last executing test programs: 15m57.673046361s ago: executing program 0 (id=40): r0 = socket(0x8000000010, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x2000000000000016, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r2}, 0x10) write(r0, &(0x7f00000002c0)="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", 0xfc) 15m57.182994319s ago: executing program 0 (id=41): creat(0x0, 0x182) r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000640)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x4e7, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x8, 0x0, 0x0, 0xff}}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f0000000100)={0x2c, &(0x7f00000003c0)={0x40, 0xd, 0x6, {0x6, 0x11, "42a009f3"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) 15m55.762653307s ago: executing program 0 (id=42): pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="1500000065ffff097b00000800395032303030ca0a81a6b94f995a7120b8a72877fcc0c13cdfa1cb893ddc61783be674f6f302364c417c69a38eae578f89b251bde19d79af25ebb7256071c6ba"], 0x15) r1 = dup(r0) write$FUSE_BMAP(r1, &(0x7f0000000100)={0x18}, 0x18) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) poll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x80cd}], 0x1, 0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) sendmmsg$inet(r2, &(0x7f0000000240)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a90500040000746400009e150451160200000064c6", 0x15}, {&(0x7f0000000000)="17460081ba60ccbb9d000000000000", 0xf}], 0x2}}, {{&(0x7f00000004c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x38}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000080)="5825be06000000000000007ca2746314d14e787b3532d5f37f49fd63f95ea8bf", 0x20}], 0x1}}], 0x2, 0x4004040) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000286dd6000050000103afffe8000030000000000000000000000bbff020000000000000000000000000001"], 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0xfffffffffffffffe) write$FUSE_INIT(r1, &(0x7f00000001c0)={0x50, 0x0, 0x0, {0x7, 0x2b, 0x4, 0x800000, 0x4, 0x400, 0x5, 0x1, 0x0, 0x0, 0x1, 0x74}}, 0x50) 15m55.443647581s ago: executing program 0 (id=43): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, 0x0) mount_setattr(0xffffffffffffffff, &(0x7f0000001d80)='.\x00', 0x8000, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = socket$inet_icmp(0x2, 0x2, 0x1) writev(r4, 0x0, 0x0) r5 = openat(0xffffffffffffffff, 0x0, 0x6a1c2, 0x50) faccessat(0xffffffffffffffff, 0x0, 0x6ae65e579ba89554) r6 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000240)={@mcast1={0xff, 0x5}, 0x1000000, 0x0, 0x1, 0x10, 0x0, 0xfffe}, 0x20) getsockopt$inet_IP_IPSEC_POLICY(r5, 0x0, 0x10, &(0x7f0000000400)={{{@in6=@mcast1, @in=@private}}, {{@in=@initdev}, 0x0, @in=@empty}}, 0x0) 15m49.513037271s ago: executing program 0 (id=47): sched_setscheduler(0x0, 0x2, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) sched_setaffinity(0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x1}, 0x1c) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000800)=[{0x28, 0x0, 0xfb, 0xffbff034}, {0x80000006, 0x64}]}, 0x10) syz_emit_ethernet(0x26, &(0x7f0000000b40)={@broadcast, @broadcast, @val={@void, {0x8100, 0x6, 0x0, 0x1}}, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x2, 0x0, 0x0, 0x84, 0x0, @rand_addr=0x64010101, @dev={0xac, 0x14, 0x14, 0xe}}}}}}, 0x0) io_setup(0x8, 0x0) 15m49.263300501s ago: executing program 0 (id=48): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) listen(0xffffffffffffffff, 0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) r5 = socket(0x10, 0x803, 0x0) socket$unix(0x1, 0x1, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000006040)={0x0, 0x0, 0x0}, 0x24040084) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000009) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x40000, 0x0) 15m3.479070118s ago: executing program 32 (id=48): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) listen(0xffffffffffffffff, 0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb7030000080000002d01000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sk_reuseport=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) r5 = socket(0x10, 0x803, 0x0) socket$unix(0x1, 0x1, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000006040)={0x0, 0x0, 0x0}, 0x24040084) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000009) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x40000, 0x0) 4m31.945024988s ago: executing program 2 (id=333): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x2) sched_setscheduler(0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x589b}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x8, 0x3, 0x498, 0x320, 0xa, 0x148, 0x368, 0x60, 0x400, 0x2a8, 0x2a8, 0x400, 0x2a8, 0x7fffffe, 0x0, {[{{@ip={@multicast2, @multicast2, 0x0, 0x0, 'bridge0\x00', 'rose0\x00'}, 0x0, 0x2f8, 0x368, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x100000, 0x0, 0x2, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x8601, 0x6, './file0\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f2f7b9f28413d9d8ad470ad2b60c45cb4ea6e7bf902bdc2ff8a9304d9f655c746adc0bdc773506378bc2d27efd6abb05175089830cc46186074d7de46d5af300"}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4f8) 4m28.49401787s ago: executing program 2 (id=334): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) ioprio_set$pid(0x2, 0x0, 0x4007) 4m27.98303613s ago: executing program 2 (id=335): syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0xc2}}}}}}, 0x0) 4m27.594988049s ago: executing program 2 (id=336): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="1800"/13], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f07ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000001000000e27f000001"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000005700)={{r2, 0xffffffffffffffff}, &(0x7f0000005680), &(0x7f00000056c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x1b, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x4}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000004}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x1e8629867d7bdaee, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) socketpair(0x1d, 0x2, 0x2, &(0x7f0000000300)={0x0, 0x0}) 4m12.523249026s ago: executing program 2 (id=338): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000ec0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x2c6e02a6a3a98c83, 0x9, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x18) wait4(0x0, 0x0, 0x40000000, 0x0) 4m10.865049913s ago: executing program 2 (id=339): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x9031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 3m25.596111865s ago: executing program 33 (id=339): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x9031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x88}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 1m40.494801562s ago: executing program 1 (id=387): syz_open_dev$ttys(0xc, 0x2, 0x1) mount(0x0, &(0x7f0000000140)='.\x00', &(0x7f0000000080)='proc\x00', 0x199, 0x0) 1m40.264398849s ago: executing program 1 (id=388): r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f00000006c0)=@raw={'raw\x00', 0x4001, 0x3, 0x3e8, 0x0, 0x0, 0x148, 0x0, 0x148, 0x350, 0x240, 0x240, 0x350, 0x240, 0x7fffffe, 0x0, {[{{@ip={@private=0xa010102, @local, 0x0, 0x0, 'ip6gretap0\x00', 'nicvf0\x00', {}, {}, 0x88, 0x3, 0x10}, 0x0, 0xf8, 0x158, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'wg1\x00', {0x0, 0x0, 0x1ff, 0x100000, 0x0, 0xed, 0x7}}}, @common=@unspec=@connmark={{0x30}, {0xfffffff9, 0x8}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, 0x85d, 0xf, [0x10, 0x32, 0x1e, 0x32, 0x2b, 0x25, 0x3f, 0x17, 0x19, 0x22, 0x2c, 0x3d, 0x7, 0x3f, 0x1e, 0x31], 0x0, 0x2, 0x2}}}, {{@ip={@rand_addr=0x64010101, @local, 0xff, 0x0, 'wg0\x00', 'lo\x00', {0xff}, {}, 0x2e, 0x3, 0x4}, 0x0, 0x190, 0x1f8, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x8, 0x9, 0x1, 0x1, 'syz1\x00', 0x2}}, @inet=@rpfilter={{0x28}, {0x8}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0xfff, 0x7e, 0x1c, 'netbios-ns\x00', 'syz0\x00', {0x3}}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x448) syz_emit_ethernet(0x8b1, &(0x7f0000000b40)={@broadcast, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x1, 0x24, 0x8a3, 0x65, 0x0, 0x6, 0x84, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}, "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"}}}}, 0x0) 1m40.028929517s ago: executing program 1 (id=389): socket$inet(0x2, 0x3, 0x8d) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) creat(&(0x7f00000000c0)='./bus\x00', 0x182) epoll_create1(0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b703000000000000850000003300000095"], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r0}, &(0x7f0000000840), &(0x7f0000000880)=r1}, 0x20) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, r3, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000140)=ANY=[], 0x0) 1m39.661545755s ago: executing program 1 (id=390): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1a, 0x8, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vxcan1\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000080000", @ANYRES32, @ANYRES32=r2, @ANYRES32, @ANYBLOB='\x00'/21], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018", @ANYRES32], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={0xffffffffffffffff, 0xfca804a0, 0x10, 0x10, &(0x7f00000002c0)="b800000500000000", &(0x7f0000000300)=""/8, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4c) r3 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x20000000000001d2, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000001000000000"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x30, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'wg1\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000004c00)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x74, r6, {0x0, 0x9}, {0x3}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x88d0}, 0x0) 1m39.250503596s ago: executing program 1 (id=391): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000000)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) writev(r3, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}], 0x1) 1m33.94772964s ago: executing program 1 (id=392): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) keyctl$revoke(0x3, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) 48.420508365s ago: executing program 34 (id=392): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000001c0)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) keyctl$revoke(0x3, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) 28.102862527s ago: executing program 4 (id=403): getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') r1 = memfd_create(&(0x7f0000000680)='v\xa6\xf5lj6,r\xaf\xe8\x10/\xecg\xed\xe3h\x80\xb8!y6w\xda\xdd\xb9\nR\xe8@\x99\xb9\x8a\x0fZ\t\x90\x8bp\x10\x84\x86t\x8a\xba\xc6\xfb\xd2\f\xef&\xad\xa8M\xe8\b\xb0#\xac)\x81\x1e\x8a\f\x11D\x90\xf5\xbb\x1c\xac\xc7\xad\xdc\\\x11\x95\xf8\xe6\xa7\xc3\xbc\x18+\x92\x92N\a\xa7\x7fN\x9bL\xf8\xebQs\x02\xf9\xadi\x8f\x0f\xff\x02n\x9d\x85\xea\x1a*\x1bC\xd8\x1c\xe8\x9bYSp\xa5\xfd\ny\xdfS\xdbU\xf8l\xb5b\x83\x00\x00\x00\x00\xfc\x83\x18\xe46\x8a\x029\x19\x8fjC\xce\xa7S\x81\xd5\xda\x84\xdf\xe3A_\x05XCk\x1d\x1cC\x97r\x93\xd6t\x81b\xc7x\xab\xa2\xf0\av\x88\x01\x92\xeaF\xa9!\xfc\x1c\xbf7q\xcf\xed&\x96\xa6\x1c_\xff\xb4\x00X\x1b\xf2w\xc1\x00\x00\x00\x00\xe0T\x1f\xbc\x85\xd1Z\xa9\x01Z\xc2\xb0\f\x9a\x16\xa5?\xf74\x88\xeez@)&\xb5\a\xc1\v\xe7\xdf\x80\xe4\x9c\xf5f\x94jC\xb1\xcfh\xc5g\x02\xc6 U\xe5\xcea\x88\xee\x0f\xf57*\xb3\xe8iWTav\xff\xd9\xb0C\x1e\xbe\x97\xc8$-\x8d)\xe8\\\x8e;I\xde\x8a\x8e\x0fq\x06\xee\xb9\xc1\xf1)\xa0\xd9T\xec\x8b\x85I\x87OZ\xd8\"4\x87\xb1\xed?:\x84S\xb9\xbf\xab#\xd0N\x8f\x1ey7\x9286p\x10uZ\xf0', 0x0) write(r1, &(0x7f0000002140)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r1, 0x0) readlinkat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000032240)=""/102400, 0x19000) 27.873255614s ago: executing program 4 (id=404): add_key$fscrypt_provisioning(0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff) bpf$MAP_CREATE(0x0, 0x0, 0x48) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x3ff}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) mknodat(0xffffffffffffff9c, &(0x7f0000000140)='./file4\x00', 0x11c0, 0x80000) openat2$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file4\x00', &(0x7f0000000380)={0x8a001, 0x0, 0x12}, 0x1e) 25.144332931s ago: executing program 4 (id=405): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) r4 = dup(r1) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r0, &(0x7f00000003c0)=ANY=[], 0x94) 24.803635657s ago: executing program 4 (id=406): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0, r1}, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'rose0\x00', 0x112}) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000100)={'vlan0\x00', 0x400}) 24.37393279s ago: executing program 4 (id=407): sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = socket$inet6(0xa, 0x2, 0x3a) r1 = dup(r0) bind$unix(r1, &(0x7f00000002c0)=@abs={0xa, 0x2}, 0x6e) sendmsg$nl_generic(r1, 0x0, 0x40004) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r2, 0x0, &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r3}, 0x18) r4 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r4, &(0x7f0000000a00)={'syz1\x00', {0x9, 0x27, 0x5, 0x5}, 0x5, [0x9, 0x2, 0x8, 0x2, 0x5334, 0x400, 0x80000000, 0x5, 0xa, 0x3, 0x6, 0x5, 0xfbfffffb, 0x39, 0x747d5e13, 0x8, 0x99, 0xfffffffc, 0x4, 0xfffffffb, 0x4, 0x3, 0x4, 0xf252, 0x80, 0x802, 0x300000, 0x7, 0xe, 0x4623f, 0x0, 0x0, 0x1ff, 0x8000, 0xfffffffe, 0x3, 0xd, 0x3, 0xba55, 0x8da8, 0x2, 0x200, 0x2, 0x400008, 0xe, 0x4, 0x2, 0xde, 0x8, 0x9, 0x1, 0x199f, 0x8, 0x2, 0x9, 0xffffffff, 0x4, 0x6, 0x1000, 0x5, 0x40, 0x9, 0xa, 0x5], [0x6, 0x1e, 0x3, 0x8000, 0xfffffffe, 0x3, 0x0, 0x25, 0x7, 0xfffffffc, 0x4, 0x7fff, 0x72c, 0x1c33, 0x2, 0x1, 0x10000, 0x400, 0x8001, 0x3, 0x1, 0x297, 0x5, 0x0, 0x981, 0x4, 0x8, 0x3ff, 0x5, 0xfffffffe, 0x0, 0x1000001, 0x10, 0xfffffff9, 0xfffffffd, 0x80000009, 0x1, 0xffffffff, 0x6, 0x5, 0x800, 0xffff, 0x6, 0x96, 0xfffffff9, 0x2, 0x0, 0x2, 0x401, 0xc, 0x3, 