last executing test programs: 1h0m37.216836168s ago: executing program 32 (id=5584): r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) syz_genetlink_get_family_id$gtp(&(0x7f00000000c0), r0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x0, 0xffffffffffffffff}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000040)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r1, 0xc008640a, &(0x7f0000000080)={r2}) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r3, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000000), 0x20000328) setsockopt$inet_mreqn(r3, 0x0, 0x23, 0x0, 0x0) r4 = syz_open_dev$dri(&(0x7f00000005c0), 0x4a7, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$KDGKBMODE(r5, 0x8901, &(0x7f0000000000)) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r4, 0xc04064aa, &(0x7f000001f880)={0x0, 0x0}) 14m42.442064045s ago: executing program 1 (id=7957): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000001c0), 0x12) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000400)={r2, 0x3, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r3 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, &(0x7f0000fca000)={0x100000001, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f00000004c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}}, 0x90) 14m41.884505271s ago: executing program 1 (id=7959): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x3, 0xc, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xfffffffa}, [@call={0x85, 0x0, 0x0, 0x7d}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffc}, {0x85, 0x0, 0x0, 0x73}}]}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x101}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) 14m41.202614545s ago: executing program 1 (id=7961): bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x10) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) openat(r1, &(0x7f00000002c0)='./file0/file0\x00', 0x103180, 0x60) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='system.posix_acl_default\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="020000000100030000000000040001000000000010"], 0x1c, 0x2) 14m38.107981005s ago: executing program 1 (id=7966): r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) syz_emit_ethernet(0x66, &(0x7f00000002c0)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "c6dd00", 0x30, 0x3a, 0xff, @private0, @mcast2, {[], @param_prob={0x4, 0x1, 0x0, 0x4, {0x0, 0x6, "1702eb", 0x8, 0x84, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, @private0}}}}}}}, 0x0) 14m37.460349747s ago: executing program 1 (id=7968): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) unshare(0x2c020400) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000400)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18d883, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x9901) mount$bind(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10a78c0, 0x0) 14m36.541646256s ago: executing program 1 (id=7970): openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0xb0000004}) r2 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000240)={0x20000000}) 14m35.888804678s ago: executing program 33 (id=7970): openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0xb0000004}) r2 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000240)={0x20000000}) 13m54.391711038s ago: executing program 2 (id=8011): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x40000, 0x0) fcntl$notify(r0, 0x402, 0x1a) setsockopt$inet6_IPV6_RTHDRDSTOPTS(0xffffffffffffffff, 0x29, 0x37, 0x0, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000140)={0x2}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='blkio.bfq.idle_time\x00', 0x275a, 0x0) write$binfmt_misc(r1, &(0x7f0000000cc0)='@', 0x1) 13m54.037203911s ago: executing program 2 (id=8012): r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="390000001300090468fe0700000000000000ff3f04000000480100100000000004002b000a00010014a4ee1ee438d2fd0000", 0xffce}], 0x1) sendmmsg(r0, 0x0, 0x0, 0x1) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000400)="3900000012000318682907070000000f0000ff3f04000000170a001700000000040037000f00030005332564aaee7b1da55073fc3d2190f5c5", 0x39}], 0x1) 13m53.471370558s ago: executing program 2 (id=8014): r0 = syz_create_resource$binfmt(&(0x7f0000001400)='./file0\x00') openat$binfmt(0xffffffffffffff9c, r0, 0x42, 0x1ff) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f00000020c0), 0x413, &(0x7f0000000340)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x8000}}) syz_fuse_handle_req(r1, &(0x7f000000bb40)="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", 0x2000, &(0x7f0000000840)={&(0x7f0000000000)={0x50, 0x0, 0x203, {0x7, 0x29, 0x8000, 0x48000010, 0xdcf, 0x3, 0xb, 0x2, 0x0, 0x0, 0x2, 0x9b}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r1, &(0x7f00000042c0)="0d9ec529eb18ec94a35378619cb10ff8c913f67139447b7ee0cca809e36c363ba1d3975a7446b70c6bdd99e2cff540eda7589ea89efeb498df568916036f0848ede5f089bf502b483c67c0432c34b98b1bc085a99e2981103397e0b0eed2ec64c1075798b56a42ea532091f5326c97622a47c53fbf42e71c3ed4b954c559424b49a13598c6c63ef65b62384b038b3e6e98ebecd178289831eaecd986a01c751e8cca7a57c009f2b5310fe9dd8a63b91c4b5b13d1c44d2b874b32ae3e961b9e96a511ffaa3ed20248dfb470460d305e44ffcd287b355380319fd31f7538c6d00de06ddb8f72b3a59c4699c94d7379e1e190c6dd7786e12096f9e963a038b6b4375535047135ecc07b16035ceeb27ed09d77f52b6eae27a03071e060b05bf347b9ba44a984e5db346d230ae9c5324ecfd4e7725bc5019a9f4d20237c820359d73b82f9c668ae71f6b85d5350140a16f988bb2b8010effb52636e0b728be1b1ed37c1b8868ec67edd52951dbf65b479aa25e92667a98c755d88995e6303a48a64317bd4b201fc6dea59381abfb5e0fb1035bbd32a97a6324b08f404fe3991879a0c6362032864031737941d9cc534697da61a43c8723ecd1062906b65c504d86383cdf9631f228372b13aee64f8ea8db00dffc37fa092ab5daeb7431dab37091c44f91c9202df60876a6e06ceee3e6a095406fe5cc1f83de1a4adf36fbef5a94a622132cc85e56fb53a9cff67bc69a24d8c259ccfe19b1925061f0cad95d6b4158c1394b8acfa9a8f52a566c6cb4e0b14dd30c85b309289a5f395e01d981735f6fce6ab30994643d70b2f322b7a233a339e621ea2eb00a0082a175c231b330a58062680546c28db8ff5b7e66c0e3df0a9b74ab72abfd241fcbe1e3d27a2d1eab44cf88180dcef4482c866324133f9e4780b891a7c5000b005cab0c131c225e944fd1aab5de9e8d17b8770b4472b6e4a13b6cce90ba152e5144acf74cd8a9821ce3eae72dc7ddc81b76482226098329c3a8ecb923822610aa0b086f44329522dd8f9ae355b4666d1a10911ef8e21377578b42fe6ee0b2a77917157488d6e0bb388951f80551dcaebf212b396d1f922aec595bd340390d310f6006c4b3efdd80838f39d25470db39d6205ba8f52bac634f8145a3c10ed007acc2f25c5dbfe911f18f44a0c57cee33725eb8c5f2d9112f91787c2c323b67b67d9d1f593d26430d77189d4678fd8d7c11c1f2d744ad59a03a8cffc52ee0293c90b00d61897c80184aa63fcf43c109b06af20c808035af0a0bf9cbe544681768f92a2ebe3b4458dd020fb0550822bc2f769631e00d63bd91e7100299bbc4ce53a35e993e24028dc5c81d46f5377d21f2f38a9688ed981044346b865161b68f3390a50c2e625052396cdb6637e9434904c63d8ca45aa2325626293cdd9cd0179b1d995be10281fa8d281db16320f520e42af268ff30dc2d8885aa3d9e7f294eadb4d827d195cd5d18632928f2153261345c231efd143288b881638b61dc5dab8114c1948d83b8ac4e278f131ec3eef4e87e43a36f4b41a699a741ef3a7cd4f0bc5dbd2dffb1d223a5c5b38b98e49092631a176d15c4f3c077d639726a3482bf2fdc73c2bdb09208aaf90bc64b5fee89d231bb1679de3e5d31662db2c5824ce9941f94500e5a11b8fe79da548efed8cc44e9bc1d5175dd77fc16f8219a83b83ccca2181bf411b0945312598817e08e5277530eccffff17d198613cc8c991349141ced56e79031ab6cb98f3f39e5f20bac76017083041a1ee99ca257d0e0cf95e59617139afb08cf0c6a607d3f2ac2b5d3f4394a4a063c9769bb884ec522d46138228c7e9b5c7ea5e3a6c70815b565ce15a13fd0a5deb28e710c15fe25c744b430b4f6482532fb96566381c56e12632cab5acb5e08d6f973003c96a7d81ff76966e0f93c83c462bfcef230939e48c4983bfed78f68b0f540d1fff2196cbd1f1c1a1c310ec10f5a2745407000bc6db1fcc8540282cc7e96cf5582c4eaf874a2fe6369534176429b7505eb0aade883260806be2d86a42e76b315a76e5f686ca669f49e1f9054a77b8eaff14a43e9a9801244e8e94ff50a17b60dee0122ea70819bae3375070466c7f202c4ea0fc0c9aaae50c43cb65febea224c2b554e937f67689b3e18ed543749a7ef0997a7a7530b918c4ef935137137e1ee7e6a8919fb76a8f008ddcc2d8b2e18f3eb90f7a13cf4f49170ccf50c75de82e92a5e2d1f311e59071ff202b6cae4d6243fc3787cb9fbd401938cc18dcf5620f8b8f74e9e3b13dcde85ef896f31f5a2458118addae77206ab1506882f91873b4828950a7b91ddae74888155a9c486c7c60492813ac0e33362dc4e21e00538e5b05b78271d82486a0d156d4a5a07085bb1cd74f5d63763f18648a489352b5d05107909fe54b5d332cde2900c82c150b11071e028eeb275cc9a9614f1eda4e4830b128870e732d473100c24152aff2aa1659daa65d7e9591ebfcae5dca4e84c9a0965a01668e59843ef4a093d9b01067a0ae9d09e3d810c2cb63600ee05b10fc8685e8cb150e2d6d75baecfb8762f7a7d131417eb0721e19e1d21f5adcc1e09489f06b81d91b48608107fc7b3853e214a3c786a9812113ccbcf09907506d0e9cd72c79793584b4fe06a18a627bd969f628a5936367961f1e7d117d03a8fabc85f5ecdd0ddcfae49aa293893a2e5ae376be11031abc0e05ff250b35926345b52f8d3dc02b7497f7513e759247353db9b8e493120e73981aef4c4d9747621537a089848754c14cda1cad18084274e98ea2bf7400ca846184e0e31a571f9bd770222b1038a4ce60dcf8fe9cca4d60048cc29c37c1345de992e9dc7128ef093c1ce80232a88a3da7ae8bc87120c5b1f405d5186141288998fed9e021cd0ad6b12b51c217849390be3ea00cbd6c755958140bfb9b2a2765ad1f51ac045fdc5c28ee5886b1436015b88bd90d19328f91394110b0d891678e63b63d6cc4d35279f6f616d7692c6fe177a79d80ae8f7e4ad5078d8d7096f3ee664dcdb2f634eba98f4788de1f5e34f32ef09e2f0aee4fdc5bec4bc4aeec5721ac3a2da1bf52da017c3312095403d50dcde39671242b610f11832773796557f71455376a7741ab242a9fc94464180bf224d5e8c79b462e3a816f6c08ab0f5503386d34ddfd808b4b8d5d333548d4b873923c6c297b2fa1abe433ec9264385c50dca40316c37ed85db382e7c853ba331c727043cb3345de9f89b1c804e98205eda3d6b6e042c9c41877d456dcb8f12663e6dc1ba809229536fbcc4c58d01a137eb80af8596dfc7b5fa7a044cd141238aa82e440526e55a28c4ed2f4b26157a0eebb4a77c5ab66fcce2602e1a70aea07e5e7e7e5321d58ad128a5ea6b574730037f24a7300e0ad6fc96bd18e03763bbbf21bd3c388aff1cc5ea13728ba2f8e1eb70148d2603e55bb01cce0763c2020b5627a0ccb35ae3a9b3df380e6d9800d9506219a90971a3b8bde1dae6a43fce2aaecbc026be8f4e9bd749e10c87ed7d78f92014342fa449eef28e7175548e5a8ec4fe7d31fc86737aee63ef40b54485380b6898161676f0d82f76113b12a529fbce4482dd278a90aa416077c677aea623ddb3761bc81527ab7e3d73a3b4c8c3e4352c7c083cee8953ebd972a83caed837587e8d7cf360f28ce6ca71de75c9174e8744ba1098513bb6c7fdc6a3c7c8e5870223d6cc0b18b5d6edea926d5376aeb85488d3712e8f67128f0d3fb2b42f82363a0d4c1c806ff283f6e4ddc10ce4a0803be66a247207d6606c7dd67cd293dada159016d7fd7e88c4df53d09bdd9fd9fa3c732da45fb92bdf6f442eda15edd97bf1928a7699008f0b482240a684ff5efef0cadbf1b4f16888650d59b2bdaeae0d1112a79c5522dd0933ccc16fed7cd0ccabe929f625de8947b3b1532dc04253cca988a1584df2b31492b19410d6f681d614eaa20029592c00c948a98973a9fba87f1397f8859ba543edeb5c0b0db92f65462a1103947d780b539433332d65bd1418bc00c9e815f73e0cc0aca5fcc9f95f707c455013a55a0c4a29093b05b94edc5b5284ec7ccf3ec091002b4229036c174e2927127f40769ece890612bbeb960d9392f442765a2ca8990c52ad7d4441e975a7cf079d139945f2b2a8a34f0e85d76cbc96efbb52cf8b5ae681234e14b6648244d41cfee2d9b189cd831cc2f31ae7e5f11aaaff1629f8c2cf73494ac38e58da7010dd986f8b6134ee0dabfdcb30617d15720cffbec7651f22253aea21696d2ece4fe026543ea2f3473e4c12e65dbb3cbf764ffa0b3a396382b9b7f0c24eaaf3495554b2319b66f3cabf01a8d6cfd1382d94ab71cd11eae2a42e4dc841d4a9732c395688d3377c8ccff7e3f88a3129855a5f41a7de6b6a9ac40a87c288f4821295edfc4f5b8fe5a1fc0162e9820205c809935cc6047e8a835c651be02fb41c21de30ac770d7a7f2108c6a3f1cf2649cac444f028a6ebf4db422cbbdb7fd0cb39109a3130ffae17810bb58f5c557c99670224c2678fa07f1064911e6c665c0d1c26cd2f40f7089789208a48eb339bb8885910e035b4b8c69b1c3ad79270ac6e70b963493a6628b90501822878cdfac866268d914d8af2814612b0198f9e4c6b48e739e414d61f34e2f69ff7cdc4fc7ffe45a64c5faf191ef6c4e31cecebe09a2f6a63d60926ebaa7e925ccea5c93e403c7ec0ee55423ce4893471440006d4c09c141e489dda5577f73b57ecfc764ee5bc1bc88f7866dc6a494e3ee560c956dc12ae51842030251f1cedf2caca15549d0bb4ee3bef03702197350cd7586b5916ef6a0abcb5f30548d22ce5d8c4dbd82030b8d7b5481c51676b7d14d35c20346c74dcc7d96ea0b13f890f755a219993e88739da8246283ebbd82eb1b15956b5ec16ad523768c19ceba9199f97d7bb43b85fa11349ff7fb89a97b463b34c584ae9e2af6c8f20ab528750a22ff6c2297e400065fbd9a4660ec2c658afff6db9b67070352d2aa5e6cfe534eeb5ff271575b828dfd7f537e3627a1a6419ed0c84297fc3d362a52f3860a2eb7ae0a50f06d3c68c4a1463ec331ead7af2dba792332218b04d5b585de1a471d296df6e10316852d50f211e07643f749a1d75410e66e47db40bfcefe4b708d0b2879a50ccbd85939b89fe4b905a6a89a2d5a4e28d18c048e66108a06d8b6a64ec5737b5ae283d914484167c8ac7dde7ec007aad1999854c4d6a0e5f887f99de3662610d5e8d49bac7d41d6fb7d90b4b04939638e2151ba67e75362aded50edfb7d9919b345b5b7df6a909193ce64b20470e3480c68bd764968f4d8a5779ffd9a35e58558272a214ae26a094360b9f2ec97c5e0a7693f4b7509b962cd8537e90ce7be70b54e9531e7295f894b94566df49c50c2265842392dff50e17ed3f7beb9ba4ad0520a73db1d8d3b39759e7fffcbf26517316bc74437fef944fc915ec24affc1a53748cfc883e3ddea9e25063ea8383b06f0d5c9db13a0ff335f52699226b391543060ae5e2c25b585b9efdd5ff9495a4873cac58b5feff5f08717b04e81bfea349accc58fcc6a6505de3aa6ff4985d9c38bb83e8daa663ccb356df3ed52343ed7723687e416816f987c565eae22c7548c1d6b56a5b6819583da0ddf92739f65e604e37b3275a6cb1252d4ef7a515c4b1e9068d714be80066bf0d422f1e4d2ce6f95c9eac081d6e4596a6a8e16a57b732b575b7de16f176ff0e34e84b293d3fd77fa30a7b7cf12a1edd54170e56bf7f2d40620ad56acbc5cc615556300ff9e95ce3dda93c8333f23f0d97a5da12a0fe58f95d6b911f614563d343ac6e4f9fee1d149c94fc75a97ac839b6d8d7b27c5efb870d2bfc6dbe6b688490b23597d83982d7858215c59011042b1957a0b386842621c72f89a9b524008794ffa0c179753ab48d0f73e5ff13624b3b90287edaf6a5367dcfe4094a21ffad3e881b428b77ccac6924d5bde9c781d4189654d8f29885fbde07e6334c6406dd3ece359c6ac7c6147f5c4906e56764e9980a669bfdddd9eb780e7f9988630d1eb098b3e4fd4c795f11441fb6d0ff7cf086eb291b1ec8d90092e1eaf9722ccdcd15408617cdb8c49043bf71a6ea0ee6b7e840344fbcd377b995bfb1faf22754fcb363f6c630501b619bbd87cc13d5df0948a176771d2d69236eb50dd313817d9687967e7d71f854db6bff803f4501d999dfe3da37ccfdf894a7914c4c113fa7a18c3468a52d646a5070614a6f02b7ff21c9f6927f5de55be85ba815f4bb9e29f26a94423c58338947c804e0627d69bc5a6e93fc5fe8cae851700253f2d494622c6127b4d77bf54a1ac27957234628cbe2fea1729ec53be7d90806d510ccddfd76fab1b9bf1207db8b05c3eaa88fa4c0a5db13cec9310f4e02c1d8114705446fd6649df3829aa12786b8d10b4540d8c1f1c8208c4b41998435e3fa1ec5199cb2d3d0c5c04c5e0b3ffd69112252106bb39333ff23b38d167a9b45ad1bdabf434c8695e2676d461b34c5f048e70b67a44d824baa090c8be13a22ef0d0970cc7a94ed4b77bfc3a40427c6c11abd2b415817243f6801d535a3adc9924a1671b645100e822a0c1876a37d9c9e230e3d762f1cfbb89a8b28255ba4cc5b46cb1635cf185578fa068b68bac93991982b48e7faacc09745a7e33bb12de6b25a2342a7e03cff06dde29b4d05de84e56c78fc6d9dcd180438da3136767d5846bfe7168faeac5b9434394bd747126c5c1ecc6621d10817ce9b6540433828a3bb8f6da0cd8f2b54a47cd5473f6bc3dc1234bd115a6890aa678d1bce7840d7a4559cda556740860079e46217c20e45ee59b8b7078d9b70cb6a249eb2e5e4071d044f456fb61649f261689b8d7a532afaf88eb30041242ce491fb7e654a1f06add370e2706f75c2fe1afe8e065804414c660ec4d96f496b1ad87592de8b7d04baa7ab142f580f262c64c57fce8ef933f18904f001809cfdf94eb679c9eced5d125b4f1d0064ca2ccf5eaf61bb7841bd408ae213deeb15d860f7ee7224b9d2dd38ee9f6c3fca6590335715c218db8f8c98e6339a6944817a1ce2e115ae984699861631b9893c143f594d6dde0895a0c7edb9912fe9cd8fd0765227b3963033306d15711387044bc373ac10d7be73cd80f1a79cf1ea0989ea9ae8a0dbbd1227bc33df652792a6bd95f1d21c6497c4c35b9a1eadc0217e322285a2eb832753aae74ef42fc983e58a126b7c23e4b0bac16f0de1eff7d41477bb25052f32cc9cc956ebd209d6b945b1fa9182857e180672a6be7edeb5234830668b1ea749d0a0dd3a244684d4dd76221c3bdf98c2f1eacb7a6dcccafd249b0ba2592c88790de40895799ea4dfb045cc2392dbb623bfe420b24e5a425b84a4b24d787a68bbec9db363ac4e9453df597f0224d8b7b21629e1989e53accbae97e189cf9b59ebf8bb89591fe3fda450af548ffc46eff98b5216e238a9246e2fb95810f8f4d89504633a6d223484a765b9e6e5497159b31c51fa6cc10641bafa81b10c5ab853f3136fa1b4334bcbde99cb4689f077ca3c29c2f1aca2a05762943073d5992aac4d9b0d411ba25905c34fd02b8eb7b9db375a6f6516446cc195eb55eda1e007e26328e9e2642a9c4e90c56440cc60a1db77713860a56820901b3022d55c621e9d54f759dd17fc5b59331c63cf30e07081bf0cdee6cc94ddfe8c6179e7ed86607d4ba7d5f1e97fbc1139b43ae5fd04c1c715f4600f028d0852a421d472b1b48e591b6edfebcd86be3db2caf967b06776096e14f0deffc9bb126ec329c49ada996b963e942d9c404967dc23bdbd0eee951b2879f2ef7ae224d4ff25edac4ddeb2c0b8e579af283e87c625d3fae5286fa855930e45207af7054763937a9247dc38e37e6dee2e325b617280846012e463707b6ccfa2fc399a66e534221a45626cd18c79d46f5c77c2d359e19ea870cd230709b5e33cd52fd43388ef91dea0a1e0df6c72688d9fd32bb67f489a3618604ef1dfa0d7f569d40cc68e39994e4edab4007c988998f59485ce4723c1eeb7c72f7e833418bab47735a91c7ab24e8555d2ccf3a812b6c634c0c3a68271ec8b536aaa442e056945feca6fb4e54d2cf60a0334f494b2bdb6fbd597de0ce9d2cf03333a0c7121e086aa4c657360fbfb60f3ce0fc0d90ff12b03464e8ff0e5e546ff79735c5c800a0f9b680a478c772f60173a760e280d8287681986038444f2103e2894d5809d062cfe8380e34bca86475da3d7634131c2a8cdc98c5927bc137db61f94eaf9a74f87cc85072c201766eae17fbd5b732859fb1b1c980b36e377aa41a95bca18ccea529420e742899af7b968c1fb9c0d181da9f86358dbeea877c3e9123a9289c362fa61d96c707ac94b427318a1e5f21078aa9d1fd7a52704e0d73e527f3ca65b7b459734dd30db5335c450f1dbcc1e4259d657d13b6d6b4adddc3d0eae034d1878cd0aa1825991d75f8e6b5b4c0d6d17e8ce709b19ff794a8ef856abdfac65cd13631f1b66b20f2ebf2f3122d18e03cbfff88206a5998fc3cb2b40634fcecdb8f5bdbfe044dbf169ccd2cd60f7bf033272f38f587943fcc75d2d65d9028c02891c8415706c2b2459b7a3c5cc82b0446088d3b3bcc033ad453136afd4ac4678320fc17288dbfa1c5180ad57508a2a298ed4ebc716ede34fded574d9779be5d56517d4dd40f197312390c488f46914b0927b13901ce70c1684801f2811168fab533998a1fdabbb6e683abfa021f6b80077f19455c34cecf5dbdb2fa6e3930eb5940cb14504050cc74249424310dff81116b8f2076b8ebece84c302e758fa90af5a1888aa8a5a2bff4aeb7ebd1c7a216bdbb84bf9c021caf3c8efbfdc5d3aede46381bcda372a5398c89868ad57287736fec2a7e8ed638974fde5875eafa506a6bd7f772d2b221f4bde4920fe0c56f8e0847e2a7e8387c64ddef4203d77a526c46d7871befe0c5f9128bd67319acd963fc040185aac4e7815f728bbd7ffd8f3d125e63320182f202fa9a52505be9585556a5d1308c118ccdf01978027cbace7ab339d6f53d15e795b7f3fedae4f86c3f257ed80ee634375dc2333ceed1ccaeab1b6be7a9611ff33d79dccdec2007558c06dfc06612d56d37882e5f1de340cf05f4fffbe1a5def6d045bc5bdaf633f07360f9028cedd103bf03fec8beb9fdbf8c5fc684d12efae1859c53e2cc3e2f508a9cd0410ec036648d3760dd591f7ae04e4cdd61a2566319c943f0b63d87e422dfe5c0d1edcb2dc515778a0d7bb2c93ced3b1435adbc51d3fdca9c13679397bc4490093d64869998d6a28bb862ead0fa411585289cc00dc199eac6c607b8a84123dad3be80dd8fd86aa202113131046336352235f34c05f5ea6d5265adda98edbbfd11d6839c5b1bfe4fad4e688558d633d4a281df44d9c0a35abd464e01f8ab01a1e272cc8cd155a40b8aca4c6b1dc894c0fdc02f15a8f67ce94c7f99b6fcc0e4a3a8a71365645ad7809d47bb26f46ed8bd02f6e8f3d277224f82f3d41695f367e343ac6d507413f4bdacf9e344a49156c4de36d68