_printk_skb: 57 callbacks suppressed [ 932.280296][ T28] audit: type=1400 audit(932.200:6890): avc: denied { read } for pid=10009 comm="syz.9.910" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 932.280514][ T28] audit: type=1400 audit(932.200:6891): avc: denied { open } for pid=10009 comm="syz.9.910" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 932.287370][ T28] audit: type=1400 audit(932.210:6892): avc: denied { prog_load } for pid=10009 comm="syz.9.910" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 932.288957][ T28] audit: type=1400 audit(932.210:6893): avc: denied { bpf } for pid=10009 comm="syz.9.910" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 932.908948][T10018] netlink: 'syz.9.912': attribute type 10 has an invalid length. [ 933.189701][ T28] audit: type=1400 audit(933.110:6894): avc: denied { bpf } for pid=10020 comm="syz.9.913" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 933.374125][ T28] audit: type=1400 audit(933.290:6895): avc: denied { create } for pid=10022 comm="syz.9.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 933.374525][ T28] audit: type=1400 audit(933.290:6896): avc: denied { write } for pid=10022 comm="syz.9.914" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 933.799986][T10025] netlink: 60 bytes leftover after parsing attributes in process `syz.9.915'. [ 933.817565][T10025] netlink: 60 bytes leftover after parsing attributes in process `syz.9.915'. [ 933.821169][T10025] netlink: 60 bytes leftover after parsing attributes in process `syz.9.915'. [ 934.299418][ T28] audit: type=1400 audit(934.220:6897): avc: denied { create } for pid=10027 comm="syz.9.916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 934.304665][ T28] audit: type=1400 audit(934.220:6898): avc: denied { write } for pid=10027 comm="syz.9.916" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 935.393090][ T28] audit: type=1400 audit(935.310:6899): avc: denied { prog_load } for pid=10030 comm="syz.9.917" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 936.834585][T10036] netlink: 'syz.8.918': attribute type 10 has an invalid length. [ 937.739730][ T28] kauditd_printk_skb: 8 callbacks suppressed [ 937.740036][ T28] audit: type=1400 audit(937.660:6908): avc: denied { create } for pid=10038 comm="syz.8.920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 937.740254][ T28] audit: type=1400 audit(937.660:6909): avc: denied { module_request } for pid=10038 comm="syz.8.920" kmod="net-pf-2-proto-262-type-7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 938.028428][ T28] audit: type=1400 audit(937.950:6910): avc: denied { module_request } for pid=10038 comm="syz.8.920" kmod="net-pf-2-proto-262" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 938.199283][ T28] audit: type=1400 audit(938.120:6911): avc: denied { create } for pid=10038 comm="syz.8.920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 938.206831][ T28] audit: type=1400 audit(938.120:6912): avc: denied { write } for pid=10038 comm="syz.8.920" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 938.258968][ T28] audit: type=1400 audit(938.180:6913): avc: denied { prog_load } for pid=10042 comm="syz.9.921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 938.296394][ T28] audit: type=1400 audit(938.180:6914): avc: denied { bpf } for pid=10042 comm="syz.9.921" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 938.324642][ T28] audit: type=1400 audit(938.240:6915): avc: denied { prog_load } for pid=10042 comm="syz.9.921" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 938.335254][ T28] audit: type=1400 audit(938.250:6916): avc: denied { perfmon } for pid=10042 comm="syz.9.921" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 938.336217][ T28] audit: type=1400 audit(938.250:6917): avc: denied { bpf } for pid=10042 comm="syz.9.921" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 942.758371][ T28] kauditd_printk_skb: 21 callbacks suppressed [ 942.758760][ T28] audit: type=1400 audit(942.680:6939): avc: denied { remount } for pid=10069 comm="syz.9.929" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 942.882285][ T28] audit: type=1400 audit(942.800:6940): avc: denied { create } for pid=10073 comm="syz.8.930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 942.913001][ T28] audit: type=1400 audit(942.830:6941): avc: denied { prog_load } for pid=10073 