0x379, 0x9, 0xe, 0x5, 0x7, 0x7ff, 0x2, 0x1, 0x1, 0x8, 0x6, 0x200, 0x3], [0x401, 0xc584, 0xffff, 0xcd3, 0x7, 0x20, 0x400, 0x4, 0x8, 0x10, 0x7, 0x9, 0xe87, 0x9, 0x80000001, 0x8, 0x3f92, 0x1000, 0x2, 0x10, 0x1, 0xfffffff9, 0xe55, 0x1000, 0x80000001, 0x4, 0x4, 0x5, 0x200003, 0x400, 0x5, 0x80, 0x218c, 0x8001, 0x47, 0x0, 0x3, 0x4, 0x3, 0x6d7e, 0x3, 0x8, 0x5, 0xbf23, 0x6, 0xc, 0x86, 0x0, 0x3ff, 0x3, 0x652, 0x100fffd, 0x2005, 0x5, 0x4, 0xea, 0x9, 0x20000007, 0x6, 0xd9, 0x0, 0x7d, 0x401, 0x5], [0x108e, 0xffff, 0x3, 0x3, 0x88, 0x2, 0x6, 0x4, 0x50, 0x2, 0x763, 0x7, 0x402, 0x800, 0x100005, 0x1000, 0x7f, 0x5, 0x3fa6, 0x7, 0x0, 0x5, 0x1e2, 0x4, 0x9, 0x3, 0x3, 0x3, 0x200, 0x1000, 0x203b, 0x20000002, 0x5, 0x800, 0xff, 0x65f413f9, 0xfffffff8, 0x20008, 0x8a8, 0x2, 0x40, 0x40000409, 0x7, 0x8, 0x4, 0x10, 0x4, 0x0, 0x7fff, 0x0, 0xfffffff8, 0x8401, 0x1, 0x200, 0x7, 0x8, 0xfffffffd, 0xa, 0xe, 0x2, 0x40, 0xf, 0x136, 0x6]}, 0x45c) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r5 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f000007"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r9}, 0x10) r10 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r10, 0x8946, &(0x7f00000002c0)={'veth0_vlan\x00', &(0x7f0000000000)=@ethtool_cmd={0x26, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xfffffffb]}}) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x84022, &(0x7f0000000840)=ANY=[@ANYBLOB='nr_inodes=7,inode32\f\x00']) ioctl$UI_DEV_CREATE(r4, 0x5501) 22.673653729s ago: executing program 3 (id=410): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x0, 0x4e20, 0x8}}}}}, 0x0) 22.319774156s ago: executing program 3 (id=411): write$FUSE_LSEEK(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_load(r2, &(0x7f0000000080)=ANY=[], 0x2000) 21.914108426s ago: executing program 3 (id=412): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003340)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) r2 = socket(0x10, 0x3, 0x0) connect$netlink(r2, &(0x7f0000000280)=@proc={0x10, 0x0, 0x1, 0x80}, 0xc) sendmsg$nl_route_sched(r2, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000001500)=@newtaction={0x18, 0x31, 0x829, 0x0, 0x0, {0x0, 0x0, 0x2}, [{0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4010}, 0x8084) 21.442618032s ago: executing program 3 (id=413): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), 0xffffffffffffffff) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) ptrace$ARCH_MAP_VDSO_32(0x1e, r2, 0x3, 0x2002) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0xc) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f0000000400)={0x3c, r1, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_DEBUG_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x10, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x8, 0x3, 0x0, 0x1, [{0x4}]}]}]}, 0x3c}}, 0x4000080) 4.502514438s ago: executing program 4 (id=414): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000380)=0x202) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$fou(0x0, r3) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000000)={'team_slave_0\x00', &(0x7f0000002fc0)=@ethtool_stats={0x33}}) 2.608733551s ago: executing program 3 (id=415): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x13) ppoll(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000100)={0xffff7fff, 0x1, 0xb, 0x9, 0x1b, "fb8ffd625eb8e114fac77cbed6bfebbca8e84e"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x8) 0s ago: executing program 3 (id=416): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x200000000000008b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000000)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) writev(r2, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}], 0x1) kernel console output (not intermixed with test programs): [ 46.911374][ T29] audit: type=1400 audit(46.810:56): avc: denied { read write } for pid=3088 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 46.914292][ T29] audit: type=1400 audit(46.810:57): avc: denied { open } for pid=3088 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:19271' (ED25519) to the list of known hosts. [ 58.469704][ T29] audit: type=1400 audit(58.370:58): avc: denied { name_bind } for pid=3091 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 60.524649][ T29] audit: type=1400 audit(60.410:59): avc: denied { execute } for pid=3092 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 60.556357][ T29] audit: type=1400 audit(60.440:60): avc: denied { execute_no_trans } for pid=3092 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 63.016707][ T29] audit: type=1400 audit(62.920:61): avc: denied { mounton } for pid=3092 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 63.023041][ T29] audit: type=1400 audit(62.920:62): avc: denied { mount } for pid=3092 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.040982][ T3092] cgroup: Unknown subsys name 'net' [ 63.050763][ T29] audit: type=1400 audit(62.950:63): avc: denied { unmount } for pid=3092 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 63.196605][ T3092] cgroup: Unknown subsys name 'cpuset' [ 63.201469][ T3092] cgroup: Unknown subsys name 'hugetlb' [ 63.202339][ T3092] cgroup: Unknown subsys name 'rlimit' [ 63.476053][ T29] audit: type=1400 audit(63.380:64): avc: denied { setattr } for pid=3092 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.477995][ T29] audit: type=1400 audit(63.380:65): avc: denied { mounton } for pid=3092 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 63.481988][ T29] audit: type=1400 audit(63.380:66): avc: denied { mount } for pid=3092 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 63.664718][ T3094] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 63.666527][ T29] audit: type=1400 audit(63.570:67): avc: denied { relabelto } for pid=3094 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 63.672357][ T29] audit: type=1400 audit(63.570:68): avc: denied { write } for pid=3094 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 63.718253][ T29] audit: type=1400 audit(63.620:69): avc: denied { read } for pid=3092 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 63.718788][ T29] audit: type=1400 audit(63.620:70): avc: denied { open } for pid=3092 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 71.158548][ T3092] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 73.123097][ T29] audit: type=1400 audit(73.020:71): avc: denied { execmem } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 73.181335][ T29] audit: type=1400 audit(73.080:72): avc: denied { read } for pid=3097 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 73.182851][ T29] audit: type=1400 audit(73.080:73): avc: denied { open } for pid=3097 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 73.192335][ T29] audit: type=1400 audit(73.090:74): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 73.218428][ T29] audit: type=1400 audit(73.120:76): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 73.220261][ T29] audit: type=1400 audit(73.120:75): avc: denied { module_request } for pid=3098 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 73.294741][ T29] audit: type=1400 audit(73.190:77): avc: denied { sys_module } for pid=3098 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 73.787574][ T29] audit: type=1400 audit(73.690:78): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.771686][ T3098] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.783110][ T3098] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.930947][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.940197][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 75.566167][ T3098] hsr_slave_0: entered promiscuous mode [ 75.570273][ T3098] hsr_slave_1: entered promiscuous mode [ 75.712818][ T3097] hsr_slave_0: entered promiscuous mode [ 75.717318][ T3097] hsr_slave_1: entered promiscuous mode [ 75.718565][ T3097] debugfs: 'hsr0' already exists in 'hsr' [ 75.720071][ T3097] Cannot create hsr debugfs directory [ 76.080886][ T29] audit: type=1400 audit(75.980:79): avc: denied { create } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.087874][ T29] audit: type=1400 audit(75.990:80): avc: denied { write } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 76.092566][ T3098] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 76.108411][ T3098] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 76.121805][ T3098] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 76.130898][ T3098] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 76.212753][ T3097] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 76.222416][ T3097] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 76.236031][ T3097] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 76.250950][ T3097] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 76.951970][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.969001][ T3098] 8021q: adding VLAN 0 to HW filter on device bond0 [ 79.529087][ T3097] veth0_vlan: entered promiscuous mode [ 79.553285][ T3097] veth1_vlan: entered promiscuous mode [ 79.617293][ T3097] veth0_macvtap: entered promiscuous mode [ 79.627854][ T3097] veth1_macvtap: entered promiscuous mode [ 79.691648][ T12] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.692378][ T12] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.692498][ T12] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.692598][ T12] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.788572][ T3098] veth0_vlan: entered promiscuous mode [ 79.790459][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 79.794684][ T29] audit: type=1400 audit(79.690:82): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 79.796358][ T29] audit: type=1400 audit(79.700:83): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.4FMo1w/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 79.798941][ T29] audit: type=1400 audit(79.700:84): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 79.806314][ T29] audit: type=1400 audit(79.710:85): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.4FMo1w/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 79.808514][ T29] audit: type=1400 audit(79.710:86): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.4FMo1w/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2479 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 79.839056][ T29] audit: type=1400 audit(79.740:87): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 79.847130][ T29] audit: type=1400 audit(79.750:88): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 79.852714][ T29] audit: type=1400 audit(79.750:89): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="gadgetfs" ino=840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 79.857589][ T3098] veth1_vlan: entered promiscuous mode [ 79.861288][ T29] audit: type=1400 audit(79.760:90): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 79.866096][ T29] audit: type=1400 audit(79.770:91): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 79.932059][ T3097] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 79.964946][ T3098] veth0_macvtap: entered promiscuous mode [ 79.986432][ T3098] veth1_macvtap: entered promiscuous mode [ 80.112117][ T32] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.112562][ T32] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.112665][ T32] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 80.112729][ T32] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 81.921702][ T3811] binder: 3810:3811 ioctl c00c620f 200001c0 returned -22 [ 83.025414][ T3821] random: crng reseeded on system resumption [ 84.745574][ T3832] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 86.369772][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 86.370143][ T29] audit: type=1400 audit(86.270:113): avc: denied { create } for pid=3834 comm="syz.1.15" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 86.392589][ T29] audit: type=1400 audit(86.290:114): avc: denied { mounton } for pid=3834 comm="syz.1.15" path="/2/file0" dev="tmpfs" ino=28 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 88.929949][ T29] audit: type=1400 audit(88.830:115): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 88.992088][ T29] audit: type=1400 audit(88.890:116): avc: denied { unlink } for pid=3098 comm="syz-executor" name="file0" dev="tmpfs" ino=28 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 90.658934][ T29] audit: type=1400 audit(90.560:117): avc: denied { create } for pid=3872 comm="syz.1.