last executing test programs: 4.804847697s ago: executing program 0 (id=177): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0xc9d7, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000180)={'geneve1\x00', 0x0}) sendto$packet(r3, &(0x7f00000002c0)="1441c05465f0006fc8afa8e40800", 0xe, 0x80c0, &(0x7f0000000040)={0x11, 0x7, r4, 0x1, 0x0, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x14) 4.072164374s ago: executing program 0 (id=179): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x1800000000000000, &(0x7f0000003940)=@base={0x21, 0x0, 0x0, 0x100000, 0x400, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2000000, 0x0, 0x200000000000000, @void, @value, @void, @value}, 0x48) 3.694375635s ago: executing program 0 (id=181): bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getrandom(0xffffffffffffffff, 0x15, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f000001a240)=""/102400, 0x19000, 0x0) socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$MRT_ADD_VIF(r0, 0x0, 0xca, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) syz_clone(0x8004100, 0x0, 0x0, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=ANY=[@ANYBLOB="440000001000090600"/20, @ANYRES32=0x0, @ANYBLOB="adffa888000000001c00128009000100626f6e64000000000c000280050001000600000008000a00"], 0x44}}, 0x0) 2.623626967s ago: executing program 1 (id=183): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0xe) r2 = syz_io_uring_setup(0x3570, &(0x7f0000000240)={0x0, 0x0, 0x10100}, &(0x7f0000000000)=0x0, &(0x7f00000002c0)=0x0) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_RENAMEAT={0x23, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000100)='./file0\x00'}) io_uring_enter(r2, 0x2dbe, 0x0, 0x0, 0x0, 0x0) 2.028815609s ago: executing program 1 (id=184): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000500000095"], 0x0, 0x0, 0xffffffffffffffca, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x13f}}, 0x20) 1.80848177s ago: executing program 0 (id=185): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = syz_io_uring_setup(0xd3f, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x528d}, &(0x7f0000000380)=0x0, &(0x7f00000002c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x99, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) syz_io_uring_submit(r1, r2, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0xa, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r0, 0xce3, 0x0, 0x0, 0x0, 0x0) io_uring_enter(r0, 0x4ac9, 0x0, 0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r7}, 0x18) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="bbbbbbbbbbbb0180c200000208060001080006040002aaaaaaaaaa00ac1414bbaaaaaaaaaa"], 0x0) r8 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r8, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendto$packet(r8, &(0x7f0000000100)="f257a8ea7bc273dfaeab96850806", 0x2a, 0x0, &(0x7f0000000200)={0x11, 0x0, r9, 0x1, 0x0, 0x6, @link_local}, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r10, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)={0x34, 0x0, 0x2, 0x70bd2a, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x10001}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x45}]}, 0x34}, 0x1, 0x0, 0x0, 0x4890}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r11 = add_key$keyring(&(0x7f00000001c0), &(0x7f0000000240)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000040), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r11) semctl$SEM_INFO(0x0, 0x1, 0x13, &(0x7f0000000300)=""/67) 1.650416319s ago: executing program 1 (id=186): r0 = open(&(0x7f0000000180)='./bus\x00', 0x16d27e, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x60142, 0x0) r2 = open(&(0x7f0000000080)='./bus\x00', 0x185102, 0x0) ftruncate(r2, 0x2007fff) sendfile(r1, r2, 0x0, 0x1000000201005) sendfile(r0, r0, 0x0, 0x8800000) 1.438410799s ago: executing program 1 (id=187): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'netdevsim0\x00', &(0x7f0000000340)=@ethtool_sset_info={0x3a, 0x0, 0x8}}) 1.266530062s ago: executing program 1 (id=188): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00'}, 0x10) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000540)={{r0}, &(0x7f00000004c0), &(0x7f0000000500)='%-5lx \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="59bb22bd7000000020001100000008002b01"], 0x28}}, 0x0) 237.731095ms ago: executing program 1 (id=189): ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000011c0)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000001200)={0x1d, r2, 0x0, {0x0, 0x0, 0x4}}, 0x18) connect$can_j1939(r1, &(0x7f0000000080)={0x1d, r2}, 0x18) writev(r1, &(0x7f0000000240)=[{&(0x7f0000000000)='h', 0xfdef}], 0x1) setsockopt$SO_J1939_FILTER(r1, 0x6b, 0x1, &(0x7f0000000700)=[{0x2, 0x3, {0x1}, {0x1}}, {0x0, 0x0, {}, {}, 0x0, 0xfe}], 0x40) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000240)={'vxcan0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=@getchain={0x24, 0x11, 0x839, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}}, 0x0) 237.280855ms ago: executing program 0 (id=190): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @dev={0xfe, 0x80, '\x00', 0x28}, 0x2000000}, 0x1c) 0s ago: executing program 0 (id=191): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r1, 0x0, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x8, 0x3, 0x650, 0x0, 0xa, 0x148, 0x0, 0x10, 0x5b8, 0x2a8, 0x2a8, 0x5b8, 0x2a8, 0x3, 0x0, {[{{@ip={@multicast2=0xe000000b, @multicast2, 0x0, 0x0, 'bridge0\x00', 'rose0\x00', {}, {}, 0x0, 0x1}, 0x0, 0x2f8, 0x368, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x7a, 0x8000000, 0x0, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x64, './file0\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f2f7b9f28413d9d8ad470ad2b60c45cb4ea6e7bf902bdc2ff8a9304d9f655c746adc0bdc773506378bc2d27efd6abb05175089830cc46186074d7de46d5af300"}}}, {{@ip={@empty, @broadcast, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0x1f0, 0x250, 0x0, {}, [@common=@inet=@hashlimit3={{0x158}, {'veth1_to_bond\x00'}}, @inet=@rpfilter={{0x28}}]}, @common=@SET={0x60}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x6b0) kernel console output (not intermixed with test programs): [ 49.813487][ T31] audit: type=1400 audit(49.750:68): avc: denied { read write } for pid=3103 