last executing test programs: 7m28.255565536s ago: executing program 1 (id=2858): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) mlock(&(0x7f0000ff7000/0x3000)=nil, 0x3000) 7m27.758388954s ago: executing program 1 (id=2859): r0 = socket$rds(0x15, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{}, [@ringbuf_output={{0x18, 0x2, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffd}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r2}, 0x10) bind$rds(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/28, 0x1c}], 0x1}}], 0x90}, 0x0) 7m27.534979751s ago: executing program 1 (id=2860): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 7m27.02759039s ago: executing program 1 (id=2862): r0 = socket$igmp(0x2, 0x3, 0x2) ioctl$SIOCGETSGCNT_IN6(r0, 0x89e1, &(0x7f0000000580)={@dev={0xfe, 0x80, '\x00', 0x3e}, @empty}) 7m26.626995461s ago: executing program 1 (id=2863): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) io_uring_setup(0x5741, &(0x7f00000001c0)={0x0, 0x100, 0x2}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r2) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @empty}, 0xf}, 0x1c) listen(r3, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r4, &(0x7f0000000140)={0x2, 0x4e22, @loopback}, 0x10) 7m26.003996328s ago: executing program 1 (id=2865): socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) preadv2(r0, 0x0, 0x0, 0xa, 0x81, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 6m40.16770759s ago: executing program 32 (id=2865): socket$can_bcm(0x1d, 0x2, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000008da4b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x18) preadv2(r0, 0x0, 0x0, 0xa, 0x81, 0x6) openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) 4m19.385372176s ago: executing program 0 (id=2952): openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x181242, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x2, &(0x7f0000002400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) open(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000002300)={0x50, 0x0, r1, {0x7, 0x9, 0x0, 0x31008003, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x50) read$FUSE(r0, &(0x7f0000004580)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000002240)={0x10, 0xffffffffffffffda, r2}, 0x10) dup3(0xffffffffffffffff, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) 3m37.415040002s ago: executing program 0 (id=2952): openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x181242, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x2, &(0x7f0000002400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) open(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000002300)={0x50, 0x0, r1, {0x7, 0x9, 0x0, 0x31008003, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x50) read$FUSE(r0, &(0x7f0000004580)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000002240)={0x10, 0xffffffffffffffda, r2}, 0x10) dup3(0xffffffffffffffff, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) 2m42.632988229s ago: executing program 0 (id=2952): openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x181242, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x2, &(0x7f0000002400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) open(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000002300)={0x50, 0x0, r1, {0x7, 0x9, 0x0, 0x31008003, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x50) read$FUSE(r0, &(0x7f0000004580)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000002240)={0x10, 0xffffffffffffffda, r2}, 0x10) dup3(0xffffffffffffffff, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) 1m52.36885621s ago: executing program 0 (id=2952): openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x181242, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x2, &(0x7f0000002400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) open(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000002300)={0x50, 0x0, r1, {0x7, 0x9, 0x0, 0x31008003, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x50) read$FUSE(r0, &(0x7f0000004580)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000002240)={0x10, 0xffffffffffffffda, r2}, 0x10) dup3(0xffffffffffffffff, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) 1m2.084200153s ago: executing program 0 (id=2952): openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x181242, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x2, &(0x7f0000002400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) open(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000002300)={0x50, 0x0, r1, {0x7, 0x9, 0x0, 0x31008003, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x50) read$FUSE(r0, &(0x7f0000004580)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000002240)={0x10, 0xffffffffffffffda, r2}, 0x10) dup3(0xffffffffffffffff, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) 20.046678044s ago: executing program 2 (id=3232): r0 = syz_usb_connect(0x5, 0x1cb, &(0x7f0000000000)=ANY=[@ANYBLOB="12010000122f0d4071040403dfe4000000010902b901010000003f0904"], 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$cdc_ecm(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000740)={0x2c, &(0x7f0000000200)=ANY=[], 0x0, 0x0, 0x0, 