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 90.672620][ T29] audit: type=1400 audit(90.570:118): avc: denied { ioctl } for pid=3872 comm="syz.1.20" path="socket:[963]" dev="sockfs" ino=963 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 90.947872][ T29] audit: type=1400 audit(90.850:119): avc: denied { create } for pid=3874 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 90.949764][ T29] audit: type=1400 audit(90.850:120): avc: denied { write } for pid=3874 comm="syz.0.21" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 90.965284][ T29] audit: type=1326 audit(90.860:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 90.967832][ T29] audit: type=1326 audit(90.870:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 91.485877][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 91.486809][ T29] audit: type=1326 audit(91.390:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 91.490683][ T29] audit: type=1326 audit(91.390:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 91.538683][ T29] audit: type=1326 audit(91.440:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132510 code=0x7ffc0000 [ 91.539935][ T29] audit: type=1326 audit(91.440:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 91.542003][ T29] audit: type=1326 audit(91.440:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x132510 code=0x7ffc0000 [ 91.547724][ T29] audit: type=1326 audit(91.450:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 91.549748][ T29] audit: type=1326 audit(91.450:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 91.557121][ T29] audit: type=1326 audit(91.460:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 91.559000][ T29] audit: type=1326 audit(91.460:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 91.562341][ T29] audit: type=1326 audit(91.460:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3874 comm="syz.0.21" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 91.658385][ T3876] process 'syz.0.21' launched '/dev/fd/9' with NULL argv: empty string added [ 110.230680][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 110.234425][ T29] audit: type=1326 audit(110.130:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3903 comm="syz.0.28" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 110.236328][ T29] audit: type=1326 audit(110.140:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3903 comm="syz.0.28" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 110.238459][ T29] audit: type=1326 audit(110.140:164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3903 comm="syz.0.28" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 110.240660][ T29] audit: type=1326 audit(110.140:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3903 comm="syz.0.28" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 110.242535][ T29] audit: type=1326 audit(110.140:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3903 comm="syz.0.28" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 110.254309][ T29] audit: type=1326 audit(110.140:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3903 comm="syz.0.28" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 110.254777][ T29] audit: type=1326 audit(110.150:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3903 comm="syz.0.28" exe="/syz-executor" sig=0 arch=40000028 syscall=161 compat=0 ip=0x132510 code=0x7ffc0000 [ 110.254953][ T29] audit: type=1326 audit(110.150:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3903 comm="syz.0.28" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 122.999837][ T3915] syz.1.32 uses obsolete (PF_INET,SOCK_PACKET) [ 133.437366][ T3921] netlink: 4 bytes leftover after parsing attributes in process `syz.0.33'. [ 139.280427][ T3932] cgroup: Unknown subsys name 'cpuset' [ 154.052848][ T29] audit: type=1400 audit(153.950:170): avc: denied { create } for pid=3935 comm="syz.0.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 154.701382][ T3941] netlink: 'syz.0.40': attribute type 12 has an invalid length. [ 155.175135][ T41] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 155.394878][ T41] usb 1-1: Using ep0 maxpacket: 32 [ 155.426682][ T41] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 155.428738][ T41] usb 1-1: New USB device found, idVendor=04e7, idProduct=0009, bcdDevice= 0.00 [ 155.432747][ T41] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 155.458996][ T41] usb 1-1: config 0 descriptor?? [ 155.969293][ T41] elo 0003:04E7:0009.0001: item fetching failed at offset 4/5 [ 155.975805][ T41] elo 0003:04E7:0009.0001: parse failed [ 155.976819][ T41] elo 0003:04E7:0009.0001: probe with driver elo failed with error -22 [ 156.129117][ T3860] usb 1-1: USB disconnect, device number 2 [ 156.414910][ T29] audit: type=1326 audit(156.300:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 156.416283][ T29] audit: type=1326 audit(156.320:172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 156.425840][ T29] audit: type=1326 audit(156.330:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=168 compat=0 ip=0x132510 code=0x7ffc0000 [ 156.435159][ T29] audit: type=1326 audit(156.340:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 156.436032][ T29] audit: type=1326 audit(156.340:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 156.439572][ T29] audit: type=1326 audit(156.340:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 156.441413][ T29] audit: type=1326 audit(156.340:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 156.443087][ T29] audit: type=1326 audit(156.340:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 156.454420][ T29] audit: type=1326 audit(156.340:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3960 comm="syz.0.42" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 158.557974][ T3966] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 161.112800][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 161.113218][ T29] audit: type=1400 audit(161.010:201): avc: denied { create } for pid=3962 comm="syz.0.43" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 175.814866][ T3866] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 175.991117][ T3866] usb 2-1: config 0 interface 0 altsetting 3 endpoint 0x81 has invalid wMaxPacketSize 0 [ 175.991632][ T3866] usb 2-1: config 0 interface 0 altsetting 3 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 175.992015][ T3866] usb 2-1: config 0 interface 0 has no altsetting 0 [ 175.992139][ T3866] usb 2-1: New USB device found, idVendor=0fc5, idProduct=b080, bcdDevice= 0.00 [ 175.992182][ T3866] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 176.006809][ T3866] usb 2-1: config 0 descriptor?? [ 176.456856][ T3866] hid-led 0003:0FC5:B080.0002: unknown main item tag 0x0 [ 176.457417][ T3866] hid-led 0003:0FC5:B080.0002: unknown main item tag 0x0 [ 176.457547][ T3866] hid-led 0003:0FC5:B080.0002: unknown main item tag 0x0 [ 176.457639][ T3866] hid-led 0003:0FC5:B080.0002: unknown main item tag 0x0 [ 176.457726][ T3866] hid-led 0003:0FC5:B080.0002: unknown main item tag 0x0 [ 177.099946][ T3875] usb 2-1: USB disconnect, device number 2 [ 193.727864][ T3886] usb 2-1: new full-speed USB device number 3 using dummy_hcd [ 193.978992][ T3886] usb 2-1: unable to get BOS descriptor or descriptor too short [ 193.994565][ T3886] usb 2-1: not running at top speed; connect to a high speed hub [ 194.009806][ T3886] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 194.011994][ T3886] usb 2-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 194.012445][ T3886] usb 2-1: config 1 has no interface number 1 [ 194.012866][ T3886] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 0 [ 194.036259][ T3886] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 194.036566][ T3886] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 194.036829][ T3886] usb 2-1: Product: syz [ 194.036976][ T3886] usb 2-1: Manufacturer: syz [ 194.037125][ T3886] usb 2-1: SerialNumber: syz [ 194.264897][ T3886] hub 2-1:1.0: Invalid hub with more than one config or interface [ 194.266044][ T3886] hub 2-1:1.0: probe with driver hub failed with error -22 [ 194.359886][ T3886] usb 2-1: USB disconnect, device number 3 [ 194.610704][ T29] audit: type=1326 audit(194.510:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4058 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 194.632680][ T29] audit: type=1326 audit(194.520:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4058 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=251 compat=0 ip=0x132510 code=0x7ffc0000 [ 194.634851][ T29] audit: type=1326 audit(194.530:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4058 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 194.636429][ T29] audit: type=1326 audit(194.530:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4058 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132510 code=0x7ffc0000 [ 194.637963][ T29] audit: type=1326 audit(194.530:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4058 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 194.639955][ T29] audit: type=1326 audit(194.530:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4058 comm="syz.1.55" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 197.565381][ T29] audit: type=1400 audit(197.460:208): avc: denied { create } for pid=4065 comm="syz.1.58" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 211.282390][ T4070] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 211.306802][ T4070] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 212.131227][ T29] audit: type=1400 audit(213.029:209): avc: denied { relabelfrom } for pid=4277 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 212.134826][ T29] audit: type=1400 audit(213.029:210): avc: denied { relabelto } for pid=4277 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 212.677724][ T4070] hsr_slave_0: entered promiscuous mode [ 212.679282][ T4070] hsr_slave_1: entered promiscuous mode [ 212.696131][ T4070] debugfs: 'hsr0' already exists in 'hsr' [ 212.696499][ T4070] Cannot create hsr debugfs directory [ 213.364796][ T3807] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 213.403511][ T4070] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 213.422805][ T4070] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 213.448025][ T4070] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 213.458826][ T4070] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 213.523299][ T3807] usb 2-1: config 0 interface 0 altsetting 3 endpoint 0x81 has invalid wMaxPacketSize 0 [ 213.524354][ T3807] usb 2-1: config 0 interface 0 altsetting 3 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 213.524449][ T3807] usb 2-1: config 0 interface 0 has no altsetting 0 [ 213.524531][ T3807] usb 2-1: New USB device found, idVendor=0fc5, idProduct=b080, bcdDevice= 0.00 [ 213.524642][ T3807] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 213.533467][ T3807] usb 2-1: config 0 descriptor?? [ 213.990380][ T3807] hid-led 0003:0FC5:B080.0003: unknown main item tag 0x0 [ 213.990919][ T3807] hid-led 0003:0FC5:B080.0003: unknown main item tag 0x0 [ 213.991161][ T3807] hid-led 0003:0FC5:B080.0003: unknown main item tag 0x0 [ 213.991277][ T3807] hid-led 0003:0FC5:B080.0003: unknown main item tag 0x0 [ 213.991375][ T3807] hid-led 0003:0FC5:B080.0003: unknown main item tag 0x0 [ 214.454233][ T3807] hid-led 0003:0FC5:B080.0003: probe with driver hid-led failed with error -71 [ 214.459698][ T3807] usb 2-1: USB disconnect, device number 4 [ 216.114856][ T4070] 8021q: adding VLAN 0 to HW filter on device bond0 [ 223.802260][ T4070] veth0_vlan: entered promiscuous mode [ 223.822397][ T4070] veth1_vlan: entered promiscuous mode [ 223.893436][ T4070] veth0_macvtap: entered promiscuous mode [ 223.936222][ T4070] veth1_macvtap: entered promiscuous mode [ 224.033631][ T2043] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.034913][ T2043] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.035285][ T2043] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 224.035512][ T2043] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 231.727651][ T29] audit: type=1400 audit(232.609:211): avc: denied { connect } for pid=4458 comm="syz.2.66" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 237.604441][ T3875] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 237.826198][ T3875] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 237.827486][ T3875] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 237.844578][ T3875] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 237.874387][ T3875] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 237.874804][ T3875] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 237.879692][ T3875] usb 2-1: config 0 descriptor?? [ 238.367214][ T3875] plantronics 0003:047F:FFFF.0004: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 238.573080][ T3866] usb 2-1: USB disconnect, device number 5 [ 244.094496][ T29] audit: type=1400 audit(244.989:212): avc: denied { mounton } for pid=4489 comm="syz.1.69" path="/33/file0" dev="tmpfs" ino=185 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 247.237039][ T4496] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 247.237828][ T4496] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 267.046664][ T32] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 267.133218][ T32] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 267.262149][ T32] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 267.792956][ T32] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 268.511452][ T32] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 268.521680][ T32] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 268.533027][ T32] bond0 (unregistering): Released all slaves [ 268.634999][ T32] hsr_slave_0: left promiscuous mode [ 268.638282][ T32] hsr_slave_1: left promiscuous mode [ 268.649116][ T32] veth1_macvtap: left promiscuous mode [ 268.649618][ T32] veth0_macvtap: left promiscuous mode [ 268.650132][ T32] veth1_vlan: left promiscuous mode [ 268.650540][ T32] veth0_vlan: left promiscuous mode [ 269.121666][ T29] audit: type=1400 audit(270.019:213): avc: denied { nlmsg_write } for pid=4539 comm="syz.2.