last executing test programs: 4.71970453s ago: executing program 4 (id=1343): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) r3 = syz_clone(0x102200, 0x0, 0xffffffffffffff88, 0x0, 0x0, 0x0) setpgid(r3, r3) waitid(0x2, r3, 0x0, 0x4, 0x0) 4.318415003s ago: executing program 4 (id=1346): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) unlink(&(0x7f0000000040)='./file1\x00') 4.068490565s ago: executing program 4 (id=1348): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000140)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) setpriority(0x2, 0x0, 0xd2f4) 3.154866246s ago: executing program 4 (id=1359): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "5d9bc136c963254c661fb620148b6f72ca6ae2a44829bfa79ec13499f8ec9077d85d879711d98bb1687ad36dfe5f14a7b0ce15c1e6be0e7ecabfdfde0dfa00b1"}, 0x48, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) 2.953163391s ago: executing program 1 (id=1364): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x24, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, 0x0, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}}, 0x24}}, 0x0) 2.853565024s ago: executing program 1 (id=1367): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) syz_io_uring_setup(0x5b14, &(0x7f0000000040)={0x0, 0xf527, 0x8, 0x5, 0x321}, 0x0, 0x0) 2.699519384s ago: executing program 1 (id=1372): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = getpgrp(0xffffffffffffffff) r4 = gettid() rt_tgsigqueueinfo(r3, r4, 0x0, &(0x7f0000000780)={0x11, 0x0, 0x80}) 2.559827947s ago: executing program 1 (id=1376): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) fanotify_mark(0xffffffffffffffff, 0x80, 0x8001018, 0xffffffffffffffff, 0x0) 2.459168143s ago: executing program 1 (id=1378): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x84) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r3, 0x0, 0x0) 2.346634158s ago: executing program 1 (id=1380): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000105509147200ed0000000109022400010000000009040000030300000009210000000122050009058103"], 0x0) syz_usb_control_io(r1, 0x0, 0x0) syz_usb_control_io$hid(r1, &(0x7f0000000140)={0x24, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x22, 0x5, {[@main=@item_4={0x3, 0x0, 0xb, "1a3952b5"}]}}, 0x0}, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0), 0x3f, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010028bd7040010000000f00000005002a000000000008000300", @ANYRES32=r4], 0x5c}}, 0x18) socket$nl_route(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r3, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000090}, 0xc0) syz_usb_connect(0x2, 0x3fe, &(0x7f00000008c0)={{0x12, 0x1, 0x310, 0x18, 0xb5, 0xb4, 0x45, 0x582, 0x12, 0x1ad7, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3ec, 0x3, 0x40, 0x3, 0x30, 0x1, [{{0x9, 0x4, 0x5d, 0xfe, 0xb, 0x93, 0x92, 0x2e, 0x0, [@generic={0xdc, 0x22, "9a4cb7c2912d503e190b196a63f67a34513b8919dd3a293316b4f67222306a0e9d3a37ca49c8471f89d1b80e7d6e71e46da3da9d7234354febb05033da82c74f41474ebba59a9c9b7a2bbac5ffda840397992e49360996bacd8d5e224f469b430c8b69b540878076ae6cd1fe6d5873ab465f5ca048349b8255a55ce38a97a3d68078d2a07b916d15fefc1af25ed885b470db55b146cf2046057762a6af7ee8263d02bcb661252b121c85c1bbe7a04f5f64f8b402db75c2cabfedf544ed7a148690e3b15b56b2cf34d36e180ed4f97299ea02a82b106e0786edc3"}], [{{0x9, 0x5, 0x86, 0x10, 0x200, 0x0, 0xf, 0xb1}}, {{0x9, 0x5, 0x4, 0x0, 0x8, 0x5, 0x2, 0x1b}}, {{0x9, 0x5, 0x0, 0x4, 0x400, 0x3, 0x2, 0x4, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x3, 0x4}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0xe, 0x4c7}]}}, {{0x9, 0x5, 0x5, 0x10, 0x8, 0x2, 0x1, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0xff, 0x4}, @generic={0xd, 0xa, "58fd12e4ba7981983442b7"}]}}, {{0x9, 0x5, 0xe, 0x4, 0x400, 0x21, 0x8, 0x9}}, {{0x9, 0x5, 0xa, 0x0, 0x10, 0x4, 0x8d, 0x7}}, {{0x9, 0x5, 0x6, 0xc, 0x20, 0x16, 0x4, 0x7}}, {{0x9, 0x5, 0xc, 0x0, 0x20, 0x5, 0xa, 0x24, [@generic={0x3, 0x4, 'h'}, @generic={0x83, 0x19, "9d4d70b90919aaf12307d77b65bebceb91fe812f8e8e44fac3d66bc977e03b7f97c21568a0cbb449e88a02857cbb1f2785072c8e94c999410cf407b41fca70e21e65cfd0f84b3462607bb91b598b8787c87240aa21d3bf68726fc15ccf3e044df5426cc96f302857fecbd57759f7ce3348e764b73bce7f43684a4bb2f54a5bb0b5"}]}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x9, 0x5, 0x9, [@uac_iso={0x7, 0x25, 0x1, 0x43, 0x8, 0x1}, @generic={0xd0, 0x21, "9f165d1f11650e15b6a8a64c616caf1aca266d295ff5feeec1b80d9df25ab6074627c4c1e85c281d6deb5dc4ee86b6a1cb8037244a1dd260c9dd767f6fd5db8632d08830b1f32ed6271d2c085b316f472caeef4e2c7aafcc88b809e06f328b4cc1f53a8563d791d502f91a26fe3508195cd34ba7c8050eb4af8ee84a0b52ec6e544a9cd084cfe08f2db773eb8633a75e0a590c1cdc549c97e768043b036a3b6f88052bffbd2a69afcc346cc6f13af0b24ffec0cd5df5c2e251c968ba1c9867256f0be210a07faf90ad0d0a786311"}]}}, {{0x9, 0x5, 0x6, 0x2, 0x8, 0x9, 0xa2, 0x3}}, {{0x9, 0x5, 0x5, 0x10, 0x10, 0x6, 0x3, 0x7, [@generic={0x31, 0x25, "bdfd95c4e18cfd6f2a40b24dee92a6e4977fd41d3c83424d94ddfa91ad125fc98f63278cd1219c2ca8e408dbb220f5"}]}}]}}, {{0x9, 0x4, 0xc0, 0x0, 0x2, 0x2d, 0x26, 0xd4, 0x7, [@hid_hid={0x9, 0x21, 0x8, 0xf6, 0x1, {0x22, 0x64a}}], [{{0x9, 0x5, 0xa, 0x2, 0x3ff, 0x7, 0x4, 0x65, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x9, 0x9}]}}, {{0x9, 0x5, 0x7, 0x13, 0x10, 0x5, 0xe, 0x81}}]}}, {{0x9, 0x4, 0xe7, 0x9, 0x2, 0xf8, 0x9d, 0xab, 0x0, [@cdc_ncm={{0x6, 0x24, 0x6, 0x0, 0x1, '%'}, {0x5, 0x24, 0x0, 0x1}, {0xd, 0x24, 0xf, 0x1, 0x1ff, 0x4, 0xe6e, 0x8}, {0x6, 0x24, 0x1a, 0x7fff, 0x2}}, @generic={0x80, 0x5, "bfb8155670ac035e4a561aa9ee9c0940b97962854a3d31e03f24d65b4a1152ce9e1389d926e6b95e8a38f8ccf32d37bf0cd2e76d6264766497477b0e8e02461fd2c52d85a1375800335fb5afd969941ef1c6e7bc5ecabfc02acb4448146222c3261de60d32cff6c2b7a7648455d4bb9f41dc9351d852273ad3f89db95ab6"}], [{{0x9, 0x5, 0x2, 0x0, 0x3ff, 0x3, 0x0, 0x8}}, {{0x9, 0x5, 0x0, 0x14, 0x210, 0x80, 0x6, 0xf6, [@uac_iso={0x7, 0x25, 0x1, 0x82, 0x3, 0x4116}]}}]}}]}}]}}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x8, [{0x2, &(0x7f0000000200)=@string={0x2}}, {0x4, &(0x7f00000002c0)=@lang_id={0x4, 0x3, 0x81d}}, {0x96, &(0x7f0000000080)=ANY=[@ANYRESHEX=0x0]}, {0x51, &(0x7f0000000640)=@string={0x51, 0x3, "8ccac8c6d6143e0cfa8b9e65e06218c597200dc9a5fc8924fb2a20c909a4d0279053574a422222ff68d59864327a482ed0d99e879b5360dab4aba87e29bd7d76c5e2d31d8b24bc884b902800000000"}}, {0x4, &(0x7f0000000040)=@lang_id={0x4, 0x3, 0x42c}}, {0x0, 0x0}, {0x3f, &(0x7f00000003c0)=@string={0x3f, 0x3, "42be0900004f4ee927abc1c8177eb12f5f7bf148437b32d240d96e6e4c56782afef65cc055bc7423a350d3e1acd4266b7f8ab711ee234d2ec1a58e4d1f"}}, {0x6, &(0x7f0000000000)=@string={0x6, 0x3, "54b65cbc"}}]}) 2.116554224s ago: executing program 4 (id=1384): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000000)=0x10, 0x4) 1.631343234s ago: executing program 4 (id=1395): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x42) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 936.095326ms ago: executing program 0 (id=1397): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, 0x0, 0x0) 875.566157ms ago: executing program 2 (id=1399): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000000500)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=@newlink={0x38, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13101}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x4}}}]}, 0x38}}, 0x0) 707.891984ms ago: executing program 3 (id=1400): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) socket(0x10, 0x803, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0x3, &(0x7f0000000700)=@framed, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x12, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x40}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r2, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) 701.157067ms ago: executing program 0 (id=1401): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0xdc000006, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f0000000080)={0x9, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e23, @empty}}}, 0x108) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000080)={0x9, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @rand_addr=0x64010102}}}, 0x108) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) close(r3) 692.384086ms ago: executing program 2 (id=1402): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$sock_int(r4, 0x1, 0xc, &(0x7f0000000040)=0x8, 0x4) 624.246427ms ago: executing program 3 (id=1403): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) userfaultfd(0x0) 623.489382ms ago: executing program 2 (id=1404): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) ioctl$sock_inet6_tcp_SIOCOUTQ(r3, 0x5411, &(0x7f00000000c0)) 569.7333ms ago: executing program 0 (id=1405): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg$inet(r2, &(0x7f0000000a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40040) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000010007c0000000000006000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000010900020073797a310000000008000a40fffffffc400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c0001"], 0xa4}}, 0x40) 496.075235ms ago: executing program 2 (id=1406): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.throttle.io_serviced\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8=0x0, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) write(r0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000d000000000001"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x0) 480.797904ms ago: executing program 3 (id=1407): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket(0x2, 0x3, 0x3a) setsockopt$MRT6_ADD_MIF(r3, 0x29, 0xca, 0x0, 0x0) 427.274402ms ago: executing program 0 (id=1408): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) recvmmsg(r3, &(0x7f0000003ac0)=[{{0x0, 0x0, 0x0}, 0x4}], 0x1, 0x40012063, 0x0) 308.088388ms ago: executing program 2 (id=1409): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000040)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r3, 0x0, 0x2e, &(0x7f0000000100)={0x4, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @local}}}, 0x108) 290.717526ms ago: executing program 3 (id=1410): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r2, 0x0, 0x0, 0x805, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) cachestat(r3, 0x0, 0x0, 0x0) 259.915357ms ago: executing program 0 (id=1411): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6d706f6c3d98a02e20ae6c23828462696e643d"]) 119.902642ms ago: executing program 3 (id=1412): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0xb, 0x84) fanotify_init(0x2, 0x40000) 84.474656ms ago: executing program 2 (id=1413): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000005800)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8014) socket$packet(0x11, 0x2, 0x300) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) close_range(r3, 0xffffffffffffffff, 0x0) 78.245688ms ago: executing program 0 (id=1414): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r1, 0x0) ioctl$KVM_X86_SETUP_MCE(r1, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f25, 0x4}) sendmmsg$inet6(r0, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f26, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r3 = memfd_secret(0x0) close_range(r3, 0xffffffffffffffff, 0x0) 0s ago: executing program 3 (id=1415): rt_sigaction(0xd, &(0x7f0000000180)={&(0x7f0000000000)="ca00d1c441ef196ec866400fe2de0fae4e0afaf2466ff00fc01ec422e10399c5c1202063df", 0x44000004, 0x0, {[0x2]}}, 0x0, 0x8, &(0x7f0000000300)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.group_wait_time\x00', 0x275a, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000340)=ANY=[@ANYRES32, @ANYRES8, @ANYRES8=r1, @ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6f, 0x11, r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$KVM_X86_SETUP_MCE(0xffffffffffffffff, 0x4008ae9c, &(0x7f0000000000)={0x1c, 0x526d630517582f27, 0x4}) sendmmsg$inet6(r2, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$inet6(r3, &(0x7f0000003c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.174' (ED25519) to