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 49.814820][ T31] audit: type=1400 audit(49.750:69): avc: denied { open } for pid=3103 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:17024' (ED25519) to the list of known hosts. [ 60.286807][ T31] audit: type=1400 audit(60.210:70): avc: denied { name_bind } for pid=3104 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 62.296020][ T31] audit: type=1400 audit(62.230:71): avc: denied { execute } for pid=3106 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.338629][ T31] audit: type=1400 audit(62.280:72): avc: denied { execute_no_trans } for pid=3106 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.697212][ T31] audit: type=1400 audit(66.630:73): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.698153][ T31] audit: type=1400 audit(66.630:74): avc: denied { mount } for pid=3106 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.712895][ T3106] cgroup: Unknown subsys name 'net' [ 66.722186][ T31] audit: type=1400 audit(66.660:75): avc: denied { unmount } for pid=3106 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.964767][ T3106] cgroup: Unknown subsys name 'hugetlb' [ 66.965705][ T3106] cgroup: Unknown subsys name 'rlimit' [ 67.248058][ T31] audit: type=1400 audit(67.190:76): avc: denied { setattr } for pid=3106 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 67.249894][ T31] audit: type=1400 audit(67.190:77): avc: denied { mounton } for pid=3106 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 67.250711][ T31] audit: type=1400 audit(67.190:78): avc: denied { mount } for pid=3106 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 67.513418][ T3108] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 67.515433][ T31] audit: type=1400 audit(67.450:79): avc: denied { relabelto } for pid=3108 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.519889][ T31] audit: type=1400 audit(67.460:80): avc: denied { write } for pid=3108 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.550376][ T31] audit: type=1400 audit(67.490:81): avc: denied { read } for pid=3106 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.551408][ T31] audit: type=1400 audit(67.490:82): avc: denied { open } for pid=3106 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.547172][ T3106] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 75.339056][ T31] audit: type=1400 audit(75.280:83): avc: denied { execmem } for pid=3109 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 75.406996][ T31] audit: type=1400 audit(75.340:84): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 75.408042][ T31] audit: type=1400 audit(75.340:85): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 75.409050][ T31] audit: type=1400 audit(75.340:86): avc: denied { read } for pid=3111 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.409713][ T31] audit: type=1400 audit(75.340:87): avc: denied { open } for pid=3111 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.416755][ T31] audit: type=1400 audit(75.350:88): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 75.431766][ T31] audit: type=1400 audit(75.370:89): avc: denied { module_request } for pid=3111 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.517331][ T31] audit: type=1400 audit(75.450:90): avc: denied { sys_module } for pid=3111 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 76.291638][ T31] audit: type=1400 audit(76.230:91): avc: denied { ioctl } for pid=3111 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 77.573913][ T3111] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.579706][ T3111] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 77.879041][ T3112] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.913903][ T3112] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.260057][ T3111] hsr_slave_0: entered promiscuous mode [ 78.263929][ T3111] hsr_slave_1: entered promiscuous mode [ 78.644577][ T31] audit: type=1400 audit(78.580:92): avc: denied { create } for pid=3111 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 78.660004][ T3111] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 78.672742][ T3111] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 78.683195][ T3111] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 78.693986][ T3111] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 79.211396][ T3112] hsr_slave_0: entered promiscuous mode [ 79.217254][ T3112] hsr_slave_1: entered promiscuous mode [ 79.225100][ T3112] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 79.225729][ T3112] Cannot create hsr debugfs directory [ 79.653421][ T3112] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 79.664201][ T3112] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 79.676656][ T3112] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 79.691556][ T3112] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 79.741839][ T3111] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.250252][ T3112] 8021q: adding VLAN 0 to HW filter on device bond0 [ 82.661035][ T3111] veth0_vlan: entered promiscuous mode [ 82.682684][ T3111] veth1_vlan: entered promiscuous mode [ 82.764602][ T3111] veth0_macvtap: entered promiscuous mode [ 82.782849][ T3111] veth1_macvtap: entered promiscuous mode [ 82.855360][ T3111] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.858554][ T3111] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.858971][ T3111] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.859333][ T3111] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.005807][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 83.005919][ T31] audit: type=1400 audit(82.940:95): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 83.007851][ T31] audit: type=1400 audit(82.940:96): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/syzkaller.8NHc0S/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 83.017479][ T31] audit: type=1400 audit(82.950:97): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 83.040505][ T31] audit: type=1400 audit(82.980:98): avc: denied { unmount } for pid=3111 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 83.048131][ T31] audit: type=1400 audit(82.980:99): avc: denied { mounton } for pid=3111 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 83.059708][ T31] audit: type=1400 