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 270.704809][ T4565] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 270.705974][ T4565] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 286.277853][ T29] audit: type=1400 audit(287.179:214): avc: denied { write } for pid=4608 comm="syz.1.83" name="unix" dev="proc" ino=4026532685 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 292.528300][ T29] audit: type=1400 audit(293.429:215): avc: denied { connect } for pid=4624 comm="syz.2.86" lport=132 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 292.531758][ T29] audit: type=1326 audit(293.429:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4622 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 292.560604][ T29] audit: type=1326 audit(293.459:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4622 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 292.568384][ T29] audit: type=1326 audit(293.469:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4622 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 292.585543][ T29] audit: type=1326 audit(293.489:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4622 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 292.588491][ T29] audit: type=1326 audit(293.489:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4622 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 292.590177][ T29] audit: type=1326 audit(293.489:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4622 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 292.592277][ T29] audit: type=1326 audit(293.489:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4622 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 292.596841][ T29] audit: type=1326 audit(293.499:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4622 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132510 code=0x7ffc0000 [ 292.599400][ T29] audit: type=1400 audit(293.499:224): avc: denied { allowed } for pid=4622 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 310.039284][ T29] kauditd_printk_skb: 307 callbacks suppressed [ 310.039585][ T29] audit: type=1400 audit(310.939:532): avc: denied { name_bind } for pid=4659 comm="syz.1.87" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 310.046397][ T29] audit: type=1400 audit(310.949:533): avc: denied { node_bind } for pid=4659 comm="syz.1.87" saddr=::ffff:172.20.20.170 src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 312.222394][ T29] audit: type=1400 audit(313.119:534): avc: denied { bind } for pid=4670 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 312.228776][ T29] audit: type=1400 audit(313.129:535): avc: denied { node_bind } for pid=4670 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 331.374800][ T29] audit: type=1400 audit(332.269:536): avc: denied { name_bind } for pid=4688 comm="syz.1.96" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 332.504683][ T29] audit: type=1400 audit(333.399:537): avc: denied { map } for pid=4691 comm="syz.2.97" path="socket:[3740]" dev="sockfs" ino=3740 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 332.505044][ T29] audit: type=1400 audit(333.399:538): avc: denied { read } for pid=4691 comm="syz.2.97" path="socket:[3740]" dev="sockfs" ino=3740 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 337.787075][ T4697] Zero length message leads to an empty skb [ 337.851970][ T29] audit: type=1400 audit(338.749:539): avc: denied { write } for pid=4694 comm="syz.2.98" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 349.745740][ T29] audit: type=1400 audit(350.649:540): avc: denied { set_context_mgr } for pid=4705 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 350.921376][ T29] audit: type=1400 audit(351.819:541): avc: denied { write } for pid=4707 comm="syz.2.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 350.932286][ T4708] netlink: 8 bytes leftover after parsing attributes in process `syz.2.103'. [ 350.932840][ T4708] netlink: 'syz.2.103': attribute type 2 has an invalid length. [ 351.057107][ T29] audit: type=1400 audit(351.959:542): avc: denied { create } for pid=4709 comm="syz.2.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 351.070807][ T29] audit: type=1400 audit(351.969:543): avc: denied { setopt } for pid=4709 comm="syz.2.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 351.127146][ T29] audit: type=1400 audit(352.029:544): avc: denied { call } for pid=4705 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 351.128904][ T4706] binder_alloc: 4705: binder_alloc_buf, no vma [ 354.078109][ T4724] pim6reg1: entered promiscuous mode [ 354.079301][ T4724] pim6reg1: entered allmulticast mode [ 358.289083][ T4732] x_tables: duplicate underflow at hook 4 [ 363.302291][ T29] audit: type=1326 audit(364.199:545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4742 comm="syz.2.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 363.317242][ T29] audit: type=1326 audit(364.219:546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4742 comm="syz.2.113" exe="/syz-executor" sig=0 arch=40000028 syscall=71 compat=0 ip=0x132510 code=0x7ffc0000 [ 363.321368][ T29] audit: type=1326 audit(364.219:547): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4742 comm="syz.2.113" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 371.122270][ T4755] binder: 4753:4755 ioctl c018620c 20000080 returned -22 [ 371.638525][ T4760] cgroup: Unknown subsys name '¬§@﬽æì¦4*oäÂÒ£hÓîºoþüíUÜ' [ 378.033951][ T4766] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=4766 comm=syz.1.121 [ 378.044770][ T29] audit: type=1400 audit(378.939:548): avc: denied { audit_write } for pid=4763 comm="syz.1.121" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 378.045052][ T29] audit: type=1107 audit(378.939:549): pid=4763 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 395.038100][ T3888] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 395.298904][ T3888] usb 2-1: Using ep0 maxpacket: 16 [ 395.341140][ T3888] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x1 has an invalid bInterval 0, changing to 7 [ 395.342377][ T3888] usb 2-1: config 1 interface 1 altsetting 1 endpoint 0x1 has invalid wMaxPacketSize 0 [ 395.345013][ T3888] usb 2-1: config 1 interface 2 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 395.416181][ T3888] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 395.417252][ T3888] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 395.421873][ T3888] usb 2-1: Product: syz [ 395.422709][ T3888] usb 2-1: Manufacturer: syz [ 395.423382][ T3888] usb 2-1: SerialNumber: syz [ 395.895624][ T3888] usb 2-1: 2:1 : UAC_AS_GENERAL descriptor not found [ 396.319336][ T4653] usb 2-1: USB disconnect, device number 6 [ 402.383472][ T29] audit: type=1400 audit(403.279:550): avc: denied { unmount } for pid=4815 comm="syz.2.129" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 402.706879][ T29] audit: type=1400 audit(403.609:551): avc: denied { ioctl } for pid=4817 comm="syz.2.130" path="socket:[3855]" dev="sockfs" ino=3855 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 402.710132][ T29] audit: type=1400 audit(403.609:552): avc: denied { bind } for pid=4817 comm="syz.2.130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 421.094772][ T4646] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 421.284851][ T4646] usb 2-1: Using ep0 maxpacket: 32 [ 421.380101][ T4646] usb 2-1: config 250 has an invalid interface number: 8 but max is 0 [ 421.405730][ T4646] usb 2-1: config 250 has no interface number 0 [ 421.414684][ T4646] usb 2-1: New USB device found, idVendor=0ac8, idProduct=3410, bcdDevice=b6.f9 [ 421.415608][ T4646] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 421.628621][ T4646] usb 2-1: string descriptor 0 read error: -71 [ 421.645145][ T4646] usb 2-1: USB disconnect, device number 7 [ 430.284482][ T29] audit: type=1400 audit(431.169:553): avc: denied { execute_no_trans } for pid=4862 comm="syz.2.144" path="/44/file0" dev="tmpfs" ino=245 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 433.744122][ C0] hrtimer: interrupt took 7487616 ns [ 440.999929][ T29] audit: type=1326 audit(441.899:554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4866 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 441.007938][ T29] audit: type=1326 audit(441.909:555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4866 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 441.011600][ T29] audit: type=1326 audit(441.909:556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4866 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=237 compat=0 ip=0x132510 code=0x7ffc0000 [ 441.034407][ T29] audit: type=1326 audit(441.929:557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4866 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 450.689412][ T29] audit: type=1326 audit(451.589:558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 450.689903][ T29] audit: type=1326 audit(451.589:559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 450.699237][ T29] audit: type=1326 audit(451.599:560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 450.699650][ T29] audit: type=1326 audit(451.599:561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 450.711108][ T29] audit: type=1326 audit(451.609:562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 450.711662][ T29] audit: type=1326 audit(451.609:563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 450.717712][ T29] audit: type=1326 audit(451.619:564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 450.719137][ T29] audit: type=1326 audit(451.619:565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 450.726239][ T29] audit: type=1326 audit(451.629:566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=363 compat=0 ip=0x132510 code=0x7ffc0000 [ 450.728879][ T29] audit: type=1326 audit(451.629:567): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4903 comm="syz.1.152" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 459.066338][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 459.069564][ T29] audit: type=1400 audit(459.969:573): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 459.071283][ T29] audit: type=1400 audit(459.969:574): avc: denied { open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 459.086850][ T29] audit: type=1400 audit(459.979:575): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 459.238306][ T29] audit: type=1400 audit(460.139:576): avc: denied { read } for pid=4916 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 459.339549][ T29] audit: type=1400 audit(460.239:577): avc: denied { execmem } for pid=4916 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 461.810607][ T29] audit: type=1400 audit(462.709:578): avc: denied { prog_load } for pid=4916 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 461.825080][ T29] audit: type=1400 audit(462.729:579): avc: denied { bpf } for pid=4916 comm="syz.1.157" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 461.829731][ T29] audit: type=1400 audit(462.729:580): avc: denied { perfmon } for pid=4916 comm="syz.1.157" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 461.834076][ T29] audit: type=1400 audit(462.729:581): avc: denied { prog_run } for pid=4916 comm="syz.1.157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 461.851395][ T29] audit: type=1400 audit(462.749:582): avc: denied { read write } for pid=4916 comm="syz.1.157" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 466.391526][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 466.398776][ T29] audit: type=1400 audit(467.289:586): avc: denied { map_create } for pid=4927 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 466.400480][ T29] audit: type=1400 audit(467.289:587): avc: denied { map_read map_write } for pid=4927 comm="syz.1.161" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 474.630369][ T29] audit: type=1326 audit(475.529:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4932 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 474.632363][ T29] audit: type=1326 audit(475.529:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4932 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 474.639193][ T29] audit: type=1326 audit(475.529:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4932 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 474.643446][ T29] audit: type=1326 audit(475.529:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4932 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 487.287769][ T29] audit: type=1400 audit(488.189:592): avc: denied { create } for pid=4936 comm="syz.2.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 487.291946][ T29] audit: type=1400 audit(488.189:593): avc: denied { create } for pid=4936 comm="syz.2.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 487.298209][ T29] audit: type=1400 audit(488.199:594): avc: denied { write } for pid=4936 comm="syz.2.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 487.374462][ T29] audit: type=1400 audit(488.269:595): avc: denied { create } for pid=4938 comm="syz.2.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 487.379205][ T29] audit: type=1400 audit(488.279:596): avc: denied { write } for pid=4938 comm="syz.2.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 487.405778][ T29] audit: type=1400 audit(488.279:597): avc: denied { nlmsg_write } for pid=4938 comm="syz.2.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 495.398725][ T29] audit: type=1400 audit(496.299:598): avc: denied { open } for pid=4947 comm="syz.1.169" path="/dev/raw-gadget" dev="devtmpfs" ino=692 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 495.399116][ T29] audit: type=1400 audit(496.299:599): avc: denied { ioctl } for pid=4947 comm="syz.1.169" path="/dev/raw-gadget" dev="devtmpfs" ino=692 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 495.634745][ T4651] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 495.794995][ T4651] usb 2-1: Using ep0 maxpacket: 32 [ 495.814113][ T4651] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 495.814465][ T4651] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 495.814798][ T4651] usb 2-1: New USB device found, idVendor=27b8, idProduct=01ed, bcdDevice= 0.00 [ 495.814894][ T4651] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 495.819703][ T4651] usb 2-1: config 0 descriptor?? [ 496.257964][ T4651] hid-led 0003:27B8:01ED.0005: item fetching failed at offset 0/2 [ 496.258613][ T4651] hid-led 0003:27B8:01ED.0005: probe with driver hid-led failed with error -22 [ 496.540715][ T29] audit: type=1400 audit(497.439:600): avc: denied { write } for pid=4947 comm="syz.1.169" name="pfkey" dev="proc" ino=4026532721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 496.559291][ T29] audit: type=1326 audit(497.459:601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4947 comm="syz.1.169" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 496.561112][ T29] audit: type=1326 audit(497.459:602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4947 comm="syz.1.169" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 496.568462][ T29] audit: type=1326 audit(497.469:603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4947 comm="syz.1.169" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 496.570780][ T29] audit: type=1326 audit(497.469:604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4947 comm="syz.1.169" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 496.578446][ T29] audit: type=1326 audit(497.479:605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4947 comm="syz.1.169" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 496.590154][ T29] audit: type=1326 audit(497.489:606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4947 comm="syz.1.169" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 