the list of known hosts. [ 67.773058][ T30] audit: type=1400 audit(1763401153.990:62): avc: denied { mounton } for pid=5799 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 67.796714][ T30] audit: type=1400 audit(1763401154.010:63): avc: denied { mount } for pid=5799 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.799767][ T5799] cgroup: Unknown subsys name 'net' [ 67.826450][ T30] audit: type=1400 audit(1763401154.040:64): avc: denied { unmount } for pid=5799 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 67.945565][ T5799] cgroup: Unknown subsys name 'cpuset' [ 67.953606][ T5799] cgroup: Unknown subsys name 'rlimit' [ 68.120824][ T30] audit: type=1400 audit(1763401154.330:65): avc: denied { setattr } for pid=5799 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 68.144985][ T30] audit: type=1400 audit(1763401154.340:66): avc: denied { create } for pid=5799 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 68.165526][ T30] audit: type=1400 audit(1763401154.340:67): avc: denied { write } for pid=5799 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 68.189120][ T30] audit: type=1400 audit(1763401154.340:68): avc: denied { read } for pid=5799 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 68.218503][ T30] audit: type=1400 audit(1763401154.340:69): avc: denied { mounton } for pid=5799 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 68.243417][ T30] audit: type=1400 audit(1763401154.340:70): avc: denied { mount } for pid=5799 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 68.244881][ T5801] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 68.275481][ T30] audit: type=1400 audit(1763401154.410:71): avc: denied { read } for pid=5481 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 69.325117][ T5799] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 71.414074][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.420408][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 72.021790][ T5810] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 72.030980][ T5810] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 72.038693][ T5810] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 72.046760][ T5810] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 72.054481][ T5810] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 72.119494][ T5137] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 72.131113][ T5137] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 72.138775][ T5137] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 72.147275][ T5137] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 72.155594][ T5137] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 72.175807][ T52] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 72.183992][ T52] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 72.192097][ T52] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 72.205433][ T5819] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 72.212757][ T5819] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 72.220697][ T5819] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 72.231001][ T5821] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 72.261171][ T5821] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 72.275173][ T5821] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 72.291656][ T5810] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 72.309488][ T5810] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 72.318053][ T5137] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 72.330312][ T5137] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 72.338518][ T5137] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 72.351283][ T5137] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 72.599904][ T5813] chnl_net:caif_netlink_parms(): no params data found [ 72.699445][ T5809] chnl_net:caif_netlink_parms(): no params data found [ 72.788734][ T5813] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.796067][ T5813] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.803837][ T5813] bridge_slave_0: entered allmulticast mode [ 72.810607][ T5813] bridge_slave_0: entered promiscuous mode [ 72.843075][ T5813] bridge0: port 2(bridge_slave_1) entered blocking state [ 72.850393][ T5813] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.858115][ T5813] bridge_slave_1: entered allmulticast mode [ 72.865066][ T5813] bridge_slave_1: entered promiscuous mode [ 72.924754][ T5813] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 72.944067][ T5809] bridge0: port 1(bridge_slave_0) entered blocking state [ 72.951355][ T5809] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.958433][ T5809] bridge_slave_0: entered allmulticast mode [ 72.966075][ T5809] bridge_slave_0: entered promiscuous mode [ 72.985987][ T5813] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.014892][ T5809] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.022266][ T5809] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.029329][ T5809] bridge_slave_1: entered allmulticast mode [ 73.036247][ T5809] bridge_slave_1: entered promiscuous mode [ 73.109932][ T5809] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.135339][ T5813] team0: Port device team_slave_0 added [ 73.144537][ T5813] team0: Port device team_slave_1 added [ 73.164182][ T5809] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.245687][ T5823] chnl_net:caif_netlink_parms(): no params data found [ 73.259014][ T5813] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 73.266793][ T5813] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 73.292904][ T5813] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 73.304822][ T5815] chnl_net:caif_netlink_parms(): no params data found [ 73.315503][ T5809] team0: Port device team_slave_0 added [ 73.335686][ T5813] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 73.342852][ T5813] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 73.368755][ T5813] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 73.391563][ T5809] team0: Port device team_slave_1 added [ 73.401435][ T5818] chnl_net:caif_netlink_parms(): no params data found [ 73.490401][ T5809] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 73.497467][ T5809] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 73.523898][ T5809] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 73.565874][ T5809] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 73.572972][ T5809] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 73.599702][ T5809] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 73.621638][ T5823] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.628737][ T5823] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.636271][ T5823] bridge_slave_0: entered allmulticast mode [ 73.643460][ T5823] bridge_slave_0: entered promiscuous mode [ 73.656628][ T5823] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.663795][ T5823] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.671079][ T5823] bridge_slave_1: entered allmulticast mode [ 73.677772][ T5823] bridge_slave_1: entered promiscuous mode [ 73.696694][ T5813] hsr_slave_0: entered promiscuous mode [ 73.702857][ T5813] hsr_slave_1: entered promiscuous mode [ 73.754728][ T5823] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.764363][ T5815] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.771813][ T5815] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.778905][ T5815] bridge_slave_0: entered allmulticast mode [ 73.785914][ T5815] bridge_slave_0: entered promiscuous mode [ 73.808494][ T5823] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.829868][ T5815] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.837205][ T5815] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.844441][ T5815] bridge_slave_1: entered allmulticast mode [ 73.851360][ T5815] bridge_slave_1: entered promiscuous mode [ 73.911597][ T5818] bridge0: port 1(bridge_slave_0) entered blocking state [ 73.918746][ T5818] bridge0: port 1(bridge_slave_0) entered disabled state [ 73.926153][ T5818] bridge_slave_0: entered allmulticast mode [ 73.933343][ T5818] bridge_slave_0: entered promiscuous mode [ 73.946624][ T5818] bridge0: port 2(bridge_slave_1) entered blocking state [ 73.953959][ T5818] bridge0: port 2(bridge_slave_1) entered disabled state [ 73.961142][ T5818] bridge_slave_1: entered allmulticast mode [ 73.967840][ T5818] bridge_slave_1: entered promiscuous mode [ 73.976480][ T5823] team0: Port device team_slave_0 added [ 73.995458][ T5809] hsr_slave_0: entered promiscuous mode [ 74.001621][ T5809] hsr_slave_1: entered promiscuous mode [ 74.007506][ T5809] debugfs: 'hsr0' already exists in 'hsr' [ 74.013914][ T5809] Cannot create hsr debugfs directory [ 74.038168][ T5823] team0: Port device team_slave_1 added [ 74.046038][ T5815] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.080363][ T5815] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.105718][ T5818] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 74.131632][ T5821] Bluetooth: hci0: command tx timeout [ 74.153603][ T5818] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.164395][ T5823] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 74.171418][ T5823] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 74.197832][ T5823] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 74.210551][ T5815] team0: Port device team_slave_0 added [ 74.216435][ T5821] Bluetooth: hci1: command tx timeout [ 74.241879][ T5823] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 74.248853][ T5823] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 74.275134][ T5823] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 74.287399][ T5815] team0: Port device team_slave_1 added [ 74.323335][ T5818] team0: Port device team_slave_0 added [ 74.331437][ T5818] team0: Port device team_slave_1 added [ 74.381231][ T5137] Bluetooth: hci2: command tx timeout [ 74.381235][ T5810] Bluetooth: hci3: command tx timeout [ 74.382503][ T5821] Bluetooth: hci4: command tx timeout [ 74.416402][ T5815] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 74.423620][ T5815] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 74.449605][ T5815] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 74.462060][ T5815] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 74.469002][ T5815] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 74.495203][ T5815] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 74.524026][ T5818] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 74.531083][ T5818] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 74.557296][ T5818] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 74.593698][ T5818] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 74.600638][ T5818] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 74.626962][ T5818] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 74.651523][ T5823] hsr_slave_0: entered promiscuous mode [ 74.657614][ T5823] hsr_slave_1: entered promiscuous mode [ 74.664627][ T5823] debugfs: 'hsr0' already exists in 'hsr' [ 74.670336][ T5823] Cannot create hsr debugfs directory [ 74.746080][ T5815] hsr_slave_0: entered promiscuous mode [ 74.753327][ T5815] hsr_slave_1: entered promiscuous mode [ 74.759370][ T5815] debugfs: 'hsr0' already exists in 'hsr' [ 74.765175][ T5815] Cannot create hsr debugfs directory [ 74.813540][ T5818] hsr_slave_0: entered promiscuous mode [ 74.819838][ T5818] hsr_slave_1: entered promiscuous mode [ 74.825928][ T5818] debugfs: 'hsr0' already exists in 'hsr' [ 74.832236][ T5818] Cannot create hsr debugfs directory [ 75.033624][ T5813] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 75.059601][ T5813] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 75.069146][ T5813] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 75.104864][ T5813] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 75.199905][ T5809] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 