comm="syz.8.930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 942.921944][ T28] audit: type=1400 audit(942.840:6942): avc: denied { bpf } for pid=10073 comm="syz.8.930" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 942.924073][ T28] audit: type=1400 audit(942.840:6943): avc: denied { perfmon } for pid=10073 comm="syz.8.930" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 942.927219][ T28] audit: type=1400 audit(942.840:6944): avc: denied { prog_run } for pid=10073 comm="syz.8.930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 943.488853][ T8052] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 943.605186][ T8052] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 943.720732][ T8052] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 943.799361][ T8052] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 943.943784][ T28] audit: type=1400 audit(943.860:6945): avc: denied { execute } for pid=10086 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 943.954360][ T28] audit: type=1400 audit(943.870:6946): avc: denied { execute_no_trans } for pid=10086 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 944.021767][ T28] audit: type=1400 audit(943.940:6947): avc: denied { execute } for pid=10086 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 944.199178][ T28] audit: type=1400 audit(944.110:6948): avc: denied { execmem } for pid=10086 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 944.527026][ T8052] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 944.531000][ T8052] bond_slave_0: left allmulticast mode [ 944.548220][ T8052] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 944.553506][ T8052] bond_slave_1: left allmulticast mode [ 944.593636][ T8052] bond0 (unregistering): Released all slaves [ 945.049922][ T8052] hsr_slave_0: left promiscuous mode [ 945.054302][ T8052] hsr_slave_1: left promiscuous mode [ 945.069354][ T8052] veth1_macvtap: left promiscuous mode [ 945.070277][ T8052] veth0_macvtap: left promiscuous mode [ 945.074284][ T8052] veth1_vlan: left promiscuous mode [ 945.096171][ T8052] veth0_vlan: left promiscuous mode [ 946.179941][T10100] syz_tun: left allmulticast mode [ 947.872631][ T28] kauditd_printk_skb: 32 callbacks suppressed [ 947.876207][ T28] audit: type=1400 audit(947.790:6981): avc: denied { write } for pid=10112 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 947.878024][ T28] audit: type=1400 audit(947.790:6982): avc: denied { open } for pid=10112 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 947.887876][ T28] audit: type=1400 audit(947.810:6983): avc: denied { search } for pid=10112 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 947.889506][ T28] audit: type=1400 audit(947.810:6984): avc: denied { search } for pid=10112 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 947.891107][ T28] audit: type=1400 audit(947.810:6985): avc: denied { search } for pid=10112 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 947.892701][ T28] audit: type=1400 audit(947.810:6986): avc: denied { search } for pid=10112 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 947.926771][ T28] audit: type=1400 audit(947.840:6987): avc: denied { search } for pid=10114 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 947.928531][ T28] audit: type=1400 audit(947.840:6988): avc: denied { search } for pid=10114 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 947.931585][ T28] audit: type=1400 audit(947.840:6989): avc: denied { search } for pid=10114 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 947.933321][ T28] audit: type=1400 audit(947.840:6990): avc: denied { read open } for pid=10114 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 952.064352][T10091] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 952.101789][T10091] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 952.970184][ T28] kauditd_printk_skb: 275 callbacks suppressed [ 952.973866][ T28] audit: type=1400 audit(952.890:7266): avc: denied { write } for pid=10284 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 952.981335][ T28] audit: type=1400 audit(952.900:7267): avc: denied { write open } for pid=10284 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 953.004072][ T28] audit: type=1400 audit(952.920:7268): avc: denied { search } for pid=10284 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.007168][ T28] audit: type=1400 audit(952.930:7269): avc: denied { search } for pid=10284 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.013582][ T28] audit: type=1400 audit(952.930:7270): avc: denied { search } for pid=10284 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.026475][ T28] audit: type=1400 audit(952.940:7271): avc: denied { search } for pid=10284 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.062628][ T28] audit: type=1400 audit(952.980:7272): avc: denied { search } for pid=10286 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.065378][ T28] audit: type=1400 audit(952.980:7273): avc: denied { search } for pid=10286 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.068062][ T28] audit: type=1400 audit(952.990:7274): avc: denied { search } for pid=10286 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.070593][ T28] audit: type=1400 audit(952.990:7275): avc: denied { read open } for pid=10286 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 953.762651][T10091] hsr_slave_0: entered promiscuous mode [ 953.765075][T10091] hsr_slave_1: entered promiscuous mode [ 953.773470][T10091] debugfs: 'hsr0' already exists in 'hsr' [ 953.777587][T10091] Cannot create hsr debugfs directory [ 954.910141][T10091] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 954.932088][T10091] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 954.954803][T10091] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 954.979847][T10091] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 956.464127][T10091] 8021q: adding VLAN 0 to HW filter on device bond0 [ 957.976673][ T28] kauditd_printk_skb: 288 callbacks suppressed [ 957.978013][ T28] audit: type=1400 audit(957.890:7564): avc: denied { search } for pid=10457 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 957.998650][ T28] audit: type=1400 audit(957.910:7565): avc: denied { search } for pid=10457 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 957.999033][ T28] audit: type=1400 audit(957.910:7566): avc: denied { search } for pid=10457 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 957.999377][ T28] audit: type=1400 audit(957.910:7567): avc: denied { getattr } for pid=10457 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth36.link" dev="tmpfs" ino=103 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 957.999578][ T28] audit: type=1400 audit(957.910:7568): avc: denied { search } for pid=10457 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 957.999769][ T28] audit: type=1400 audit(957.910:7569): avc: denied { search } for pid=10457 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 958.000092][ T28] audit: type=1400 audit(957.910:7570): avc: denied { search } for pid=10457 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 958.017402][ T28] audit: type=1400 audit(957.930:7571): avc: denied { search } for pid=10457 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 958.019492][ T28] audit: type=1400 audit(957.930:7572): avc: denied { remove_name search } for pid=10457 comm="rm" name="resolv.conf.eth36.link" dev="tmpfs" ino=103 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 958.021490][ T28] audit: type=1400 audit(957.930:7573): avc: denied { unlink } for pid=10457 comm="rm" name="resolv.conf.eth36.link" dev="tmpfs" ino=103 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 962.808441][T10091] veth0_vlan: entered promiscuous mode [ 962.862087][T10091] veth1_vlan: entered promiscuous mode [ 962.997624][T10091] veth0_macvtap: entered promiscuous mode [ 963.031929][ T28] kauditd_printk_skb: 438 callbacks suppressed [ 963.032285][ T28] audit: type=1400 audit(962.950:8012): avc: denied { write } for pid=10506 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 963.032523][ T28] audit: type=1400 audit(962.950:8013): avc: denied { write open } for pid=10506 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 963.048872][T10091] veth1_macvtap: entered promiscuous mode [ 963.052525][ T28] audit: type=1400 audit(962.970:8014): avc: denied { search } for pid=10506 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.060976][ T28] audit: type=1400 audit(962.970:8015): avc: denied { search } for pid=10506 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.063112][ T28] audit: type=1400 audit(962.970:8016): avc: denied { search } for pid=10506 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.066461][ T28] audit: type=1400 audit(962.970:8017): avc: denied { search } for pid=10506 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.083462][ T28] audit: type=1400 audit(963.000:8018): avc: denied { search } for pid=10507 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.086211][ T28] audit: type=1400 audit(963.000:8019): avc: denied { search } for pid=10507 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.088096][ T28] audit: type=1400 audit(963.000:8020): avc: denied { search } for pid=10507 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.092063][ T28] audit: type=1400 audit(963.000:8021): avc: denied { read open } for pid=10507 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 963.193467][ T8056] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 963.195579][ T8056] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 963.207694][ T8056] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 963.208687][ T8056] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 968.322914][ T28] kauditd_printk_skb: 315 callbacks suppressed [ 968.323277][ T28] audit: type=1400 audit(968.240:8337): avc: denied { read } for pid=10548 comm="syz.9.954" dev="nsfs" ino=4026532696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 968.337412][ T28] audit: type=1400 audit(968.240:8338): avc: denied { open } for pid=10548 comm="syz.9.954" path="net:[4026532696]" dev="nsfs" ino=4026532696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 968.551088][ T28] audit: type=1400 audit(968.470:8339): avc: denied { create } for pid=10548 comm="syz.9.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 968.555070][ T28] audit: type=1400 audit(968.470:8340): avc: denied { write } for pid=10548 comm="syz.9.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 968.561184][ T28] audit: type=1400 audit(968.480:8341): avc: denied { write } for pid=10547 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 968.563961][ T28] audit: type=1400 audit(968.480:8342): avc: denied { open } for pid=10547 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 968.577158][ T28] audit: type=1400 audit(968.500:8343): avc: denied { read } for pid=10548 comm="syz.9.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 968.579581][ T28] audit: type=1400 audit(968.500:8344): avc: denied { read } for pid=10548 comm="syz.9.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 968.591360][ T28] audit: type=1400 audit(968.510:8345): avc: denied { write } for pid=10548 comm="syz.9.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 968.816503][ T28] audit: type=1400 audit(968.710:8346): avc: denied { search } for pid=10547 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 973.301768][T10561] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 973.304297][T10561] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 973.534448][ T28] kauditd_printk_skb: 65 callbacks suppressed [ 973.534746][ T28] audit: type=1400 audit(973.450:8412): avc: denied { read } for pid=10566 comm="syz.8.959" dev="nsfs" ino=4026532668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 973.543585][ T28] audit: type=1400 audit(973.460:8413): avc: denied { read open } for pid=10566 comm="syz.8.959" path="net:[4026532668]" dev="nsfs" ino=4026532668 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 973.548644][ T28] audit: type=1400 audit(973.470:8414): avc: denied { create } for pid=10566 comm="syz.8.959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 973.566032][ T28] audit: type=1400 audit(973.480:8415): avc: denied { write } for pid=10566 comm="syz.8.959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 973.572181][ T28] audit: type=1400 audit(973.490:8416): avc: denied { read } for pid=10566 comm="syz.8.959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 973.582800][ T28] audit: type=1400 audit(973.500:8417): avc: denied { write } for pid=10566 comm="syz.8.959" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 973.764147][ T28] audit: type=1400 audit(973.680:8418): avc: denied { prog_load } for pid=10568 comm="syz.8.960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 973.778360][ T28] audit: type=1400 audit(973.690:8419): avc: denied { bpf } for pid=10568 comm="syz.8.960" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 973.804385][ T28] audit: type=1400 audit(973.720:8420): avc: denied { create } for pid=10568 comm="syz.8.960" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 974.081119][ T28] audit: type=1400 audit(974.000:8421): avc: denied { create } for pid=10572 comm="syz.8.962" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 979.799293][ T28] kauditd_printk_skb: 12 callbacks suppressed [ 979.799619][ T28] audit: type=1400 audit(979.720:8434): avc: denied { read } for pid=10576 comm="syz.9.963" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 979.803661][ T28] audit: type=1400 audit(979.720:8435): avc: denied { read open } for pid=10576 comm="syz.9.963" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 979.812394][ T28] audit: type=1400 audit(979.730:8436): avc: denied { allowed } for pid=10576 comm="syz.9.963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 979.825074][ T28] audit: type=1400 audit(979.740:8437): avc: denied { create } for pid=10576 comm="syz.9.963" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 979.831842][ T28] audit: type=1400 audit(979.750:8438): avc: denied { map } for pid=10576 comm="syz.9.963" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=16926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 979.838033][ T28] audit: type=1400 audit(979.750:8439): avc: denied { read write } for pid=10576 comm="syz.9.963" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=16926 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 979.949350][ T28] audit: type=1400 audit(979.870:8440): avc: denied { read write } for pid=10578 comm="syz.9.964" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 979.951847][ T28] audit: type=1400 audit(979.870:8441): avc: denied { open } for pid=10578 comm="syz.9.964" path="/dev/virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 979.984364][ T28] audit: type=1400 audit(979.900:8442): avc: denied { ioctl } for pid=10578 comm="syz.9.964" path="/dev/virtual_nci" dev="devtmpfs" ino=659 ioctlcmd=0x0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 979.994839][ T28] audit: type=1400 audit(979.910:8443): avc: denied { read } for pid=10578 comm="syz.9.964" dev="nsfs" ino=4026532696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 986.470260][ T28] kauditd_printk_skb: 16 callbacks suppressed [ 986.472142][ T28] audit: type=1400 audit(986.390:8460): avc: denied { execmem } for pid=10613 comm="syz.8.970" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 986.505002][ T28] audit: type=1400 audit(986.420:8461): avc: denied { read } for pid=10613 comm="syz.8.970" name="timer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 986.508993][ T28] audit: type=1400 audit(986.420:8462): avc: denied { open } for pid=10613 comm="syz.8.970" path="/dev/snd/timer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 986.624612][ T28] audit: type=1400 audit(986.540:8463): avc: denied { write } for pid=10601 comm="syz.9.969" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 987.732476][ T28] audit: type=1400 audit(987.650:8464): avc: denied { module_request } for pid=10619 comm="syz.9.971" kmod="bpf_preload" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 987.845160][ T28] audit: type=1400 audit(987.760:8465): avc: denied { mount } for pid=10619 comm="syz.9.971" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 987.927699][ T28] audit: type=1400 audit(987.840:8466): avc: denied { map_create } for pid=10622 comm="syz.9.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 987.928060][ T28] audit: type=1400 audit(987.840:8467): avc: denied { map_read map_write } for pid=10622 comm="syz.9.972" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 988.006751][ T28] audit: type=1400 audit(987.930:8468): avc: denied { read } for pid=10624 comm="syz.9.973" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 988.009441][ T28] audit: type=1400 audit(987.930:8469): avc: denied { open } for pid=10624 comm="syz.9.973" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 991.937904][ T28] kauditd_printk_skb: 19 callbacks suppressed [ 991.938204][ T28] audit: type=1400 audit(991.860:8489): avc: denied { execmem } for pid=10650 comm="syz.9.