496.591529][ T29] audit: type=1326 audit(497.489:607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4947 comm="syz.1.169" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 498.866487][ T3888] usb 2-1: USB disconnect, device number 8 [ 500.731446][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 500.744266][ T29] audit: type=1326 audit(501.629:631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 500.746533][ T29] audit: type=1326 audit(501.649:632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 500.752955][ T29] audit: type=1326 audit(501.649:633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 500.753267][ T29] audit: type=1326 audit(501.649:634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 500.769999][ T29] audit: type=1326 audit(501.669:635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 500.772413][ T29] audit: type=1326 audit(501.669:636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 500.772622][ T29] audit: type=1326 audit(501.669:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 500.780737][ T29] audit: type=1326 audit(501.679:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 500.781055][ T29] audit: type=1326 audit(501.679:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 500.786653][ T29] audit: type=1326 audit(501.689:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5029 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 507.049839][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 507.050318][ T29] audit: type=1400 audit(507.949:649): avc: denied { read } for pid=5057 comm="syz.1.187" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 507.066451][ T29] audit: type=1400 audit(507.969:650): avc: denied { open } for pid=5057 comm="syz.1.187" path="net:[4026532654]" dev="nsfs" ino=4026532654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 533.988753][ T29] audit: type=1400 audit(534.889:651): avc: denied { create } for pid=5077 comm="syz.2.193" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 534.002187][ T29] audit: type=1400 audit(534.899:652): avc: denied { setopt } for pid=5077 comm="syz.2.193" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 553.560127][ T29] audit: type=1400 audit(554.459:653): avc: denied { mount } for pid=5088 comm="syz.2.197" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 554.856610][ T5094] bridge_slave_0: entered promiscuous mode [ 554.864930][ T5094] A link change request failed with some changes committed already. Interface bridge_slave_0 may have been left with an inconsistent configuration, please check. [ 554.900944][ T29] audit: type=1400 audit(555.799:654): avc: denied { create } for pid=5093 comm="syz.2.198" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 554.925404][ T29] audit: type=1400 audit(555.809:655): avc: denied { ioctl } for pid=5093 comm="syz.2.198" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4696 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 557.692317][ T29] audit: type=1326 audit(558.589:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5093 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 557.695195][ T29] audit: type=1326 audit(558.589:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5093 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132510 code=0x7ffc0000 [ 557.838221][ T29] audit: type=1326 audit(558.699:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5093 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 557.891879][ T29] audit: type=1326 audit(558.789:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5093 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 557.944062][ T29] audit: type=1326 audit(558.839:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5093 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=114 compat=0 ip=0x132510 code=0x7ffc0000 [ 557.972518][ T29] audit: type=1326 audit(558.809:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5096 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15ffc4 code=0x7ffc0000 [ 559.475087][ T29] audit: type=1326 audit(560.369:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5096 comm="syz.2.198" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132510 code=0x7ffc0000 [ 560.219826][ T5100] netlink: 28 bytes leftover after parsing attributes in process `syz.2.200'. [ 560.590755][ T29] audit: type=1326 audit(561.489:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5101 comm="syz.2.201" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 560.591175][ T29] audit: type=1326 audit(561.489:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5101 comm="syz.2.201" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 560.599461][ T29] audit: type=1326 audit(561.499:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5101 comm="syz.2.201" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x132510 code=0x7ffc0000 [ 560.599852][ T29] audit: type=1326 audit(561.499:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5101 comm="syz.2.201" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 560.607324][ T29] audit: type=1326 audit(561.499:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5101 comm="syz.2.201" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 561.288492][ T29] audit: type=1326 audit(562.179:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5105 comm="syz.2.203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 561.288854][ T29] audit: type=1326 audit(562.179:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5105 comm="syz.2.203" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 561.289134][ T29] audit: type=1326 audit(562.179:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5105 comm="syz.2.203" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 561.289336][ T29] audit: type=1326 audit(562.189:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5105 comm="syz.2.203" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 570.978843][ T29] kauditd_printk_skb: 7 callbacks suppressed [ 570.980625][ T29] audit: type=1400 audit(571.859:679): avc: denied { write } for pid=5111 comm="syz.1.205" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 572.735928][ T29] audit: type=1400 audit(573.629:680): avc: denied { create } for pid=5124 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 572.738664][ T5125] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 576.497657][ T29] audit: type=1400 audit(577.329:681): avc: denied { setopt } for pid=5124 comm="syz.1.209" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 589.098948][ T5136] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=5136 comm=syz.2.212 [ 589.115317][ T29] audit: type=1400 audit(589.999:682): avc: denied { audit_write } for pid=5133 comm="syz.2.212" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 589.117017][ T29] audit: type=1107 audit(589.999:683): pid=5133 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 598.137170][ T29] audit: type=1326 audit(599.039:684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 598.138383][ T29] audit: type=1326 audit(599.039:685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 598.144231][ T29] audit: type=1326 audit(599.039:686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x130a24 code=0x7ffc0000 [ 598.149635][ T29] audit: type=1326 audit(599.049:687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15ffc4 code=0x7ffc0000 [ 598.359918][ T29] audit: type=1326 audit(599.259:688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 598.360487][ T29] audit: type=1326 audit(599.259:689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 598.384724][ T29] audit: type=1326 audit(599.259:690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 598.385313][ T29] audit: type=1326 audit(599.269:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 598.385390][ T29] audit: type=1326 audit(599.269:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 598.390959][ T29] audit: type=1326 audit(599.289:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5151 comm="syz.1.218" exe="/syz-executor" sig=0 arch=40000028 syscall=29 compat=0 ip=0x132510 code=0x7ffc0000 [ 605.744365][ T29] audit: type=1400 audit(606.609:694): avc: denied { ioctl } for pid=5159 comm="syz.1.222" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 605.766115][ T29] audit: type=1400 audit(606.669:695): avc: denied { set_context_mgr } for pid=5159 comm="syz.1.222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 605.796593][ T5162] binder: 5159:5162 ioctl c0306201 20000040 returned -22 [ 605.900572][ T29] audit: type=1400 audit(606.799:696): avc: denied { write } for pid=5159 comm="syz.1.222" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 607.361792][ T5164] wg2: entered promiscuous mode [ 607.362684][ T5164] wg2: entered allmulticast mode [ 608.423557][ T29] audit: type=1400 audit(609.319:697): avc: denied { block_suspend } for pid=5167 comm="syz.2.225" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 626.805472][ T5194] can: request_module (can-proto-0) failed. [ 633.845013][ T29] audit: type=1400 audit(634.739:698): avc: denied { map } for pid=5199 comm="syz.1.233" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 633.888766][ T29] audit: type=1400 audit(634.789:699): avc: denied { call } for pid=5199 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 633.910496][ T29] audit: type=1400 audit(634.809:700): avc: denied { transfer } for pid=5199 comm="syz.1.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 643.215778][ T29] audit: type=1400 audit(644.119:701): avc: denied { create } for pid=5209 comm="syz.2.237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 643.220760][ T29] audit: type=1400 audit(644.119:702): avc: denied { write } for pid=5209 comm="syz.2.237" path="socket:[5357]" dev="sockfs" ino=5357 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 648.946898][ T29] audit: type=1400 audit(649.849:703): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.948086][ T29] audit: type=1400 audit(649.849:704): avc: denied { open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.949082][ T29] audit: type=1400 audit(649.849:705): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 648.975937][ T29] audit: type=1400 audit(649.869:706): avc: denied { read } for pid=5245 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 649.004736][ T29] audit: type=1400 audit(649.899:707): avc: denied { map_create } for pid=5245 comm="syz.2.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 649.005119][ T29] audit: type=1400 audit(649.899:708): avc: denied { bpf } for pid=5245 comm="syz.2.244" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 649.005346][ T29] audit: type=1400 audit(649.899:709): avc: denied { map_read map_write } for pid=5245 comm="syz.2.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 649.015735][ T29] audit: type=1400 audit(649.919:710): avc: denied { prog_load } for pid=5245 comm="syz.2.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 649.016119][ T29] audit: type=1400 audit(649.919:711): avc: denied { perfmon } for pid=5245 comm="syz.2.244" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 649.023556][ T29] audit: type=1400 audit(649.919:712): avc: denied { prog_run } for pid=5245 comm="syz.2.244" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 655.640636][ T29] kauditd_printk_skb: 31 callbacks suppressed [ 655.665013][ T29] audit: type=1326 audit(656.539:744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.2.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 655.665400][ T29] audit: type=1326 audit(656.549:745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.2.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 655.665469][ T29] audit: type=1326 audit(656.549:746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.2.251" exe="/syz-executor" sig=0 arch=40000028 syscall=151 compat=0 ip=0x132510 code=0x7ffc0000 [ 655.665526][ T29] audit: type=1326 audit(656.549:747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.2.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 655.665564][ T29] audit: type=1326 audit(656.559:748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.2.251" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 656.089679][ T29] audit: type=1400 audit(656.989:749): avc: denied { mount } for pid=5290 comm="syz.2.253" name="/" dev="securityfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=filesystem permissive=1 [ 656.455084][ T29] audit: type=1326 audit(657.359:750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5292 comm="syz.2.254" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 656.455682][ T29] audit: type=1326 audit(657.359:751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5292 comm="syz.2.254" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 656.459431][ T29] audit: type=1326 audit(657.359:752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5292 comm="syz.2.254" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 656.479056][ T29] audit: type=1326 audit(657.379:753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5292 comm="syz.2.254" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 662.512100][ T29] kauditd_printk_skb: 12 callbacks suppressed [ 662.512575][ T29] audit: type=1400 audit(663.409:766): avc: denied { create } for pid=5301 comm="syz.2.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 662.538764][ T29] audit: type=1400 audit(663.439:767): avc: denied { ioctl } for pid=5301 comm="syz.2.258" path="socket:[5433]" dev="sockfs" ino=5433 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 662.557083][ T29] audit: type=1400 audit(663.459:768): avc: denied { bind } for pid=5301 comm="syz.2.258" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 669.425162][ T29] audit: type=1400 audit(670.259:769): avc: denied { allowed } for pid=5307 comm="syz.1.