75.216802][ T5809] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 75.227260][ T5809] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 75.237448][ T5809] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 75.308428][ T5823] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 75.318247][ T5823] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 75.328441][ T5823] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 75.338721][ T5823] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 75.419700][ T5818] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 75.444512][ T5818] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 75.456953][ T5818] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 75.470652][ T5818] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 75.537938][ T5813] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.584118][ T5813] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.591998][ T5815] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 75.602881][ T5815] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 75.612798][ T5815] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 75.628968][ T5815] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 75.648235][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.655446][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.683042][ T36] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.690099][ T36] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.703421][ T5809] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.753133][ T5809] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.775432][ T5823] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.792404][ T62] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.799514][ T62] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.831785][ T3478] bridge0: port 2(bridge_slave_1) entered blocking state [ 75.838887][ T3478] bridge0: port 2(bridge_slave_1) entered forwarding state [ 75.879796][ T5823] 8021q: adding VLAN 0 to HW filter on device team0 [ 75.915999][ T36] bridge0: port 1(bridge_slave_0) entered blocking state [ 75.923131][ T36] bridge0: port 1(bridge_slave_0) entered forwarding state [ 75.941309][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 75.941323][ T30] audit: type=1400 audit(1763401162.150:86): avc: denied { sys_module } for pid=5813 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 75.965808][ T5815] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.009039][ T62] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.016176][ T62] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.033615][ T5818] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.086158][ T5815] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.126253][ T5818] 8021q: adding VLAN 0 to HW filter on device team0 [ 76.150104][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.157255][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.177311][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 76.184447][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 76.195565][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.202698][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.212913][ T5821] Bluetooth: hci0: command tx timeout [ 76.228899][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 76.236062][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 76.291133][ T5821] Bluetooth: hci1: command tx timeout [ 76.342272][ T5813] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.444506][ T5809] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.453128][ T5821] Bluetooth: hci4: command tx timeout [ 76.456389][ T5810] Bluetooth: hci2: command tx timeout [ 76.458882][ T5137] Bluetooth: hci3: command tx timeout [ 76.623271][ T5809] veth0_vlan: entered promiscuous mode [ 76.664677][ T5809] veth1_vlan: entered promiscuous mode [ 76.766155][ T5809] veth0_macvtap: entered promiscuous mode [ 76.796818][ T5809] veth1_macvtap: entered promiscuous mode [ 76.888772][ T5809] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 76.914597][ T5818] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.925011][ T5823] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.937604][ T5809] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 76.951325][ T13] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.963410][ T5815] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 76.977774][ T13] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 76.987773][ T13] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.012678][ T13] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.105405][ T5813] veth0_vlan: entered promiscuous mode [ 77.123871][ T5823] veth0_vlan: entered promiscuous mode [ 77.133912][ T5815] veth0_vlan: entered promiscuous mode [ 77.165095][ T5813] veth1_vlan: entered promiscuous mode [ 77.172048][ T3551] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 77.179954][ T3551] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 77.219786][ T5823] veth1_vlan: entered promiscuous mode [ 77.236002][ T5815] veth1_vlan: entered promiscuous mode [ 77.248747][ T36] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 77.255662][ T5818] veth0_vlan: entered promiscuous mode [ 77.262504][ T36] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 77.271900][ T5813] veth0_macvtap: entered promiscuous mode [ 77.295346][ T30] audit: type=1400 audit(1763401163.510:87): avc: denied { mounton } for pid=5809 comm="syz-executor" path="/root/syzkaller.V1WX5U/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 77.322563][ T30] audit: type=1400 audit(1763401163.510:88): avc: denied { mount } for pid=5809 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 77.343569][ T5818] veth1_vlan: entered promiscuous mode [ 77.346936][ T30] audit: type=1400 audit(1763401163.510:89): avc: denied { mounton } for pid=5809 comm="syz-executor" path="/root/syzkaller.V1WX5U/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 77.380818][ T30] audit: type=1400 audit(1763401163.510:90): avc: denied { mount } for pid=5809 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 77.386659][ T5813] veth1_macvtap: entered promiscuous mode [ 77.403144][ T30] audit: type=1400 audit(1763401163.510:91): avc: denied { mounton } for pid=5809 comm="syz-executor" path="/root/syzkaller.V1WX5U/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 77.436402][ T30] audit: type=1400 audit(1763401163.510:92): avc: denied { mounton } for pid=5809 comm="syz-executor" path="/root/syzkaller.V1WX5U/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 77.469160][ T30] audit: type=1400 audit(1763401163.510:93): avc: denied { unmount } for pid=5809 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 77.481409][ T5809] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 77.490072][ T30] audit: type=1400 audit(1763401163.540:94): avc: denied { mounton } for pid=5809 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=2784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 77.536824][ T5823] veth0_macvtap: entered promiscuous mode [ 77.557028][ T30] audit: type=1400 audit(1763401163.540:95): avc: denied { mount } for pid=5809 comm="syz-executor" name="/" dev="gadgetfs" ino=7724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 77.583240][ T5823] veth1_macvtap: entered promiscuous mode [ 77.595052][ T5818] veth0_macvtap: entered promiscuous mode [ 77.619094][ T5813] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 77.646077][ T5815] veth0_macvtap: entered promiscuous mode [ 77.659575][ T5813] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 77.677115][ T5815] veth1_macvtap: entered promiscuous mode [ 77.692500][ T5818] veth1_macvtap: entered promiscuous mode [ 77.710565][ T5823] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 77.763807][ T36] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.784840][ T36] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.799300][ T5823] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 77.809717][ T36] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.829210][ T5818] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 77.848980][ T36] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.858671][ T36] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.873308][ T5815] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 77.915289][ T5818] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 77.926154][ T36] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.942738][ T36] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.957195][ T36] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 77.967350][ T5815] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 77.984858][ T3551] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.020696][ T3551] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.058374][ T3551] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.085701][ T3478] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.097403][ T3551] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.106146][ T3478] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 78.142508][ T3551] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.155605][ T3551] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.175752][ T3551] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.234728][ T3551] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.246666][ T3478] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.257708][ T3478] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 78.290995][ T5821] Bluetooth: hci0: command tx timeout [ 78.366311][ T3551] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.372020][ T5821] Bluetooth: hci1: command tx timeout [ 78.391642][ T3551] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 78.517364][ T37] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.532319][ T5821] Bluetooth: hci4: command tx timeout [ 78.537729][ T5821] Bluetooth: hci3: command tx timeout [ 78.543915][ T5137] Bluetooth: hci2: command tx timeout [ 78.563739][ T37] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 78.615732][ T3551] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.631021][ T3551] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 78.646305][ T3551] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 78.654537][ T3551] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 79.196069][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 79.212349][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 79.226871][ T3551] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 79.235486][ T3551] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 79.525526][ T5949] cgroup: Invalid name [ 80.256759][ T5966] fuse: Bad value for 'rootmode' [ 80.411429][ T5810] Bluetooth: hci0: command tx timeout [ 80.453784][ T5810] Bluetooth: hci1: command tx timeout [ 80.628523][ T5810] Bluetooth: hci3: command tx timeout [ 80.633873][ T5821] Bluetooth: hci2: command tx timeout [ 80.633984][ T5810] Bluetooth: hci4: command tx timeout [ 81.067637][ T30] kauditd_printk_skb: 29 callbacks suppressed [ 81.067666][ T30] audit: type=1400 audit(1763401167.270:125): avc: denied { node_bind } for pid=5973 comm="syz.1.20" saddr=::ffff:100.1.1.0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 82.083835][ T30] audit: type=1400 audit(1763401167.270:126): avc: denied { name_bind } for pid=5973 comm="syz.1.20" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 82.516348][ T30] audit: type=1400 audit(1763401168.040:127): avc: denied { mount } for pid=5978 comm="syz.2.21" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 83.236411][ T30] audit: type=1400 audit(1763401169.450:128): avc: denied { allowed } for pid=6006 comm="syz.4.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 83.314423][ T30] audit: type=1400 audit(1763401169.480:129): avc: denied { sqpoll } for pid=6006 comm="syz.4.