audit(83.000:100): avc: denied { mount } for pid=3111 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 83.229451][ T31] audit: type=1400 audit(83.170:101): avc: denied { read write } for pid=3111 comm="syz-executor" name="loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 83.250975][ T31] audit: type=1400 audit(83.180:102): avc: denied { open } for pid=3111 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 83.252014][ T31] audit: type=1400 audit(83.180:103): avc: denied { ioctl } for pid=3111 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=635 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 83.328456][ T31] audit: type=1400 audit(83.260:104): avc: denied { map_create } for pid=3788 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 84.342189][ T3112] veth0_vlan: entered promiscuous mode [ 84.370781][ T3112] veth1_vlan: entered promiscuous mode [ 84.554645][ T3112] veth0_macvtap: entered promiscuous mode [ 84.573935][ T3112] veth1_macvtap: entered promiscuous mode [ 85.283579][ T3112] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.307970][ T3112] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.309540][ T3112] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.319184][ T3112] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 88.311724][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 88.311838][ T31] audit: type=1326 audit(88.240:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3812 comm="syz.0.8" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 88.327340][ T31] audit: type=1326 audit(88.250:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3812 comm="syz.0.8" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 88.349582][ T31] audit: type=1326 audit(88.280:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3815 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 88.376963][ T31] audit: type=1326 audit(88.310:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3815 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 88.380272][ T31] audit: type=1326 audit(88.320:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3815 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 88.381863][ T31] audit: type=1326 audit(88.320:136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3815 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 88.382690][ T31] audit: type=1326 audit(88.320:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3815 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 88.383522][ T31] audit: type=1326 audit(88.320:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3815 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=307 compat=0 ip=0x132da0 code=0x7ffc0000 [ 88.415493][ T31] audit: type=1326 audit(88.330:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3815 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 88.424520][ T31] audit: type=1326 audit(88.330:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3815 comm="syz.1.9" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 94.267738][ T3840] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 94.272456][ T31] kauditd_printk_skb: 45 callbacks suppressed [ 94.272746][ T31] audit: type=1400 audit(94.210:186): avc: denied { getopt } for pid=3838 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 95.671346][ T31] audit: type=1400 audit(95.590:187): avc: denied { create } for pid=3826 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 95.672205][ T31] audit: type=1400 audit(95.610:188): avc: denied { setopt } for pid=3826 comm="syz.1.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 97.014667][ T31] audit: type=1400 audit(96.950:189): avc: denied { write } for pid=3845 comm="syz.0.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 97.327971][ T31] audit: type=1400 audit(97.260:190): avc: denied { execute } for pid=3848 comm="syz.0.17" path="/12/net_prio.prioidx" dev="tmpfs" ino=78 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 97.488327][ T31] audit: type=1326 audit(97.420:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3851 comm="syz.0.18" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 97.489366][ T31] audit: type=1326 audit(97.420:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3851 comm="syz.0.18" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 97.493189][ T31] audit: type=1326 audit(97.420:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3851 comm="syz.0.18" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 97.516595][ T31] audit: type=1326 audit(97.420:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3851 comm="syz.0.18" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 97.517723][ T31] audit: type=1326 audit(97.430:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3851 comm="syz.0.18" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 98.005655][ T3857] SELinux: Context system_u:object_r:device_t:s0 is not valid (left unmapped). [ 99.520316][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 99.520450][ T31] audit: type=1400 audit(99.460:209): avc: denied { read } for pid=3869 comm="syz.0.25" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 99.521585][ T31] audit: type=1400 audit(99.460:210): avc: denied { open } for pid=3869 comm="syz.0.25" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 114.671885][ T31] audit: type=1400 audit(114.610:211): avc: denied { create } for pid=3881 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 114.690451][ T31] audit: type=1400 audit(114.630:212): avc: denied { create } for pid=3881 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 114.701886][ T31] audit: type=1400 audit(114.640:213): avc: denied { connect } for pid=3881 comm="syz.1.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 118.196713][ T31] audit: type=1400 audit(118.130:214): avc: denied { connect } for pid=3890 comm="syz.1.31" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 118.214677][ T31] audit: type=1400 audit(118.150:215): avc: denied { write } for pid=3890 comm="syz.1.31" path="socket:[2044]" dev="sockfs" ino=2044 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 118.786472][ T31] audit: type=1400 audit(118.720:216): avc: denied { sqpoll } for pid=3894 comm="syz.1.