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 669.425577][ T29] audit: type=1400 audit(670.269:770): avc: denied { create } for pid=5307 comm="syz.1.260" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 669.426016][ T29] audit: type=1400 audit(670.279:771): avc: denied { map } for pid=5307 comm="syz.1.260" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4938 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 669.427443][ T29] audit: type=1400 audit(670.279:772): avc: denied { read write } for pid=5307 comm="syz.1.260" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=4938 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 676.697025][ T29] audit: type=1400 audit(677.599:773): avc: denied { connect } for pid=5327 comm="syz.2.267" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 696.622820][ T29] audit: type=1400 audit(697.519:774): avc: denied { read } for pid=5344 comm="syz.2.272" path="socket:[5463]" dev="sockfs" ino=5463 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 718.039709][ T29] audit: type=1400 audit(718.939:775): avc: denied { append } for pid=5353 comm="syz.1.275" name="ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 718.040284][ T29] audit: type=1400 audit(718.939:776): avc: denied { open } for pid=5353 comm="syz.1.275" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 718.638842][ T29] audit: type=1400 audit(719.539:777): avc: denied { ioctl } for pid=5353 comm="syz.1.275" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 725.599922][ T29] audit: type=1400 audit(726.499:778): avc: denied { create } for pid=5359 comm="syz.2.277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 727.135110][ T5336] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 727.461152][ T5336] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 727.472043][ T5336] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 727.475381][ T5336] usb 2-1: New USB device found, idVendor=10c4, idProduct=ea90, bcdDevice= 0.00 [ 727.476512][ T5336] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 727.486310][ T5336] usb 2-1: config 0 descriptor?? [ 727.945231][ T5336] cp2112 0003:10C4:EA90.0006: unknown main item tag 0x0 [ 727.966626][ T5336] cp2112 0003:10C4:EA90.0006: hidraw0: USB HID v0.00 Device [HID 10c4:ea90] on usb-dummy_hcd.1-1/input0 [ 728.134634][ T5336] cp2112 0003:10C4:EA90.0006: Part Number: 0x82 Device Version: 0xFE [ 728.963215][ T4650] usb 2-1: USB disconnect, device number 9 [ 733.313587][ T5395] netlink: 'syz.1.279': attribute type 4 has an invalid length. [ 735.297161][ T3823] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 735.444424][ T3823] usb 2-1: Using ep0 maxpacket: 32 [ 735.488966][ T3823] usb 2-1: config 0 has an invalid interface number: 67 but max is 0 [ 735.489382][ T3823] usb 2-1: config 0 has no interface number 0 [ 735.544857][ T3823] usb 2-1: New USB device found, idVendor=0424, idProduct=9901, bcdDevice=c2.57 [ 735.545222][ T3823] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 735.545291][ T3823] usb 2-1: Product: syz [ 735.545320][ T3823] usb 2-1: Manufacturer: syz [ 735.545345][ T3823] usb 2-1: SerialNumber: syz [ 735.557565][ T3823] usb 2-1: config 0 descriptor?? [ 735.620859][ T3823] smsc95xx v2.0.0 [ 736.402822][ T3823] smsc95xx 2-1:0.67 (unnamed net_device) (uninitialized): Failed to read reg index 0x00000030: -71 [ 736.403442][ T3823] smsc95xx 2-1:0.67 (unnamed net_device) (uninitialized): Error reading E2P_CMD [ 736.408031][ T3823] smsc95xx 2-1:0.67 (unnamed net_device) (uninitialized): Failed to write reg index 0x00000014: -71 [ 736.408823][ T3823] smsc95xx 2-1:0.67: probe with driver smsc95xx failed with error -71 [ 736.425404][ T3823] usb 2-1: USB disconnect, device number 10 [ 749.639946][ T5418] fuse: Bad value for 'fd' [ 749.641831][ T29] audit: type=1400 audit(750.539:779): avc: denied { mounton } for pid=5417 comm="syz.2.283" path="/113/file0" dev="tmpfs" ino=594 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 751.222101][ T29] audit: type=1400 audit(752.119:780): avc: denied { name_bind } for pid=5419 comm="syz.2.284" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 751.650779][ T29] audit: type=1400 audit(752.549:781): avc: denied { bind } for pid=5421 comm="syz.2.285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 751.655174][ T29] audit: type=1400 audit(752.549:782): avc: denied { name_bind } for pid=5421 comm="syz.2.285" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 751.657717][ T29] audit: type=1400 audit(752.559:783): avc: denied { node_bind } for pid=5421 comm="syz.2.285" saddr=ff02::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 751.674670][ T29] audit: type=1400 audit(752.569:784): avc: denied { block_suspend } for pid=5421 comm="syz.2.285" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 752.059997][ T29] audit: type=1326 audit(752.959:785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5427 comm="syz.2.286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 752.074937][ T29] audit: type=1326 audit(752.969:786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5427 comm="syz.2.286" exe="/syz-executor" sig=0 arch=40000028 syscall=26 compat=0 ip=0x132510 code=0x7ffc0000 [ 752.076273][ T29] audit: type=1326 audit(752.969:787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5427 comm="syz.2.286" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 752.084602][ T29] audit: type=1326 audit(752.979:788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5427 comm="syz.2.286" exe="/syz-executor" sig=0 arch=40000028 syscall=26 compat=0 ip=0x132510 code=0x7ffc0000 [ 752.494884][ T5431] fuse: Bad value for 'fd' [ 755.261583][ T5438] netlink: 'syz.2.290': attribute type 12 has an invalid length. [ 760.319968][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 760.320301][ T29] audit: type=1400 audit(761.219:795): avc: denied { create } for pid=5441 comm="syz.1.292" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 762.859750][ T29] audit: type=1400 audit(763.759:796): avc: denied { setopt } for pid=5439 comm="syz.2.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 768.134345][ T29] audit: type=1400 audit(769.029:797): avc: denied { read } for pid=5450 comm="syz.1.294" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 768.135389][ T29] audit: type=1400 audit(769.029:798): avc: denied { open } for pid=5450 comm="syz.1.294" path="user:[4026531837]" dev="nsfs" ino=4026531837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 770.540046][ T29] audit: type=1400 audit(771.439:799): avc: denied { ioctl } for pid=5454 comm="syz.1.296" path="socket:[5058]" dev="sockfs" ino=5058 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 770.559204][ T29] audit: type=1400 audit(771.459:800): avc: denied { write } for pid=5454 comm="syz.1.296" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 770.817906][ T29] audit: type=1400 audit(771.719:801): avc: denied { name_bind } for pid=5456 comm="syz.1.297" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 770.818342][ T29] audit: type=1400 audit(771.719:802): avc: denied { node_bind } for pid=5456 comm="syz.1.297" saddr=::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 774.584174][ T29] audit: type=1326 audit(775.479:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.301" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 774.594849][ T29] audit: type=1326 audit(775.489:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.301" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 774.634629][ T29] audit: type=1326 audit(775.529:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.301" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 774.714247][ T29] audit: type=1326 audit(775.609:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.301" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 774.714693][ T29] audit: type=1326 audit(775.609:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.301" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 774.744469][ T29] audit: type=1326 audit(775.619:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.301" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 774.745730][ T29] audit: type=1326 audit(775.649:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.301" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 774.748173][ T29] audit: type=1326 audit(775.649:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.301" exe="/syz-executor" sig=0 arch=40000028 syscall=38 compat=0 ip=0x132510 code=0x7ffc0000 [ 774.781364][ T29] audit: type=1326 audit(775.679:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5465 comm="syz.2.301" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 775.342488][ T29] audit: type=1400 audit(776.239:812): avc: denied { create } for pid=5468 comm="syz.2.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 779.437152][ T5474] netlink: 16 bytes leftover after parsing attributes in process `syz.2.303'. [ 779.437581][ T5474] tc_dump_action: action bad kind [ 783.930257][ T29] audit: type=1400 audit(784.829:813): avc: denied { ioctl } for pid=5525 comm="syz.2.307" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5649 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 795.498480][ T29] audit: type=1400 audit(796.399:814): avc: denied { watch } for pid=5532 comm="syz.1.309" path="/149/control" dev="tmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 795.761830][ T29] audit: type=1326 audit(796.659:815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5540 comm="syz.2.313" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 795.776593][ T29] audit: type=1326 audit(796.669:816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5540 comm="syz.2.313" exe="/syz-executor" sig=0 arch=40000028 syscall=393 compat=0 ip=0x132510 code=0x7ffc0000 [ 795.777134][ T29] audit: type=1326 audit(796.679:817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5540 comm="syz.2.313" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 795.777207][ T29] audit: type=1326 audit(796.679:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5540 comm="syz.2.313" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 796.347873][ T29] audit: type=1326 audit(797.249:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5565 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 796.365635][ T29] audit: type=1326 audit(797.269:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5565 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=243 compat=0 ip=0x132510 code=0x7ffc0000 [ 796.367613][ T29] audit: type=1326 audit(797.269:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5565 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 796.370748][ T29] audit: type=1326 audit(797.269:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5565 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=246 compat=0 ip=0x132510 code=0x7ffc0000 [ 796.374415][ T29] audit: type=1326 audit(797.269:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5565 comm="syz.1.316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 802.805762][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 802.806968][ T29] audit: type=1400 audit(803.689:828): avc: denied { write } for pid=5604 comm="syz.2.323" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 821.419140][ T29] audit: type=1400 audit(822.319:829): avc: denied { write } for pid=5620 comm="syz.2.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 821.425312][ T29] audit: type=1400 audit(822.329:830): avc: denied { setopt } for pid=5620 comm="syz.2.328" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 843.574954][ T29] audit: type=1326 audit(844.469:831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.2.334" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 843.598062][ T29] audit: type=1326 audit(844.489:832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.2.334" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 843.698219][ T29] audit: type=1326 audit(844.599:833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.2.334" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 843.701118][ T29] audit: type=1326 audit(844.599:834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.2.334" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 843.701529][ T29] audit: type=1326 audit(844.599:835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.2.334" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 843.708913][ T29] audit: type=1326 audit(844.609:836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.2.334" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 843.712265][ T29] audit: type=1326 audit(844.609:837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.2.334" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 843.712688][ T29] audit: type=1326 audit(844.609:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.2.334" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 843.719660][ T29] audit: type=1326 audit(844.619:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.2.334" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 843.728690][ T29] audit: type=1326 audit(844.629:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5646 comm="syz.2.334" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 848.814610][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 848.814977][ T29] audit: type=1400 audit(849.699:847): avc: denied { create } for pid=5650 comm="syz.2.336" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 855.235177][ T4646] usb 2-1: new high-speed USB device number 11 using dummy_hcd [ 855.424552][ T4646] usb 2-1: Using ep0 maxpacket: 16 [ 855.440861][ T4646] usb 2-1: config 1 interface 0 altsetting 255 endpoint 0x1 has invalid wMaxPacketSize 0 [ 855.443465][ T4646] usb 2-1: config 1 interface 0 altsetting 255 bulk endpoint 0x1 has invalid maxpacket 0 [ 855.454463][ T4646] usb 2-1: config 1 interface 0 altsetting 255 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 855.454648][ T4646] usb 2-1: config 1 interface 0 has no altsetting 0 [ 855.554840][ T4646] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 855.555100][ T4646] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 855.555284][ T4646] usb 2-1: Product: syz [ 855.555308][ T4646] usb 2-1: Manufacturer: syz [ 855.555319][ T4646] usb 2-1: SerialNumber: syz [ 855.781371][ T4646] usblp 2-1:1.0: usblp0: USB Unidirectional printer dev 11 if 0 alt 255 proto 1 vid 0x0525 pid 0xA4A8 [ 859.464422][ T29] audit: type=1326 audit(860.359:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.2.