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 83.345625][ T30] audit: type=1400 audit(1763401169.480:130): avc: denied { map } for pid=6006 comm="syz.4.32" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8690 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 83.439111][ T30] audit: type=1400 audit(1763401169.480:131): avc: denied { read write } for pid=6006 comm="syz.4.32" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=8690 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 83.541587][ T30] audit: type=1400 audit(1763401169.590:132): avc: denied { prog_load } for pid=6009 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 83.625178][ T30] audit: type=1400 audit(1763401169.590:133): avc: denied { perfmon } for pid=6009 comm="syz.0.34" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 83.670684][ T30] audit: type=1400 audit(1763401169.590:134): avc: denied { prog_run } for pid=6009 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 83.962007][ T6029] netlink: 'syz.0.43': attribute type 25 has an invalid length. [ 85.182808][ T6054] mmap: syz.3.54 (6054) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 85.700242][ T5889] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 85.903276][ T5889] usb 1-1: New USB device found, idVendor=0cf3, idProduct=9271, bcdDevice= 1.08 [ 85.951117][ T5889] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 85.981573][ T6074] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 86.003605][ T5889] usb 1-1: Product: syz [ 86.007790][ T5889] usb 1-1: Manufacturer: syz [ 86.031159][ T5889] usb 1-1: SerialNumber: syz [ 86.080096][ T5889] usb 1-1: ath9k_htc: Firmware ath9k_htc/htc_9271-1.4.0.fw requested [ 86.100948][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 86.100962][ T30] audit: type=1400 audit(1763401172.310:141): avc: denied { firmware_load } for pid=5927 comm="kworker/0:6" path="/lib/firmware/ath9k_htc/htc_9271-1.4.0.fw" dev="sda1" ino=313 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 86.209774][ T5927] usb 1-1: ath9k_htc: Transferred FW: ath9k_htc/htc_9271-1.4.0.fw, size: 51008 [ 86.572520][ T6089] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 86.587642][ T6089] bridge0: port 1(bridge_slave_0) entered blocking state [ 86.589298][ T30] audit: type=1400 audit(1763401172.800:142): avc: denied { ioctl } for pid=6088 comm="syz.4.69" path="socket:[9497]" dev="sockfs" ino=9497 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 86.595192][ T6089] bridge0: port 1(bridge_slave_0) entered forwarding state [ 86.811283][ T5874] usb 1-1: USB disconnect, device number 2 [ 87.201276][ T976] cfg80211: failed to load regulatory.db [ 87.252197][ T5927] ath9k_htc 1-1:1.0: ath9k_htc: Target is unresponsive [ 87.283169][ T5927] ath9k_htc: Failed to initialize the device [ 87.332833][ T5874] usb 1-1: ath9k_htc: USB layer deinitialized [ 87.373136][ T6096] netlink: 'syz.3.72': attribute type 11 has an invalid length. [ 87.383073][ T6096] netlink: 32 bytes leftover after parsing attributes in process `syz.3.72'. [ 87.626398][ T30] audit: type=1400 audit(1763401173.840:143): avc: denied { setopt } for pid=6105 comm="syz.1.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 87.628534][ T6108] netlink: 164 bytes leftover after parsing attributes in process `syz.3.78'. [ 87.692704][ T30] audit: type=1400 audit(1763401173.840:144): avc: denied { create } for pid=6106 comm="syz.3.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 87.720622][ T30] audit: type=1400 audit(1763401173.840:145): avc: denied { write } for pid=6106 comm="syz.3.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 87.743742][ T30] audit: type=1400 audit(1763401173.840:146): avc: denied { nlmsg_write } for pid=6106 comm="syz.3.78" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 87.766563][ T30] audit: type=1400 audit(1763401173.930:147): avc: denied { bind } for pid=6109 comm="syz.0.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 88.140077][ T30] audit: type=1400 audit(1763401174.350:148): avc: denied { map_create } for pid=6128 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 88.214943][ T30] audit: type=1400 audit(1763401174.350:149): avc: denied { map_read map_write } for pid=6128 comm="syz.0.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 88.241560][ T6131] tipc: Enabling of bearer rejected, failed to enable media [ 88.378034][ T6137] ======================================================= [ 88.378034][ T6137] WARNING: The mand mount option has been deprecated and [ 88.378034][ T6137] and is ignored by this kernel. Remove the mand [ 88.378034][ T6137] option from the mount to silence this warning. [ 88.378034][ T6137] ======================================================= [ 88.413642][ T30] audit: type=1400 audit(1763401174.590:150): avc: denied { remount } for pid=6136 comm="syz.0.91" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 88.465192][ T6139] netlink: 76 bytes leftover after parsing attributes in process `syz.1.94'. [ 89.133515][ T6167] netlink: 20 bytes leftover after parsing attributes in process `syz.1.106'. [ 90.219175][ T6221] netlink: 'syz.3.132': attribute type 19 has an invalid length. [ 90.539544][ T6237] netlink: 44 bytes leftover after parsing attributes in process `syz.4.139'. [ 90.581003][ T6237] netlink: 12 bytes leftover after parsing attributes in process `syz.4.139'. [ 90.617166][ T6237] netlink: 16 bytes leftover after parsing attributes in process `syz.4.139'. [ 92.053642][ T6271] process 'syz.0.153' launched './file2' with NULL argv: empty string added [ 92.071081][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 92.071099][ T30] audit: type=1400 audit(1763401178.290:165): avc: denied { connect } for pid=6253 comm="syz.4.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 92.155249][ T30] audit: type=1400 audit(1763401178.310:166): avc: denied { execute_no_trans } for pid=6270 comm="syz.0.153" path="/37/file2" dev="tmpfs" ino=239 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 92.320313][ T6283] qnx6: wrong signature (magic) at position (0x2000) - will try alternative position (0x0000). [ 92.353662][ T6283] qnx6: wrong signature (magic) in superblock #1. [ 92.360092][ T6283] qnx6: unable to read the first superblock [ 92.377911][ T30] audit: type=1400 audit(1763401178.590:167): avc: denied { read } for pid=6284 comm="syz.0.159" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 92.440846][ T30] audit: type=1400 audit(1763401178.590:168): avc: denied { open } for pid=6284 comm="syz.0.159" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 92.515863][ T30] audit: type=1400 audit(1763401178.590:169): avc: denied { ioctl } for pid=6284 comm="syz.0.159" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 92.550069][ T6291] netlink: 4 bytes leftover after parsing attributes in process `syz.0.162'. [ 92.679222][ T6294] No control pipe specified [ 92.721356][ T30] audit: type=1400 audit(1763401178.930:170): avc: denied { ioctl } for pid=6295 comm="syz.1.163" path="socket:[10245]" dev="sockfs" ino=10245 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 93.296063][ T6291] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 93.314888][ T6291] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 93.328372][ T6291] bond0 (unregistering): Released all slaves [ 93.354579][ T6299] batadv_slave_1: entered promiscuous mode [ 93.369168][ T6295] batadv_slave_1: left promiscuous mode [ 93.378745][ T30] audit: type=1400 audit(1763401179.590:171): avc: denied { ioctl } for pid=6304 comm="syz.4.168" path="socket:[10152]" dev="sockfs" ino=10152 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 94.610889][ T30] audit: type=1400 audit(1763401180.820:172): avc: denied { mount } for pid=6350 comm="syz.3.188" name="/" dev="configfs" ino=1103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 94.801906][ T30] audit: type=1400 audit(1763401181.020:173): avc: denied { create } for pid=6354 comm="syz.3.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 94.903213][ T6359] 9pnet: Unknown protocol version 9p [ 95.084857][ T30] audit: type=1400 audit(1763401181.290:174): avc: denied { read } for pid=6364 comm="syz.0.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 95.183389][ T6369] netlink: 4 bytes leftover after parsing attributes in process `syz.2.197'. [ 95.236883][ T6374] capability: warning: `syz.3.198' uses deprecated v2 capabilities in a way that may be insecure [ 95.536187][ T6369] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 95.602441][ T6369] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 95.674470][ T6369] bond0 (unregistering): Released all slaves [ 96.437091][ T6423] netlink: 32 bytes leftover after parsing attributes in process `syz.4.223'. [ 96.874144][ T6447] sit1: entered allmulticast mode [ 97.430492][ T6473] netlink: 96 bytes leftover after parsing attributes in process `syz.4.248'. [ 97.751850][ T6492] sctp: [Deprecated]: syz.4.257 (pid 6492) Use of int in maxseg socket option. [ 97.751850][ T6492] Use struct sctp_assoc_value instead [ 97.783467][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 97.783482][ T30] audit: type=1326 audit(1763401184.000:187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6487 comm="syz.0.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1c158f6c9 code=0x7ffc0000 [ 97.919404][ T30] audit: type=1326 audit(1763401184.000:188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6487 comm="syz.0.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1c158f6c9 code=0x7ffc0000 [ 97.976594][ T30] audit: type=1326 audit(1763401184.030:189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6487 comm="syz.0.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fd1c158f6c9 code=0x7ffc0000 [ 98.020419][ T6502] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 98.129749][ T6504] syz.1.263 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 98.189948][ T30] audit: type=1326 audit(1763401184.400:190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6487 comm="syz.0.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1c158f6c9 code=0x7ffc0000 [ 98.258447][ T30] audit: type=1326 audit(1763401184.400:191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6487 comm="syz.0.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1c158f6c9 code=0x7ffc0000 [ 98.339534][ T30] audit: type=1326 audit(1763401184.430:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6487 comm="syz.0.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fd1c158f6c9 code=0x7ffc0000 [ 98.379401][ T6515] netlink: 28 bytes leftover after parsing attributes in process `syz.1.267'. [ 98.407778][ T6514] overlayfs: only single ':' or double '::' sequences of unescaped colons in lowerdir mount option allowed. [ 98.452427][ T30] audit: type=1326 audit(1763401184.430:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6487 comm="syz.0.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1c158f6c9 code=0x7ffc0000 [ 98.567276][ T30] audit: type=1326 audit(1763401184.430:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6487 comm="syz.0.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd1c158f6c9 code=0x7ffc0000 [ 98.660886][ T30] audit: type=1326 audit(1763401184.430:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6487 comm="syz.0.