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 994.194279][ T28] audit: type=1400 audit(994.110:8490): avc: denied { prog_load } for pid=10650 comm="syz.9.977" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 994.208620][ T28] audit: type=1400 audit(994.130:8491): avc: denied { bpf } for pid=10650 comm="syz.9.977" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 994.214902][ T28] audit: type=1400 audit(994.130:8492): avc: denied { write } for pid=10650 comm="syz.9.977" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 994.220311][ T28] audit: type=1400 audit(994.130:8493): avc: denied { write open } for pid=10650 comm="syz.9.977" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 994.234675][ T28] audit: type=1400 audit(994.150:8494): avc: denied { ioctl } for pid=10650 comm="syz.9.977" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 994.246725][ T28] audit: type=1400 audit(994.170:8495): avc: denied { sys_module } for pid=10650 comm="syz.9.977" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 994.248058][ T28] audit: type=1400 audit(994.170:8496): avc: denied { module_request } for pid=10650 comm="syz.9.977" kmod="tty-ldisc-3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 994.650647][ T28] audit: type=1400 audit(994.570:8497): avc: denied { ioctl } for pid=10650 comm="syz.9.977" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5457 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 994.651230][ T28] audit: type=1400 audit(994.570:8498): avc: denied { checkpoint_restore } for pid=10650 comm="syz.9.977" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 997.434684][ T28] audit: type=1400 audit(997.350:8499): avc: denied { create } for pid=10657 comm="syz.8.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 997.446309][ T28] audit: type=1400 audit(997.360:8500): avc: denied { create } for pid=10657 comm="syz.8.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 997.451916][ T28] audit: type=1400 audit(997.370:8501): avc: denied { prog_load } for pid=10657 comm="syz.8.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 997.462924][ T28] audit: type=1400 audit(997.370:8502): avc: denied { bpf } for pid=10657 comm="syz.8.979" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 997.471771][ T28] audit: type=1400 audit(997.370:8503): avc: denied { prog_load } for pid=10657 comm="syz.8.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 997.475336][ T28] audit: type=1400 audit(997.370:8504): avc: denied { perfmon } for pid=10657 comm="syz.8.979" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 997.486336][ T28] audit: type=1400 audit(997.370:8505): avc: denied { bpf } for pid=10657 comm="syz.8.979" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 997.491426][ T28] audit: type=1400 audit(997.380:8506): avc: denied { allowed } for pid=10657 comm="syz.8.979" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 997.703744][ T28] audit: type=1400 audit(997.620:8507): avc: denied { read write } for pid=10661 comm="syz.8.981" name="virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 997.707307][ T28] audit: type=1400 audit(997.630:8508): avc: denied { open } for pid=10661 comm="syz.8.981" path="/dev/virtual_nci" dev="devtmpfs" ino=659 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1004.289000][ T28] kauditd_printk_skb: 18 callbacks suppressed [ 1004.289427][ T28] audit: type=1400 audit(1004.210:8527): avc: denied { create } for pid=10680 comm="syz.9.985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1004.298074][ T28] audit: type=1400 audit(1004.220:8528): avc: denied { write } for pid=10680 comm="syz.9.985" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1004.309666][ T28] audit: type=1400 audit(1004.230:8529): avc: denied { module_request } for pid=10680 comm="syz.9.985" kmod="nfnetlink-subsys-6" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1004.570959][ T28] audit: type=1400 audit(1004.490:8530): avc: denied { write } for pid=10683 comm="syz.8.986" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1005.729026][ T28] audit: type=1400 audit(1005.650:8531): avc: denied { bpf } for pid=10700 comm="syz.8.987" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1006.039930][ T28] audit: type=1400 audit(1005.960:8532): avc: denied { read append } for pid=10704 comm="syz.8.989" name="comedi2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1006.044455][ T28] audit: type=1400 audit(1005.960:8533): avc: denied { open } for pid=10704 comm="syz.8.989" path="/dev/comedi2" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1006.055522][ T28] audit: type=1400 audit(1005.970:8534): avc: denied { ioctl } for pid=10704 comm="syz.8.989" path="/dev/comedi2" dev="devtmpfs" ino=713 ioctlcmd=0x6400 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1006.061140][T10705] 