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 118.787274][ T31] audit: type=1400 audit(118.720:217): avc: denied { create } for pid=3894 comm="syz.1.33" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 118.802989][ T31] audit: type=1400 audit(118.740:218): avc: denied { map } for pid=3894 comm="syz.1.33" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3077 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 118.803863][ T31] audit: type=1400 audit(118.740:219): avc: denied { read write } for pid=3894 comm="syz.1.33" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3077 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 119.226527][ T31] audit: type=1400 audit(119.150:220): avc: denied { name_bind } for pid=3897 comm="syz.1.34" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 119.852494][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 119.852611][ T31] audit: type=1400 audit(119.790:223): avc: denied { mount } for pid=3902 comm="syz.1.36" name="/" dev="ramfs" ino=3101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 121.736355][ T31] audit: type=1326 audit(121.670:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 121.737111][ T31] audit: type=1326 audit(121.670:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 121.737752][ T31] audit: type=1326 audit(121.670:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.42" exe="/syz-executor" sig=0 arch=40000028 syscall=23 compat=0 ip=0x132da0 code=0x7ffc0000 [ 121.738174][ T31] audit: type=1326 audit(121.670:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 121.738616][ T31] audit: type=1326 audit(121.670:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3916 comm="syz.1.42" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 122.425073][ T3924] syz.0.44[3924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.425396][ T3924] syz.0.44[3924] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 122.858954][ T3929] pim6reg1: entered promiscuous mode [ 122.860147][ T3929] pim6reg1: entered allmulticast mode [ 122.950636][ T31] audit: type=1326 audit(122.890:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3934 comm="syz.1.46" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 122.952207][ T31] audit: type=1326 audit(122.890:230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3934 comm="syz.1.46" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 122.953172][ T31] audit: type=1326 audit(122.890:231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3934 comm="syz.1.46" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 122.954474][ T31] audit: type=1326 audit(122.890:232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3934 comm="syz.1.46" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 129.135261][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 129.135358][ T31] audit: type=1400 audit(129.070:251): avc: denied { create } for pid=3980 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 129.184144][ T31] audit: type=1400 audit(129.100:252): avc: denied { ioctl } for pid=3980 comm="syz.1.60" path="socket:[2555]" dev="sockfs" ino=2555 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 129.360511][ T31] audit: type=1400 audit(129.300:253): avc: denied { connect } for pid=3980 comm="syz.1.60" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 130.059446][ T3998] syz.1.62[3998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.060003][ T3998] syz.1.62[3998] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.106867][ T31] audit: type=1326 audit(130.040:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.1.62" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 130.110806][ T31] audit: type=1326 audit(130.040:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.1.62" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 130.112174][ T31] audit: type=1326 audit(130.040:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.1.62" exe="/syz-executor" sig=0 arch=40000028 syscall=268 compat=0 ip=0x132da0 code=0x7ffc0000 [ 130.112755][ T31] audit: type=1326 audit(130.040:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.1.62" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 130.113452][ T31] audit: type=1326 audit(130.040:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3996 comm="syz.1.62" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 131.926829][ T31] audit: type=1326 audit(131.850:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.64" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 131.927771][ T31] audit: type=1326 audit(131.870:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4009 comm="syz.1.64" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 134.558410][ T31] kauditd_printk_skb: 59 callbacks suppressed [ 134.558528][ T31] audit: type=1400 audit(134.500:320): avc: denied { ioctl } for pid=4027 comm="syz.1.68" path="socket:[2591]" dev="sockfs" ino=2591 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 134.564640][ T4028] Zero length message leads to an empty skb [ 135.221380][ T31] audit: type=1326 audit(135.160:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4031 comm="syz.1.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.222581][ T31] audit: type=1326 audit(135.160:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4031 comm="syz.1.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.228309][ T31] audit: type=1326 audit(135.160:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4031 comm="syz.1.70" exe="/syz-executor" sig=0 arch=40000028 syscall=437 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.229575][ T31] audit: type=1326 audit(135.160:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4031 comm="syz.1.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.232319][ T31] audit: type=1326 audit(135.160:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4031 comm="syz.1.