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd1c15915e7 code=0x7ffc0000 [ 98.710945][ T30] audit: type=1326 audit(1763401184.430:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6487 comm="syz.0.255" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7fd1c159155c code=0x7ffc0000 [ 98.916436][ T6540] Bluetooth: MGMT ver 1.23 [ 99.292587][ T6554] netlink: 9 bytes leftover after parsing attributes in process `syz.3.287'. [ 99.395985][ T6554] 0·: renamed from hsr0 (while UP) [ 99.446492][ T6554] 0·: entered allmulticast mode [ 99.459720][ T6554] hsr_slave_0: entered allmulticast mode [ 99.531379][ T6561] xt_cgroup: invalid path, errno=-2 [ 99.973300][ T6554] hsr_slave_1: entered allmulticast mode [ 99.986316][ T6554] A link change request failed with some changes committed already. Interface 70· may have been left with an inconsistent configuration, please check. [ 100.281598][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 100.633397][ T6578] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 100.703281][ T6583] netlink: 16 bytes leftover after parsing attributes in process `syz.4.299'. [ 101.671036][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 101.680076][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 101.691709][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 101.951367][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 101.956279][ T6632] xt_CT: You must specify a L4 protocol and not use inversions on it [ 102.821078][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 102.941625][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 102.950830][ T0] NOHZ tick-stop error: local softirq work is pending, handler #42!!! [ 102.959040][ T0] NOHZ tick-stop error: local softirq work is pending, handler #42!!! [ 103.159574][ T30] kauditd_printk_skb: 26 callbacks suppressed [ 103.159585][ T30] audit: type=1400 audit(1763401189.370:223): avc: denied { name_bind } for pid=6671 comm="syz.0.335" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 103.335052][ T30] audit: type=1400 audit(1763401189.550:224): avc: denied { mount } for pid=6676 comm="syz.2.337" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 103.663782][ T6695] netlink: 9 bytes leftover after parsing attributes in process `syz.1.344'. [ 103.730276][ T6695] 0·: renamed from hsr0 (while UP) [ 103.789145][ T6695] 0·: entered allmulticast mode [ 103.820056][ T6695] hsr_slave_0: entered allmulticast mode [ 103.830155][ T6695] hsr_slave_1: entered allmulticast mode [ 103.849974][ T6695] A link change request failed with some changes committed already. Interface 70· may have been left with an inconsistent configuration, please check. [ 103.860797][ T30] audit: type=1400 audit(1763401190.070:225): avc: denied { write } for pid=6701 comm="syz.2.348" name="sockstat" dev="proc" ino=4026533238 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 103.866968][ T6702] sctp: [Deprecated]: syz.4.347 (pid 6702) Use of int in max_burst socket option deprecated. [ 103.866968][ T6702] Use struct sctp_assoc_value instead [ 104.849094][ T6728] netlink: 16 bytes leftover after parsing attributes in process `syz.1.360'. [ 105.289185][ T30] audit: type=1400 audit(1763401191.500:226): avc: denied { create } for pid=6739 comm="syz.1.366" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 105.349922][ T30] audit: type=1400 audit(1763401191.500:227): avc: denied { read write } for pid=6739 comm="syz.1.366" name="file1" dev="tmpfs" ino=484 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 105.451368][ T30] audit: type=1400 audit(1763401191.500:228): avc: denied { open } for pid=6739 comm="syz.1.366" path="/77/file1" dev="tmpfs" ino=484 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 105.521879][ T30] audit: type=1400 audit(1763401191.540:229): avc: denied { unlink } for pid=5815 comm="syz-executor" name="file1" dev="tmpfs" ino=484 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 105.737354][ T6761] netlink: 9 bytes leftover after parsing attributes in process `syz.0.374'. [ 105.754367][ T6761] 0·: renamed from hsr0 (while UP) [ 105.783332][ T6761] 0·: entered allmulticast mode [ 105.788211][ T6761] hsr_slave_0: entered allmulticast mode [ 105.794529][ T6761] hsr_slave_1: entered allmulticast mode [ 105.801908][ T6761] A link change request failed with some changes committed already. Interface 70· may have been left with an inconsistent configuration, please check. [ 106.968913][ T6799] netlink: 9 bytes leftover after parsing attributes in process `syz.4.392'. [ 106.990468][ T6799] 0·: renamed from hsr0 (while UP) [ 107.013994][ T30] audit: type=1400 audit(1763401193.230:230): avc: denied { accept } for pid=6800 comm="syz.2.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 107.043619][ T6799] 0·: entered allmulticast mode [ 107.060893][ T6799] hsr_slave_0: entered allmulticast mode [ 107.068865][ T6799] hsr_slave_1: entered allmulticast mode [ 107.083564][ T6799] A link change request failed with some changes committed already. Interface 70· may have been left with an inconsistent configuration, please check. [ 107.416458][ T6813] netlink: 'syz.2.398': attribute type 8 has an invalid length. [ 107.812176][ T30] audit: type=1400 audit(1763401193.920:231): avc: denied { read } for pid=6818 comm="syz.4.401" path="socket:[12159]" dev="sockfs" ino=12159 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 107.936445][ T30] audit: type=1400 audit(1763401194.130:232): avc: denied { execute } for pid=6831 comm="syz.3.403" path="/85/cpuacct.usage_percpu_sys" dev="tmpfs" ino=530 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 108.051211][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 108.208446][ T30] audit: type=1400 audit(1763401194.420:233): avc: denied { read } for pid=6838 comm="syz.2.404" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 108.285553][ T30] audit: type=1400 audit(1763401194.420:234): avc: denied { open } for pid=6838 comm="syz.2.404" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 108.570809][ T30] audit: type=1400 audit(1763401194.450:235): avc: denied { ioctl } for pid=6838 comm="syz.2.404" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 109.088348][ T30] audit: type=1400 audit(1763401195.300:236): avc: denied { write } for pid=6838 comm="syz.2.404" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 109.430875][ T30] audit: type=1400 audit(1763401195.620:237): avc: denied { watch } for pid=6875 comm="syz.3.408" path="/87/file0" dev="tmpfs" ino=543 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 109.474329][ T6881] netlink: 9 bytes leftover after parsing attributes in process `syz.2.407'. [ 109.483203][ T30] audit: type=1400 audit(1763401195.620:238): avc: denied { watch_sb watch_reads } for pid=6875 comm="syz.3.408" path="/87/file0" dev="tmpfs" ino=543 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 109.513916][ T6881] 0·: renamed from hsr0 (while UP) [ 109.539057][ T6881] 0·: entered allmulticast mode [ 109.553181][ T6881] hsr_slave_0: entered allmulticast mode [ 109.560274][ T6881] hsr_slave_1: entered allmulticast mode [ 109.567869][ T6881] A link change request failed with some changes committed already. Interface 70· may have been left with an inconsistent configuration, please check. [ 109.733801][ T6888] netlink: 224 bytes leftover after parsing attributes in process `syz.0.413'. [ 111.052687][ T6922] netlink: 164 bytes leftover after parsing attributes in process `syz.4.430'. [ 111.745056][ T6944] netlink: 28 bytes leftover after parsing attributes in process `syz.0.432'. [ 112.405487][ T6966] netlink: 368 bytes leftover after parsing attributes in process `syz.3.450'. [ 112.659698][ T6973] netlink: 328 bytes leftover after parsing attributes in process `syz.1.453'. [ 113.824989][ T6996] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 114.691830][ T30] audit: type=1400 audit(1763401200.900:239): avc: denied { mount } for pid=7025 comm="syz.4.476" name="/" dev="autofs" ino=13100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 114.840969][ T30] audit: type=1400 audit(1763401201.050:240): avc: denied { unmount } for pid=5809 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 115.485640][ T30] audit: type=1400 audit(1763401201.700:241): avc: denied { sys_module } for pid=7052 comm="syz.1.488" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 115.542531][ T30] audit: type=1400 audit(1763401201.740:242): avc: denied { unmount } for pid=5813 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 116.621238][ T5810] Bluetooth: hci4: unexpected event 0x09 length: 4 > 3 [ 116.867562][ T7090] netlink: 'syz.2.499': attribute type 1 has an invalid length. [ 117.573841][ T7090] 8021q: adding VLAN 0 to HW filter on device bond0 [ 117.993721][ T30] audit: type=1400 audit(1763401204.200:243): avc: denied { map } for pid=7100 comm="syz.0.505" path="socket:[13250]" dev="sockfs" ino=13250 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 118.040159][ T30] audit: type=1400 audit(1763401204.200:244): avc: denied { accept } for pid=7100 comm="syz.0.505" path="socket:[13250]" dev="sockfs" ino=13250 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 118.246556][ T30] audit: type=1400 audit(1763401204.460:245): avc: denied { write } for pid=7112 comm="syz.2.511" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 118.304974][ T30] audit: type=1400 audit(1763401204.460:246): avc: denied { name_connect } for pid=7112 comm="syz.2.511" dest=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 118.391528][ T30] audit: type=1400 audit(1763401204.590:247): avc: denied { mounton } for pid=7118 comm="syz.0.514" path="/99/file0" dev="tmpfs" ino=612 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 119.220131][ T30] audit: type=1400 audit(1763401205.430:248): avc: denied { connect } for pid=7143 comm="syz.2.524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 120.282778][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 120.282788][ T30] audit: type=1400 audit(1763401206.490:251): avc: denied { create } for pid=7157 comm="syz.2.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 120.426851][ T30] audit: type=1400 audit(1763401206.500:252): avc: denied { getopt } for pid=7157 comm="syz.2.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 120.516555][ T30] audit: type=1400 audit(1763401206.700:253): avc: denied { remount } for pid=7164 comm="syz.2.533" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 120.697918][ T30] audit: type=1400 audit(1763401206.910:254): avc: denied { create } for pid=7171 comm="syz.3.534" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 121.239974][ T30] audit: type=1400 audit(1763401207.440:255): avc: denied { create } for pid=7182 comm="syz.3.540" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 121.417481][ T30] audit: type=1400 audit(1763401207.450:256): avc: denied { ioctl } for pid=7182 comm="syz.3.540" path="socket:[13908]" dev="sockfs" ino=13908 ioctlcmd=0x89ef scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 121.764342][ T7194] overlayfs: option "workdir=./bus" is useless in a non-upper mount, ignore [ 121.785422][ T7194] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 121.904142][ T30] audit: type=1400 audit(1763401208.120:257): avc: denied { write } for pid=7195 comm="syz.2.546" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 122.321616][ T30] audit: type=1401 audit(1763401208.530:258): op=fscreate invalid_context=CFA7 [ 122.656662][ T30] audit: type=1400 audit(1763401208.870:259): avc: denied { create } for pid=7230 comm="syz.0.562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 122.735459][ T30] audit: type=1400 audit(1763401208.930:260): avc: denied { bind } for pid=7230 comm="syz.0.562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 122.768169][ T7236] netlink: 36 bytes leftover after parsing attributes in process `syz.1.565'. [ 122.884081][ T7241] netlink: 256 bytes leftover after parsing attributes in process `syz.4.567'. [ 124.041291][ T7267] netlink: 84 bytes leftover after parsing attributes in process `syz.4.579'. [ 124.051861][ T7267] netlink: 16 bytes leftover after parsing attributes in process `syz.4.579'. [ 124.121526][ T7268] netlink: 44 bytes leftover after parsing attributes in process `syz.3.578'. [ 124.291722][ T7276] netlink: 36 bytes leftover after parsing attributes in process `syz.2.583'. [ 124.959780][ T7315] veth1_to_bond: entered allmulticast mode [ 124.971764][ T7314] veth1_to_bond: left allmulticast mode [ 125.076971][ T7317] SELinux: security_context_str_to_sid () failed with errno=-22 [ 125.735841][ T30] kauditd_printk_skb: 10 callbacks suppressed [ 125.735863][ T30] audit: type=1400 audit(1763401211.950:271): avc: denied { setopt } for pid=7333 comm="syz.3.611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 126.128928][ T7351] netlink: 4 bytes leftover after parsing attributes in process `syz.3.617'. [ 126.537961][ T7372] overlayfs: NFS export requires "redirect_dir=nofollow" on non-upper mount, falling back to nfs_export=off. [ 126.552911][ T30] audit: type=1400 audit(1763401212.770:272): avc: denied { connect } for pid=7373 comm="syz.1.