8<--- cut here --- [ 1006.072358][ T28] audit: type=1400 audit(1005.990:8535): avc: denied { read } for pid=2896 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 1006.074312][ T28] audit: type=1400 audit(1005.990:8536): avc: denied { search } for pid=2896 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1006.087800][T10705] Unable to handle kernel paging request at virtual address fee0afff when write SYZFAIL: failed to recv rpc [ 1006.118868][T10705] [fee0afff] *pgd=80000080007003, *pmd=00000000 [ 1006.128685][T10705] Internal error: Oops: a06 [#1] SMP ARM [ 1006.130413][T10705] Modules linked in: [ 1006.131477][T10705] CPU: 0 UID: 0 PID: 10705 Comm: syz.8.989 Not tainted syzkaller #0 PREEMPT [ 1006.131986][T10705] Hardware name: ARM-Versatile Express [ 1006.132503][T10705] PC is at parport_attach+0x174/0x1d0 [ 1006.133678][T10705] LR is at parport_attach+0x164/0x1d0 [ 1006.133998][T10705] pc : [<81433a34>] lr : [<81433a24>] psr: 60000013 [ 1006.134323][T10705] sp : e84a9d30 ip : e84a9d30 fp : e84a9d54 [ 1006.134566][T10705] r10: 82b2f064 r9 : 00000003 r8 : 8337e180 [ 1006.134880][T10705] r7 : e84a9d90 r6 : 8337e180 r5 : 00000000 r4 : 00000000 [ 1006.135275][T10705] r3 : fee0afff r2 : 81e24a18 r1 : 00000001 r0 : 814336a4 [ 1006.135792][T10705] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 1006.136400][T10705] Control: 30c5387d Table: 8409b0c0 DAC: fffffffd [ 1006.136888][T10705] Register r0 information: non-slab/vmalloc memory [ 1006.137838][T10705] Register r1 information: non-paged memory [ 1006.138123][T10705] Register r2 information: non-slab/vmalloc memory [ 1006.138394][T10705] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 1006.139046][T10705] Register r4 information: NULL pointer [ 1006.139303][T10705] Register r5 information: NULL pointer [ 1006.139536][T10705] Register r6 information: slab kmalloc-192 start 8337e180 pointer offset 0 size 192 [ 1006.140483][T10705] Register r7 information: 2-page vmalloc region starting at 0xe84a8000 allocated at kernel_clone+0xac/0x428 [ 1006.140952][T10705] Register r8 information: slab kmalloc-192 start 8337e180 pointer offset 0 size 192 [ 1006.141422][T10705] Register r9 information: non-paged memory [ 1006.141684][T10705] Register r10 information: non-slab/vmalloc memory [ 1006.141957][T10705] Register r11 information: 2-page vmalloc region starting at 0xe84a8000 allocated at kernel_clone+0xac/0x428 [ 1006.142385][T10705] Register r12 information: 2-page vmalloc region starting at 0xe84a8000 allocated at kernel_clone+0xac/0x428 [ 1006.142859][T10705] Process syz.8.989 (pid: 10705, stack limit = 0xe84a8000) [ 1006.143256][T10705] Stack: (0xe84a9d30 to 0xe84aa000) [ 1006.143591][T10705] 9d20: 82444a50 8337e180 829d6700 829d6700 [ 1006.143937][T10705] 9d40: 81e24ed8 00000000 e84a9d8c e84a9d58 8142f5ac 814338cc 40946400 00000000 [ 1006.144257][T10705] 9d60: e84a9d7c 20000240 8337e180 b5403587 40946400 00000002 00000003 85a3d400 [ 1006.144638][T10705] 9d80: e84a9e4c e84a9d90 8142adb8 8142f4ac 656d6f63 705f6964 6f707261 00007472 [ 1006.144958][T10705] 9da0: 00000000 0000afff 00000033 80010000 00000004 00000008 0000208f 00000006 [ 1006.145493][T10705] 9dc0: 00008012 00001007 c0000000 10000005 fffffffd 00000001 00000000 00000005 [ 1006.145967][T10705] 9de0: fdfffffa 000000e8 00000006 00000009 0000008e 02000005 00000005 0000000f [ 1006.146622][T10705] 9e00: 0000000b 00000004 00000005 0000b0c4 00000006 00020002 00400002 00000022 [ 1006.147038][T10705] 9e20: 00000000 a5f6f491 00000000 8688c000 8337e180 20000240 40946400 00000002 [ 1006.147395][T10705] 9e40: e84a9f14 e84a9e50 8142c0dc 8142acf0 e84a9e4c a5f6f491 00000000 00000000 [ 1006.147713][T10705] 9e60: 824b857c e84a9ea4 0000005f 8453a640 00000064 8337e1b0 e84a9ee4 e84a9e88 [ 1006.148331][T10705] 9e80: 807cf290 807c5668 00000064 00000001 00000000 e84a9ea4 864a96d0 834e7990 [ 1006.148670][T10705] 9ea0: 00006400 0000000b e84a9e98 00000000 e84a9d38 a5f6f491 00000000 8688c000 [ 1006.148982][T10705] 9ec0: 40946400 20000240 20000240 8688c000 00000003 85a3d400 e84a9ef4 e84a9ee8 [ 1006.149309][T10705] 9ee0: 807cf3c0 a5f6f491 e84a9f14 00000000 8688c001 40946400 20000240 8688c000 [ 1006.149688][T10705] 9f00: 00000003 85a3d400 e84a9fa4 e84a9f18 80590734 8142bd94 ecac8b10 85a3d400 [ 1006.150032][T10705] 9f20: e84a9f3c e84a9f30 81ae47b4 81ae4680 e84a9f54 e84a9f40 8025a864 8028c2d0 [ 1006.150414][T10705] 9f40: e84a9fb0 40000000 e84a9f84 e84a9f58 80220bf8 8025a820 00000000 8281d2bc [ 1006.150717][T10705] 9f60: e84a9fb0 0013e480 ecac8b10 80220b4c 00000000 a5f6f491 e84a9fac 00000000 [ 1006.151017][T10705] 9f80: 00000000 00346310 00000036 8020029c 85a3d400 00000036 00000000 e84a9fa8 [ 1006.151317][T10705] 9fa0: 80200060 805904fc 00000000 00000000 00000003 40946400 20000240 00000000 [ 1006.151619][T10705] 9fc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f6d0dc [ 1006.151916][T10705] 9fe0: 76f6ce88 76f6ce78 00018ba0 001302e0 60000010 00000003 00000000 00000000 [ 1006.152406][T10705] Call trace: [ 1006.152861][T10705] [<814338c0>] (parport_attach) from [<8142f5ac>] (comedi_device_attach+0x10c/0x248) [ 1006.153633][T10705] r6:00000000 r5:81e24ed8 r4:829d6700 [ 1006.153924][T10705] [<8142f4a0>] (comedi_device_attach) from [<8142adb8>] (do_devconfig_ioctl+0xd4/0x21c) [ 1006.154308][T10705] r10:85a3d400 r9:00000003 r8:00000002 r7:40946400 r6:b5403587 r5:8337e180 [ 1006.154601][T10705] r4:20000240 [ 1006.154759][T10705] [<8142ace4>] (do_devconfig_ioctl) from [<8142c0dc>] (comedi_unlocked_ioctl+0x354/0x1dbc) [ 1006.155117][T10705] r8:00000002 r7:40946400 r6:20000240 r5:8337e180 r4:8688c000 [ 1006.155378][T10705] [<8142bd88>] (comedi_unlocked_ioctl) from [<80590734>] (sys_ioctl+0x244/0xb5c) [ 1006.156031][T10705] r10:85a3d400 r9:00000003 r8:8688c000 r7:20000240 r6:40946400 r5:8688c001 [ 1006.156400][T10705] r4:00000000 [ 1006.156588][T10705] [<805904f0>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1006.156952][T10705] Exception stack(0xe84a9fa8 to 0xe84a9ff0) [ 1006.157187][T10705] 9fa0: 00000000 00000000 00000003 40946400 20000240 00000000 [ 1006.157520][T10705] 9fc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f6d0dc [ 1006.157797][T10705] 9fe0: 76f6ce88 76f6ce78 00018ba0 001302e0 [ 1006.158018][T10705] r10:00000036 r9:85a3d400 r8:8020029c r7:00000036 r6:00346310 r5:00000000 [ 1006.158292][T10705] r4:00000000 [ 1006.158702][T10705] Code: e596306c e3a04000 e7f33053 e2433612 (e5c34000) [ 1006.160336][T10705] ---[ end trace 0000000000000000 ]--- fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1006.306778][T10705] Kernel panic - not syncing: Fatal exception [ 1006.309963][T10705] Rebooting in 86400 seconds.. VM DIAGNOSIS: 11:51:46 Registers: info registers vcpu 0 CPU#0 R00=ebee1e9c R01=83592830 R02=00000001 R03=00000020 R04=ebee1e50 R05=ebee1d48 R06=00300000 R07=83592830 R08=ebee1e9c R09=00000002 R10=ebee1f18 R11=ebee1d34 R12=00000001 R13=ebee1d08 R14=80587304 R15=8059e280 PSR=400b0013 -Z-- A S svc32 s00=77206666 s01=206e6568 d00=206e656877206666 s02=38373830 s03=5b5d3030 d01=5b5d303038373830 s04=37303154 s05=205d3530 d02=205d353037303154 s06=62616e55 s07=7420656c d03=7420656c62616e55 s08=6168206f s09=656c646e d04=656c646e6168206f s10=72656b20 s11=206c656e d05=206c656e72656b20 s12=69676170 s13=7220676e d06=7220676e69676170 s14=65757165 s15=61207473 d07=6120747365757165 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000000 R01=00000000 R02=00000000 R03=b5003500 R04=e849dec0 R05=20081ee0 R06=000040f1 R07=00000002 R08=00000000 R09=83f72400 R10=00010106 R11=e849df5c R12=e849de00 R13=e849de80 R14=815c4db4 R15=81ab5360 PSR=80000013 N--- A S svc32 s00=00080000 s01=00000001 d00=0000000100080000 s02=00080806 s03=b0030100 d01=b003010000080806 s04=ffff0404 s05=0303ffff d02=0303ffffffff0404 s06=100004c0 s07=04d00300 d03=04d00300100004c0 s08=03c61000 s09=0004e003 d04=0004e00303c61000 s10=f0030010 s11=00080004 d05=00080004f0030010 s12=0004f803 s13=0d980108 d06=0d9801080004f803 s14=08060601 s15=0000000a d07=0000000a08060601 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=06010d98 s33=000a0806 d16=000a080606010d98 s34=08000000 s35=47800202 d17=4780020208000000 s36=060106e2 s37=00000806 d18=00000806060106e2 s38=08000100 s39=00080000 d19=0008000008000100 s40=0a010680 s41=00000806 d20=000008060a010680 s42=08000100 s43=0008000e d21=0008000e08000100 s44=00000800 s45=00010008 d22=0001000800000800 s46=3daf0000 s47=727c6884 d23=727c68843daf0000 s48=e7cd5a6b s49=f5202a60 d24=f5202a60e7cd5a6b s50=752597f7 s51=ff3340a0 d25=ff3340a0752597f7 s52=fc4b9a58 s53=413c02fb d26=413c02fbfc4b9a58 s54=e280bfac s55=678f780e d27=678f780ee280bfac s56=b5a326e1 s57=e87ee263 d28=e87ee263b5a326e1 s58=0acb00ae s59=29b41b85 d29=29b41b850acb00ae s60=a6b3dcde s61=ac1658a1 d30=ac1658a1a6b3dcde s62=6bf31021 s63=2f857a30 d31=2f857a306bf31021 FPSCR: 00000000