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 135.800989][ T31] audit: type=1400 audit(135.740:326): avc: denied { validate_trans } for pid=4038 comm="syz.0.72" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 137.952362][ T31] audit: type=1400 audit(137.890:327): avc: denied { write } for pid=4069 comm="syz.1.83" name="igmp" dev="proc" ino=4026532776 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 142.641593][ T4093] syz.0.91[4093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 142.641953][ T4093] syz.0.91[4093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 143.160395][ T31] audit: type=1326 audit(143.100:328): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 143.161390][ T31] audit: type=1326 audit(143.100:329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 143.176604][ T31] audit: type=1326 audit(143.100:330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=428 compat=0 ip=0x132da0 code=0x7ffc0000 [ 143.177542][ T31] audit: type=1326 audit(143.100:331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 143.178314][ T31] audit: type=1326 audit(143.100:332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 143.186603][ T31] audit: type=1326 audit(143.120:333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 143.187447][ T31] audit: type=1326 audit(143.120:334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 143.188215][ T31] audit: type=1326 audit(143.120:335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 143.188954][ T31] audit: type=1326 audit(143.120:336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 143.189703][ T31] audit: type=1326 audit(143.120:337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4100 comm="syz.0.93" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 145.786403][ C0] hrtimer: interrupt took 9582784 ns [ 147.315364][ T4126] capability: warning: `syz.0.100' uses deprecated v2 capabilities in a way that may be insecure [ 147.872636][ T4132] netlink: 40 bytes leftover after parsing attributes in process `syz.0.102'. [ 160.014244][ T4185] netlink: 28 bytes leftover after parsing attributes in process `syz.0.118'. [ 160.316791][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 160.316896][ T31] audit: type=1326 audit(160.250:348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4186 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 160.318292][ T31] audit: type=1326 audit(160.250:349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4186 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 160.319701][ T31] audit: type=1326 audit(160.250:350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4186 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 160.327307][ T31] audit: type=1326 audit(160.250:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4186 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 160.328131][ T31] audit: type=1326 audit(160.250:352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4186 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 160.328942][ T31] audit: type=1326 audit(160.250:353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4186 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 160.329677][ T31] audit: type=1326 audit(160.250:354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4186 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 160.330744][ T31] audit: type=1326 audit(160.250:355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4186 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 160.331803][ T31] audit: type=1326 audit(160.260:356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4186 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 160.332639][ T31] audit: type=1326 audit(160.260:357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4186 comm="syz.0.119" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 166.272114][ T4208] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4208 comm=syz.0.124 [ 167.171821][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 167.171932][ T31] audit: type=1326 audit(167.110:376): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 167.173193][ T31] audit: type=1326 audit(167.110:377): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 167.182478][ T31] audit: type=1326 audit(167.110:378): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 167.183319][ T31] audit: type=1326 audit(167.120:379): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 167.184230][ T31] audit: type=1326 audit(167.120:380): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 167.185290][ T31] audit: type=1326 audit(167.120:381): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 167.187742][ T31] audit: type=1326 audit(167.120:382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 167.188418][ T31] audit: type=1326 audit(167.130:383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 167.217752][ T31] audit: type=1326 audit(167.160:384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 167.218863][ T31] audit: type=1326 audit(167.160:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4216 comm="syz.0.127" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 168.801637][ T4240] process 'syz.0.135' launched './file0' with NULL argv: empty string added [ 171.791839][ T4277] netlink: 'syz.0.146': attribute type 10 has an invalid length. [ 171.952330][ T4279] SELinux: Context system_u:object_r:mouse_device_t:s0 is not valid (left unmapped). [ 172.509862][ T31] kauditd_printk_skb: 51 callbacks suppressed [ 172.509979][ T31] audit: type=1400 audit(172.450:437): avc: denied { read } for pid=4278 comm="syz.0.147" name="event0" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 172.511864][ T31] audit: type=1400 audit(172.450:438): avc: denied { open } for pid=4278 comm="syz.0.147" path="/dev/input/event0" dev="devtmpfs" ino=719 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 175.018830][ T4285] veth2: entered allmulticast mode [ 181.128195][ T31] audit: type=1326 audit(181.060:439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 181.139189][ T31] audit: type=1326 audit(181.080:440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 181.141741][ T31] audit: type=1326 audit(181.080:441): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 181.143441][ T31] audit: type=1326 audit(181.080:442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 181.144241][ T31] audit: type=1326 audit(181.080:443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 181.158630][ T31] audit: type=1326 audit(181.100:444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 181.159476][ T31] audit: type=1326 audit(181.100:445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 181.162449][ T31] audit: type=1326 audit(181.100:446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 181.163114][ T31] audit: type=1326 audit(181.100:447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4300 comm="syz.0.150" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 182.480821][ T4309] syz.0.152[4309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.481203][ T4309] syz.0.152[4309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 182.537215][ T4309] netlink: 'syz.0.152': attribute type 4 has an invalid length. [ 183.280087][ T31] audit: type=1400 audit(183.220:448): avc: denied { getopt } for pid=4310 comm="syz.0.