c075415f8004748055b38b8a4110f869fafcc59cdae5663eda72a05be365a50e98bfd4b00e35aef687afae7bd6622cdd725326776f6fb1476c8cf8c20a0e5223e2bea494a1bbe4e79b25a5e48ba34bc66a84ecc4a0aba98e74ca2b1f61893e61a29498d855a778a2a9ce7b7fcaa44b4aedcbd0e28d6c49bdb6776975bf69161f372b964e4288ce6a3b877c3126f90c4c9749d45b8c5c840983b035993e484a945be5fc9d2d1bd3f3de4e6de7bc74a7a07b13e9e82acc11db85454f1d928fe52ad42ca783fd20dd3e94471b498c2736af40d2a45ff74f9ef874639e33306daa8a667674571e2ed93a48f49b57e9e3382fa8090774bc795609ee510b6a1ca48d9833819cbe8ac77eeebb0e3b6c59ced2d1ab355264934ff1914a3f654249bba60a692dd36368b8a866b333320e57e9c7d3646c374b96ff14e303780ffd7b957d89ccdf57823d2d1e158773c2075233dd2f331eafe3802da683c293eaa24cd8b63a7582ddb202cd6f8c837c74f823727641c7eb680fe51ce7f250adb34956e4cab17b8a5f10edf144c700e376c682dd46c8fc89830fee1a44fafe0a5a2e7581d5d16ad6267d1dc2d5be8547f9352d1591b42de94f2559b44a80038360c6394541a77d95b196558a479b609882fc597b9cbe285ad7c7a41133ed85c8ab6e6dec5bf70f9e787985512d48865022705098a6703b255a6f2b05b62fc7ab32e67f06d785ccb33fb348205a76939e6c2991486c5aae8ec1556b2f8e30ca445a4a495cbf2c6013042b8cea615e58899fccbbf1fc4f17a6dc37e46b17ada0be033dc67904fbd7903086d3417e423af64338426a84ca0c2a3252db62695f9cdf10ebc09b9da5747d30e7f4adfb374e1d2bb24542b0373b1fb897690b49fe24d8575ec9800f019c9c76459421c11f002989ac82c13c04a202cf7f9f38b053f9a680d4d5012887a11d25cad201df20a4eee6d2c0474055579ac729c7514a88b1675bbf6b773448c6c1a5ccd157f44f7e032a6b848f2e734d773f029e48fd13c90d41666f9bd4e9bea91950737b6e7502f9d2677938f240e3f905d6095bb0f8bbe961b99b2d025538c3888bfff8957e3592ee5b26a75399b59c697f59fcdfbbe3bcffb8777340875611bf75486d2378e68de771800bfffe0572fb36ca855ec5fc8cb90c76455773c36ec40b101fb30c48f8a8e775f5220e024b4da9dddc2fcf4da413e7c5db9e0567cbb5fad0c91d779a0939debd9247d3f7d8107fd986f73a9c9067e6594fabde0b9e887040cfbe7d31332f41259de57b38f33275597725392efea51f290b8e1b5c243ffd9eb4c0231600f9b4b204344736849d527156c4720a463bbe88fbbdc333099d949853d5c6fda98bcd35ad3f1fb1d5a7d00541a8a202c8590e35360bb9d25d6431476649e1898f901fad37975d6dce9833956e7a78d0306f533d4aa3c9676017c7abc7e1f8f2f117774a4f5beba55d1c3cd580fb18defccc349cce24e94a4cf1f4c6f45d783ee0167a55369c9b5e1eb6d0a836f3eb2354fad3cd771a9d777ff84c63120baee86ddc52b3e6817dce339ac9c240e75f3e2f77afbffbc1d54eb5936d045370ce3b77365c5320892dc7bc36e488019461d2e552969de9f25bd8de049d693be450c43c5d22d7569fc384e8d56ddb577c5f3c3471f5ba2998bc0c697a06b6d8ba5f2f7236e78aaed69b468e761a5f07145c0326ebb94f50aaa8c5666c92006d8d139036f981003933f8e2eba106a0e251fa9f5407544e44aedbbb271a3bf1c660a9cb8c74dbd0713aaebba2dd046af8b9428709646521d6bf387a92996b35748e1e67b602309b7da0fb642e89de19f550925f4db082ef7e9821ac4b2aee93c9cf791c086751c4cb4172608a4f903dc40727858046851529205b45786e294c17abf5e5f6bc730cbfb8fd977c5501a8140ac7984a267880b53cb94157be9ac157be1cf12d8a9e5612947772b734ed6ae30e548a3b2faecf94a7e03f86317f52ac797aefb957d2a29de8f8ced414ce22c800e0dc7e49d3672fca633248f3e68c00", 0x2000, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000fc0)={0x78, 0x0, 0xa, {0xb, 0x0, 0x0, {0x9, 0x8, 0x1000, 0x90000005, 0x40000000000003, 0x2, 0x9ec, 0x35741061, 0x0, 0xa593e9c1ca988eda, 0xfffffff9, 0x0, 0x0, 0x3d, 0xe}}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) execveat$binfmt(0xffffffffffffff9c, r0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000023c0)='./file0\x00', 0x0, 0x958028, 0x0) syz_fuse_handle_req(r1, &(0x7f0000007b40)="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", 0x2000, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)={0x20, 0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 13m52.021131472s ago: executing program 2 (id=8017): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x80) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x0, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) chroot(&(0x7f0000000100)='./file0\x00') mount$bind(&(0x7f0000000040)='.\x00', &(0x7f00000003c0)='./file0\x00', 0x0, 0x2a05004, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0/../file0\x00') 13m51.572952541s ago: executing program 2 (id=8018): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$loop(&(0x7f0000000740), 0x3, 0x200) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) 13m51.080531322s ago: executing program 2 (id=8019): r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000000)={0x0, 0x0, 0x8, 0xe, 0x200, &(0x7f0000003c40)="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"}) 13m51.080059093s ago: executing program 34 (id=8019): r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000000)={0x0, 0x0, 0x8, 0xe, 0x200, &(0x7f0000003c40)="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"}) 13m34.24865775s ago: executing program 3 (id=8049): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000340)="fb", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 13m33.860070045s ago: executing program 3 (id=8050): r0 = syz_clone(0x0, 0x0, 0x9, 0x0, 0x0, 0x0) r1 = syz_pidfd_open(r0, 0x0) waitid$P_PIDFD(0x3, r1, 0x0, 0xa000000c, 0x0) listen(0xffffffffffffffff, 0x5) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2000009, 0x32, 0xffffffffffffffff, 0x91c6b000) ioctl$UFFDIO_API(0xffffffffffffffff, 0xc018aa3f, &(0x7f00000002c0)={0xaa, 0x100}) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000000000/0x400000)=nil, 0x400000}, 0x1}) syz_open_dev$evdev(&(0x7f0000002f80), 0x8, 0x484000) ioctl$UFFDIO_UNREGISTER(0xffffffffffffffff, 0x8010aa01, &(0x7f0000000000)={&(0x7f0000000000/0x800000)=nil, 0x800000}) 13m31.91538822s ago: executing program 3 (id=8051): syz_emit_ethernet(0x76, &(0x7f0000000640)={@local, @random="e863834626be", @void, {@ipv6={0x86dd, @icmpv6={0x1, 0x6, "fbddf0", 0x40, 0x3a, 0xff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @mcast2, {[], @dest_unreach={0x1, 0x1, 0x0, 0x1b, '\x00', {0x2, 0x6, "5cdb66", 0x9, 0x2c, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, [@dstopts={0x2f}], "88edd4e5e292aaae"}}}}}}}, 0x0) 13m31.76721583s ago: executing program 3 (id=8052): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000100)='.\x00', &(0x7f0000000300)='./file0/../file0\x00', 0x0, 0x2151090, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) umount2(&(0x7f0000000180)='./file0/file0\x00', 0x0) 13m31.589203421s ago: executing program 3 (id=8053): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000340)="fb", 0x1, 0x20000845, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) 13m31.480356558s ago: executing program 3 (id=8054): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syslog(0x2, 0xffffffffffffffff, 0x3a) r0 = openat$userfaultfd(0xffffffffffffff9c, &(0x7f0000000040), 0x80800, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKDISCARDZEROES(r1, 0x127c, 0x0) timer_create(0x6, 0x0, 0x0) 13m31.480135188s ago: executing program 35 (id=8054): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) syslog(0x2, 0xffffffffffffffff, 0x3a) r0 = openat$userfaultfd(0xffffffffffffff9c, &(0x7f0000000040), 0x80800, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$BLKDISCARDZEROES(r1, 0x127c, 0x0) timer_create(0x6, 0x0, 0x0) 12m31.781483274s ago: executing program 4 (id=8176): r0 = socket(0x80000000000000a, 0x1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x20000}}, {{0xa, 0x0, 0x40000, @dev={0xfe, 0x80, '\x00', 0x26}}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x0, @loopback}}}, 0x108) close(r0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0xb, &(0x7f0000000080)={&(0x7f0000000340)=@newlink={0x30, 0x10, 0x801, 0x0, 0x25dfdbfc, {}, [@IFLA_MTU={0x8, 0x4, 0x44}, @IFLA_GROUP={0x8}]}, 0x30}}, 0x0) 11m49.378578843s ago: executing program 4 (id=8178): r0 = io_uring_setup(0x31fd, &(0x7f0000000400)={0x0, 0x52e1, 0x8, 0x0, 0x9a}) io_uring_register$IORING_REGISTER_IOWQ_MAX_WORKERS(r0, 0x13, &(0x7f0000000480)=[0x0, 0x2], 0x2) 11m48.970548349s ago: executing program 4 (id=8180): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000040)={0x0, 0xe733, 0x1, 0x7, 0x4, "05e7a1196ed078fca75615f8e6be60ec027645", 0x200a, 0xd}) 11m48.506360989s ago: executing program 4 (id=8182): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x4e22, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x0) 11m12.131970908s ago: executing program 4 (id=8184): r0 = gettid() timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x4, @tid=r0}, &(0x7f0000000000)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(0x0, 0x1, &(0x7f0000000040), 0x0) keyctl$instantiate(0xc, 0x0, 0x0, 0x2a, 0xfffffffffffffffc) 11m10.958835054s ago: executing program 4 (id=8188): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x4e22, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x0) 10m25.362486629s ago: executing program 36 (id=8188): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x4e22, @loopback}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000000), 0x20000328) setsockopt$inet_msfilter(r0, 0x0, 0x29, 0x0, 0x0) 10m1.280022675s ago: executing program 5 (id=8202): socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x803, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) waitid(0x1, r1, 0x0, 0x4, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r2 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000740)=ANY=[@ANYBLOB="50000000100003040000000000000000f200", @ANYBLOB="00000000000000002800128009000100766c616e000000001800028006000100010000000c000200540a00001800000008000500", @ANYRES32], 0x50}, 0x1, 0xba01}, 0x0) r3 = socket(0x10, 0x3, 0x0) sendmsg$kcm(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x404c080) write(r3, &(0x7f0000000000)="2400000011005f0414f9f40700090400810000000d0000000000000008000f0001000000", 0x24) 9m59.561081736s ago: executing program 5 (id=8203): r0 = socket$inet6(0xa, 0x3, 0x10) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x3, @mcast2, 0x5}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000001e40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00)\x00\x00\x002'], 0x28}}], 0x1, 0x20042004) sendmmsg$inet6(r0, &(0x7f0000001980)=[{{0x0, 0x0, 0x0}}], 0x20, 0x4004844) 9m59.240999086s ago: executing program 5 (id=8204): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@func={0x3}]}}, &(0x7f0000000b80)=""/4096, 0x26, 0x1000, 0x1}, 0x28) 9m59.067279898s ago: executing program 5 (id=8205): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000013c0)={{r0}, &(0x7f0000001340), &(0x7f0000001380)='%pI4 \x00'}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) 9m58.830507563s ago: executing program 5 (id=8206): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x34, 0x24, 0xd0f, 0x0, 0x4, {0x60, 0x0, 0x0, r1, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_cake={{0x9}, {0x4}}]}, 0x34}}, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) read$FUSE(0xffffffffffffffff, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) sendto$packet(r2, &(0x7f0000000180)="0b0312002e0064000200475400f6a13bb1000000086086dd4803", 0x100a6, 0x0, &(0x7f0000000140)={0x11, 0x8100, r3}, 0x14) 9m58.459473157s ago: executing program 5 (id=8207): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@ptr, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x2000, [{0x0, 0x1}]}]}}, &(0x7f0000000100)=""/226, 0x3e, 0xe2, 0x1}, 0x20) 9m43.721588529s ago: executing program 6 (id=8209): fcntl$lock(0xffffffffffffffff, 0x25, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000000c0)='tracefs\x00', 0x1214040, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000002180)='./file0\x00', 0x0, 0x0) getdents64(r3, &(0x7f0000000580)=""/174, 0xff56) 9m40.058798395s ago: executing program 6 (id=8210): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0x62d81) ioctl$SNDRV_SEQ_IOCTL_GET_PORT_INFO(r0, 0xc0a85322, 0x0) 9m39.878460557s ago: executing program 6 (id=8211): bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8a2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x3f, &(0x7f0000000080)=0x1, 0x4) bind$inet(r0, &(0x7f0000000480)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x28040041, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x10, 0x4) sendmsg$inet(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="1f", 0x1}], 0x1}, 0x8c0) recvmmsg(r0, &(0x7f00000005c0), 0x40000000000026c, 0x0, 0x0) 9m39.594255075s ago: executing program 6 (id=8212): prlimit64(0x0, 0xe, &(0x7f0000000600)={0x9, 0x20000008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb, 0x4008032, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000100)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f00000000c0)='./file1\x00') symlinkat(&(0x7f0000000400)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00') setpgid(0x0, 0x0) 9m31.00931154s ago: executing program 6 (id=8213): close(0x3) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD_OLD(r0, 0x40045402, &(0x7f0000000140)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000083c0)={{0x3}}) r1 = syz_io_uring_setup(0x88b, &(0x7f0000000240)={0x0, 0xa5e6, 0x800, 0x2003, 0x276}, &(0x7f00000001c0)=0x0, &(0x7f0000000200)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r1, 0x47f6, 0x4, 0x0, 0x0, 0xfffffffffffffea4) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f00000000c0)={0x7, 0x9dc5, 0x0, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) 9m30.730038578s ago: executing program 6 (id=8214): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x2000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2c, &(0x7f00000005c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) unshare(0x64000600) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x70}, 0x1, 0x7}, 0x0) r5 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x184) fcntl$lock(r5, 0x24, &(0x7f0000000400)={0x0, 0x1, 0x101, 0x80000001}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000400)) sendmsg$NL80211_CMD_VENDOR(r6, 0x0, 0x0) 9m12.641695896s ago: executing program 37 (id=8207): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001380)={&(0x7f0000001200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@ptr, @struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x2000, [{0x0, 0x1}]}]}}, &(0x7f0000000100)=""/226, 0x3e, 0xe2, 0x1}, 0x20) 8m45.63834766s ago: executing program 38 (id=8214): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x2000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x2a, 0x0, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x2c, &(0x7f00000005c0)={0x1, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) unshare(0x64000600) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r4, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000180)=ANY=[@ANYBLOB], 0x70}, 0x1, 0x7}, 0x0) r5 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x184) fcntl$lock(r5, 0x24, &(0x7f0000000400)={0x0, 0x1, 0x101, 0x80000001}) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) timerfd_gettime(0xffffffffffffffff, &(0x7f0000000400)) sendmsg$NL80211_CMD_VENDOR(r6, 0x0, 0x0) 6m57.672945885s ago: executing program 8 (id=8246): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) getpid() sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x3, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x5, 0x0, 0xc, 0x9, 0x0, 0x1, 0x2000000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xc, 0x9, 0x0, 0x0, 0x80ffffff}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0x5}, {0x18, 0x2, 0x2, 0x0, r3}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 6m39.160523315s ago: executing program 8 (id=8249): bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r0, 0x8982, &(0x7f00000006c0)={0x0, 'bridge0\x00', {0x101}, 0x2}) r1 = socket$netlink(0x10, 0x3, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000700)=ANY=[@ANYBLOB="300000001000010800"/20, @ANYRES32=0x0, @ANYBLOB="000900006440000008001b0000000000050010000400"], 0x30}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4004040) write$tcp_mem(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x2d, 0x0, 0x3a, 0xfffffffffffffffe, 0x2c}, 0x48) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newqdisc={0x54, 0x10, 0x1, 0x70bd25, 0x25dfdbfc, {0x6, 0x0, 0x8100, r4, {0x1, 0x10}, {0xfff1}, {0xe, 0x10}}, [@TCA_RATE={0x6, 0x5, {0xfc}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x11, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x400c800}, 0x0) 6m38.62060112s ago: executing program 8 (id=8250): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000140), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0x2b, 'pids'}]}, 0x6) 6m38.429478003s ago: executing program 8 (id=8251): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000540)=@ipv6_newroute={0x28, 0x18, 0x1, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, 0xff, 0x3, 0xfd, 0x9}, [@RTA_METRICS={0x4}, @RTA_MARK={0x8, 0x10, 0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0x84}, 0x0) r1 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x405c5504, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x103a42, 0x32) copy_file_range(r2, 0x0, r2, &(0x7f00000004c0)=0x100, 0x9, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="020000000400000006000000aa0b"], 0x48) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000003c0)={0x0, &(0x7f00000002c0)=""/251, &(0x7f0000000940), &(0x7f0000000200), 0xa7c, r4}, 0x38) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, 0x0, &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r2}, 0x94) close(r5) socket$inet6(0xa, 0x2, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000580)=ANY=[], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r6}, 0x0, &(0x7f0000000180)=r5}, 0x20) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x48, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x80}, [@IFLA_LINKINFO={0x28, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x18, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x80}, 0x0) 6m35.421270169s ago: executing program 8 (id=8254): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x24}}, 0x0) getsockname$packet(r1, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000440)=0x14) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001000050700"/20, @ANYRES32=r2, @ANYBLOB="0000000000000000280012000900010076657468"], 0x48}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000740)=@newqdisc={0x60, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x34, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{}, {}, 0x0, 0x0, 0x200}}, @TCA_TBF_BURST={0x8, 0x6, 0x58}]}}]}, 0x60}}, 0x0) 6m34.820076169s ago: executing program 8 (id=8255): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ptrace$getregset(0x4204, r0, 