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 126.586712][ T7372] overlayfs: missing 'lowerdir' [ 126.604504][ T30] audit: type=1400 audit(1763401212.790:273): avc: denied { read } for pid=7373 comm="syz.1.628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 126.763492][ T30] audit: type=1400 audit(1763401212.980:274): avc: denied { bind } for pid=7382 comm="syz.2.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 127.357059][ T30] audit: type=1400 audit(1763401213.570:275): avc: denied { name_bind } for pid=7416 comm="syz.3.649" src=19999 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 128.119804][ T7448] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 128.163601][ T7453] netlink: 28 bytes leftover after parsing attributes in process `syz.3.668'. [ 128.288485][ T7457] netlink: 4 bytes leftover after parsing attributes in process `syz.3.670'. [ 128.292729][ T7448] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 128.438452][ T7448] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 128.589204][ T7448] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 128.625050][ T7471] netlink: 592 bytes leftover after parsing attributes in process `syz.4.677'. [ 128.648219][ T7471] Zero length message leads to an empty skb [ 128.767898][ T7475] netlink: 68 bytes leftover after parsing attributes in process `syz.1.679'. [ 128.803521][ T30] audit: type=1400 audit(1763401215.020:276): avc: denied { bind } for pid=7474 comm="syz.1.679" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 128.807998][ T1003] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 128.907241][ T1003] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 128.937020][ T1003] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 128.958017][ T1003] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 129.149388][ T30] audit: type=1400 audit(1763401215.360:277): avc: denied { ioctl } for pid=7482 comm="syz.0.683" path="socket:[15163]" dev="sockfs" ino=15163 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 129.260815][ T30] audit: type=1400 audit(1763401215.410:278): avc: denied { unmount } for pid=5813 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 129.264497][ T7487] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 130.350913][ T30] audit: type=1400 audit(1763401216.560:279): avc: denied { mount } for pid=7510 comm="syz.1.696" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 130.407551][ T30] audit: type=1400 audit(1763401216.610:280): avc: denied { unmount } for pid=5815 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 130.472418][ T7520] warning: `syz.3.701' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 130.616547][ T7529] ecryptfs_validate_options: You must supply at least one valid auth tok signature as a mount parameter; see the eCryptfs README [ 130.661205][ T7529] Error validating options; rc = [-22] [ 130.802544][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 130.802560][ T30] audit: type=1400 audit(1763401217.020:282): avc: denied { remove_name } for pid=7532 comm="syz.4.706" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 130.948417][ T30] audit: type=1400 audit(1763401217.060:283): avc: denied { unlink } for pid=7532 comm="syz.4.706" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 131.284209][ T7555] netlink: 40 bytes leftover after parsing attributes in process `syz.3.716'. [ 131.713348][ T30] audit: type=1400 audit(1763401217.930:284): avc: denied { create } for pid=7581 comm="syz.2.730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 131.833141][ T30] audit: type=1400 audit(1763401217.960:285): avc: denied { ioctl } for pid=7581 comm="syz.2.730" path="socket:[15922]" dev="sockfs" ino=15922 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 132.855880][ T1297] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.861090][ T30] audit: type=1400 audit(1763401219.070:286): avc: denied { connect } for pid=7613 comm="syz.3.744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 132.882076][ T1297] ieee802154 phy1 wpan1: encryption failed: -22 [ 132.955464][ T30] audit: type=1400 audit(1763401219.080:287): avc: denied { bind } for pid=7613 comm="syz.3.744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 133.016837][ T30] audit: type=1400 audit(1763401219.100:288): avc: denied { write } for pid=7613 comm="syz.3.744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 133.165532][ T30] audit: type=1400 audit(1763401219.120:289): avc: denied { read } for pid=7613 comm="syz.3.744" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 133.392084][ T30] audit: type=1400 audit(1763401220.605:290): avc: denied { create } for pid=7628 comm="syz.2.750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 133.438203][ T7629] netlink: 32 bytes leftover after parsing attributes in process `syz.2.750'. [ 133.532865][ T30] audit: type=1400 audit(1763401220.645:291): avc: denied { write } for pid=7628 comm="syz.2.750" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 133.762329][ T7637] tmpfs: Bad value for 'mpol' [ 134.873438][ T7685] overlayfs: failed to resolve './file0': -2 [ 135.950836][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 135.950876][ T30] audit: type=1400 audit(1763401223.035:294): avc: denied { read write } for pid=7714 comm="syz.2.792" name="video3" dev="devtmpfs" ino=936 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 136.076639][ T30] audit: type=1400 audit(1763401223.055:295): avc: denied { open } for pid=7714 comm="syz.2.792" path="/dev/video3" dev="devtmpfs" ino=936 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 136.173671][ T7724] netlink: 8 bytes leftover after parsing attributes in process `syz.1.796'. [ 136.380347][ T30] audit: type=1400 audit(1763401223.585:296): avc: denied { ioctl } for pid=7714 comm="syz.2.792" path="/dev/video3" dev="devtmpfs" ino=936 ioctlcmd=0x5608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=1 [ 136.515304][ T30] audit: type=1400 audit(1763401223.635:297): avc: denied { setopt } for pid=7733 comm="syz.3.801" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 136.604695][ T7739] IPVS: length: 37 != 8 [ 136.772947][ T7749] 9pnet_fd: Insufficient options for proto=fd [ 136.797055][ T7752] fuseblk: Bad value for 'fd' [ 136.966238][ T30] audit: type=1400 audit(1763401224.175:298): avc: denied { execute } for pid=7754 comm="syz.1.811" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=16842 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 137.045720][ T7763] netlink: 224 bytes leftover after parsing attributes in process `syz.2.815'. [ 138.316406][ T7778] raw_sendmsg: syz.3.830 forgot to set AF_INET. Fix it! [ 138.575667][ T7788] tipc: Enabling of bearer rejected, failed to enable media [ 138.691533][ T7796] : renamed from bond_slave_0 (while UP) [ 138.971503][ T30] audit: type=1326 audit(1763401226.185:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7811 comm="syz.0.836" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd1c158f6c9 code=0x0 [ 140.018836][ T30] audit: type=1400 audit(1763401227.225:300): avc: denied { setopt } for pid=7859 comm="syz.2.859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 140.649463][ T30] audit: type=1400 audit(1763401227.855:301): avc: denied { bind } for pid=7889 comm="syz.3.873" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 141.307455][ T7916] overlayfs: failed to resolve './file0': -2 [ 141.763508][ T7932] netlink: 'syz.3.892': attribute type 3 has an invalid length. [ 141.786579][ T7932] netlink: 'syz.3.892': attribute type 3 has an invalid length. [ 141.800433][ T7935] fuse: Bad value for 'group_id' [ 141.826750][ T7935] fuse: Bad value for 'group_id' [ 142.467736][ T7965] veth0: entered promiscuous mode [ 142.494556][ T7967] No control pipe specified [ 142.506780][ T7965] veth0: left promiscuous mode [ 142.785676][ T30] audit: type=1400 audit(1763401229.975:302): avc: denied { unmount } for pid=5815 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 142.852402][ T30] audit: type=1400 audit(1763401230.065:303): avc: denied { getopt } for pid=7981 comm="syz.4.918" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 143.591933][ T8007] netlink: 72 bytes leftover after parsing attributes in process `syz.4.929'. [ 144.018290][ T8025] overlayfs: overlapping lowerdir path [ 144.038765][ T8021] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 144.077110][ T30] audit: type=1400 audit(1780178676.289:304): avc: denied { mount } for pid=8027 comm="syz.3.940" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 144.303804][ T8037] netlink: 20 bytes leftover after parsing attributes in process `syz.3.944'. [ 144.435844][ T8021] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 144.553272][ T8049] overlayfs: missing 'lowerdir' [ 145.342131][ T8021] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 145.838951][ T30] audit: type=1400 audit(1780178678.049:305): avc: denied { ioctl } for pid=8064 comm="syz.4.954" path="socket:[18027]" dev="sockfs" ino=18027 ioctlcmd=0x8946 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 145.935508][ T8021] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 145.979735][ T30] audit: type=1400 audit(1780178678.189:306): avc: denied { name_bind } for pid=8068 comm="syz.4.956" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 146.120480][ T30] audit: type=1400 audit(1780178678.189:307): avc: denied { node_bind } for pid=8068 comm="syz.4.956" saddr=ff02::1 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 146.192011][ T1003] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 146.194526][ T30] audit: type=1400 audit(1780178678.249:308): avc: denied { listen } for pid=8054 comm="syz.0.951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 146.268785][ T30] audit: type=1400 audit(1780178678.259:309): avc: denied { accept } for pid=8054 comm="syz.0.951" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 146.322310][ T12] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 146.356176][ T12] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 146.415147][ T8021] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 146.563028][ T8021] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 146.685475][ T8021] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 146.874940][ T30] audit: type=1400 audit(1780178679.089:310): avc: denied { setopt } for pid=8103 comm="syz.4.973" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 146.996739][ T30] audit: type=1400 audit(1780178679.209:311): avc: denied { bind } for pid=8110 comm="syz.0.975" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 147.912945][ T8155] can: request_module (can-proto-0) failed. [ 147.941338][ T8159] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 148.203249][ T8174] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1006'. [ 148.680266][ T30] audit: type=1400 audit(1780178680.879:312): avc: denied { setopt } for pid=8194 comm="syz.3.1016" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 148.733361][ T8203] dns_resolver: Unsupported content type (240) [ 148.742998][ T30] audit: type=1400 audit(1780178680.959:313): avc: denied { setopt } for pid=8200 comm="syz.0.1019" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 149.693078][ T8254] 9p: Unknown Cache mode or invalid value mma [ 149.740875][ T5927] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 149.902579][ T5927] usb 5-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 149.930795][ T5927] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 149.954195][ T5927] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 