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 185.878152][ T4274] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 186.130383][ T4274] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 186.131326][ T4274] usb 1-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 21 [ 186.132008][ T4274] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 186.132341][ T4274] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 186.147962][ T4274] usb 1-1: config 0 descriptor?? [ 186.190629][ T4274] usbhid 1-1:0.0: couldn't find an input interrupt endpoint [ 191.147552][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 191.147677][ T31] audit: type=1400 audit(191.090:455): avc: denied { block_suspend } for pid=4318 comm="syz.0.156" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 194.128915][ T31] audit: type=1326 audit(194.060:456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4332 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 194.131417][ T31] audit: type=1326 audit(194.070:457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4332 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 194.134995][ T31] audit: type=1326 audit(194.070:458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4332 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132da0 code=0x7ffc0000 [ 194.148917][ T31] audit: type=1326 audit(194.080:459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4332 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 194.159459][ T31] audit: type=1326 audit(194.100:460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4332 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 194.163207][ T31] audit: type=1326 audit(194.100:461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4332 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=451 compat=0 ip=0x132da0 code=0x7ffc0000 [ 194.165731][ T31] audit: type=1326 audit(194.100:462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4332 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 194.186727][ T31] audit: type=1326 audit(194.110:463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4332 comm="syz.1.157" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 194.401683][ T31] audit: type=1400 audit(194.340:464): avc: denied { create } for pid=4334 comm="syz.1.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 194.488820][ T4335] netlink: 20 bytes leftover after parsing attributes in process `syz.1.158'. [ 195.723758][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x1 [ 195.724395][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.724925][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.725327][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.725654][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.725971][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.726787][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.727179][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.728123][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.728473][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.728917][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.729236][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.729674][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.729989][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.737672][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.738272][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.738589][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.738980][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.739338][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.742977][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.766769][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.767290][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.767652][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.768035][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.768473][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.768902][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.769368][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.769765][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.770132][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.770485][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.770829][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.771166][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.771497][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.771856][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.772184][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.772515][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.772847][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.773174][ T4344] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 195.797761][ T4344] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.80 Device [syz0] on syz0 [ 199.562030][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 199.562145][ T31] audit: type=1400 audit(199.500:467): avc: denied { mount } for pid=4357 comm="syz.1.162" name="/" dev="configfs" ino=1180 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 200.238760][ T31] audit: type=1400 audit(200.170:468): avc: denied { sqpoll } for pid=4362 comm="syz.1.164" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 215.557401][ T31] audit: type=1400 audit(215.500:469): avc: denied { execute } for pid=4379 comm="syz-executor" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 215.561129][ T31] audit: type=1400 audit(215.500:470): avc: denied { execute_no_trans } for pid=4379 comm="syz-executor" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 215.604598][ T31] audit: type=1400 audit(215.540:471): avc: denied { mounton } for pid=4380 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 215.616652][ T31] audit: type=1400 audit(215.550:472): avc: denied { mount } for pid=4380 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 215.617471][ T31] audit: type=1400 audit(215.550:473): avc: denied { mounton } for pid=4380 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 215.712645][ T31] audit: type=1400 audit(215.650:474): avc: denied { sys_module } for pid=4380 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 216.891121][ T3839] usb 1-1: USB disconnect, device number 2 [ 217.713782][ T31] audit: type=1326 audit(217.650:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4522 comm="syz.1.172" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 217.741244][ T31] audit: type=1326 audit(217.650:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4522 comm="syz.1.172" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 217.744255][ T31] audit: type=1326 audit(217.680:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4522 comm="syz.1.172" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132da0 code=0x7ffc0000 [ 217.746770][ T31] audit: type=1326 audit(217.680:478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4522 comm="syz.1.172" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x7ffc0000 [ 218.102942][ T4380] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 218.120955][ T4380] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 222.850068][ T4380] hsr_slave_0: entered promiscuous mode [ 222.869319][ T4380] hsr_slave_1: entered promiscuous mode [ 222.874301][ T4380] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 222.874765][ T4380] Cannot create hsr debugfs directory [ 223.829759][ T4380] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 223.929596][ T4380] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 224.000815][ T4380] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 224.089289][ T4380] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 224.313082][ T4380] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 224.332248][ T4380] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 224.350843][ T4380] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 224.370038][ T4380] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 227.030217][ T4380] 8021q: adding VLAN 0 to HW filter on device bond0 [ 232.421233][ T4380] veth0_vlan: entered promiscuous mode [ 232.449572][ T4380] veth1_vlan: entered promiscuous mode [ 232.507657][ T4380] veth0_macvtap: entered promiscuous mode [ 232.518977][ T4380] veth1_macvtap: entered promiscuous mode [ 232.578071][ T4380] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 232.578667][ T4380] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 232.579024][ T4380] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 232.579362][ T4380] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 232.685312][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 232.685403][ T31] audit: type=1400 audit(232.620:492): avc: denied { mounton } for pid=4380 comm="syz-executor" path="/syzkaller.aJUEn7/syz-tmp" dev="vda" ino=691 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 232.700341][ T31] audit: type=1400 audit(232.630:493): avc: denied { mount } for pid=4380 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 232.701243][ T31] audit: type=1400 audit(232.630:494): avc: denied { mounton } for pid=4380 comm="syz-executor" path="/syzkaller.aJUEn7/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 232.702375][ T31] audit: type=1400 audit(232.630:495): avc: denied { mount } for pid=4380 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 232.720392][ T31] audit: type=1400 audit(232.660:496): avc: denied { unmount } for pid=4380 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 232.730496][ T31] audit: type=1400 audit(232.670:497): avc: denied { mounton } for pid=4380 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 232.737028][ T31] audit: type=1400 audit(232.670:498): avc: denied { mount } for pid=4380 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 232.883355][ T31] audit: type=1400 audit(232.820:499): avc: denied { setopt } for pid=4752 comm="syz.0.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 233.511627][ T31] audit: type=1400 audit(233.450:500): avc: denied { ioctl } for pid=4756 comm="syz.0.177" path="socket:[4379]" dev="sockfs" ino=4379 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 233.570414][ T31] audit: type=1400 audit(233.500:501): avc: denied { write } for pid=4756 comm="syz.0.177" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 234.971533][ T4770] bond1: entered promiscuous mode [ 234.972980][ T4770] bond1: entered allmulticast mode [ 234.974420][ T4770] 8021q: adding VLAN 0 to HW filter on device bond1 [ 235.023296][ T4770] bond1 (unregistering): Released all slaves [ 235.968093][ T4841] syz.1.184[4841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.968505][ T4841] syz.1.184[4841] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.758360][ T31] kauditd_printk_skb: 14 callbacks suppressed [ 237.758476][ T31] audit: type=1400 audit(237.700:516): avc: denied { setopt } for pid=4857 comm="syz.1.189" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 237.763976][ C0] ------------[ cut here ]------------ [ 237.764621][ C0] WARNING: CPU: 0 PID: 4859 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 237.765655][ C0] refcount_t: underflow; use-after-free. [ 237.765967][ C0] Modules linked in: [ 237.766728][ C0] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 237.767864][ C0] CPU: 0 UID: 0 PID: 4859 Comm: syz.1.189 Not tainted 6.11.0-syzkaller #0 [ 237.769215][ C0] Hardware name: ARM-Versatile Express [ 237.770156][ C0] Call trace: frame pointer underflow [ 237.770844][ C0] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 237.771695][ C0] r7:00000000 r6:826228c4 r5:00000000 r4:8200e404 [ 237.772032][ C0] [<81966d9c>] (show_stack) from [<81984a58>] (dump_stack_lvl+0x54/0x7c) [ 237.772386][ C0] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 237.772781][ C0] r5:00000000 r4:8286ed18 [ 237.772981][ C0] [<81984a80>] (dump_stack) from [<8196785c>] (panic+0x120/0x368) [ 237.773353][ C0] [<8196773c>] (panic) from [<802421d4>] (get_taint+0x0/0x1c) [ 