0x6, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000380)={[0xd]}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x44, 0x6, 0x510, 0x3a8, 0x210, 0x210, 0x0, 0x138, 0x478, 0x478, 0x478, 0x478, 0x478, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x570) 5m49.466408064s ago: executing program 39 (id=8255): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ptrace$getregset(0x4204, r0, 0x6, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ppoll(0x0, 0x0, &(0x7f0000000300), &(0x7f0000000380)={[0xd]}, 0x8) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000001640)=@mangle={'mangle\x00', 0x44, 0x6, 0x510, 0x3a8, 0x210, 0x210, 0x0, 0x138, 0x478, 0x478, 0x478, 0x478, 0x478, 0x6, 0x0, {[{{@ip={@broadcast, @multicast1=0xe0007600, 0x11000000, 0x0, 'geneve1\x00', 'ip6gre0\x00'}, 0x0, 0x70, 0x98}, @inet=@DSCP={0x28}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @local, 0x0, 0x0, 'batadv_slave_1\x00', 'veth1_virt_wifi\x00', {}, {}, 0x11}, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @local}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'vlan1\x00', 'nr0\x00'}, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@unspec=@connlimit={{0x40}}]}, @unspec=@CHECKSUM={0x28}}, {{@ip={@loopback, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth1_to_team\x00'}, 0x0, 0x70, 0x198}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x0, 'system_u:object_r:dbusd_etc_t:s0\x00'}}}, {{@ip={@broadcast, @multicast2, 0x0, 0x0, 'lo\x00', 'batadv_slave_1\x00'}, 0x0, 0xa0, 0xd0, 0x0, {}, [@common=@unspec=@mac={{0x30}, {@multicast}}]}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x0, 0x0, @loopback}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x570) 3m33.440020278s ago: executing program 7 (id=8317): getpid() openat$binderfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0xf, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(0xffffffffffffffff, 0xc02064b2, &(0x7f0000000180)={0x9, 0x10, 0xffff}) ioctl$DRM_IOCTL_MODE_GETFB2(0xffffffffffffffff, 0xc06864ce, 0x0) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000280)='/sys/kernel/debug/binder/state\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, 0x0, &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$RTC_SET_TIME(r3, 0x4024700a, &(0x7f0000000040)={0xfffffffe, 0x2c, 0x0, 0x6, 0x0, 0xa9, 0x3, 0x2, 0x1}) 3m18.946451236s ago: executing program 7 (id=8319): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0xe2981) mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0xfffffffc}}, &(0x7f0000000300)='syzkaller\x00'}, 0x90) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r6, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32={[0x2600, 0x0, 0x2000]}}], 0xffc8) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 2m59.888922871s ago: executing program 7 (id=8322): socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) socket$igmp(0x2, 0x3, 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) r3 = socket(0x10, 0x2, 0x0) write(r3, &(0x7f0000000040)="1c0000001a009b8a140000003b9b301f00"/28, 0x1c) recvmmsg(r3, &(0x7f0000002ec0), 0x400000000000ec0, 0x2, &(0x7f00000001c0)={0x77359400}) io_uring_register$IORING_REGISTER_BUFFERS2(0xffffffffffffffff, 0xf, 0x0, 0x0) 2m49.398595017s ago: executing program 7 (id=8327): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x20000000) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000000)='erofs\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x64, 0x3, 0x300, 0x6e, 0xffffffad, 0x190, 0x190, 0x190, 0x268, 0x268, 0x268, 0x268, 0x268, 0x3, 0x0, {[{{@ip={@remote, @local={0xac, 0x14, 0xd}, 0x0, 0x0, 'caif0\x00', 'ip6tnl0\x00'}, 0x0, 0x130, 0x190, 0xffffffc5, {}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'bm\x00', "bdc74c01369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa6ecab6b1d2cc05e3182f64694d7d05fb8b8c8f56627a54f905d564eeeb8334f650ca0f3c44f7fda4d20a55050342ea85ecc8838e7088de33582f36a0a375bb7008adc297a5ece1bb2df53d17bef26bb6f800", 0x7f, 0x2}}]}, @common=@SET={0x60}}, {{@ip={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1, 0x0, 0x0, 'team0\x00', 'team0\x00'}, 0x0, 0x98, 0xd8, 0x0, {}, [@common=@inet=@set1={{0x28}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x360) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000140)=0x6) 2m37.829986004s ago: executing program 7 (id=8329): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x0, 0x2, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f0000000100)=@gcm_128={{0x304}, "87ee8ac6c46dad33", "2607080d7f4fcf00fd4ef2dece6c7c58", "000600", "230000fff600fcff"}, 0x28) sendmsg$inet(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000240)}], 0x1}, 0x0) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000680)=@gcm_128={{0x304}, "000037d7009400", "c0b6b5b29ca29838d41ac2dc3e6e05e0", "e9be1ec3", "8d7869391934e667"}, 0x28) read(r3, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') 2m23.680217249s ago: executing program 7 (id=8336): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x4, 0x1}, 0x48) 1m38.322267604s ago: executing program 40 (id=8336): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x1e, 0x0, 0x4, 0xff, 0x4, 0x1}, 0x48) 22.819399832s ago: executing program 0 (id=8390): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32={[0x2600, 0x0, 0x2000]}}], 0xffc8) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 9.309910741s ago: executing program 0 (id=8396): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000002c0)={0x0, @in={0x2, 0x4e20, @local}, @nfc={0x27, 0x0, 0xffffffffffffffff, 0x7}, @xdp={0x2c, 0x0, 0x0, 0x2e}, 0x400, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x7, 0xb}) 9.198073559s ago: executing program 0 (id=8397): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x10) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000002140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_fuse_handle_req(r0, &(0x7f0000004180)="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", 0x2000, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)={0x90, 0x0, 0x0, {0x4, 0x5, 0x0, 0x8, 0x0, 0x0, {0x200000000000, 0x203, 0x6, 0xffff, 0x0, 0xfffffffffffffffc, 0x7f, 0x0, 0x120, 0x2000, 0x0, r2, 0x0, 0xfc24, 0x4}}}, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_INIT(r0, &(0x7f0000000440)={0x50, 0x0, r1, {0x7, 0x29, 0x2, 0x14c0348, 0x40, 0x1, 0xfffffff1, 0x0, 0x0, 0x0, 0x80, 0x7fffffff}}, 0x50) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0/file0\x00', 0x103880, 0x60) 9.035699939s ago: executing program 0 (id=8398): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f00000001c0)=0x1, 0x4) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e24, @loopback}, 0x10) sendmmsg$inet(r0, &(0x7f0000004980)=[{{&(0x7f0000000000)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000340)="b9cd14c222ee", 0x4b}], 0x1}}], 0x1, 0x20008000) setsockopt$inet_tcp_TLS_TX(r0, 0x6, 0x1, &(0x7f0000000140)=@gcm_128={{0x303}, "60000100", "9de66ebc3914c06f0f109088d190e700", "000e3102", "f8dd000000000092"}, 0x28) 8.359777373s ago: executing program 0 (id=8399): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) r2 = socket$can_j1939(0x1d, 0x2, 0x7) connect(r2, &(0x7f0000000280)=@can={0x1d, r1}, 0x80) 8.220234362s ago: executing program 0 (id=8400): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000040), r2) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0xc08c5332, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32={[0x2600, 0x0, 0x2000]}}], 0xffc8) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 1.322457763s ago: executing program 9 (id=8407): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000000)={0x0, 0x8, [@remote, @multicast, @local, @local, @random="6c64f4fd7562", @multicast, @remote, @random="19f8f78aa8b9"]}) 1.131080986s ago: executing program 9 (id=8408): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5d}, 0x94) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(0xffffffffffffffff, &(0x7f0000000180)={0x4, 0xffffff95, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x29fdf) r0 = syz_io_uring_setup(0x656f, &(0x7f0000000140)={0x0, 0xbbda, 0x13500, 0x0, 0x2b5}, &(0x7f0000000240), &(0x7f0000000480)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x21, &(0x7f0000000440), 0x1) 863.532953ms ago: executing program 9 (id=8409): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) r2 = socket$can_j1939(0x1d, 0x2, 0x7) connect(r2, &(0x7f0000000280)=@can={0x1d, r1}, 0x80) 660.280847ms ago: executing program 9 (id=8410): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) r1 = fsopen(&(0x7f0000000180)='hugetlbfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) fchdir(r2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0xc0042, 0x8) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r3, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000001c0)=@gcm_256={{0x304}, "6ae04425ace3f60c", "acba84f0a6711f234db5aaa13f382ad796bd667c9e00000009873931d2873103", "0f9dafb4", "ec3fff9afd96e6c0"}, 0x38) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000040)=0x2, 0x4) ioctl$int_in(r0, 0x5421, &(0x7f0000000140)=0x1) writev(r0, &(0x7f0000000080)=[{&(0x7f00000002c0)="ec", 0xfdef}], 0x1) 210.701246ms ago: executing program 9 (id=8411): capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000001080)={0x200000, 0x200000}) clock_adjtime(0x0, &(0x7f0000000140)={0x1, 0x0, 0x2, 0x0, 0x800000, 0xfffffffffffffffd, 0xe00, 0xfffffffffffffffc, 0xff, 0x6, 0x400000000000000, 0xc53, 0x0, 0x3, 0x0, 0x2, 0x0, 0x4, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2}) 0s ago: executing program 9 (id=8412): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi3\x00', 0x400, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f00000000c0)={'8255\x00', [0x4f37, 0x5, 0x2, 0x401, 0x1, 0xcc7, 0xfff, 0x5c95239d, 0x5, 0x3ff, 0x802, 0x1600, 0x1, 0x1, 0x9, 0xe1cb, 0x20000006, 0x4, 0x3, 0x395, 0x40000005, 0xfffffffd, 0x1, 0xfffffff5, 0xffffeadd, 0x3, 0x3a, 0x8, 0x4, 0x8000000, 0xdffffffa]}) kernel console output (not intermixed with test programs): denied { bpf } for pid=29467 comm="syz.8.8249" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4969.785835][ T29] audit: type=1400 audit(4969.730:69489): avc: denied { perfmon } for pid=29467 comm="syz.8.8249" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4969.789705][ T29] audit: type=1400 audit(4969.730:69490): avc: denied { create } for pid=29467 comm="syz.8.8249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4969.798746][ T29] audit: type=1400 audit(4969.740:69491): avc: denied { create } for pid=29467 comm="syz.8.8249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4969.841886][ T29] audit: type=1400 audit(4969.780:69492): avc: denied { create } for pid=29467 comm="syz.8.8249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4969.847033][ T29] audit: type=1400 audit(4969.790:69493): avc: denied { ioctl } for pid=29467 comm="syz.8.8249" path="socket:[81734]" dev="sockfs" ino=81734 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 4969.849672][ T29] audit: type=1400 audit(4969.790:69494): avc: denied { module_request } for pid=29467 comm="syz.8.8249" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4969.992684][ T29] audit: type=1400 audit(4969.930:69495): avc: denied { sys_module } for pid=29467 comm="syz.8.8249" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 4969.995229][ T29] audit: type=1400 audit(4969.930:69496): avc: denied { module_request } for pid=29467 comm="syz.8.8249" kmod="bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 4970.117323][T29468] netlink: 'syz.8.8249': attribute type 16 has an invalid length. [ 4970.117777][T29468] netlink: 'syz.8.8249': attribute type 17 has an invalid length. [ 4970.589221][T29474] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 4970.589669][T29474] IPv6: NLM_F_CREATE should be set when creating new route [ 4973.841563][T29483] netlink: 24 bytes leftover after parsing attributes in process `syz.8.8254'. [ 4973.915346][T29483] sch_tbf: burst 88 is lower than device ip6tnl1 mtu (1452) ! [ 4976.281436][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 4976.286931][ T29] audit: type=1400 audit(4976.220:69520): avc: denied { setopt } for pid=29477 comm="syz.7.8253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4976.754945][ T29] audit: type=1400 audit(4976.690:69521): avc: denied { create } for pid=29477 comm="syz.7.8253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4976.757936][ T29] audit: type=1400 audit(4976.690:69522): avc: denied { write } for pid=29477 comm="syz.7.8253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 4976.760063][ T29] audit: type=1400 audit(4976.700:69523): avc: denied { accept } for pid=29477 comm="syz.7.8253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4976.787960][ T29] audit: type=1400 audit(4976.700:69524): avc: denied { read } for pid=29477 comm="syz.7.8253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 4977.409870][ T29] audit: type=1400 audit(4977.350:69525): avc: denied { name_bind } for pid=29487 comm="syz.7.8256" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 4977.410475][ T29] audit: type=1400 audit(4977.350:69526): avc: denied { node_bind } for pid=29487 comm="syz.7.8256" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 4977.441714][ T29] audit: type=1400 audit(4977.380:69527): avc: denied { read } for pid=29487 comm="syz.7.8256" dev="nsfs" ino=4026532982 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4977.442805][ T29] audit: type=1400 audit(4977.380:69528): avc: denied { open } for pid=29487 comm="syz.7.8256" path="net:[4026532982]" dev="nsfs" ino=4026532982 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 4977.476072][ T29] audit: type=1400 audit(4977.390:69529): avc: denied { create } for pid=29487 comm="syz.7.8256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 4981.460862][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 4981.463503][ T29] audit: type=1400 audit(4981.400:69535): avc: denied { write } for pid=29487 comm="syz.7.8256" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4981.463806][ T29] audit: type=1400 audit(4981.400:69536): avc: denied { open } for pid=29487 comm="syz.7.8256" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4981.479302][ T29] audit: type=1400 audit(4981.420:69537): avc: denied { prog_load } for pid=29487 comm="syz.7.8256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4981.491147][ T29] audit: type=1400 audit(4981.430:69538): avc: denied { bpf } for pid=29487 comm="syz.7.8256" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4981.491622][ T29] audit: type=1400 audit(4981.430:69539): avc: denied { perfmon } for pid=29487 comm="syz.7.8256" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 4981.491703][ T29] audit: type=1400 audit(4981.430:69540): avc: denied { prog_run } for pid=29487 comm="syz.7.8256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 4981.497317][ T29] audit: type=1400 audit(4981.440:69541): avc: denied { ioctl } for pid=29487 comm="syz.7.8256" path="/dev/snd/seq" dev="devtmpfs" ino=720 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4992.835061][ T29] audit: type=1400 audit(4992.770:69542): avc: denied { read } for pid=29495 comm="syz.7.8258" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4992.835891][ T29] audit: type=1400 audit(4992.780:69543): avc: denied { open } for pid=29495 comm="syz.7.8258" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4992.840572][ T29] audit: type=1400 audit(4992.780:69544): avc: denied { ioctl } for pid=29495 comm="syz.7.8258" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4992.870618][ T29] audit: type=1400 audit(4992.810:69545): avc: denied { create } for pid=29495 comm="syz.7.8258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4992.877436][ T29] audit: type=1400 audit(4992.820:69546): avc: denied { read } for pid=29495 comm="syz.7.8258" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4992.879356][ T29] audit: type=1400 audit(4992.820:69547): avc: denied { read open } for pid=29495 comm="syz.7.8258" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 4992.888088][T29496] syzkaller0: entered promiscuous mode [ 4992.888846][T29496] syzkaller0: entered allmulticast mode [ 4992.902961][ T29] audit: type=1400 audit(4992.840:69548): avc: denied { setopt } for pid=29495 comm="syz.7.8258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4992.906496][ T29] audit: type=1400 audit(4992.850:69549): avc: denied { write } for pid=29495 comm="syz.7.8258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4993.133229][ T29] audit: type=1400 audit(4993.070:69550): avc: denied { create } for pid=29501 comm="syz.7.8259" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 4993.266315][ T29] audit: type=1400 audit(4993.210:69551): avc: denied { prog_load } for pid=29503 comm="syz.7.8260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5002.791138][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 5002.794414][ T29] audit: type=1400 audit(5002.730:69557): avc: denied { write } for pid=29507 comm="syz.7.8261" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5002.795495][ T29] audit: type=1400 audit(5002.730:69558): avc: denied { open } for pid=29507 comm="syz.7.8261" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5002.800062][ T29] audit: type=1400 audit(5002.740:69559): avc: denied { ioctl } for pid=29507 comm="syz.7.8261" path="/dev/snd/seq" dev="devtmpfs" ino=720 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5003.148608][ T29] audit: type=1400 audit(5003.090:69560): avc: denied { prog_load } for pid=29509 comm="syz.7.8262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5003.151755][ T29] audit: type=1400 audit(5003.090:69561): avc: denied { bpf } for pid=29509 comm="syz.7.8262" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5003.163582][ T29] audit: type=1400 audit(5003.100:69562): avc: denied { execmem } for pid=29509 comm="syz.7.8262" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5013.312292][ T29] audit: type=1400 audit(5013.250:69563): avc: denied { create } for pid=29515 comm="syz.7.8264" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5013.488922][ T29] audit: type=1400 audit(5013.430:69564): avc: denied { execmem } for pid=29517 comm="syz.7.8265" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5019.556236][ T29] audit: type=1400 audit(5019.500:69565): avc: denied { execute } for pid=29521 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5019.560139][ T29] audit: type=1400 audit(5019.500:69566): avc: denied { execute_no_trans } for pid=29521 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5019.580316][ T29] audit: type=1400 audit(5019.520:69567): avc: denied { execute } for pid=29521 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5019.628654][ T29] audit: type=1400 audit(5019.560:69568): avc: denied { execmem } for pid=29521 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5019.681544][ T29] audit: type=1400 audit(5019.620:69569): avc: denied { read } for pid=29522 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5019.683669][ T29] audit: type=1400 audit(5019.620:69570): avc: denied { read open } for pid=29522 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5019.699284][ T29] audit: type=1400 audit(5019.640:69571): avc: denied { mounton } for pid=29522 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 5019.755477][ T29] audit: type=1400 audit(5019.700:69572): avc: denied { module_request } for pid=29522 comm="syz-executor" kmod="netdev-nr9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5019.985834][ T29] audit: type=1400 audit(5019.930:69573): avc: denied { sys_module } for pid=29522 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5019.987327][ T29] audit: type=1400 audit(5019.930:69574): avc: denied { module_request } for pid=29522 comm="syz-executor" kmod="nr9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5022.802515][T29522] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 5022.810410][T29522] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 5023.861989][T29522] hsr_slave_0: entered promiscuous mode [ 5023.863496][T29522] hsr_slave_1: entered promiscuous mode [ 5023.879335][T29522] debugfs: 'hsr0' already exists in 'hsr' [ 5023.879626][T29522] Cannot create hsr debugfs directory [ 5024.517259][T29522] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 5024.538103][T29522] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 5024.551709][T29522] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 5024.572828][T29522] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 5024.598154][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 5024.598354][ T29] audit: type=1400 audit(5024.540:69616): avc: denied { create } for pid=29522 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5024.607861][ T29] audit: type=1400 audit(5024.550:69617): avc: denied { write } for pid=29522 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5024.615127][ T29] audit: type=1400 audit(5024.560:69618): avc: denied { read } for pid=29522 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5024.625286][ T29] audit: type=1400 audit(5024.570:69619): avc: denied { write } for pid=29522 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5024.648545][ T29] audit: type=1400 audit(5024.590:69620): avc: denied { read } for pid=29522 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5024.650985][ T29] audit: type=1400 audit(5024.590:69621): avc: denied { write } for pid=29522 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5024.698553][ T29] audit: type=1400 audit(5024.630:69622): avc: denied { read } for pid=29522 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5024.701809][ T29] audit: type=1400 audit(5024.640:69623): avc: denied { write } for pid=29522 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5024.743204][ T29] audit: type=1400 audit(5024.680:69624): avc: denied { read } for pid=29522 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5024.793337][ T29] audit: type=1400 audit(5024.730:69625): avc: denied { module_request } for pid=29522 comm="syz-executor" kmod="netdev-bridge0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5026.087471][T29522] 8021q: adding VLAN 0 to HW filter on device bond0 [ 5029.642578][ T29] kauditd_printk_skb: 60 callbacks suppressed [ 5029.647693][ T29] audit: type=1400 audit(5029.580:69686): avc: denied { module_request } for pid=29522 comm="syz-executor" kmod="netdev-netdevsim9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5029.745277][ T29] audit: type=1400 audit(5029.690:69687): avc: denied { sys_module } for pid=29522 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5029.745772][ T29] audit: type=1400 audit(5029.690:69688): avc: denied { module_request } for pid=29522 comm="syz-executor" kmod="netdevsim9" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5030.030839][ T29] audit: type=1400 audit(5029.970:69689): avc: denied { allowed } for pid=29831 comm="syz.7.8268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5030.038301][ T29] audit: type=1400 audit(5029.980:69690): avc: denied { create } for pid=29831 comm="syz.7.8268" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5030.041194][ T29] audit: type=1400 audit(5029.980:69691): avc: denied { map } for pid=29831 comm="syz.7.8268" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=82045 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5030.044489][ T29] audit: type=1400 audit(5029.980:69692): avc: denied { read write } for pid=29831 comm="syz.7.8268" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=82045 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5030.067577][ T29] audit: type=1400 audit(5030.010:69693): avc: denied { map } for pid=29831 comm="syz.7.8268" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=82045 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5030.091635][ T29] audit: type=1400 audit(5030.030:69694): avc: denied { read write } for pid=29831 comm="syz.7.8268" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=82045 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5030.126513][ T29] audit: type=1400 audit(5030.060:69695): avc: denied { module_request } for pid=29522 comm="syz-executor" kmod="netdev-virt_wifi0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5031.253002][T29522] veth0_vlan: entered promiscuous mode [ 5031.288789][T29522] veth1_vlan: entered promiscuous mode [ 5031.380058][T29522] veth0_macvtap: entered promiscuous mode [ 5031.407258][T29522] veth1_macvtap: entered promiscuous mode [ 5031.538359][T15583] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 5031.540418][T15583] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 5031.543681][T15583] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 5031.549103][T15583] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 5034.752432][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 5034.753567][ T29] audit: type=1400 audit(5034.690:69737): avc: denied { write } for pid=29842 comm="syz.7.8271" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5034.757770][ T29] audit: type=1400 audit(5034.700:69738): avc: denied { open } for pid=29842 comm="syz.7.8271" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5034.774847][ T29] audit: type=1400 audit(5034.710:69739): avc: denied { prog_load } for pid=29842 comm="syz.7.8271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5034.775276][ T29] audit: type=1400 audit(5034.710:69740): avc: denied { bpf } for pid=29842 comm="syz.7.8271" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5034.775408][ T29] audit: type=1400 audit(5034.710:69741): avc: denied { perfmon } for pid=29842 comm="syz.7.8271" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5034.817576][ T29] audit: type=1400 audit(5034.730:69742): avc: denied { bpf } for pid=29842 comm="syz.7.8271" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5034.817960][ T29] audit: type=1400 audit(5034.730:69743): avc: denied { prog_run } for pid=29842 comm="syz.7.8271" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5036.152684][ T29] audit: type=1400 audit(5036.090:69744): avc: denied { create } for pid=29853 comm="syz.9.8275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5036.170986][ T29] audit: type=1400 audit(5036.110:69745): avc: denied { connect } for pid=29853 comm="syz.9.8275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 5036.177354][ T29] audit: type=1400 audit(5036.120:69746): avc: denied { read } for pid=29853 comm="syz.9.8275" name="fb0" dev="devtmpfs" ino=616 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5050.686922][T24361] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5050.737792][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 5050.738776][ T29] audit: type=1400 audit(5050.680:69763): avc: denied { write } for pid=29859 comm="syz.7.8276" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5050.746273][ T29] audit: type=1400 audit(5050.680:69764): avc: denied { open } for pid=29859 comm="syz.7.8276" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5050.749749][ T29] audit: type=1400 audit(5050.690:69765): avc: denied { ioctl } for pid=29859 comm="syz.7.8276" path="/dev/snd/seq" dev="devtmpfs" ino=720 ioctlcmd=0x5332 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5050.761895][T24361] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5050.849890][T24361] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5050.940306][T24361] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5051.180720][ T29] audit: type=1400 audit(5051.120:69766): avc: denied { execmem } for pid=29861 comm="syz.7.8277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5051.263545][T24361] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5051.271910][T24361] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5051.284895][T24361] bond0 (unregistering): Released all slaves [ 5051.375961][T24361] hsr_slave_0: left promiscuous mode [ 5051.390091][T24361] hsr_slave_1: left promiscuous mode [ 5051.407548][T24361] veth1_macvtap: left promiscuous mode [ 5051.407872][T24361] veth0_macvtap: left promiscuous mode [ 5051.408120][T24361] veth1_vlan: left promiscuous mode [ 5051.408287][T24361] veth0_vlan: left promiscuous mode [ 5052.840579][ T29] audit: type=1400 audit(5052.780:69767): avc: denied { write } for pid=29876 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5052.845298][ T29] audit: type=1400 audit(5052.790:69768): avc: denied { open } for pid=29876 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5053.136495][ T29] audit: type=1400 audit(5053.080:69769): avc: denied { write } for pid=29877 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5053.136998][ T29] audit: type=1400 audit(5053.080:69770): avc: denied { open } for pid=29877 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5053.141674][ T29] audit: type=1400 audit(5053.080:69771): avc: denied { create } for pid=29878 comm="syz.9.8278" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5053.152485][ T29] audit: type=1400 audit(5053.090:69772): avc: denied { search } for pid=29877 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5055.885816][ T29] kauditd_printk_skb: 786 callbacks suppressed [ 5055.892260][ T29] audit: type=1400 audit(5055.830:70559): avc: denied { search } for pid=29898 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5055.893585][ T29] audit: type=1400 audit(5055.830:70560): avc: denied { search } for pid=29898 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5055.895712][ T29] audit: type=1400 audit(5055.830:70561): avc: denied { search } for pid=29898 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5055.928239][ T29] audit: type=1400 audit(5055.870:70562): avc: denied { search } for pid=29891 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5056.304640][ T29] audit: type=1400 audit(5056.240:70563): avc: denied { map_create } for pid=29884 comm="syz.9.8280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5056.338040][ T29] audit: type=1400 audit(5056.250:70564): avc: denied { read } for pid=29884 comm="syz.9.8280" name="pcmC0D0c" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5056.338476][ T29] audit: type=1400 audit(5056.260:70565): avc: denied { read open } for pid=29884 comm="syz.9.8280" path="/dev/snd/pcmC0D0c" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5056.338555][ T29] audit: type=1400 audit(5056.270:70566): avc: denied { ioctl } for pid=29884 comm="syz.9.8280" path="/dev/snd/pcmC0D0c" dev="devtmpfs" ino=724 ioctlcmd=0x4124 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5056.695041][ T29] audit: type=1400 audit(5056.440:70567): avc: denied { write } for pid=29900 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5056.697969][ T29] audit: type=1400 audit(5056.440:70568): avc: denied { write open } for pid=29900 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5061.013544][ T29] kauditd_printk_skb: 801 callbacks suppressed [ 5061.016691][ T29] audit: type=1400 audit(5060.950:71370): avc: denied { write } for pid=29919 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5061.018335][ T29] audit: type=1400 audit(5060.950:71371): avc: denied { open } for pid=29919 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5061.569800][ T29] audit: type=1400 audit(5061.510:71372): avc: denied { write } for pid=29921 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5061.570283][ T29] audit: type=1400 audit(5061.510:71373): avc: denied { open } for pid=29921 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5070.963142][ T29] audit: type=1400 audit(5070.900:71374): avc: denied { write } for pid=29934 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5070.963657][ T29] audit: type=1400 audit(5070.900:71375): avc: denied { open } for pid=29934 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5071.021229][ T29] audit: type=1400 audit(5070.960:71376): avc: denied { search } for pid=29934 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5071.021709][ T29] audit: type=1400 audit(5070.960:71377): avc: denied { search } for pid=29934 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5071.021802][ T29] audit: type=1400 audit(5070.960:71378): avc: denied { search } for pid=29934 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5071.021928][ T29] audit: type=1400 audit(5070.960:71379): avc: denied { search } for pid=29934 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5071.065085][ T29] audit: type=1400 audit(5071.000:71380): avc: denied { search } for pid=29935 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5071.065485][ T29] audit: type=1400 audit(5071.010:71381): avc: denied { search } for pid=29935 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5071.065574][ T29] audit: type=1400 audit(5071.010:71382): avc: denied { search } for pid=29935 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5071.069710][ T29] audit: type=1400 audit(5071.010:71383): avc: denied { read open } for pid=29935 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5075.996098][ T29] kauditd_printk_skb: 1227 callbacks suppressed [ 5075.997370][ T29] audit: type=1400 audit(5075.940:72611): avc: denied { search } for pid=29960 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5076.000065][ T29] audit: type=1400 audit(5075.940:72612): avc: denied { search } for pid=29960 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5076.003090][ T29] audit: type=1400 audit(5075.940:72613): avc: denied { search } for pid=29960 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5076.007046][ T29] audit: type=1400 audit(5075.950:72614): avc: denied { getattr } for pid=29960 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth30.ipv4ll" dev="tmpfs" ino=128 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5076.012348][ T29] audit: type=1400 audit(5075.950:72615): avc: denied { search } for pid=29960 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5076.015865][ T29] audit: type=1400 audit(5075.960:72616): avc: denied { search } for pid=29960 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5076.018259][ T29] audit: type=1400 audit(5075.960:72617): avc: denied { search } for pid=29960 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5076.020914][ T29] audit: type=1400 audit(5075.960:72618): avc: denied { search } for pid=29960 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5076.025049][ T29] audit: type=1400 audit(5075.970:72619): avc: denied { remove_name } for pid=29960 comm="rm" name="resolv.conf.eth30.ipv4ll" dev="tmpfs" ino=128 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5076.034890][ T29] audit: type=1400 audit(5075.970:72620): avc: denied { unlink } for pid=29960 comm="rm" name="resolv.conf.eth30.ipv4ll" dev="tmpfs" ino=128 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5083.076412][ T29] kauditd_printk_skb: 379 callbacks suppressed [ 5083.076853][ T29] audit: type=1400 audit(5083.020:73000): avc: denied { name_bind } for pid=29972 comm="syz.9.8286" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 5083.077139][ T29] audit: type=1400 audit(5083.020:73001): avc: denied { node_bind } for pid=29972 comm="syz.9.8286" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 5083.114981][ T29] audit: type=1400 audit(5083.050:73002): avc: denied { read } for pid=29972 comm="syz.9.8286" dev="nsfs" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5083.115475][ T29] audit: type=1400 audit(5083.050:73003): avc: denied { read open } for pid=29972 comm="syz.9.8286" path="net:[4026532667]" dev="nsfs" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5083.115567][ T29] audit: type=1400 audit(5083.050:73004): avc: denied { create } for pid=29972 comm="syz.9.8286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5083.120762][ T29] audit: type=1400 audit(5083.060:73005): avc: denied { write } for pid=29972 comm="syz.9.8286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5083.124620][ T29] audit: type=1400 audit(5083.060:73006): avc: denied { read } for pid=29972 comm="syz.9.8286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5083.153727][ T29] audit: type=1400 audit(5083.090:73007): avc: denied { execmem } for pid=29972 comm="syz.9.8286" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5085.542858][ T29] audit: type=1400 audit(5085.480:73008): avc: denied { write } for pid=29972 comm="syz.9.8286" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5085.557357][ T29] audit: type=1400 audit(5085.500:73009): avc: denied { open } for pid=29972 comm="syz.9.8286" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5090.951564][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 