0x0}) 19.595239749s ago: executing program 2 (id=3233): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000dc0)={0x0, 0x4000, 0x0, 0x865d, 0xfd, "ffff00"}) syz_open_pts(r0, 0x0) io_setup(0x7, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x4004, r0, &(0x7f00000003c0)='z', 0x1, 0x4}]) close_range(r0, 0xffffffffffffffff, 0x0) 18.66356817s ago: executing program 2 (id=3234): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), r0) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x14, r1, 0x1, 0x70bd29, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) 18.26409015s ago: executing program 2 (id=3235): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sock, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYRES32=r1, @ANYBLOB="02"], 0x10) socket$l2tp(0x2, 0x2, 0x73) 17.908518797s ago: executing program 2 (id=3236): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r0) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r1, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000140), 0x4) connect$inet(r2, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x14, 0x3, 0xa, 0x3, 0x0, 0x0, {0xa, 0x0, 0x6}}], {0x14, 0x11, 0x1, 0x0, 0x0, {0xa}}}, 0x3c}, 0x1, 0x0, 0x0, 0x4005}, 0x8000) 17.425657855s ago: executing program 2 (id=3237): r0 = syz_usb_connect(0x0, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x77, 0x29, 0x4, 0x20, 0x424, 0x9901, 0xc257, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x10, 0x0, [{{0x9, 0x4, 0x43, 0x0, 0x2, 0x31, 0x7d, 0x55, 0x0, [], [{{0x9, 0x5, 0x2, 0x2, 0x200, 0x2}}, {{0x9, 0x5, 0x82, 0x2, 0x200}}]}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000500)={0x2c, &(0x7f00000012c0)={0x0, 0x1b, 0x4, "55baed73"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, &(0x7f0000000f80)={0x44, &(0x7f0000000d80)={0x0, 0x11, 0x4, "86e0acad"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000640)={0x2c, &(0x7f00000003c0)={0x40, 0x3, 0x4, "8ef36e9d"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, &(0x7f0000000700)={0x44, &(0x7f0000000480)={0x0, 0x18, 0x5, "4844e4681c"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 0s ago: executing program 0 (id=2952): openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x181242, 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file1\x00', &(0x7f0000000140), 0x2, &(0x7f0000002400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000000200)={0x2020, 0x0, 0x0}, 0x2020) open(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) write$FUSE_INIT(r0, &(0x7f0000002300)={0x50, 0x0, r1, {0x7, 0x9, 0x0, 0x31008003, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}, 0x50) read$FUSE(r0, &(0x7f0000004580)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INTERRUPT(r0, &(0x7f0000002240)={0x10, 0xffffffffffffffda, r2}, 0x10) dup3(0xffffffffffffffff, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) kernel console output (not intermixed with test programs): amily 0 port 6081 - 0 [ 1618.484552][ T9694] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1618.531004][ T9694] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1618.961370][ T9704] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2356'. [ 1619.292714][ T9704] veth2: entered promiscuous mode [ 1620.209283][ T9715] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 1620.434560][ T9719] netlink: 9 bytes leftover after parsing attributes in process `syz.1.2363'. [ 1620.447579][ T9719] gretap0: entered promiscuous mode [ 1621.049449][ T9729] ip6gretap0: entered promiscuous mode [ 1621.051589][ T9729] vlan2: entered promiscuous mode [ 1621.460409][ T30] kauditd_printk_skb: 37 callbacks suppressed [ 1621.461596][ T30] audit: type=1326 audit(1621.000:3728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9731 comm="syz.1.2370" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1621.466051][ T30] audit: type=1326 audit(1621.000:3729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9731 comm="syz.1.2370" exe="/syz-executor" sig=0 arch=c00000b7 syscall=460 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1621.470827][ T30] audit: type=1326 audit(1621.010:3730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9731 comm="syz.1.2370" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1621.473737][ T30] audit: type=1326 audit(1621.010:3731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9731 comm="syz.1.2370" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1621.982311][ T30] audit: type=1400 audit(1621.520:3732): avc: denied { read } for pid=9738 comm="syz.0.2373" dev="nsfs" ino=4026532807 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1621.988389][ T30] audit: type=1400 audit(1621.530:3733): avc: denied { open } for pid=9738 comm="syz.0.2373" path="net:[4026532807]" dev="nsfs" ino=4026532807 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1621.992563][ T30] audit: type=1400 audit(1621.530:3734): avc: denied { create } for pid=9738 comm="syz.0.