237.773719][ C0] r3:8260c5c4 r2:00000001 r1:81ff6c38 r0:81ffea04 [ 237.773975][ C0] r7:8081a110 [ 237.774169][ C0] [<80242160>] (check_panic_on_warn) from [<80242328>] (__warn+0x7c/0x180) [ 237.774586][ C0] [<802422ac>] (__warn) from [<80242614>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 237.775077][ C0] r8:00000009 r7:8205cdc4 r6:df801c94 r5:84f05400 r4:00000000 [ 237.775368][ C0] [<80242430>] (warn_slowpath_fmt) from [<8081a110>] (refcount_warn_saturate+0x13c/0x174) [ 237.775843][ C0] r10:20000013 r9:851cdd5c r8:84464f00 r7:00000000 r6:817f7394 r5:00000002 [ 237.776409][ C0] r4:84464f00 [ 237.776829][ C0] [<80819fd4>] (refcount_warn_saturate) from [<8146782c>] (sk_skb_reason_drop+0x1d8/0x248) [ 237.777336][ C0] [<81467654>] (sk_skb_reason_drop) from [<817f7394>] (j1939_xtp_rx_cts+0x220/0x3d0) [ 237.778749][ C0] r9:851cdd5c r8:84464f00 r7:8535c498 r6:00000df2 r5:851cdd00 r4:851cdd14 [ 237.779636][ C0] [<817f7174>] (j1939_xtp_rx_cts) from [<817f8308>] (j1939_tp_recv+0x3f4/0x530) [ 237.780195][ C0] r10:dddd0ec8 r9:00000040 r8:8535c490 r7:835a9000 r6:835a9008 r5:835a9000 [ 237.780527][ C0] r4:85682000 [ 237.780706][ C0] [<817f7f14>] (j1939_tp_recv) from [<817f1da0>] (j1939_can_recv+0x1e4/0x2dc) [ 237.781300][ C0] r7:835a9000 r6:835a9008 r5:835a9810 r4:85682000 [ 237.781736][ C0] [<817f1bbc>] (j1939_can_recv) from [<817e7b6c>] (can_rcv_filter+0x9c/0x218) [ 237.782267][ C0] r9:00000040 r8:847106a0 r7:98c80000 r6:85682240 r5:00000001 r4:8510c6c0 [ 237.782601][ C0] [<817e7ad0>] (can_rcv_filter) from [<817e8510>] (can_receive+0xb4/0xf0) [ 237.783114][ C0] r9:00000040 r8:00000000 r7:84710000 r6:842eb6c0 r5:84c68000 r4:85682240 [ 237.783550][ C0] [<817e845c>] (can_receive) from [<817e85d0>] (can_rcv+0x84/0xac) [ 237.784013][ C0] r9:00000040 r8:00000002 r7:00000000 r6:00000000 r5:817e854c r4:85682240 [ 237.784355][ C0] [<817e854c>] (can_rcv) from [<814886a4>] (__netif_receive_skb_one_core+0x5c/0x80) [ 237.784767][ C0] r5:817e854c r4:84710000 [ 237.784963][ C0] [<81488648>] (__netif_receive_skb_one_core) from [<81488710>] (__netif_receive_skb+0x18/0x5c) [ 237.785429][ C0] r5:dddd0fb0 r4:85682240 [ 237.785730][ C0] [<814886f8>] (__netif_receive_skb) from [<81488a00>] (process_backlog+0x88/0x15c) [ 237.786290][ C0] r5:dddd0fb0 r4:85682240 [ 237.786592][ C0] [<81488978>] (process_backlog) from [<81489904>] (__napi_poll+0x34/0x240) [ 237.787093][ C0] r10:dddd0ec0 r9:dddd1100 r8:df801ed0 r7:df801ecb r6:00000040 r5:dddd0fb0 [ 237.787479][ C0] r4:00000001 [ 237.787732][ C0] [<814898d0>] (__napi_poll) from [<8148a13c>] (net_rx_action+0x338/0x420) [ 237.788093][ C0] r9:dddd1100 r8:df801ed0 r7:0000012c r6:ffffe7ac r5:dddd0fb0 r4:00000000 [ 237.788399][ C0] [<81489e04>] (net_rx_action) from [<8024b5d8>] (handle_softirqs+0x15c/0x468) [ 237.789018][ C0] r10:00000008 r9:84f05400 r8:00000101 r7:00400040 r6:00000003 r5:00000004 [ 237.789482][ C0] r4:8260408c [ 237.789673][ C0] [<8024b47c>] (handle_softirqs) from [<802012d0>] (__do_softirq+0x14/0x18) [ 237.790350][ C0] r10:00000126 r9:84f05400 r8:00000002 r7:84cfd660 r6:852f7880 r5:00000001 [ 237.790898][ C0] r4:60000013 [ 237.791100][ C0] [<802012bc>] (__do_softirq) from [<80208800>] (____do_softirq+0x10/0x14) [ 237.791517][ C0] [<802087f0>] (____do_softirq) from [<81936768>] (call_with_stack+0x1c/0x20) [ 237.791977][ C0] [<8193674c>] (call_with_stack) from [<8020883c>] (do_softirq_own_stack+0x38/0x3c) [ 237.792492][ C0] [<80208804>] (do_softirq_own_stack) from [<8024baf0>] (do_softirq+0x5c/0x64) [ 237.792874][ C0] [<8024ba94>] (do_softirq) from [<8024bbc4>] (__local_bh_enable_ip+0xcc/0xd0) [ 237.793643][ C0] r5:00000001 r4:84f05400 [ 237.794130][ C0] [<8024baf8>] (__local_bh_enable_ip) from [<81991a78>] (_raw_spin_unlock_bh+0x34/0x38) [ 237.794768][ C0] r5:84cfd4ec r4:84cfd400 [ 237.794951][ C0] [<81991a44>] (_raw_spin_unlock_bh) from [<8145a574>] (lock_sock_nested+0x38/0x48) [ 237.795426][ C0] [<8145a53c>] (lock_sock_nested) from [<817f2df8>] (j1939_sk_setsockopt+0xdc/0x2d8) [ 237.795967][ C0] r5:00000002 r4:84cfd400 [ 237.796449][ C0] [<817f2d20>] (j1939_sk_setsockopt) from [<8145195c>] (do_sock_setsockopt+0xb0/0x17c) [ 237.797021][ C0] r8:8020029c r7:00000000 r6:84856280 r5:00000000 r4:817f2d1c [ 237.797313][ C0] [<814518ac>] (do_sock_setsockopt) from [<81454ef0>] (sys_setsockopt+0x78/0xbc) [ 237.797884][ C0] r6:84856280 r5:00000001 r4:0000006b [ 237.798129][ C0] [<81454e78>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 237.798603][ C0] Exception stack(0xdfe41fa8 to 0xdfe41ff0) [ 237.799115][ C0] 1fa0: 00000040 00000000 00000004 0000006b 00000001 20000700 [ 237.799693][ C0] 1fc0: 00000040 00000000 002862f8 00000126 00000000 00006364 003d0f00 76be60bc [ 237.800110][ C0] 1fe0: 76be5ec0 76be5eb0 000189d0 00132da0 [ 237.800464][ C0] r7:00000126 r6:002862f8 r5:00000000 r4:00000040 [ 237.802585][ C0] Rebooting in 86400 seconds.. VM DIAGNOSIS: 21:43:32 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=00000000 R02=00000000 R03=8286ed18 R04=84f05400 R05=8200e404 R06=827f09a6 R07=8286f154 R08=00000000 R09=00000000 R10=000012fb R11=df801bdc R12=df801b90 R13=df801b90 R14=8193a71c R15=8193a724 PSR=60000093 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=832ff390 R01=04200000 R02=5600522d R03=fd63c75f R04=def9b094 R05=0000013f R06=00000136 R07=00147000 R08=def9b094 R09=dfe8de30 R10=00000000 R11=dfe8ddec R12=dfe8dd90 R13=dfe8dd40 R14=802164b4 R15=80217830 PSR=60000113 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=004b27e9 s17=00000000 d08=00000000004b27e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=0303ffff s33=08001bd0 d16=08001bd00303ffff s34=1bd80300 s35=03000800 d17=030008001bd80300 s36=08001be0 s37=1be80300 d18=1be8030008001be0 s38=03000800 s39=ff041bf0 d19=ff041bf003000800 s40=03ffffff s41=041c8003 d20=041c800303ffffff s42=ffffffff s43=1c900303 d21=1c900303ffffffff s44=03000800 s45=08001c98 d22=08001c9803000800 s46=1ca00300 s47=fc000800 d23=fc0008001ca00300 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=1592effd s53=fe074ae4 d26=fe074ae41592effd s54=2242d025 s55=d8decb4f d27=d8decb4f2242d025 s56=94a1a5b4 s57=3cdd3cc9 d28=3cdd3cc994a1a5b4 s58=796e4444 s59=61ba8ff5 d29=61ba8ff5796e4444 s60=713d8172 s61=23914e90 d30=23914e90713d8172 s62=c6934c02 s63=5001f0a3 d31=5001f0a3c6934c02 FPSCR: 00000000