5090.952650][ T29] audit: type=1400 audit(5090.890:73024): avc: denied { write } for pid=29976 comm="syz.7.8287" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5090.956828][ T29] audit: type=1400 audit(5090.890:73025): avc: denied { open } for pid=29976 comm="syz.7.8287" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5090.985453][ T29] audit: type=1400 audit(5090.930:73026): avc: denied { prog_load } for pid=29976 comm="syz.7.8287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5090.989163][ T29] audit: type=1400 audit(5090.930:73027): avc: denied { bpf } for pid=29976 comm="syz.7.8287" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5091.012469][ T29] audit: type=1400 audit(5090.950:73028): avc: denied { perfmon } for pid=29976 comm="syz.7.8287" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5091.013606][ T29] audit: type=1400 audit(5090.950:73029): avc: denied { bpf } for pid=29976 comm="syz.7.8287" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5091.015243][ T29] audit: type=1400 audit(5090.950:73030): avc: denied { bpf } for pid=29976 comm="syz.7.8287" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5091.016059][ T29] audit: type=1400 audit(5090.950:73031): avc: denied { prog_run } for pid=29976 comm="syz.7.8287" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5102.972825][ T29] audit: type=1400 audit(5102.910:73032): avc: denied { create } for pid=29981 comm="syz.9.8288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5103.136217][ T29] audit: type=1400 audit(5103.080:73033): avc: denied { prog_load } for pid=29983 comm="syz.9.8289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5103.138758][ T29] audit: type=1400 audit(5103.080:73034): avc: denied { bpf } for pid=29983 comm="syz.9.8289" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5103.142337][ T29] audit: type=1400 audit(5103.080:73035): avc: denied { perfmon } for pid=29983 comm="syz.9.8289" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5103.148288][ T29] audit: type=1400 audit(5103.090:73036): avc: denied { perfmon } for pid=29983 comm="syz.9.8289" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5103.151297][ T29] audit: type=1400 audit(5103.090:73037): avc: denied { perfmon } for pid=29983 comm="syz.9.8289" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5103.154845][ T29] audit: type=1400 audit(5103.100:73038): avc: denied { perfmon } for pid=29983 comm="syz.9.8289" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5103.159384][ T29] audit: type=1400 audit(5103.100:73039): avc: denied { perfmon } for pid=29983 comm="syz.9.8289" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5103.161669][ T29] audit: type=1400 audit(5103.100:73040): avc: denied { bpf } for pid=29983 comm="syz.9.8289" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5103.168117][ T29] audit: type=1400 audit(5103.110:73041): avc: denied { prog_run } for pid=29983 comm="syz.9.8289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5117.067545][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 5117.070054][ T29] audit: type=1400 audit(5117.010:73060): avc: denied { execmem } for pid=29991 comm="syz.9.8291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5118.432029][ T29] audit: type=1400 audit(5118.370:73061): avc: denied { create } for pid=29994 comm="syz.7.8292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5118.446807][ T29] audit: type=1400 audit(5118.390:73062): avc: denied { write } for pid=29994 comm="syz.7.8292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5118.449770][ T29] audit: type=1400 audit(5118.390:73063): avc: denied { nlmsg_write } for pid=29994 comm="syz.7.8292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5118.452706][ T29] audit: type=1400 audit(5118.390:73064): avc: denied { module_request } for pid=29994 comm="syz.7.8292" kmod="crypto-ecb(cipher_null)" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5118.555654][ T29] audit: type=1400 audit(5118.500:73065): avc: denied { module_request } for pid=29994 comm="syz.7.8292" kmod="crypto-ecb(cipher_null)-all" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5118.889018][ T29] audit: type=1400 audit(5118.830:73066): avc: denied { map_create } for pid=29991 comm="syz.9.8291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5118.893812][ T29] audit: type=1400 audit(5118.830:73067): avc: denied { perfmon } for pid=29991 comm="syz.9.8291" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5118.963600][ T29] audit: type=1400 audit(5118.900:73068): avc: denied { map_read map_write } for pid=29991 comm="syz.9.8291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5119.186265][ T29] audit: type=1400 audit(5119.120:73069): avc: denied { create } for pid=30003 comm="syz.7.8293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5120.311727][T30008] netlink: 24 bytes leftover after parsing attributes in process `syz.9.8295'. [ 5120.326418][T30008] sch_tbf: burst 88 is lower than device xfrm0 mtu (1500) ! [ 5134.931556][ T29] kauditd_printk_skb: 26 callbacks suppressed [ 5134.932723][ T29] audit: type=1400 audit(5134.870:73096): avc: denied { execmem } for pid=30023 comm="syz.7.8301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5136.272943][ T29] audit: type=1400 audit(5136.210:73097): avc: denied { execmem } for pid=30026 comm="syz.9.8302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5136.934654][ T29] audit: type=1400 audit(5136.750:73098): avc: denied { create } for pid=30023 comm="syz.7.8301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5136.935174][ T29] audit: type=1400 audit(5136.780:73099): avc: denied { allowed } for pid=30023 comm="syz.7.8301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5136.937662][ T29] audit: type=1400 audit(5136.780:73100): avc: denied { create } for pid=30023 comm="syz.7.8301" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5136.937906][ T29] audit: type=1400 audit(5136.780:73101): avc: denied { map } for pid=30023 comm="syz.7.8301" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=82328 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5136.938119][ T29] audit: type=1400 audit(5136.780:73102): avc: denied { read write } for pid=30023 comm="syz.7.8301" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=82328 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5136.938347][ T29] audit: type=1400 audit(5136.820:73103): avc: denied { override_creds } for pid=30023 comm="syz.7.8301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5136.938546][ T29] audit: type=1400 audit(5136.860:73104): avc: denied { override_creds } for pid=30023 comm="syz.7.8301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5136.938787][ T29] audit: type=1400 audit(5136.860:73105): avc: denied { override_creds } for pid=30023 comm="syz.7.8301" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5140.063448][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 5140.064939][ T29] audit: type=1400 audit(5140.000:73110): avc: denied { create } for pid=30034 comm="syz.9.8304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5140.072993][ T29] audit: type=1400 audit(5140.010:73111): avc: denied { setopt } for pid=30034 comm="syz.9.8304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5140.078549][ T29] audit: type=1400 audit(5140.020:73112): avc: denied { setopt } for pid=30034 comm="syz.9.8304" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 5140.203022][ T29] audit: type=1400 audit(5140.140:73113): avc: denied { name_bind } for pid=30036 comm="syz.9.8305" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 5140.207596][ T29] audit: type=1400 audit(5140.140:73114): avc: denied { node_bind } for pid=30036 comm="syz.9.8305" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 5140.230967][ T29] audit: type=1400 audit(5140.170:73115): avc: denied { read } for pid=30036 comm="syz.9.8305" dev="nsfs" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5140.232015][ T29] audit: type=1400 audit(5140.170:73116): avc: denied { open } for pid=30036 comm="syz.9.8305" path="net:[4026532667]" dev="nsfs" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5140.243524][ T29] audit: type=1400 audit(5140.180:73117): avc: denied { create } for pid=30036 comm="syz.9.8305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5140.260311][ T29] audit: type=1400 audit(5140.200:73118): avc: denied { write } for pid=30036 comm="syz.9.8305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5140.263181][ T29] audit: type=1400 audit(5140.200:73119): avc: denied { read } for pid=30036 comm="syz.9.8305" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5150.872385][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 5150.878190][ T29] audit: type=1400 audit(5150.810:73129): avc: denied { create } for pid=30045 comm="syz.7.8308" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5151.080706][ T29] audit: type=1400 audit(5151.020:73130): avc: denied { prog_load } for pid=30047 comm="syz.7.8309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5151.082046][ T29] audit: type=1400 audit(5151.020:73131): avc: denied { bpf } for pid=30047 comm="syz.7.8309" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5151.393369][ T29] audit: type=1400 audit(5151.330:73132): avc: denied { read write } for pid=30051 comm="syz.7.8311" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5151.399750][ T29] audit: type=1400 audit(5151.340:73133): avc: denied { read write open } for pid=30051 comm="syz.7.8311" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5151.412830][ T29] audit: type=1400 audit(5151.350:73134): avc: denied { mounton } for pid=30051 comm="syz.7.8311" path="/47/file0" dev="tmpfs" ino=263 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 5151.430057][ T29] audit: type=1400 audit(5151.370:73135): avc: denied { mount } for pid=30051 comm="syz.7.8311" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 5153.921811][ T29] audit: type=1400 audit(5153.860:73136): avc: denied { unmount } for pid=28560 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 5154.087707][ T29] audit: type=1400 audit(5154.030:73137): avc: denied { module_request } for pid=30056 comm="syz.7.8312" kmod="rtnl-link-bridge" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5154.378472][ T29] audit: type=1400 audit(5154.310:73138): avc: denied { create } for pid=30059 comm="syz.7.8313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5155.876030][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 5155.882684][ T29] audit: type=1400 audit(5155.820:73152): avc: denied { nlmsg_write } for pid=30063 comm="syz.9.8315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5155.957011][ T29] audit: type=1400 audit(5155.900:73153): avc: denied { create } for pid=30063 comm="syz.9.8315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5160.573243][ T29] audit: type=1400 audit(5160.500:73154): avc: denied { map_create } for pid=30069 comm="syz.7.8317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5160.581277][ T29] audit: type=1400 audit(5160.510:73155): avc: denied { bpf } for pid=30069 comm="syz.7.8317" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5160.583318][ T29] audit: type=1400 audit(5160.510:73156): avc: denied { map_read map_write } for pid=30069 comm="syz.7.8317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5160.586353][ T29] audit: type=1400 audit(5160.510:73157): avc: denied { prog_load } for pid=30069 comm="syz.7.8317" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5160.627030][ T29] audit: type=1400 audit(5160.510:73158): avc: denied { bpf } for pid=30069 comm="syz.7.8317" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5160.632388][ T29] audit: type=1400 audit(5160.520:73159): avc: denied { read } for pid=30069 comm="syz.7.8317" name="rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5160.632545][ T29] audit: type=1400 audit(5160.520:73160): avc: denied { open } for pid=30069 comm="syz.7.8317" path="/dev/rtc0" dev="devtmpfs" ino=699 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5160.632607][ T29] audit: type=1400 audit(5160.530:73161): avc: denied { ioctl } for pid=30069 comm="syz.7.8317" path="/dev/rtc0" dev="devtmpfs" ino=699 ioctlcmd=0x700a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5168.992572][ T29] audit: type=1400 audit(5168.930:73162): avc: denied { create } for pid=30074 comm="syz.9.8318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5169.015196][ T29] audit: type=1400 audit(5168.950:73163): avc: denied { ioctl } for pid=30074 comm="syz.9.8318" path="socket:[83419]" dev="sockfs" ino=83419 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5169.018243][ T29] audit: type=1400 audit(5168.960:73164): avc: denied { module_request } for pid=30074 comm="syz.9.8318" kmod="netdev-wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5169.196179][ T29] audit: type=1400 audit(5169.140:73165): avc: denied { sys_module } for pid=30074 comm="syz.9.8318" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5169.205139][ T29] audit: type=1400 audit(5169.140:73166): avc: denied { module_request } for pid=30074 comm="syz.9.8318" kmod="wlan1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5169.375999][ T29] audit: type=1400 audit(5169.320:73167): avc: denied { execmem } for pid=30074 comm="syz.9.8318" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5170.063817][ T29] audit: type=1400 audit(5170.000:73168): avc: denied { name_bind } for pid=30078 comm="syz.7.8319" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 5170.067033][ T29] audit: type=1400 audit(5170.010:73169): avc: denied { node_bind } for pid=30078 comm="syz.7.8319" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 5170.090041][ T29] audit: type=1400 audit(5170.030:73170): avc: denied { read } for pid=30078 comm="syz.7.8319" dev="nsfs" ino=4026532982 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5170.093326][ T29] audit: type=1400 audit(5170.030:73171): avc: denied { open } for pid=30078 comm="syz.7.8319" path="net:[4026532982]" dev="nsfs" ino=4026532982 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5183.229700][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 5183.235395][ T29] audit: type=1400 audit(5183.170:73188): avc: denied { prog_load } for pid=30084 comm="syz.9.8320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5183.239263][ T29] audit: type=1400 audit(5183.180:73189): avc: denied { bpf } for pid=30084 comm="syz.9.8320" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5183.250288][ T29] audit: type=1400 audit(5183.190:73190): avc: denied { perfmon } for pid=30084 comm="syz.9.8320" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5183.253731][ T29] audit: type=1400 audit(5183.190:73191): avc: denied { perfmon } for pid=30084 comm="syz.9.8320" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5183.262161][ T29] audit: type=1400 audit(5183.200:73192): avc: denied { perfmon } for pid=30084 comm="syz.9.8320" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5183.263774][ T29] audit: type=1400 audit(5183.200:73193): avc: denied { bpf } for pid=30084 comm="syz.9.8320" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5183.272292][ T29] audit: type=1400 audit(5183.210:73194): avc: denied { bpf } for pid=30084 comm="syz.9.8320" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5183.277925][ T29] audit: type=1400 audit(5183.220:73195): avc: denied { perfmon } for pid=30084 comm="syz.9.8320" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5183.279839][ T29] audit: type=1400 audit(5183.220:73196): avc: denied { bpf } for pid=30084 comm="syz.9.8320" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5183.283706][ T29] audit: type=1400 audit(5183.220:73197): avc: denied { perfmon } for pid=30084 comm="syz.9.8320" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5189.080920][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 5189.082799][ T29] audit: type=1400 audit(5189.020:73204): avc: denied { create } for pid=30089 comm="syz.7.8322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5189.101030][ T29] audit: type=1400 audit(5189.040:73205): avc: denied { create } for pid=30089 comm="syz.7.8322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5189.110361][ T29] audit: type=1400 audit(5189.050:73206): avc: denied { execmem } for pid=30089 comm="syz.7.8322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5191.426719][ T29] audit: type=1400 audit(5191.370:73207): avc: denied { create } for pid=30089 comm="syz.7.8322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5194.059015][ T29] audit: type=1400 audit(5194.000:73208): avc: denied { append } for pid=30094 comm="syz.9.8323" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5194.061724][ T29] audit: type=1400 audit(5194.000:73209): avc: denied { open } for pid=30094 comm="syz.9.8323" path="/dev/snd/seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5194.077176][ T29] audit: type=1400 audit(5194.020:73210): avc: denied { ioctl } for pid=30094 comm="syz.9.8323" path="/dev/snd/seq" dev="devtmpfs" ino=720 ioctlcmd=0x5322 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5195.477366][ T29] audit: type=1400 audit(5195.420:73211): avc: denied { name_bind } for pid=30102 comm="syz.9.8326" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 5195.479292][ T29] audit: type=1400 audit(5195.420:73212): avc: denied { node_bind } for pid=30102 comm="syz.9.8326" saddr=255.255.255.255 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 5195.497079][ T29] audit: type=1400 audit(5195.440:73213): avc: denied { read } for pid=30102 comm="syz.9.8326" dev="nsfs" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5195.498683][ T29] audit: type=1400 audit(5195.440:73214): avc: denied { open } for pid=30102 comm="syz.9.8326" path="net:[4026532667]" dev="nsfs" ino=4026532667 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5195.504588][ T29] audit: type=1400 audit(5195.440:73215): avc: denied { create } for pid=30102 comm="syz.9.8326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5195.510742][ T29] audit: type=1400 audit(5195.450:73216): avc: denied { write } for pid=30102 comm="syz.9.8326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5195.512616][ T29] audit: type=1400 audit(5195.450:73217): avc: denied { read } for pid=30102 comm="syz.9.8326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5195.517407][ T29] audit: type=1400 audit(5195.460:73218): avc: denied { read } for pid=30102 comm="syz.9.8326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5195.527109][ T29] audit: type=1400 audit(5195.470:73219): avc: denied { execmem } for pid=30102 comm="syz.9.8326" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5197.347694][ T29] audit: type=1400 audit(5197.290:73220): avc: denied { write } for pid=30102 comm="syz.9.8326" name="seq" dev="devtmpfs" ino=720 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5204.149692][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 5204.151420][ T29] audit: type=1400 audit(5204.090:73228): avc: denied { module_request } for pid=30106 comm="syz.7.8327" kmod="fs-erofs" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5209.020910][ T29] audit: type=1400 audit(5208.960:73229): avc: denied { read } for pid=30111 comm="syz.9.8328" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5209.021697][ T29] audit: type=1400 audit(5208.960:73230): avc: denied { open } for pid=30111 comm="syz.9.8328" path="/dev/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5209.029941][ T29] audit: type=1400 audit(5208.970:73231): avc: denied { ioctl } for pid=30111 comm="syz.9.8328" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5211.208319][ T29] audit: type=1400 audit(5211.150:73232): avc: denied { execmem } for pid=30114 comm="syz.7.8329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5211.270899][ T29] audit: type=1400 audit(5211.210:73233): avc: denied { create } for pid=30111 comm="syz.9.8328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 5211.367207][ T29] audit: type=1400 audit(5211.310:73234): avc: denied { prog_load } for pid=30111 comm="syz.9.8328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5211.371440][ T29] audit: type=1400 audit(5211.310:73235): avc: denied { bpf } for pid=30111 comm="syz.9.8328" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5211.398549][ T29] audit: type=1400 audit(5211.340:73236): avc: denied { module_request } for pid=30111 comm="syz.9.8328" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5211.583156][ T29] audit: type=1400 audit(5211.520:73237): avc: denied { sys_module } for pid=30111 comm="syz.9.8328" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5211.589174][ T29] audit: type=1400 audit(5211.520:73238): avc: denied { module_request } for pid=30111 comm="syz.9.8328" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5219.303317][ T29] audit: type=1400 audit(5219.240:73239): avc: denied { prog_load } for pid=30121 comm="syz.9.8330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5219.307012][ T29] audit: type=1400 audit(5219.250:73240): avc: denied { bpf } for pid=30121 comm="syz.9.8330" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5219.315798][ T29] audit: type=1400 audit(5219.260:73241): avc: denied { perfmon } for pid=30121 comm="syz.9.8330" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5219.321855][ T29] audit: type=1400 audit(5219.260:73242): avc: denied { bpf } for pid=30121 comm="syz.9.8330" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5219.326522][ T29] audit: type=1400 audit(5219.260:73243): avc: denied { prog_run } for pid=30121 comm="syz.9.8330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5219.339117][ T29] audit: type=1400 audit(5219.280:73244): avc: denied { allowed } for pid=30121 comm="syz.9.8330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 5219.351117][ T29] audit: type=1400 audit(5219.290:73245): avc: denied { create } for pid=30121 comm="syz.9.8330" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 5219.616759][ T29] audit: type=1400 audit(5219.560:73246): avc: denied { read append } for pid=30123 comm="syz.9.8331" name="001" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5219.618299][ T29] audit: type=1400 audit(5219.560:73247): avc: denied { open } for pid=30123 comm="syz.9.8331" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=689 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5219.626524][ T29] audit: type=1400 audit(5219.570:73248): avc: denied { ioctl } for pid=30123 comm="syz.9.8331" path="/dev/bus/usb/001/001" dev="devtmpfs" ino=689 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5225.614932][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 5225.616977][ T29] audit: type=1400 audit(5225.550:73267): avc: denied { execmem } for pid=30263 comm="syz.7.8336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5230.388217][ T29] audit: type=1400 audit(5230.330:73268): avc: denied { execmem } for pid=30268 comm="syz.9.8337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5230.958497][ T29] audit: type=1400 audit(5230.830:73269): avc: denied { map_create } for pid=30263 comm="syz.7.8336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5230.961053][ T29] audit: type=1400 audit(5230.830:73270): avc: denied { bpf } for pid=30263 comm="syz.7.8336" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5230.961150][ T29] audit: type=1400 audit(5230.830:73271): avc: denied { map_read map_write } for pid=30263 comm="syz.7.8336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5234.074730][ T29] audit: type=1400 audit(5233.970:73272): avc: denied { prog_load } for pid=30268 comm="syz.9.8337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5234.075203][ T29] audit: type=1400 audit(5233.970:73273): avc: denied { bpf } for pid=30268 comm="syz.9.8337" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5234.076020][ T29] audit: type=1400 audit(5233.970:73274): avc: denied { map_create } for pid=30268 comm="syz.9.8337" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5241.421230][ T29] audit: type=1400 audit(5241.360:73275): avc: denied { create } for pid=30272 comm="syz.9.8338" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5241.501467][ T29] audit: type=1400 audit(5241.440:73276): avc: denied { execmem } for pid=30274 comm="syz.9.8339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5243.727967][ T29] audit: type=1400 audit(5243.670:73277): avc: denied { map_create } for pid=30274 comm="syz.9.8339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5243.746405][ T29] audit: type=1400 audit(5243.690:73278): avc: denied { create } for pid=30274 comm="syz.9.8339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5243.752213][ T29] audit: type=1400 audit(5243.690:73279): avc: denied { create } for pid=30274 comm="syz.9.8339" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5249.170570][ T29] audit: type=1400 audit(5249.110:73280): avc: denied { create } for pid=30278 comm="syz.9.8340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5249.183426][ T29] audit: type=1400 audit(5249.120:73281): avc: denied { bind } for pid=30278 comm="syz.9.8340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5249.190032][ T29] audit: type=1400 audit(5249.130:73282): avc: denied { setopt } for pid=30278 comm="syz.9.8340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5249.193046][ T29] audit: type=1400 audit(5249.130:73283): avc: denied { accept } for pid=30278 comm="syz.9.8340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5249.201025][ T29] audit: type=1400 audit(5249.140:73284): avc: denied { write } for pid=30278 comm="syz.9.8340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5249.212853][ T29] audit: type=1400 audit(5249.150:73285): avc: denied { read } for pid=30278 comm="syz.9.8340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 5249.357730][ T29] audit: type=1400 audit(5249.300:73286): avc: denied { create } for pid=30280 comm="syz.9.8341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5249.378248][ T29] audit: type=1400 audit(5249.320:73287): avc: denied { setopt } for pid=30280 comm="syz.9.8341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5249.382841][ T29] audit: type=1400 audit(5249.320:73288): avc: denied { create } for pid=30280 comm="syz.9.8341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 5250.435430][ T29] audit: type=1400 audit(5250.380:73289): avc: denied { prog_load } for pid=30280 comm="syz.9.8341" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5257.667878][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 5257.671515][ T29] audit: type=1400 audit(5257.600:73293): avc: denied { read write } for pid=30284 comm="syz.9.8342" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5257.677979][ T29] audit: type=1400 audit(5257.610:73294): avc: denied { read write open } for pid=30284 comm="syz.9.8342" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5257.679906][ T29] audit: type=1400 audit(5257.610:73295): avc: denied { mounton } for pid=30284 comm="syz.9.8342" path="/43/file0" dev="tmpfs" ino=238 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 5257.681641][ T29] audit: type=1400 audit(5257.610:73296): avc: denied { mount } for pid=30284 comm="syz.9.8342" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 5258.202479][ T29] audit: type=1400 audit(5258.140:73297): avc: denied { map_create } for pid=30284 comm="syz.9.8342" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5258.221439][ T29] audit: type=1400 audit(5258.150:73298): avc: denied { write } for pid=30284 comm="syz.9.8342" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 5258.233523][ T29] audit: type=1400 audit(5258.160:73299): avc: denied { open } for pid=30284 comm="syz.9.8342" path="/43/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 5258.242527][ T29] audit: type=1400 audit(5258.180:73300): avc: denied { ioctl } for pid=30284 comm="syz.9.8342" path="/43/file0/file0" dev="fuse" ino=64 ioctlcmd=0x4d02 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 5258.271653][ T29] audit: type=1400 audit(5258.210:73301): avc: denied { unmount } for pid=29522 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 5258.410906][ T29] audit: type=1400 audit(5258.350:73302): avc: denied { create } for pid=30289 comm="syz.9.8343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 5264.337463][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 5264.338560][ T29] audit: type=1400 audit(5264.280:73324): avc: denied { write } for pid=30300 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5264.340847][ T29] audit: type=1400 audit(5264.280:73325): avc: denied { open } for pid=30300 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5264.378450][ T29] audit: type=1400 audit(5264.320:73326): avc: denied { search } for pid=30300 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5264.385449][ T29] audit: type=1400 audit(5264.330:73327): avc: denied { search } for pid=30300 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5264.388434][ T29] audit: type=1400 audit(5264.330:73328): avc: denied { search } for pid=30300 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5264.389345][ T29] audit: type=1400 audit(5264.330:73329): avc: denied { search } for pid=30300 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5264.457578][ T29] audit: type=1400 audit(5264.400:73330): avc: denied { search } for pid=30301 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5264.458532][ T29] audit: type=1400 audit(5264.400:73331): avc: denied { search } for pid=30301 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5264.459004][ T29] audit: type=1400 audit(5264.400:73332): avc: denied { search } for pid=30301 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5264.468668][ T29] audit: type=1400 audit(5264.410:73333): avc: denied { read open } for pid=30301 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5270.819019][ T29] kauditd_printk_skb: 427 callbacks suppressed [ 5270.819519][ T29] audit: type=1400 audit(5270.700:73761): avc: denied { execute } for pid=30308 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5270.819785][ T29] audit: type=1400 audit(5270.700:73762): avc: denied { execute_no_trans } for pid=30308 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5270.820779][ T29] audit: type=1400 audit(5270.720:73763): avc: denied { execute } for pid=30308 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 5270.836936][ T29] audit: type=1400 audit(5270.780:73764): avc: denied { execmem } for pid=30308 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 5270.973283][ T29] audit: type=1400 audit(5270.910:73765): avc: denied { read } for pid=30309 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5270.985452][ T29] audit: type=1400 audit(5270.930:73766): avc: denied { read open } for pid=30309 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 5271.006184][ T29] audit: type=1400 audit(5270.940:73767): avc: denied { mounton } for pid=30309 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 5271.046839][ T29] audit: type=1400 audit(5270.990:73768): avc: denied { prog_load } for pid=30305 comm="syz.9.8347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 5271.048762][ T29] audit: type=1400 audit(5270.990:73769): avc: denied { bpf } for pid=30305 comm="syz.9.8347" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 5271.074765][ T29] audit: type=1400 audit(5271.010:73770): avc: denied { create } for pid=30305 comm="syz.9.8347" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 5274.398568][T30309] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 5274.414928][T30309] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 5275.991471][T30309] hsr_slave_0: entered promiscuous mode [ 5276.006113][T30309] hsr_slave_1: entered promiscuous mode [ 5276.083365][ T29] kauditd_printk_skb: 39 callbacks suppressed [ 5276.087847][ T29] audit: type=1400 audit(5276.020:73810): avc: denied { module_request } for pid=30309 comm="syz-executor" kmod="rtnl-link-virt_wifi" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5276.770945][ T29] audit: type=1400 audit(5276.710:73811): avc: denied { write } for pid=30565 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5276.772999][ T29] audit: type=1400 audit(5276.710:73812): avc: denied { open } for pid=30565 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5276.813619][ T29] audit: type=1400 audit(5276.750:73813): avc: denied { search } for pid=30565 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5276.815472][ T29] audit: type=1400 audit(5276.760:73814): avc: denied { search } for pid=30565 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5276.815857][ T29] audit: type=1400 audit(5276.760:73815): avc: denied { search } for pid=30565 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5276.816180][ T29] audit: type=1400 audit(5276.760:73816): avc: denied { search } for pid=30565 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5276.907497][ T29] audit: type=1400 audit(5276.850:73817): avc: denied { search } for pid=30573 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5276.908442][ T29] audit: type=1400 audit(5276.850:73818): avc: denied { search } for pid=30573 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5276.908809][ T29] audit: type=1400 audit(5276.850:73819): avc: denied { search } for pid=30573 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5277.092677][T30309] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 5277.124614][T30309] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 5277.133615][T30309] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 5277.166352][T30309] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 5279.447634][T30309] 8021q: adding VLAN 0 to HW filter on device bond0 [ 5281.100582][ T29] kauditd_printk_skb: 606 callbacks suppressed [ 5281.101223][ T29] audit: type=1400 audit(5281.040:74426): avc: denied { search } for pid=30604 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5281.102096][ T29] audit: type=1400 audit(5281.040:74427): avc: denied { search } for pid=30604 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5281.102962][ T29] audit: type=1400 audit(5281.040:74428): avc: denied { search } for pid=30604 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5281.106786][ T29] audit: type=1400 audit(5281.050:74429): avc: denied { search } for pid=30604 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5281.107960][ T29] audit: type=1400 audit(5281.050:74430): avc: denied { search } for pid=30604 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5281.109017][ T29] audit: type=1400 audit(5281.050:74431): avc: denied { search } for pid=30604 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5281.110188][ T29] audit: type=1400 audit(5281.050:74432): avc: denied { getattr } for pid=30604 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5281.113615][ T29] audit: type=1400 audit(5281.050:74433): avc: denied { search } for pid=30604 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5281.115653][ T29] audit: type=1400 audit(5281.060:74434): avc: denied { search } for pid=30604 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5281.116662][ T29] audit: type=1400 audit(5281.060:74435): avc: denied { search } for pid=30604 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5286.115418][ T29] kauditd_printk_skb: 372 callbacks suppressed [ 5286.116470][ T29] audit: type=1400 audit(5286.040:74808): avc: denied { search } for pid=30627 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5286.118362][ T29] audit: type=1400 audit(5286.060:74809): avc: denied { search } for pid=30627 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5286.151618][ T29] audit: type=1400 audit(5286.090:74810): avc: denied { search } for pid=30616 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5286.437801][ T29] audit: type=1400 audit(5286.380:74811): avc: denied { sys_module } for pid=30309 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 5286.442225][ T29] audit: type=1400 audit(5286.380:74812): avc: denied { module_request } for pid=30309 comm="syz-executor" kmod="caif0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5286.752190][ T29] audit: type=1400 audit(5286.690:74813): avc: denied { write } for pid=30629 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5286.752589][ T29] audit: type=1400 audit(5286.690:74814): avc: denied { write open } for pid=30629 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5286.834537][ T29] audit: type=1400 audit(5286.770:74815): avc: denied { search } for pid=30629 