149.982731][ T5927] usb 5-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 150.026251][ T5927] usb 5-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 150.072119][ T5927] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 150.561985][ T5927] usb 5-1: config 0 descriptor?? [ 151.022265][ T5927] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.4-1/input0 [ 151.370826][ T30] audit: type=1400 audit(1780178683.579:314): avc: denied { read } for pid=8303 comm="syz.3.1064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 152.213425][ T30] audit: type=1400 audit(1780178684.429:315): avc: denied { getopt } for pid=8321 comm="syz.0.1072" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 152.331690][ T30] audit: type=1400 audit(1780178684.549:316): avc: denied { shutdown } for pid=8328 comm="syz.2.1075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 153.621012][ T5880] usb 5-1: USB disconnect, device number 2 [ 153.678912][ T30] audit: type=1400 audit(1780178685.889:317): avc: denied { setopt } for pid=8352 comm="syz.3.1087" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 154.315297][ T5880] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 154.852799][ T3551] wlan1: Trigger new scan to find an IBSS to join [ 154.972387][ T5880] usb 4-1: Using ep0 maxpacket: 16 [ 154.985745][ T5880] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 155.042210][ T8400] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1108'. [ 155.061125][ T8400] sit1: entered allmulticast mode [ 155.100846][ T5880] usb 4-1: New USB device found, idVendor=0458, idProduct=5016, bcdDevice= 0.00 [ 155.109902][ T5880] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 155.125944][ T5880] usb 4-1: config 0 descriptor?? [ 155.231674][ T30] audit: type=1400 audit(1780178687.449:318): avc: denied { read } for pid=8404 comm="syz.2.1111" name="ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 155.326032][ T30] audit: type=1400 audit(1780178687.469:319): avc: denied { open } for pid=8404 comm="syz.2.1111" path="/dev/ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 155.370773][ T5880] usbhid 4-1:0.0: can't add hid device: -71 [ 155.400251][ T5880] usbhid 4-1:0.0: probe with driver usbhid failed with error -71 [ 155.407566][ T30] audit: type=1400 audit(1780178687.489:320): avc: denied { ioctl } for pid=8404 comm="syz.2.1111" path="/dev/ppp" dev="devtmpfs" ino=709 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 155.446462][ T5880] usb 4-1: USB disconnect, device number 2 [ 155.527726][ T30] audit: type=1326 audit(1780178687.529:321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8407 comm="syz.1.1112" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec2a98f6c9 code=0x7ffc0000 [ 155.565685][ T30] audit: type=1326 audit(1780178687.529:322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8407 comm="syz.1.1112" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec2a98f6c9 code=0x7ffc0000 [ 155.634759][ T30] audit: type=1326 audit(1780178687.529:323): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8407 comm="syz.1.1112" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7fec2a98f6c9 code=0x7ffc0000 [ 155.678118][ T30] audit: type=1326 audit(1780178687.529:324): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8407 comm="syz.1.1112" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec2a98f6c9 code=0x7ffc0000 [ 155.742874][ T30] audit: type=1326 audit(1780178687.529:325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8407 comm="syz.1.1112" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fec2a98f6c9 code=0x7ffc0000 [ 155.820263][ T30] audit: type=1400 audit(1780178688.029:326): avc: denied { write } for pid=8427 comm="syz.0.1121" name="ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 156.079847][ T8440] IPVS: set_ctl: invalid protocol: 255 172.20.20.187:20004 [ 156.194333][ T8448] netlink: 40 bytes leftover after parsing attributes in process `syz.1.1132'. [ 156.417460][ T30] audit: type=1400 audit(1780178688.629:327): avc: denied { execute_no_trans } for pid=8455 comm="syz.1.1136" path=2F6D656D66643AA39F6EB4645204693502ACCEE1889D5B4038D7CE1F2039497F151D933DB5E75C274CE6D28EBC294A7454447181CF81BAE531F520C8103EC95C85174CBFCF91DF4DF3025E542A202864656C6574656429 dev="tmpfs" ino=1057 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 156.683086][ T8474] Invalid ELF header magic: != ELF [ 156.698199][ T8476] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1145'. [ 157.480039][ T8509] netlink: 324 bytes leftover after parsing attributes in process `syz.4.1161'. [ 157.511663][ T8509] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1161'. [ 157.546732][ T8513] syz.1.1163 uses obsolete (PF_INET,SOCK_PACKET) [ 157.975971][ T8528] netlink: 20 bytes leftover after parsing attributes in process `syz.0.1172'. [ 158.117816][ T8534] overlayfs: option "volatile" is meaningless in a non-upper mount, ignoring it. [ 158.137580][ T8534] overlayfs: missing 'lowerdir' [ 159.815718][ T8622] hpfs: Bad magic ... probably not HPFS [ 159.895134][ T6858] wlan1: Trigger new scan to find an IBSS to join [ 160.063296][ T8637] netlink: 132 bytes leftover after parsing attributes in process `syz.2.1225'. [ 160.270788][ T5889] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 160.443131][ T8654] overlayfs: failed lookup in lower (newroot/263, name='file0', err=-40): overlapping layers [ 160.456512][ T5889] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 160.486946][ T5889] usb 2-1: config 0 has no interfaces? [ 160.497438][ T5889] usb 2-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 160.528735][ T5889] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 160.551530][ T5889] usb 2-1: config 0 descriptor?? [ 160.628819][ T30] kauditd_printk_skb: 20 callbacks suppressed [ 160.628834][ T30] audit: type=1400 audit(1780178692.839:348): avc: denied { search } for pid=8662 comm="syz.3.1236" name="/" dev="configfs" ino=1103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 160.698941][ T30] audit: type=1400 audit(1780178692.839:349): avc: denied { search } for pid=8662 comm="syz.3.1236" name="/" dev="configfs" ino=1103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 160.745434][ T30] audit: type=1400 audit(1780178692.839:350): avc: denied { read open } for pid=8662 comm="syz.3.1236" path="/" dev="configfs" ino=1103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 160.774873][ T8633] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 160.793738][ T8633] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 160.802879][ T6858] wlan1: Creating new IBSS network, BSSID c6:c2:63:09:7b:63 [ 160.803195][ T30] audit: type=1326 audit(1780178692.909:351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8660 comm="syz.2.1237" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ff07cb8f6c9 code=0x0 [ 160.846906][ T9] usb 2-1: USB disconnect, device number 2 [ 160.995144][ T8673] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1242'. [ 163.848890][ T30] audit: type=1400 audit(163.808:352): avc: denied { accept } for pid=8735 comm="syz.0.1267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 163.915374][ T30] audit: type=1400 audit(163.808:353): avc: denied { write } for pid=8735 comm="syz.0.1267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 163.960855][ T30] audit: type=1400 audit(163.808:354): avc: denied { read } for pid=8735 comm="syz.0.1267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 164.114346][ T30] audit: type=1400 audit(163.948:355): avc: denied { read } for pid=8713 comm="syz.3.1258" name="mice" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 164.172059][ T30] audit: type=1400 audit(163.948:356): avc: denied { open } for pid=8713 comm="syz.3.1258" path="/dev/input/mice" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 164.465574][ T30] audit: type=1400 audit(164.408:357): avc: denied { read write } for pid=8748 comm="syz.2.1274" name="sg0" dev="devtmpfs" ino=776 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 164.861910][ T8766] netlink: 'syz.0.1281': attribute type 1 has an invalid length. [ 164.894974][ T8764] kvm: requested 4190 ns i8254 timer period limited to 200000 ns [ 164.985346][ T8764] kvm: pic: non byte read [ 164.990301][ T8764] kvm: pic: level sensitive irq not supported [ 164.990390][ T8764] kvm: pic: non byte read [ 165.029590][ T8764] kvm: pic: level sensitive irq not supported [ 165.029651][ T8764] kvm: pic: non byte read [ 165.053308][ T8766] 8021q: adding VLAN 0 to HW filter on device bond0 [ 165.060703][ T8764] kvm: pic: level sensitive irq not supported [ 165.060834][ T8764] kvm: pic: non byte read [ 165.129492][ T8771] ip6erspan0: entered promiscuous mode [ 165.152168][ T8771] bond0: (slave ip6erspan0): making interface the new active one [ 165.164249][ T8771] bond0: (slave ip6erspan0): Enslaving as an active interface with an up link [ 165.261620][ T8781] trusted_key: encrypted_key: insufficient parameters specified [ 165.387335][ T8786] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1289'. [ 165.415355][ T8786] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1289'. [ 165.751662][ T8805] netlink: 72 bytes leftover after parsing attributes in process `syz.0.1298'. [ 166.016293][ T8821] netlink: 8 bytes leftover after parsing attributes in process `syz.1.1305'. [ 166.062273][ T8821] sit1: entered allmulticast mode [ 166.313241][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 166.313265][ T30] audit: type=1400 audit(166.278:359): avc: denied { create } for pid=8833 comm="syz.3.1313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 167.285970][ T30] audit: type=1400 audit(167.168:360): avc: denied { read } for pid=8833 comm="syz.3.1313" path="socket:[22647]" dev="sockfs" ino=22647 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 167.579462][ T8852] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1319'. [ 167.775177][ T8859] 9pnet_virtio: no channels available for device syz [ 167.847257][ T8850] bridge0: port 2(bridge_slave_1) entered disabled state [ 167.855379][ T8850] bridge0: port 1(bridge_slave_0) entered disabled state [ 167.906272][ T30] audit: type=1400 audit(167.858:361): avc: denied { mount } for pid=8861 comm="syz.2.1325" name="/" dev="ramfs" ino=22686 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 168.276357][ T8850] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 168.324441][ T8850] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 168.388665][ T30] audit: type=1400 audit(168.348:362): avc: denied { append } for pid=8872 comm="syz.0.1329" name="sg0" dev="devtmpfs" ino=776 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 168.681491][ T30] audit: type=1800 audit(168.638:363): pid=8863 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed comm="syz.2.1325" name="bus" dev="ramfs" ino=22687 res=0 errno=0 [ 168.870276][ T8879] netlink: 16 bytes leftover after parsing attributes in process `syz.0.1332'. [ 168.902457][ T8852] bridge_slave_1: left allmulticast mode [ 168.908123][ T8852] bridge_slave_1: left promiscuous mode [ 168.950994][ T8852] bridge0: port 2(bridge_slave_1) entered disabled state [ 168.992927][ T8852] bridge_slave_0: left allmulticast mode [ 169.008779][ T8852] bridge_slave_0: left promiscuous mode [ 169.027113][ T8852] bridge0: port 1(bridge_slave_0) entered disabled state [ 169.166095][ T6856] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 169.198721][ T6856] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 169.242960][ T6856] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 169.290989][ T6856] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 169.593103][ T8903] netlink: 12 bytes leftover after parsing attributes in process `syz.1.1342'. [ 169.622189][ T8903] netlink: 4 bytes leftover after parsing attributes in process `syz.1.1342'. [ 170.528777][ T30] audit: type=1804 audit(170.488:364): pid=8924 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=invalid_pcr