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 859.464847][ T29] audit: type=1326 audit(860.359:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.2.338" exe="/syz-executor" sig=0 arch=40000028 syscall=120 compat=0 ip=0x132510 code=0x7ffc0000 [ 859.473038][ T29] audit: type=1326 audit(860.369:850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.2.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 859.479837][ T29] audit: type=1326 audit(860.379:851): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.2.338" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 859.486287][ T29] audit: type=1326 audit(860.379:852): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.2.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 859.492662][ T29] audit: type=1326 audit(860.379:853): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.2.338" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132510 code=0x7ffc0000 [ 859.492822][ T29] audit: type=1326 audit(860.389:854): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.2.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 859.492915][ T29] audit: type=1326 audit(860.389:855): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.2.338" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 859.492966][ T29] audit: type=1326 audit(860.389:856): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.2.338" exe="/syz-executor" sig=0 arch=40000028 syscall=114 compat=0 ip=0x132510 code=0x7ffc0000 [ 859.505456][ T29] audit: type=1326 audit(860.409:857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5666 comm="syz.2.338" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15ffc4 code=0x7ffc0000 [ 869.547926][ T4651] usb 2-1: USB disconnect, device number 11 [ 869.558185][ T4651] usblp0: removed [ 873.794260][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 873.794582][ T29] audit: type=1400 audit(874.679:861): avc: denied { read } for pid=5680 comm="syz.1.340" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 873.796644][ T29] audit: type=1400 audit(874.699:862): avc: denied { open } for pid=5680 comm="syz.1.340" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 873.800458][ T29] audit: type=1400 audit(874.699:863): avc: denied { ioctl } for pid=5680 comm="syz.1.340" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 873.803313][ T5682] binder: 5680:5682 ioctl c0306201 0 returned -14 [ 876.909555][ T5690] input: syz0 as /devices/virtual/input/input4 [ 893.049047][ T29] audit: type=1400 audit(893.949:864): avc: denied { create } for pid=5698 comm="syz.1.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 893.060509][ T5699] netlink: 12 bytes leftover after parsing attributes in process `syz.1.345'. [ 906.450033][ T29] audit: type=1400 audit(907.349:865): avc: denied { execute } for pid=5706 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 906.450408][ T29] audit: type=1400 audit(907.349:866): avc: denied { execute_no_trans } for pid=5706 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 906.684488][ T29] audit: type=1400 audit(907.579:867): avc: denied { mounton } for pid=5707 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 906.868378][ T29] audit: type=1400 audit(907.769:868): avc: denied { sys_module } for pid=5707 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 912.073018][ T5707] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 912.089205][ T5707] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 915.327882][ T5707] hsr_slave_0: entered promiscuous mode [ 915.329569][ T5707] hsr_slave_1: entered promiscuous mode [ 915.337012][ T5707] debugfs: 'hsr0' already exists in 'hsr' [ 915.341064][ T5707] Cannot create hsr debugfs directory [ 916.642353][ T5707] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 916.786441][ T5707] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 916.792954][ T5707] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 916.835978][ T5707] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 918.567195][ T5707] 8021q: adding VLAN 0 to HW filter on device bond0 [ 924.110764][ T5707] veth0_vlan: entered promiscuous mode [ 924.125338][ T5707] veth1_vlan: entered promiscuous mode [ 924.245873][ T5707] veth0_macvtap: entered promiscuous mode [ 924.261925][ T5707] veth1_macvtap: entered promiscuous mode [ 924.351943][ T4639] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.352876][ T4639] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.353114][ T4639] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.353334][ T4639] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 924.575708][ T29] audit: type=1400 audit(925.459:869): avc: denied { mounton } for pid=5707 comm="syz-executor" path="/syzkaller.gCdp1R/syz-tmp" dev="vda" ino=817 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 924.594799][ T29] audit: type=1400 audit(925.489:870): avc: denied { mount } for pid=5707 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 924.595161][ T29] audit: type=1400 audit(925.489:871): avc: denied { mount } for pid=5707 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 924.620461][ T29] audit: type=1400 audit(925.519:872): avc: denied { mounton } for pid=5707 comm="syz-executor" path="/syzkaller.gCdp1R/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 924.644391][ T29] audit: type=1400 audit(925.529:873): avc: denied { mounton } for pid=5707 comm="syz-executor" path="/syzkaller.gCdp1R/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=6141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 924.690129][ T29] audit: type=1400 audit(925.589:874): avc: denied { unmount } for pid=5707 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 924.697060][ T29] audit: type=1400 audit(925.599:875): avc: denied { mounton } for pid=5707 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 924.697484][ T29] audit: type=1400 audit(925.599:876): avc: denied { mount } for pid=5707 comm="syz-executor" name="/" dev="gadgetfs" ino=840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 924.701269][ T29] audit: type=1400 audit(925.599:877): avc: denied { mount } for pid=5707 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 924.704361][ T29] audit: type=1400 audit(925.599:878): avc: denied { mounton } for pid=5707 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 945.226152][ T6083] netlink: 28 bytes leftover after parsing attributes in process `syz.3.354'. [ 945.746816][ T6089] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 945.748720][ T6089] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 945.800281][ T6089] serio: Serial port ptm0 [ 947.820275][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 947.820666][ T29] audit: type=1400 audit(948.719:880): avc: denied { write } for pid=6101 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 947.820955][ T29] audit: type=1400 audit(948.719:881): avc: denied { nlmsg_write } for pid=6101 comm="syz.1.359" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 951.375869][ T6120] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 951.377508][ T29] audit: type=1400 audit(952.259:882): avc: denied { load_policy } for pid=6119 comm="syz.1.362" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 951.382049][ T6120] SELinux: failed to load policy [ 959.114567][ T6137] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 959.137871][ T6137] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 980.650830][ T6175] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 980.658583][ T6175] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 984.701860][ T6182] ip6erspan0: entered allmulticast mode [ 992.446552][ T32] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 992.519972][ T32] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 992.617392][ T32] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 992.728310][ T32] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 993.266164][ T32] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 993.340091][ T32] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 993.437871][ T32] bond0 (unregistering): Released all slaves [ 993.629573][ T32] hsr_slave_0: left promiscuous mode [ 993.632717][ T32] hsr_slave_1: left promiscuous mode [ 993.655935][ T32] veth1_macvtap: left promiscuous mode [ 993.656985][ T32] veth0_macvtap: left promiscuous mode [ 993.662416][ T32] veth1_vlan: left promiscuous mode [ 993.663510][ T32] veth0_vlan: left promiscuous mode [ 1001.770057][ T29] audit: type=1400 audit(1002.669:883): avc: denied { write } for pid=6205 comm="syz.3.378" lport=8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1002.126380][ T29] audit: type=1400 audit(1003.029:884): avc: denied { write } for pid=6207 comm="syz.3.379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1002.127472][ T6208] netlink: 12 bytes leftover after parsing attributes in process `syz.3.379'. [ 1009.847048][ T4646] usb 2-1: new high-speed USB device number 12 using dummy_hcd [ 1010.200049][ T4646] usb 2-1: config 27 has an invalid descriptor of length 0, skipping remainder of the config [ 1010.200529][ T4646] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 1010.200586][ T4646] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1010.267673][ T4646] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 1010.369524][ T4646] snd-usb-audio 2-1:27.0: probe with driver snd-usb-audio failed with error -2 [ 1010.445801][ T4646] usb 2-1: USB disconnect, device number 12 [ 1011.657781][ T29] audit: type=1400 audit(1012.559:885): avc: denied { unmount } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1012.449614][ T6256] netlink: 4 bytes leftover after parsing attributes in process `syz.1.390'. [ 1017.976352][ T29] audit: type=1400 audit(1018.879:886): avc: denied { read write } for pid=3098 comm="syz-executor" name="loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1017.984673][ T29] audit: type=1400 audit(1018.879:887): avc: denied { open } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1017.987093][ T29] audit: type=1400 audit(1018.879:888): avc: denied { ioctl } for pid=3098 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1018.187144][ T29] audit: type=1400 audit(1019.089:889): avc: denied { read } for pid=6262 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1018.318659][ T29] audit: type=1400 audit(1019.219:890): avc: denied { map_create } for pid=6262 comm="syz.1.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1019.446687][ T29] audit: type=1400 audit(1020.349:891): avc: denied { prog_load } for pid=6262 comm="syz.1.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1019.494297][ T29] audit: type=1400 audit(1020.369:892): avc: denied { bpf } for pid=6262 comm="syz.1.392" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1019.494676][ T29] audit: type=1400 audit(1020.379:893): avc: denied { perfmon } for pid=6262 comm="syz.1.392" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1028.642658][ T29] audit: type=1400 audit(1029.539:894): avc: denied { open } for pid=6266 comm="syz.3.393" path="/dev/ptmx" dev="devtmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1028.662476][ T29] audit: type=1400 audit(1029.559:895): avc: denied { ioctl } for pid=6266 comm="syz.3.393" path="/dev/ptmx" dev="devtmpfs" ino=604 ioctlcmd=0x5431 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1035.515886][ T29] audit: type=1400 audit(1036.419:896): avc: denied { create } for pid=6270 comm="syz.3.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1035.524980][ T29] audit: type=1400 audit(1036.429:897): avc: denied { execmem } for pid=6270 comm="syz.3.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1036.661530][ T29] audit: type=1400 audit(1037.559:898): avc: denied { prog_run } for pid=6270 comm="syz.3.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1036.998042][ T29] audit: type=1400 audit(1037.899:899): avc: denied { map_read map_write } for pid=6294 comm="syz.3.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1037.039507][ T29] audit: type=1400 audit(1037.939:900): avc: denied { create } for pid=6294 comm="syz.3.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1041.526259][ T29] audit: type=1400 audit(1042.429:901): avc: denied { create } for pid=6294 comm="syz.3.395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1052.299914][ T29] audit: type=1326 audit(1053.199:902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6299 comm="syz.3.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1052.302003][ T29] audit: type=1326 audit(1053.199:903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6299 comm="syz.3.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1052.306058][ T29] audit: type=1326 audit(1053.209:905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6299 comm="syz.3.396" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132510 code=0x7ffc0000 [ 1052.308437][ T29] audit: type=1326 audit(1053.199:904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6299 comm="syz.3.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1052.310631][ T29] audit: type=1326 audit(1053.209:906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6299 comm="syz.3.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1052.315242][ T29] audit: type=1326 audit(1053.219:907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6299 comm="syz.3.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1052.317144][ T29] audit: type=1326 audit(1053.219:908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6299 comm="syz.3.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1052.320737][ T29] audit: type=1326 audit(1053.219:910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6299 comm="syz.3.396" exe="/syz-executor" sig=0 arch=40000028 syscall=294 compat=0 ip=0x132510 code=0x7ffc0000 [ 1052.322972][ T29] audit: type=1326 audit(1053.219:909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6299 comm="syz.3.