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5286.835021][ T29] audit: type=1400 audit(5286.770:74816): avc: denied { search } for pid=30629 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5286.838137][ T29] audit: type=1400 audit(5286.770:74817): avc: denied { search } for pid=30629 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5289.817054][T30644] netlink: 4 bytes leftover after parsing attributes in process `syz.9.8349'. [ 5291.124754][ T29] kauditd_printk_skb: 390 callbacks suppressed [ 5291.127048][ T29] audit: type=1400 audit(5291.060:75208): avc: denied { search } for pid=30652 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5291.127414][ T29] audit: type=1400 audit(5291.060:75209): avc: denied { search } for pid=30652 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5291.127493][ T29] audit: type=1400 audit(5291.060:75210): avc: denied { search } for pid=30652 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5291.127544][ T29] audit: type=1400 audit(5291.060:75211): avc: denied { search } for pid=30652 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5291.127594][ T29] audit: type=1400 audit(5291.060:75212): avc: denied { search } for pid=30652 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5291.127645][ T29] audit: type=1400 audit(5291.060:75213): avc: denied { read open } for pid=30652 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5291.127693][ T29] audit: type=1400 audit(5291.060:75214): avc: denied { getattr } for pid=30652 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5291.156232][ T29] audit: type=1400 audit(5291.100:75215): avc: denied { search } for pid=30652 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5291.156990][ T29] audit: type=1400 audit(5291.100:75216): avc: denied { search } for pid=30652 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5291.157117][ T29] audit: type=1400 audit(5291.100:75217): avc: denied { search } for pid=30652 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5292.570580][T30309] veth0_vlan: entered promiscuous mode [ 5292.663718][T30309] veth1_vlan: entered promiscuous mode [ 5293.025960][T30309] veth0_macvtap: entered promiscuous mode [ 5293.108659][T30309] veth1_macvtap: entered promiscuous mode [ 5293.380261][T26232] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 5293.383321][T26232] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 5293.385432][T21584] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 5293.385862][T21584] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 5296.138487][ T29] kauditd_printk_skb: 645 callbacks suppressed [ 5296.139612][ T29] audit: type=1400 audit(5296.080:75863): avc: denied { write } for pid=30659 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5296.157765][ T29] audit: type=1400 audit(5296.090:75864): avc: denied { write open } for pid=30659 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5296.175436][ T29] audit: type=1400 audit(5296.110:75865): avc: denied { getattr } for pid=30659 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5296.180555][ T29] audit: type=1400 audit(5296.120:75866): avc: denied { ioctl } for pid=30659 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 ioctlcmd=0x5401 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5296.449051][ T29] audit: type=1400 audit(5296.380:75867): avc: denied { search } for pid=30667 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5296.449464][ T29] audit: type=1400 audit(5296.390:75868): avc: denied { read } for pid=30667 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5296.452527][ T29] audit: type=1400 audit(5296.390:75869): avc: denied { open } for pid=30667 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5296.471305][ T29] audit: type=1400 audit(5296.410:75870): avc: denied { search } for pid=30667 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5296.471720][ T29] audit: type=1400 audit(5296.410:75871): avc: denied { search } for pid=30667 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5296.471959][ T29] audit: type=1400 audit(5296.410:75872): avc: denied { search } for pid=30667 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5301.366059][ T29] kauditd_printk_skb: 423 callbacks suppressed [ 5301.374593][ T29] audit: type=1400 audit(5301.310:76296): avc: denied { search } for pid=30673 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5301.374968][ T29] audit: type=1400 audit(5301.310:76297): avc: denied { read } for pid=30673 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5301.375032][ T29] audit: type=1400 audit(5301.310:76298): avc: denied { open } for pid=30673 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5301.375115][ T29] audit: type=1400 audit(5301.310:76299): avc: denied { search } for pid=30673 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5301.375170][ T29] audit: type=1400 audit(5301.310:76300): avc: denied { search } for pid=30673 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5301.375198][ T29] audit: type=1400 audit(5301.310:76301): avc: denied { search } for pid=30673 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5301.375225][ T29] audit: type=1400 audit(5301.310:76302): avc: denied { read } for pid=30673 comm="cmp" name="resolv.conf.eth3.dhcp" dev="tmpfs" ino=137 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5301.375248][ T29] audit: type=1400 audit(5301.310:76303): avc: denied { open } for pid=30673 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth3.dhcp" dev="tmpfs" ino=137 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5301.375284][ T29] audit: type=1400 audit(5301.310:76304): avc: denied { getattr } for pid=30673 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5301.752187][ T29] audit: type=1400 audit(5301.690:76305): avc: denied { search } for pid=30674 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5306.521980][ T29] kauditd_printk_skb: 439 callbacks suppressed [ 5306.534806][ T29] audit: type=1400 audit(5306.460:76745): avc: denied { search } for pid=30676 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5307.187435][ T29] audit: type=1400 audit(5307.130:76746): avc: denied { write } for pid=30681 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5307.190251][ T29] audit: type=1400 audit(5307.130:76747): avc: denied { open } for pid=30681 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5307.250515][ T29] audit: type=1400 audit(5307.190:76748): avc: denied { search } for pid=30681 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5307.272447][ T29] audit: type=1400 audit(5307.210:76749): avc: denied { search } for pid=30681 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5307.277309][ T29] audit: type=1400 audit(5307.210:76750): avc: denied { search } for pid=30681 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5307.279178][ T29] audit: type=1400 audit(5307.210:76751): avc: denied { search } for pid=30681 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5307.318456][ T29] audit: type=1400 audit(5307.260:76752): avc: denied { search } for pid=30682 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5307.325672][ T29] audit: type=1400 audit(5307.270:76753): avc: denied { search } for pid=30682 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5307.328192][ T29] audit: type=1400 audit(5307.270:76754): avc: denied { search } for pid=30682 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5310.064931][T30711] bond0: (slave bond_slave_0): Releasing backup interface [ 5310.098401][T30711] bond0: (slave bond_slave_1): Releasing backup interface [ 5310.173697][T30711] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 5311.533563][ T29] kauditd_printk_skb: 423 callbacks suppressed [ 5311.535031][ T29] audit: type=1400 audit(5311.470:77178): avc: denied { search } for pid=30715 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5311.536545][ T29] audit: type=1400 audit(5311.480:77179): avc: denied { search } for pid=30715 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5311.538057][ T29] audit: type=1400 audit(5311.480:77180): avc: denied { search } for pid=30715 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5311.540428][ T29] audit: type=1400 audit(5311.480:77181): avc: denied { read open } for pid=30715 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5311.544568][ T29] audit: type=1400 audit(5311.480:77182): avc: denied { getattr } for pid=30715 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5311.547752][ T29] audit: type=1400 audit(5311.490:77183): avc: denied { search } for pid=30715 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5311.549540][ T29] audit: type=1400 audit(5311.490:77184): avc: denied { search } for pid=30715 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5311.551346][ T29] audit: type=1400 audit(5311.490:77185): avc: denied { search } for pid=30715 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5311.553218][ T29] audit: type=1400 audit(5311.490:77186): avc: denied { search } for pid=30715 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5311.558880][ T29] audit: type=1400 audit(5311.500:77187): avc: denied { search } for pid=30715 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5316.715757][ T29] kauditd_printk_skb: 560 callbacks suppressed [ 5316.724716][ T29] audit: type=1400 audit(5316.660:77748): avc: denied { search } for pid=30736 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5316.725154][ T29] audit: type=1400 audit(5316.660:77749): avc: denied { read } for pid=30736 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5316.725235][ T29] audit: type=1400 audit(5316.660:77750): avc: denied { open } for pid=30736 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5316.725298][ T29] audit: type=1400 audit(5316.660:77751): avc: denied { search } for pid=30736 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5316.725390][ T29] audit: type=1400 audit(5316.660:77752): avc: denied { search } for pid=30736 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5316.725448][ T29] audit: type=1400 audit(5316.660:77753): avc: denied { search } for pid=30736 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5316.725497][ T29] audit: type=1400 audit(5316.660:77754): avc: denied { read } for pid=30736 comm="cmp" name="resolv.conf.eth2.dhcp" dev="tmpfs" ino=141 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5316.725542][ T29] audit: type=1400 audit(5316.660:77755): avc: denied { open } for pid=30736 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth2.dhcp" dev="tmpfs" ino=141 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5316.757252][ T29] audit: type=1400 audit(5316.700:77756): avc: denied { getattr } for pid=30736 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5316.761884][ T29] audit: type=1400 audit(5316.700:77757): avc: denied { getattr } for pid=30736 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth2.dhcp" dev="tmpfs" ino=141 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5318.036890][T24271] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5318.233371][T24271] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5318.333615][T24271] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5318.500229][T24271] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 5319.190401][T24271] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 5319.197383][T24271] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 5319.208226][T24271] bond0 (unregistering): Released all slaves [ 5319.388692][T24271] hsr_slave_0: left promiscuous mode [ 5319.406713][T24271] hsr_slave_1: left promiscuous mode [ 5319.458399][T24271] veth1_macvtap: left promiscuous mode [ 5319.459006][T24271] veth0_macvtap: left promiscuous mode [ 5319.459282][T24271] veth1_vlan: left promiscuous mode [ 5319.459468][T24271] veth0_vlan: left promiscuous mode [ 5321.774839][ T29] kauditd_printk_skb: 429 callbacks suppressed [ 5321.776289][ T29] audit: type=1400 audit(5321.710:78187): avc: denied { search } for pid=30760 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5321.778053][ T29] audit: type=1400 audit(5321.710:78188): avc: denied { search } for pid=30760 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5321.780462][ T29] audit: type=1400 audit(5321.710:78189): avc: denied { search } for pid=30760 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5321.798781][ T29] audit: type=1400 audit(5321.740:78190): avc: denied { getattr } for pid=30760 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=142 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5321.802345][ T29] audit: type=1400 audit(5321.740:78191): avc: denied { search } for pid=30760 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5321.804479][ T29] audit: type=1400 audit(5321.740:78192): avc: denied { search } for pid=30760 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5321.806391][ T29] audit: type=1400 audit(5321.740:78193): avc: denied { search } for pid=30760 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5321.811562][ T29] audit: type=1400 audit(5321.740:78194): avc: denied { search } for pid=30760 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5321.815184][ T29] audit: type=1400 audit(5321.740:78195): avc: denied { remove_name search } for pid=30760 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=142 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5321.823345][ T29] audit: type=1400 audit(5321.760:78196): avc: denied { read } for pid=30761 comm="syz.9.8362" name="timer" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5321.996360][T30762] ALSA: seq fatal error: cannot create timer (-16) [ 5322.410052][T30762] ALSA: seq fatal error: cannot create timer (-16) [ 5322.431863][T30762] ALSA: seq fatal error: cannot create timer (-16) [ 5326.889087][ T29] kauditd_printk_skb: 328 callbacks suppressed [ 5326.891593][ T29] audit: type=1400 audit(5326.830:78525): avc: denied { search } for pid=30809 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5326.892235][ T29] audit: type=1400 audit(5326.830:78526): avc: denied { search } for pid=30809 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5326.892578][ T29] audit: type=1400 audit(5326.830:78527): avc: denied { search } for pid=30809 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5326.893632][ T29] audit: type=1400 audit(5326.830:78528): avc: denied { getattr } for pid=30809 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.eth1.ipv4ll" dev="tmpfs" ino=144 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5326.897109][ T29] audit: type=1400 audit(5326.840:78529): avc: denied { search } for pid=30809 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5326.906727][ T29] audit: type=1400 audit(5326.850:78530): avc: denied { search } for pid=30809 comm="rm" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5326.907232][ T29] audit: type=1400 audit(5326.850:78531): avc: denied { search } for pid=30809 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5326.907606][ T29] audit: type=1400 audit(5326.850:78532): avc: denied { search } for pid=30809 comm="rm" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5326.919825][ T29] audit: type=1400 audit(5326.860:78533): avc: denied { remove_name search } for pid=30809 comm="rm" name="resolv.conf.eth1.ipv4ll" dev="tmpfs" ino=144 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5326.921026][ T29] audit: type=1400 audit(5326.860:78534): avc: denied { unlink } for pid=30809 comm="rm" name="resolv.conf.eth1.ipv4ll" dev="tmpfs" ino=144 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5332.019347][ T29] kauditd_printk_skb: 815 callbacks suppressed [ 5332.022195][ T29] audit: type=1400 audit(5331.960:79350): avc: denied { search } for pid=30836 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5332.031588][ T29] audit: type=1400 audit(5331.970:79351): avc: denied { read } for pid=30836 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5332.079534][ T29] audit: type=1400 audit(5332.020:79352): avc: denied { read open } for pid=30836 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5332.083808][ T29] audit: type=1400 audit(5332.020:79353): avc: denied { search } for pid=30836 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5332.085418][ T29] audit: type=1400 audit(5332.030:79354): avc: denied { search } for pid=30836 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5332.085930][ T29] audit: type=1400 audit(5332.030:79355): avc: denied { search } for pid=30836 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5332.087699][ T29] audit: type=1400 audit(5332.030:79356): avc: denied { read } for pid=30836 comm="cmp" name="resolv.conf.eth1.link" dev="tmpfs" ino=146 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5332.088486][ T29] audit: type=1400 audit(5332.030:79357): avc: denied { read open } for pid=30836 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=146 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5332.090055][ T29] audit: type=1400 audit(5332.030:79358): avc: denied { getattr } for pid=30836 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5332.158380][ T29] audit: type=1400 audit(5332.090:79359): avc: denied { getattr } for pid=30836 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=146 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5335.739174][T30861] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 5335.742292][T30861] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 5337.139601][ T29] kauditd_printk_skb: 344 callbacks suppressed [ 5337.141277][ T29] audit: type=1400 audit(5337.080:79704): avc: denied { search } for pid=30870 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5337.159400][ T29] audit: type=1400 audit(5337.100:79705): avc: denied { read } for pid=30870 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5337.160405][ T29] audit: type=1400 audit(5337.100:79706): avc: denied { open } for pid=30870 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5337.196046][ T29] audit: type=1400 audit(5337.100:79707): avc: denied { search } for pid=30870 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5337.224366][ T29] audit: type=1400 audit(5337.150:79708): avc: denied { search } for pid=30870 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5337.225200][ T29] audit: type=1400 