cause=ToMToU comm="syz.3.1352" name="/newroot/287/file1" dev="fuse" ino=1 res=1 errno=0 [ 170.575114][ T30] audit: type=1800 audit(170.488:365): pid=8924 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz.3.1352" name="/" dev="fuse" ino=1 res=0 errno=0 [ 170.647793][ T30] audit: type=1800 audit(170.488:366): pid=8924 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz.3.1352" name="/" dev="fuse" ino=1 res=0 errno=0 [ 171.256384][ T8947] netlink: 108 bytes leftover after parsing attributes in process `syz.3.1362'. [ 171.310602][ T8947] netlink: 20 bytes leftover after parsing attributes in process `syz.3.1362'. [ 171.340874][ T8953] netlink: 12 bytes leftover after parsing attributes in process `syz.2.1366'. [ 171.512847][ T8959] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1369'. [ 172.059953][ T8990] netlink: 100 bytes leftover after parsing attributes in process `syz.2.1383'. [ 172.181821][ T5894] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 172.540792][ T5894] usb 2-1: Using ep0 maxpacket: 16 [ 172.547972][ T5894] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 172.560245][ T5894] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 172.576032][ T5894] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 3 [ 172.600502][ T5894] usb 2-1: New USB device found, idVendor=0955, idProduct=7214, bcdDevice=ed.00 [ 172.635380][ T5894] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 173.315292][ T5894] usb 2-1: config 0 descriptor?? [ 173.653727][ T9041] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1405'. [ 173.755819][ T5894] input: HID 0955:7214 Haptics as /devices/virtual/input/input6 [ 173.796824][ T30] audit: type=1400 audit(173.758:367): avc: denied { read } for pid=5171 comm="acpid" name="event4" dev="devtmpfs" ino=2807 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 173.825648][ T30] audit: type=1400 audit(173.758:368): avc: denied { open } for pid=5171 comm="acpid" path="/dev/input/event4" dev="devtmpfs" ino=2807 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 173.855500][ T30] audit: type=1400 audit(173.758:369): avc: denied { ioctl } for pid=5171 comm="acpid" path="/dev/input/event4" dev="devtmpfs" ino=2807 ioctlcmd=0x4520 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 173.899163][ T5894] shield 0003:0955:7214.0002: Registered Thunderstrike controller [ 173.922355][ T5894] shield 0003:0955:7214.0002: : USB HID v0.00 Device [HID 0955:7214] on usb-dummy_hcd.1-1/input0 [ 173.943061][ T8982] random: crng reseeded on system resumption [ 173.949556][ T30] audit: type=1400 audit(173.908:370): avc: denied { read write } for pid=8981 comm="syz.1.1380" name="snapshot" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 173.986593][ T8982] netlink: 56 bytes leftover after parsing attributes in process `syz.1.1380'. [ 174.004233][ T30] audit: type=1400 audit(173.908:371): avc: denied { ioctl open } for pid=8981 comm="syz.1.1380" path="/dev/snapshot" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 174.079801][ T9056] tmpfs: Bad value for 'mpol' [ 174.154669][ T8982] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 174.172523][ T8982] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 174.214555][ T5874] shield 0003:0955:7214.0002: Failed to output Thunderstrike HOSTCMD request HID report due to -EPROTO [ 174.226427][ T5894] usb 2-1: USB disconnect, device number 3 [ 174.239049][ T5874] shield 0003:0955:7214.0002: Failed to output Thunderstrike HOSTCMD request HID report due to -ENODEV [ 174.251184][ T5894] ------------[ cut here ]------------ [ 174.256640][ T5894] workqueue: work disable count underflowed [ 174.262593][ T5894] WARNING: CPU: 1 PID: 5894 at kernel/workqueue.c:4355 enable_work+0x2f8/0x340 [ 174.271540][ T5894] Modules linked in: [ 174.275565][ T5894] CPU: 1 UID: 0 PID: 5894 Comm: kworker/1:5 Not tainted syzkaller #0 PREEMPT(full) [ 174.284923][ T5894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 174.294961][ T5894] Workqueue: usb_hub_wq hub_event [ 174.299981][ T5894] RIP: 0010:enable_work+0x2f8/0x340 [ 174.305168][ T5894] Code: 89 ee e8 9b b8 38 00 45 84 ed 0f 85 29 fe ff ff e8 ad bd 38 00 c6 05 da 65 e6 0e 01 90 48 c7 c7 20 29 8c 8b e8 a9 f0 f6 ff 90 <0f> 0b 90 90 e9 06 fe ff ff 48 89 ef e8 d7 61 a1 00 e9 aa fe ff ff [ 174.324770][ T5894] RSP: 0018:ffffc900043df3b0 EFLAGS: 00010086 [ 174.330825][ T5894] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90017c4c000 [ 174.338782][ T5894] RDX: 0000000000100000 RSI: ffffffff817b1ce5 RDI: 0000000000000001 [ 174.346734][ T5894] RBP: ffff888035444738 R08: 0000000000000001 R09: 0000000000000000 [ 174.354691][ T5894] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff9200087be77 [ 174.362649][ T5894] R13: 0000000000000000 R14: ffff888035444698 R15: ffff888035444730 [ 174.370605][ T5894] FS: 0000000000000000(0000) GS:ffff888124b05000(0000) knlGS:0000000000000000 [ 174.379515][ T5894] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 174.386081][ T5894] CR2: 0000001b30011ff8 CR3: 000000005b863000 CR4: 00000000003526f0 [ 174.394036][ T5894] Call Trace: [ 174.397297][ T5894] [ 174.400215][ T5894] ? __pfx_enable_work+0x10/0x10 [ 174.405158][ T5894] ? __thermal_zone_cdev_unbind+0x6c/0x6c0 [ 174.410962][ T5894] __cancel_work_sync+0xe7/0x130 [ 174.415890][ T5894] thermal_zone_device_unregister+0x28e/0x4d0 [ 174.421960][ T5894] ? __pfx_shield_remove+0x10/0x10 [ 174.427068][ T5894] power_supply_unregister+0x10a/0x150 [ 174.432518][ T5894] shield_remove+0x75/0x130 [ 174.437031][ T5894] ? __pfx_shield_remove+0x10/0x10 [ 174.442130][ T5894] hid_device_remove+0xd1/0x260 [ 174.446965][ T5894] ? __pfx_hid_device_remove+0x10/0x10 [ 174.452412][ T5894] device_remove+0xcb/0x170 [ 174.456902][ T5894] device_release_driver_internal+0x44b/0x620 [ 174.462964][ T5894] bus_remove_device+0x22f/0x420 [ 174.467902][ T5894] device_del+0x396/0x9f0 [ 174.472218][ T5894] ? __pfx_device_del+0x10/0x10 [ 174.477056][ T5894] ? do_raw_spin_lock+0x12c/0x2b0 [ 174.482074][ T5894] hid_destroy_device+0x19c/0x240 [ 174.487086][ T5894] usbhid_disconnect+0xa0/0xe0 [ 174.491843][ T5894] usb_unbind_interface+0x1dd/0x9e0 [ 174.497046][ T5894] ? kernfs_remove_by_name_ns+0xbe/0x110 [ 174.502666][ T5894] ? __pfx_usb_unbind_interface+0x10/0x10 [ 174.508383][ T5894] device_remove+0x125/0x170 [ 174.512959][ T5894] device_release_driver_internal+0x44b/0x620 [ 174.519018][ T5894] bus_remove_device+0x22f/0x420 [ 174.523954][ T5894] device_del+0x396/0x9f0 [ 174.528282][ T5894] ? __pfx_device_del+0x10/0x10 [ 174.533125][ T5894] ? kobject_put+0x210/0x5a0 [ 174.537706][ T5894] usb_disable_device+0x355/0x7d0 [ 174.542738][ T5894] usb_disconnect+0x2e1/0x9c0 [ 174.547417][ T5894] hub_event+0x1c81/0x4fe0 [ 174.551854][ T5894] ? __lock_acquire+0xb8a/0x1c90 [ 174.556790][ T5894] ? __pfx_hub_event+0x10/0x10 [ 174.561539][ T5894] ? assoc_array_find+0x1a0/0x230 [ 174.566574][ T5894] ? rcu_is_watching+0x12/0xc0 [ 174.571343][ T5894] process_one_work+0x9cf/0x1b70 [ 174.576275][ T5894] ? __pfx_process_one_work+0x10/0x10 [ 174.581641][ T5894] ? assign_work+0x1a0/0x250 [ 174.586217][ T5894] worker_thread+0x6c8/0xf10 [ 174.590804][ T5894] ? __kthread_parkme+0x19e/0x250 [ 174.595825][ T5894] ? __pfx_worker_thread+0x10/0x10 [ 174.600920][ T5894] kthread+0x3c5/0x780 [ 174.604973][ T5894] ? __pfx_kthread+0x10/0x10 [ 174.609550][ T5894] ? rcu_is_watching+0x12/0xc0 [ 174.614307][ T5894] ? __pfx_kthread+0x10/0x10 [ 174.618880][ T5894] ret_from_fork+0x675/0x7d0 [ 174.623450][ T5894] ? __pfx_kthread+0x10/0x10 [ 174.628023][ T5894] ret_from_fork_asm+0x1a/0x30 [ 174.632794][ T5894] [ 174.635797][ T5894] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 174.643054][ T5894] CPU: 1 UID: 0 PID: 5894 Comm: kworker/1:5 Not tainted syzkaller #0 PREEMPT(full) [ 174.652406][ T5894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 174.662444][ T5894] Workqueue: usb_hub_wq hub_event [ 174.667462][ T5894] Call Trace: [ 174.670727][ T5894] [ 174.673639][ T5894] dump_stack_lvl+0x3d/0x1f0 [ 174.678217][ T5894] vpanic+0x640/0x6f0 [ 174.682202][ T5894] ? enable_work+0x2f8/0x340 [ 174.686775][ T5894] panic+0xca/0xd0 [ 174.690485][ T5894] ? __pfx_panic+0x10/0x10 [ 174.694906][ T5894] check_panic_on_warn+0xab/0xb0 [ 174.699827][ T5894] __warn+0xf6/0x3c0 [ 174.703701][ T5894] ? __pfx_vprintk_emit+0x10/0x10 [ 174.708725][ T5894] ? enable_work+0x2f8/0x340 [ 174.713299][ T5894] report_bug+0x3c3/0x580 [ 174.717624][ T5894] ? enable_work+0x2f8/0x340 [ 174.722207][ T5894] handle_bug+0x184/0x210 [ 174.726520][ T5894] exc_invalid_op+0x17/0x50 [ 174.731017][ T5894] asm_exc_invalid_op+0x1a/0x20 [ 174.735849][ T5894] RIP: 0010:enable_work+0x2f8/0x340 [ 174.741033][ T5894] Code: 89 ee e8 9b b8 38 00 45 84 ed 0f 85 29 fe ff ff e8 ad bd 38 00 c6 05 da 65 e6 0e 01 90 48 c7 c7 20 29 8c 8b e8 a9 f0 f6 ff 90 <0f> 0b 90 90 e9 06 fe ff ff 48 89 ef e8 d7 61 a1 00 e9 aa fe ff ff [ 174.760621][ T5894] RSP: 0018:ffffc900043df3b0 EFLAGS: 00010086 [ 174.766675][ T5894] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffc90017c4c000 [ 174.774628][ T5894] RDX: 0000000000100000 RSI: ffffffff817b1ce5 RDI: 0000000000000001 [ 174.782578][ T5894] RBP: ffff888035444738 R08: 0000000000000001 R09: 0000000000000000 [ 174.790543][ T5894] R10: 0000000000000000 R11: 0000000000000001 R12: 1ffff9200087be77 [ 174.798500][ T5894] R13: 0000000000000000 R14: ffff888035444698 R15: ffff888035444730 [ 174.806461][ T5894] ? __warn_printk+0x1a5/0x350 [ 174.811223][ T5894] ? __pfx_enable_work+0x10/0x10 [ 174.816150][ T5894] ? __thermal_zone_cdev_unbind+0x6c/0x6c0 [ 174.821949][ T5894] __cancel_work_sync+0xe7/0x130 [ 174.826878][ T5894] thermal_zone_device_unregister+0x28e/0x4d0 [ 174.832933][ T5894] ? __pfx_shield_remove+0x10/0x10 [ 174.838037][ T5894] power_supply_unregister+0x10a/0x150 [ 174.843486][ T5894] shield_remove+0x75/0x130 [ 174.847979][ T5894] ? __pfx_shield_remove+0x10/0x10 [ 174.853078][ T5894] hid_device_remove+0xd1/0x260 [ 174.857920][ T5894] ? __pfx_hid_device_remove+0x10/0x10 [ 174.863370][ T5894] device_remove+0xcb/0x170 [ 174.867857][ T5894] device_release_driver_internal+0x44b/0x620 [ 174.873920][ T5894] bus_remove_device+0x22f/0x420 [ 174.878856][ T5894] device_del+0x396/0x9f0 [ 174.883171][ T5894] ? __pfx_device_del+0x10/0x10 [ 174.888010][ T5894] ? do_raw_spin_lock+0x12c/0x2b0 [ 174.893030][ T5894] hid_destroy_device+0x19c/0x240 [ 174.898056][ T5894] usbhid_disconnect+0xa0/0xe0 [ 174.902824][ T5894] usb_unbind_interface+0x1dd/0x9e0 [ 174.908018][ T5894] ? kernfs_remove_by_name_ns+0xbe/0x110 [ 174.913632][ T5894] ? __pfx_usb_unbind_interface+0x10/0x10 [ 174.919350][ T5894] device_remove+0x125/0x170 [ 174.923925][ T5894] device_release_driver_internal+0x44b/0x620 [ 174.929983][ T5894] bus_remove_device+0x22f/0x420 [ 174.934917][ T5894] device_del+0x396/0x9f0 [ 174.939234][ T5894] ? __pfx_device_del+0x10/0x10 [ 174.944070][ T5894] ? kobject_put+0x210/0x5a0 [ 174.948654][ T5894] usb_disable_device+0x355/0x7d0 [ 174.953694][ T5894] usb_disconnect+0x2e1/0x9c0 [ 174.958368][ T5894] hub_event+0x1c81/0x4fe0 [ 174.962793][ T5894] ? __lock_acquire+0xb8a/0x1c90 [ 174.967717][ T5894] ? __pfx_hub_event+0x10/0x10 [ 174.972467][ T5894] ? assoc_array_find+0x1a0/0x230 [ 174.977495][ T5894] ? rcu_is_watching+0x12/0xc0 [ 174.982251][ T5894] process_one_work+0x9cf/0x1b70 [ 174.987184][ T5894] ? __pfx_process_one_work+0x10/0x10 [ 174.992547][ T5894] ? assign_work+0x1a0/0x250 [ 174.997124][ T5894] worker_thread+0x6c8/0xf10 [ 175.001713][ T5894] ? __kthread_parkme+0x19e/0x250 [ 175.006739][ T5894] ? __pfx_worker_thread+0x10/0x10 [ 175.011833][ T5894] kthread+0x3c5/0x780 [ 175.015885][ T5894] ? __pfx_kthread+0x10/0x10 [ 175.020476][ T5894] ? rcu_is_watching+0x12/0xc0 [ 175.025228][ T5894] ? __pfx_kthread+0x10/0x10 [ 175.029802][ T5894] ret_from_fork+0x675/0x7d0 [ 175.034373][ T5894] ? __pfx_kthread+0x10/0x10 [ 175.038950][ T5894] ret_from_fork_asm+0x1a/0x30 [ 175.043729][ T5894] [ 175.046946][ T5894] Kernel Offset: disabled [ 175.051254][ T5894] Rebooting in 86400 seconds..