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1052.325506][ T29] audit: type=1326 audit(1053.219:911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6299 comm="syz.3.396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132510 code=0x7ffc0000 [ 1057.827852][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 1057.828254][ T29] audit: type=1400 audit(1058.729:926): avc: denied { write } for pid=6301 comm="syz.3.397" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1063.680123][ T29] audit: type=1400 audit(1064.579:927): avc: denied { execute } for pid=6306 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1063.726614][ T29] audit: type=1400 audit(1064.609:928): avc: denied { execute_no_trans } for pid=6306 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1063.841712][ T29] audit: type=1400 audit(1064.739:929): avc: denied { read } for pid=6307 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1063.842134][ T29] audit: type=1400 audit(1064.739:930): avc: denied { open } for pid=6307 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1063.857624][ T29] audit: type=1400 audit(1064.759:931): avc: denied { mounton } for pid=6307 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1063.889349][ T29] audit: type=1400 audit(1064.789:932): avc: denied { module_request } for pid=6307 comm="syz-executor" kmod="netdev-nr4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1064.286103][ T29] audit: type=1400 audit(1065.189:933): avc: denied { sys_module } for pid=6307 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1065.312005][ T29] audit: type=1400 audit(1066.209:934): avc: denied { write } for pid=6307 comm="syz-executor" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1066.952085][ T6307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1066.977713][ T6307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1068.387952][ T6307] hsr_slave_0: entered promiscuous mode [ 1068.396321][ T6307] hsr_slave_1: entered promiscuous mode [ 1068.398544][ T6307] debugfs: 'hsr0' already exists in 'hsr' [ 1068.399418][ T6307] Cannot create hsr debugfs directory [ 1068.891308][ T6307] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 1068.895519][ T29] audit: type=1400 audit(1069.789:935): avc: denied { write } for pid=6307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1068.895661][ T29] audit: type=1400 audit(1069.789:936): avc: denied { read } for pid=6307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1068.917601][ T6307] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 1068.930458][ T6307] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 1068.952073][ T6307] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 1069.678061][ T6307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1073.690501][ T29] audit: type=1400 audit(1074.589:937): avc: denied { create } for pid=6636 comm="syz.3.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1073.715414][ T29] audit: type=1400 audit(1074.609:938): avc: denied { setopt } for pid=6636 comm="syz.3.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1073.715779][ T29] audit: type=1400 audit(1074.609:939): avc: denied { bind } for pid=6636 comm="syz.3.400" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1073.762473][ T6662] input: syz0 as /devices/virtual/input/input6 [ 1074.292817][ T6307] veth0_vlan: entered promiscuous mode [ 1074.312508][ T6307] veth1_vlan: entered promiscuous mode [ 1074.391475][ T6307] veth0_macvtap: entered promiscuous mode [ 1074.406383][ T6307] veth1_macvtap: entered promiscuous mode [ 1074.464354][ T4642] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1074.465085][ T4642] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1074.465719][ T4642] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1074.466256][ T4642] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1074.550700][ T29] audit: type=1400 audit(1075.449:940): avc: denied { mounton } for pid=6307 comm="syz-executor" path="/syzkaller.ka8l0G/syz-tmp" dev="vda" ino=818 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1074.556383][ T29] audit: type=1400 audit(1075.459:941): avc: denied { mount } for pid=6307 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1074.560917][ T29] audit: type=1400 audit(1075.459:942): avc: denied { mounton } for pid=6307 comm="syz-executor" path="/syzkaller.ka8l0G/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1074.567763][ T29] audit: type=1400 audit(1075.469:943): avc: denied { mount } for pid=6307 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1074.589050][ T29] audit: type=1400 audit(1075.489:944): avc: denied { mounton } for pid=6307 comm="syz-executor" path="/syzkaller.ka8l0G/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1074.589465][ T29] audit: type=1400 audit(1075.489:945): avc: denied { mounton } for pid=6307 comm="syz-executor" path="/syzkaller.ka8l0G/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7963 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1074.603433][ T29] audit: type=1400 audit(1075.499:946): avc: denied { unmount } for pid=6307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1074.612002][ T29] audit: type=1400 audit(1075.509:947): avc: denied { mounton } for pid=6307 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1074.612472][ T29] audit: type=1400 audit(1075.509:948): avc: denied { mount } for pid=6307 comm="syz-executor" name="/" dev="gadgetfs" ino=840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1074.619872][ T29] audit: type=1400 audit(1075.519:949): avc: denied { mount } for pid=6307 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1074.792543][ T6669] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1074.795980][ T6669] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1086.961905][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 1086.965362][ T29] audit: type=1400 audit(1087.859:952): avc: denied { append } for pid=6683 comm="syz.4.405" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1087.779894][ T29] audit: type=1400 audit(1088.679:953): avc: denied { create } for pid=6695 comm="syz.4.407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1087.815002][ T29] audit: type=1400 audit(1088.709:954): avc: denied { bind } for pid=6695 comm="syz.4.407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1087.815454][ T29] audit: type=1400 audit(1088.709:955): avc: denied { name_bind } for pid=6695 comm="syz.4.407" src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 1087.815531][ T29] audit: type=1400 audit(1088.709:956): avc: denied { node_bind } for pid=6695 comm="syz.4.407" src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 1089.099203][ T29] audit: type=1400 audit(1089.999:957): avc: denied { create } for pid=6700 comm="syz.3.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1089.103473][ T29] audit: type=1400 audit(1089.999:958): avc: denied { setopt } for pid=6700 comm="syz.3.409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1089.976210][ T29] audit: type=1400 audit(1090.879:959): avc: denied { load_policy } for pid=6704 comm="syz.3.411" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1089.976635][ T6705] SELinux: policydb magic number 0x6572666b does not match expected magic number 0xf97cff8c [ 1089.977964][ T6705] SELinux: failed to load policy [ 1090.844492][ T29] audit: type=1400 audit(1091.659:960): avc: denied { ioctl } for pid=6708 comm="syz.3.413" path="socket:[8037]" dev="sockfs" ino=8037 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1092.145936][ T6711] tmpfs: Unknown parameter 'inode32 ' [ 1092.150906][ T6711] input: syz1 as /devices/virtual/input/input7 [ 1092.158349][ T29] audit: type=1400 audit(1093.039:961): avc: denied { remount } for pid=6695 comm="syz.4.407" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1107.437859][ T29] audit: type=1400 audit(1108.339:962): avc: denied { unmount } for pid=6307 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1111.840799][ T1343] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1111.898898][ T1343] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1111.967222][ T1343] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1112.047209][ T1343] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1112.387916][ T1343] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1112.395670][ T1343] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1112.402255][ T1343] bond0 (unregistering): Released all slaves [ 1112.498708][ T1343] hsr_slave_0: left promiscuous mode [ 1112.500820][ T1343] hsr_slave_1: left promiscuous mode [ 1112.518789][ T1343] veth1_macvtap: left promiscuous mode [ 1112.519183][ T1343] veth0_macvtap: left promiscuous mode [ 1112.520371][ T1343] veth1_vlan: left promiscuous mode [ 1112.520724][ T1343] veth0_vlan: left promiscuous mode [ 1113.317572][ T1343] ------------[ cut here ]------------ [ 1113.318078][ T1343] WARNING: CPU: 0 PID: 1343 at net/ipv6/xfrm6_tunnel.c:341 xfrm6_tunnel_net_exit+0x94/0x100 [ 1113.319798][ T1343] Modules linked in: [ 1113.321222][ T1343] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 1113.321865][ T1343] CPU: 0 UID: 0 PID: 1343 Comm: kworker/u8:8 Not tainted syzkaller #0 PREEMPT [ 1113.322091][ T1343] Hardware name: ARM-Versatile Express [ 1113.322349][ T1343] Workqueue: netns cleanup_net [ 1113.322837][ T1343] Call trace: [ 1113.323149][ T1343] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1113.323864][ T1343] r7:822406c0 r6:8401ec00 r5:00000000 r4:822523c8 [ 1113.324100][ T1343] [<80201b08>] (show_stack) from [<8021f920>] (dump_stack_lvl+0x54/0x7c) [ 1113.324561][ T1343] [<8021f8cc>] (dump_stack_lvl) from [<8021f960>] (dump_stack+0x18/0x1c) [ 1113.324824][ T1343] r5:00000000 r4:82a78d18 [ 1113.324936][ T1343] [<8021f948>] (dump_stack) from [<802025f8>] (vpanic+0xe0/0x2e8) [ 1113.325099][ T1343] [<80202518>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0xd8) [ 1113.325265][ T1343] r7:818b01e8 [ 1113.325379][ T1343] [<80202800>] (panic) from [<80252948>] (get_taint+0x0/0x1c) [ 1113.325549][ T1343] r3:8280c684 r2:00000001 r1:82238c24 r0:822406c0 [ 1113.325773][ T1343] [<802528d0>] (check_panic_on_warn) from [<80252aac>] (__warn+0x80/0x188) [ 1113.325999][ T1343] [<80252a2c>] (__warn) from [<80252d2c>] (warn_slowpath_fmt+0x178/0x1f4) [ 1113.326267][ T1343] r8:00000009 r7:82433038 r6:ea4c1de4 r5:8401ec00 r4:00000000 [ 1113.326428][ T1343] [<80252bb8>] (warn_slowpath_fmt) from [<818b01e8>] (xfrm6_tunnel_net_exit+0x94/0x100) [ 1113.326659][ T1343] r10:00000001 r9:00000001 r8:829de39c r7:82433038 r6:82a0789c r5:832ef000 [ 1113.326905][ T1343] r4:00000001 [ 1113.326996][ T1343] [<818b0154>] (xfrm6_tunnel_net_exit) from [<81577158>] (ops_undo_list+0xe8/0x238) [ 1113.327326][ T1343] r7:829f2540 r6:829de39c r5:859d8000 r4:ea4c1e98 [ 1113.327460][ T1343] [<81577070>] (ops_undo_list) from [<815792f0>] (cleanup_net+0x220/0x3a0) [ 1113.327644][ T1343] r10:00000000 r9:ffffffd4 r8:859d9e00 r7:829de380 r6:829de358 r5:82c2c240 [ 1113.327794][ T1343] r4:859d8020 [ 1113.327865][ T1343] [<815790d0>] (cleanup_net) from [<802785a0>] (process_one_work+0x1b4/0x4f4) [ 1113.328053][ T1343] r10:8300f470 r9:8301c815 r8:8401ec00 r7:8300e600 r6:8301c800 r5:829de370 [ 1113.328238][ T1343] r4:83fd6c00 [ 1113.328319][ T1343] [<802783ec>] (process_one_work) from [<802791e8>] (worker_thread+0x1fc/0x3d8) [ 1113.328503][ T1343] r10:61c88647 r9:8401ec00 r8:83fd6c2c r7:82804d40 r6:8300e600 r5:8300e620 [ 1113.328653][ T1343] r4:83fd6c00 [ 1113.328726][ T1343] [<80278fec>] (worker_thread) from [<8028020c>] (kthread+0x12c/0x280) [ 1113.328895][ T1343] r10:00000000 r9:83fd6c00 r8:80278fec r7:ea481e60 r6:840c3980 r5:8401ec00 [ 1113.329063][ T1343] r4:00000001 [ 1113.329191][ T1343] [<802800e0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1113.329619][ T1343] Exception stack(0xea4c1fb0 to 0xea4c1ff8) [ 1113.330058][ T1343] 1fa0: 00000000 00000000 00000000 00000000 [ 1113.330277][ T1343] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1113.330443][ T1343] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1113.330735][ T1343] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:802800e0 [ 1113.330900][ T1343] r4:83fd1d80 [ 1113.332719][ T1343] Rebooting in 86400 seconds.. VM DIAGNOSIS: 06:09:03 Registers: info registers vcpu 0 CPU#0 R00=83b34040 R01=00000073 R02=eae37000 R03=eae37018 R04=82abc144 R05=83b34040 R06=80a8ede4 R07=82abc159 R08=82827128 R09=00000000 R10=00000628 R11=ea4c1ab0 R12=00000002 R13=ea4c1aa4 R14=82959484 R15=80a8edf4 PSR=80000193 N--- A S svc32 s00=6e72656b s01=203a6c65 d00=203a6c656e72656b s02=3131205b s03=352e3231 d01=352e32313131205b s04=32373032 s05=205b5d34 d02=205b5d3432373032 s06=34333154 s07=76205d33 d03=76205d3334333154 s08=30687465 s09=616c765f d04=616c765f30687465 s10=6c203a6e s11=20746665 d05=207466656c203a6e s12=6d6f7270 s13=75637369 d06=756373696d6f7270 s14=2073756f s15=65646f6d d07=65646f6d2073756f s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=829c8ad0 R01=842a6b40 R02=00000000 R03=81a60f30 R04=82abd340 R05=23f83a01 R06=000363ec R07=00000103 R08=00000020 R09=84ee07c0 R10=00000001 R11=df805bbc R12=df805bc0 R13=df805bb0 R14=8130a660 R15=81a60f40 PSR=60010013 -ZC- A S svc32 s00=0003b803 s01=c0030008 d00=c00300080003b803 s02=ffff0403 s03=0303ffff d01=0303ffffffff0403 s04=06038803 s05=00000808 d02=0000080806038803 s06=03900300 s07=03020400 d03=0302040003900300 s08=02000394 s09=960301c4 d04=960301c402000394 s10=0c020003 s11=08039803 d05=080398030c020003 s12=fffffff3 s13=ffffffff d06=fffffffffffffff3 s14=ffff01ff s15=ffffffff d07=ffffffffffff01ff s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000030 s33=e6000000 d16=e600000000000030 s34=06060137 s35=00000608 d17=0000060806060137 s36=e6080001 s37=800204a4 d18=800204a4e6080001 s38=a0080503 s39=80030803 d19=80030803a0080503 s40=33540802 s41=81fde503 d20=81fde50333540802 s42=000014fd s43=2ff57e00 d21=2ff57e00000014fd s44=0c2a5f55 s45=00000009 d22=000000090c2a5f55 s46=000081fd s47=3bdd86f7 d23=3bdd86f7000081fd s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=eafa2682 s53=78a69ca5 d26=78a69ca5eafa2682 s54=041536e9 s55=e225b40f d27=e225b40f041536e9 s56=848960a8 s57=d5171e06 d28=d5171e06848960a8 s58=bbe72f07 s59=ef2f860a d29=ef2f860abbe72f07 s60=1f7006d4 s61=32b251ce d30=32b251ce1f7006d4 s62=93491421 s63=de91bf62 d31=de91bf6293491421 FPSCR: 00000000