audit(5337.170:79709): avc: denied { search } for pid=30870 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5337.225823][ T29] audit: type=1400 audit(5337.170:79710): avc: denied { read } for pid=30870 comm="cmp" name="resolv.conf.eth1.link" dev="tmpfs" ino=147 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5337.226366][ T29] audit: type=1400 audit(5337.170:79711): avc: denied { open } for pid=30870 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=147 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5337.227651][ T29] audit: type=1400 audit(5337.170:79712): avc: denied { getattr } for pid=30870 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5337.345928][ T29] audit: type=1400 audit(5337.290:79713): avc: denied { getattr } for pid=30870 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=147 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5337.840198][T30873] ptrace attach of "/syz-executor exec"[30874] was attempted by "/syz-executor exec"[30873] [ 5338.396274][T30877] fuse: Unknown parameter 'group_id00000000000000000000' [ 5340.666708][T30890] bond0: (slave bond_slave_0): Releasing backup interface [ 5340.699133][T30890] bond0: (slave bond_slave_1): Releasing backup interface [ 5340.856455][T30890] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 5342.161449][ T29] kauditd_printk_skb: 212 callbacks suppressed [ 5342.162656][ T29] audit: type=1400 audit(5342.100:79926): avc: denied { search } for pid=30887 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5342.165272][ T29] audit: type=1400 audit(5342.100:79927): avc: denied { search } for pid=30887 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5342.165370][ T29] audit: type=1400 audit(5342.100:79928): avc: denied { search } for pid=30887 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5342.216043][ T29] audit: type=1400 audit(5342.160:79929): avc: denied { search } for pid=30887 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5342.218125][ T29] audit: type=1400 audit(5342.160:79930): avc: denied { search } for pid=30887 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5342.219913][ T29] audit: type=1400 audit(5342.160:79931): avc: denied { search } for pid=30887 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5342.221636][ T29] audit: type=1400 audit(5342.160:79932): avc: denied { getattr } for pid=30887 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5342.224322][ T29] audit: type=1400 audit(5342.160:79933): avc: denied { search } for pid=30887 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5342.228443][ T29] audit: type=1400 audit(5342.160:79934): avc: denied { search } for pid=30887 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5342.230152][ T29] audit: type=1400 audit(5342.160:79935): avc: denied { search } for pid=30887 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5342.549753][T30890] vlan0: entered promiscuous mode [ 5343.392250][T30901] fuse: Unknown parameter 'group_id00000000000000000000' [ 5347.196946][ T29] kauditd_printk_skb: 117 callbacks suppressed [ 5347.198197][ T29] audit: type=1400 audit(5347.140:80053): avc: denied { ioctl } for pid=30925 comm="syz.9.8391" path="socket:[85044]" dev="sockfs" ino=85044 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 5347.218100][ T29] audit: type=1400 audit(5347.150:80054): avc: denied { module_request } for pid=30925 comm="syz.9.8391" kmod="netdev-wlan0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 5347.219915][ T29] audit: type=1400 audit(5347.160:80055): avc: denied { search } for pid=30928 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5347.221864][ T29] audit: type=1400 audit(5347.160:80056): avc: denied { search } for pid=30928 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5347.223619][ T29] audit: type=1400 audit(5347.160:80057): avc: denied { search } for pid=30928 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5347.246995][ T29] audit: type=1400 audit(5347.160:80058): avc: denied { read open } for pid=30928 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5347.249147][ T29] audit: type=1400 audit(5347.190:80059): avc: denied { getattr } for pid=30928 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5347.253763][ T29] audit: type=1400 audit(5347.190:80060): avc: denied { search } for pid=30928 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5347.255759][ T29] audit: type=1400 audit(5347.190:80061): avc: denied { search } for pid=30928 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5347.258296][ T29] audit: type=1400 audit(5347.190:80062): avc: denied { search } for pid=30928 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5348.725941][T30933] fuse: Bad value for 'user_id' [ 5348.727277][T30933] fuse: Bad value for 'user_id' [ 5352.360608][ T29] kauditd_printk_skb: 620 callbacks suppressed [ 5352.361868][ T29] audit: type=1400 audit(5352.300:80683): avc: denied { write } for pid=30956 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5352.363874][ T29] audit: type=1400 audit(5352.300:80684): avc: denied { write open } for pid=30956 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5352.887917][ T29] audit: type=1400 audit(5352.830:80685): avc: denied { write } for pid=30957 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5352.888584][ T29] audit: type=1400 audit(5352.830:80686): avc: denied { open } for pid=30957 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5353.407526][ T29] audit: type=1400 audit(5353.350:80687): avc: denied { write } for pid=30958 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5353.408361][ T29] audit: type=1400 audit(5353.350:80688): avc: denied { open } for pid=30958 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5354.009406][ T29] audit: type=1400 audit(5353.950:80689): avc: denied { write } for pid=30960 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5354.010612][ T29] audit: type=1400 audit(5353.950:80690): avc: denied { open } for pid=30960 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5359.593323][ T29] audit: type=1400 audit(5359.530:80691): avc: denied { read write } for pid=30309 comm="syz-executor" name="loop0" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5359.597178][ T29] audit: type=1400 audit(5359.530:80692): avc: denied { open } for pid=30309 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5359.601630][ T29] audit: type=1400 audit(5359.540:80693): avc: denied { ioctl } for pid=30309 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5359.666691][ T29] audit: type=1400 audit(5359.610:80694): avc: denied { create } for pid=30971 comm="syz.0.8396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5359.672193][ T29] audit: type=1400 audit(5359.610:80695): avc: denied { ioctl } for pid=30971 comm="syz.0.8396" path="socket:[85089]" dev="sockfs" ino=85089 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 5359.699721][ T29] audit: type=1400 audit(5359.640:80696): avc: denied { read write } for pid=30309 comm="syz-executor" name="loop0" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5359.700128][ T29] audit: type=1400 audit(5359.640:80697): avc: denied { open } for pid=30309 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=829 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5359.702315][ T29] audit: type=1400 audit(5359.640:80698): avc: denied { ioctl } for pid=30309 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=829 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 5359.807127][ T29] audit: type=1400 audit(5359.750:80699): avc: denied { read write } for pid=30973 comm="syz.0.8397" name="fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5359.809051][ T29] audit: type=1400 audit(5359.750:80700): avc: denied { read write open } for pid=30973 comm="syz.0.8397" path="/dev/fuse" dev="devtmpfs" ino=89 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 5359.818165][T30974] fuse: Bad value for 'user_id' [ 5359.818467][T30974] fuse: Bad value for 'user_id' [ 5363.997582][T30989] netlink: 12 bytes leftover after parsing attributes in process `syz.9.8401'. [ 5364.381106][T30991] fuse: Bad value for 'user_id' [ 5364.394868][T30991] fuse: Bad value for 'user_id' [ 5364.600996][ T29] kauditd_printk_skb: 382 callbacks suppressed [ 5364.602666][ T29] audit: type=1400 audit(5364.540:81083): avc: denied { search } for pid=30992 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5364.615491][ T29] audit: type=1400 audit(5364.560:81084): avc: denied { read } for pid=30992 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5364.620397][ T29] audit: type=1400 audit(5364.560:81085): avc: denied { read open } for pid=30992 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5364.620710][ T29] audit: type=1400 audit(5364.560:81086): avc: denied { search } for pid=30992 comm="cmp" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5364.620801][ T29] audit: type=1400 audit(5364.560:81087): avc: denied { search } for pid=30992 comm="cmp" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5364.625406][ T29] audit: type=1400 audit(5364.560:81088): avc: denied { search } for pid=30992 comm="cmp" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 5364.625765][ T29] audit: type=1400 audit(5364.570:81089): avc: denied { read } for pid=30992 comm="cmp" name="resolv.conf.eth1.ipv4ll" dev="tmpfs" ino=151 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5364.625852][ T29] audit: type=1400 audit(5364.570:81090): avc: denied { open } for pid=30992 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth1.ipv4ll" dev="tmpfs" ino=151 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5364.630407][ T29] audit: type=1400 audit(5364.570:81091): avc: denied { getattr } for pid=30992 comm="cmp" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5364.633396][ T29] audit: type=1400 audit(5364.570:81092): avc: denied { getattr } for pid=30992 comm="cmp" path="/run/dhcpcd/hook-state/resolv.conf.eth1.ipv4ll" dev="tmpfs" ino=151 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 5369.002898][T31034] 8<--- cut here --- [ 5369.003294][T31034] Unable to handle kernel paging request at virtual address fee04f3a when write [ 5369.006798][T31034] [fee04f3a] *pgd=80000080007003, *pmd=00000000 [ 5369.009473][T31034] Internal error: Oops: a06 [#1] SMP ARM [ 5369.011351][T31034] Modules linked in: [ 5369.011800][T31034] CPU: 0 UID: 0 PID: 31034 Comm: syz.9.8412 Tainted: G L syzkaller #0 PREEMPT [ 5369.012233][T31034] Tainted: [L]=SOFTLOCKUP [ 5369.012412][T31034] Hardware name: ARM-Versatile Express [ 5369.012650][T31034] PC is at subdev_8255_io+0x60/0x6c [ 5369.013034][T31034] LR is at subdev_8255_io+0x4c/0x6c [ 5369.013267][T31034] pc : [<8141719c>] lr : [<81417188>] psr: 60000013 [ 5369.013532][T31034] sp : e00f9cb0 ip : e00f9cb0 fp : e00f9ccc [ 5369.013805][T31034] r10: 00000001 r9 : 00000084 r8 : e00f9d9c [ 5369.014430][T31034] r7 : 00004f37 r6 : 0000009b r5 : 845f60c0 r4 : 00004f3a [ 5369.014838][T31034] r3 : 0000009b r2 : fee04f3a r1 : 00000001 r0 : 845f60c0 [ 5369.015210][T31034] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment user [ 5369.015536][T31034] Control: 30c5387d Table: 86d1d200 DAC: fffffffd [ 5369.015848][T31034] Register r0 information: slab kmalloc-192 start 845f60c0 pointer offset 0 size 192 [ 5369.017003][T31034] Register r1 information: non-paged memory [ 5369.017495][T31034] Register r2 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 5369.018083][T31034] Register r3 information: non-paged memory [ 5369.018330][T31034] Register r4 information: non-paged memory [ 5369.018564][T31034] Register r5 information: slab kmalloc-192 start 845f60c0 pointer offset 0 size 192 [ 5369.019068][T31034] Register r6 information: non-paged memory [ 5369.019298][T31034] Register r7 information: non-paged memory [ 5369.019527][T31034] Register r8 information: 2-page vmalloc region starting at 0xe00f8000 allocated at kernel_clone+0xac/0x3ec [ 5369.019931][T31034] Register r9 information: non-paged memory [ 5369.020168][T31034] Register r10 information: non-paged memory [ 5369.020410][T31034] Register r11 information: 2-page vmalloc region starting at 0xe00f8000 allocated at kernel_clone+0xac/0x3ec [ 5369.020806][T31034] Register r12 information: 2-page vmalloc region starting at 0xe00f8000 allocated at kernel_clone+0xac/0x3ec [ 5369.021292][T31034] Process syz.9.8412 (pid: 31034, stack limit = 0xe00f8000) [ 5369.021820][T31034] Stack: (0xe00f9cb0 to 0xe00fa000) [ 5369.022181][T31034] 9ca0: 8141713c 845f60c0 00004f37 00004f37 [ 5369.022515][T31034] 9cc0: e00f9cec e00f9cd0 81416e74 81417148 00004f37 805153e4 86950000 86950000 [ 5369.022896][T31034] 9ce0: e00f9d0c e00f9cf0 81417234 81416e28 845f60c0 00000000 86950000 00004f37 [ 5369.023232][T31034] 9d00: e00f9d4c e00f9d10 814173e0 814171b4 0000005f 84191980 828215b0 00000000 [ 5369.023562][T31034] 9d20: 00000000 829d46a0 845f60c0 845f6104 e00f9d88 845f60c0 00000000 82b28ad8 [ 5369.023879][T31034] 9d40: e00f9d84 e00f9d50 81405f14 81417378 845f60f0 00000000 e00f9d74 200000c0 [ 5369.024489][T31034] 9d60: 845f60c0 b5403587 845f60f0 8456b000 40946400 00000003 e00f9e44 e00f9d88 [ 5369.024763][T31034] 9d80: 8140186c 81405e18 35353238 00000000 00000000 00000000 00000000 00004f37 [ 5369.025178][T31034] 9da0: 00000005 00000002 00000401 00000001 00000cc7 00000fff 5c95239d 00000005 [ 5369.025478][T31034] 9dc0: 000003ff 00000802 00001600 00000001 00000001 00000009 0000e1cb 20000006 [ 5369.025825][T31034] 9de0: 00000004 00000003 00000395 40000005 fffffffd 00000001 fffffff5 ffffeadd [ 5369.026357][T31034] 9e00: 00000003 0000003a 00000008 00000004 08000000 dffffffa 00000000 93780e5d [ 5369.026926][T31034] 9e20: 00000000 86c8a540 845f60c0 200000c0 845f60f0 8456b000 e00f9f14 e00f9e48 [ 5369.027255][T31034] 9e40: 81402860 81401778 00000000 00000000 00000000 e00f9e54 e00f9e54 93780e5d [ 5369.027603][T31034] 9e60: 00000000 00000000 824a45ec 0000005f 840d3de0 00000064 844d0f84 8456b000 [ 5369.027868][T31034] 9e80: e00f9ee4 e00f9e90 807b85a8 807aeacc 00000064 00000001 00000000 e00f9eac [ 5369.028283][T31034] 9ea0: 833f3c10 834ec4c8 00006400 0000000b e00f9ea0 00000000 e00f9d40 93780e5d [ 5369.028697][T31034] 9ec0: 86c8a540 40946400 200000c0 200000c0 86c8a540 00000003 e00f9ef4 e00f9ee8 [ 5369.029144][T31034] 9ee0: 807b86c8 93780e5d e00f9f14 40946400 00000000 86c8a541 200000c0 86c8a540 [ 5369.029566][T31034] 9f00: 00000003 8456b000 e00f9fa4 e00f9f18 80585b90 814022b0 ecac8b10 8456b000 [ 5369.029882][T31034] 9f20: e00f9f3c e00f9f30 81ab1384 81ab1254 e00f9f54 e00f9f40 8025bcbc 8028e0c4 [ 5369.030229][T31034] 9f40: e00f9fb0 40000000 e00f9f84 e00f9f58 80221a38 8025bc78 00000000 8281cf7c [ 5369.030591][T31034] 9f60: e00f9fb0 0014c8c0 ecac8b10 8022198c 00000000 93780e5d e00f9fac 00000000 [ 5369.031063][T31034] 9f80: 00000000 00326310 00000036 8020029c 8456b000 00000036 00000000 e00f9fa8 [ 5369.031536][T31034] 9fa0: 80200060 80585a6c 00000000 00000000 00000003 40946400 200000c0 00000000 [ 5369.031984][T31034] 9fc0: 00000000 00000000 00326310 00000036 00310000 00000000 00006364 76f6a0bc [ 5369.032366][T31034] 9fe0: 76f69ec0 76f69eb0 000192bc 00132360 60000010 00000003 00000000 00000000 [ 5369.032756][T31034] Call trace: [ 5369.032977][T31034] [<8141713c>] (subdev_8255_io) from [<81416e74>] (subdev_8255_do_config+0x58/0x60) [ 5369.033385][T31034] r7:00004f37 r6:00004f37 r5:845f60c0 r4:8141713c [ 5369.033711][T31034] [<81416e1c>] (subdev_8255_do_config) from [<81417234>] (subdev_8255_io_init+0x8c/0x9c) [ 5369.034384][T31034] r4:86950000 [ 5369.034529][T31034] [<814171a8>] (subdev_8255_io_init) from [<814173e0>] (dev_8255_attach+0x74/0x120) [ 5369.035250][T31034] r7:00004f37 r6:86950000 r5:00000000 r4:845f60c0 [ 5369.035604][T31034] [<8141736c>] (dev_8255_attach) from [<81405f14>] (comedi_device_attach+0x108/0x250) [ 5369.036197][T31034] r10:82b28ad8 r9:00000000 r8:845f60c0 r7:e00f9d88 r6:845f6104 r5:845f60c0 [ 5369.036501][T31034] r4:829d46a0 [ 5369.036656][T31034] [<81405e0c>] (comedi_device_attach) from [<8140186c>] (do_devconfig_ioctl+0x100/0x220) [ 5369.037046][T31034] r10:00000003 r9:40946400 r8:8456b000 r7:845f60f0 r6:b5403587 r5:845f60c0 [ 5369.037349][T31034] r4:200000c0 [ 5369.037562][T31034] [<8140176c>] (do_devconfig_ioctl) from [<81402860>] (comedi_unlocked_ioctl+0x5bc/0x1c2c) [ 5369.037984][T31034] r8:8456b000 r7:845f60f0 r6:200000c0 r5:845f60c0 r4:86c8a540 [ 5369.038328][T31034] [<814022a4>] (comedi_unlocked_ioctl) from [<80585b90>] (sys_ioctl+0x130/0xba0) [ 5369.038774][T31034] r10:8456b000 r9:00000003 r8:86c8a540 r7:200000c0 r6:86c8a541 r5:00000000 [ 5369.039253][T31034] r4:40946400 [ 5369.039417][T31034] [<80585a60>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 5369.039755][T31034] Exception stack(0xe00f9fa8 to 0xe00f9ff0) [ 5369.040233][T31034] 9fa0: 00000000 00000000 00000003 40946400 200000c0 00000000 [ 5369.040621][T31034] 9fc0: 00000000 00000000 00326310 00000036 00310000 00000000 00006364 76f6a0bc [ 5369.040973][T31034] 9fe0: 76f69ec0 76f69eb0 000192bc 00132360 [ 5369.041221][T31034] r10:00000036 r9:8456b000 r8:8020029c r7:00000036 r6:00326310 r5:00000000 [ 5369.041519][T31034] r4:00000000 [ 5369.041948][T31034] Code: e6ef3076 e0842002 e7f32052 e2422612 (e5c23000) [ 5369.044297][T31034] ---[ end trace 0000000000000000 ]--- [ 5369.086817][T31034] Kernel panic - not syncing: Fatal exception [ 5369.088902][T31034] Rebooting in 86400 seconds.. VM DIAGNOSIS: 20:50:07 Registers: info registers vcpu 0 CPU#0 R00=e00f9b00 R01=8247fa3c R02=00034300 R03=80201260 R04=8280ca84 R05=df80a000 R06=8244489c R07=df80a00c R08=00000000 R09=8456b000 R10=00000001 R11=df801fd4 R12=df801fd8 R13=df801fb8 R14=81ab0730 R15=8020127c PSR=200e0193 --C- A S svc32 s00=72656820 s01=2d2d2065 d00=2d2d206572656820 s02=5f736670 s03=63742074 d01=637420745f736670 s04=6e692022 s05=20323d6f d02=20323d6f6e692022 s06=6e6f6373 s07=74786574 d03=747865746e6f6373 s08=7379733d s09=5f6d6574 d04=5f6d65747379733d s10=79733a75 s11=6d657473 d05=6d65747379733a75 s12=643a725f s13=63706368 d06=63706368643a725f s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=ded12870 R01=00000008 R02=dedc1d7c R03=000002e0 R04=00000001 R05=00000000 R06=00000001 R07=82a03580 R08=82a02e80 R09=00000000 R10=ded1286c R11=dfcb5d64 R12=dfcb5cb0 R13=dfcb5c98 R14=000df000 R15=805018e8 PSR=20000113 --C- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000