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1622.007016][ T30] audit: type=1400 audit(1621.540:3735): avc: denied { map_create } for pid=9738 comm="syz.0.2373" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1622.009115][ T30] audit: type=1400 audit(1621.540:3736): avc: denied { bpf } for pid=9738 comm="syz.0.2373" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1622.013603][ T30] audit: type=1400 audit(1621.540:3737): avc: denied { perfmon } for pid=9738 comm="syz.0.2373" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1622.153364][ T9737] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=5123 sclass=netlink_xfrm_socket pid=9737 comm=+}[@ [ 1626.493960][ T30] kauditd_printk_skb: 32 callbacks suppressed [ 1626.494566][ T30] audit: type=1400 audit(1626.030:3770): avc: denied { write } for pid=9768 comm="syz.0.2387" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1627.230323][ T30] audit: type=1400 audit(1626.770:3771): avc: denied { prog_run } for pid=9772 comm="syz.1.2389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1628.329117][ T30] audit: type=1400 audit(1627.870:3772): avc: denied { mount } for pid=9778 comm="syz.1.2392" name="/" dev="configfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1628.511272][ T30] audit: type=1400 audit(1628.050:3773): avc: denied { name_bind } for pid=9780 comm="syz.0.2393" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1628.513086][ T30] audit: type=1400 audit(1628.050:3774): avc: denied { node_bind } for pid=9780 comm="syz.0.2393" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1629.153133][ T30] audit: type=1400 audit(1628.690:3775): avc: denied { create } for pid=9788 comm="syz.0.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1629.164648][ T30] audit: type=1400 audit(1628.700:3776): avc: denied { connect } for pid=9788 comm="syz.0.2397" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1629.441670][ T30] audit: type=1326 audit(1628.980:3777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9792 comm="syz.0.2399" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1629.455416][ T30] audit: type=1326 audit(1628.990:3778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9792 comm="syz.0.2399" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1629.458332][ T30] audit: type=1326 audit(1628.990:3779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9792 comm="syz.0.2399" exe="/syz-executor" sig=0 arch=c00000b7 syscall=198 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1631.925480][ T9828] netlink: 'syz.1.2414': attribute type 4 has an invalid length. [ 1634.340058][ T9844] bond1 (unregistering): Released all slaves [ 1634.471195][ T30] kauditd_printk_skb: 17 callbacks suppressed [ 1634.471743][ T30] audit: type=1326 audit(1634.010:3797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9856 comm="syz.0.2426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1634.475888][ T30] audit: type=1326 audit(1634.010:3798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9856 comm="syz.0.2426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=152 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1634.478025][ T30] audit: type=1326 audit(1634.010:3799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9856 comm="syz.0.2426" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1634.612360][ T30] audit: type=1404 audit(1634.150:3800): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1634.654014][ T30] audit: type=1400 audit(1634.190:3801): avc: denied { map_create } for pid=9858 comm="syz.0.2427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1634.659455][ T30] audit: type=1400 audit(1634.200:3802): avc: denied { prog_load } for pid=9858 comm="syz.0.2427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1634.660151][ T30] audit: type=1400 audit(1634.200:3803): avc: denied { prog_load } for pid=9858 comm="syz.0.2427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 1634.709973][ T30] audit: type=1400 audit(1634.250:3804): avc: denied { read write } for pid=6396 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 1634.797278][ T30] audit: type=1404 audit(1634.330:3805): enforcing=0 old_enforcing=1 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 1634.819425][ T30] audit: type=1400 audit(1634.360:3806): avc: denied { read } for pid=9860 comm="syz.0.2428" dev="nsfs" ino=4026532807 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1637.142592][ T9894] netlink: 348 bytes leftover after parsing attributes in process `syz.1.2445'. [ 1637.810917][ T9903] sch_tbf: burst 0 is lower than device lo mtu (18) ! [ 1639.209268][ T9927] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=9927 comm=syz.1.2460 [ 1639.747332][ T30] kauditd_printk_skb: 61 callbacks suppressed [ 1639.749636][ T30] audit: type=1326 audit(1639.280:3868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9933 comm="syz.0.2464" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1639.752651][ T30] audit: type=1326 audit(1639.290:3869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9933 comm="syz.0.2464" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1639.762031][ T30] audit: type=1326 audit(1639.300:3870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9933 comm="syz.0.2464" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1639.767400][ T30] audit: type=1326 audit(1639.300:3871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9933 comm="syz.0.2464" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1639.775421][ T30] audit: type=1326 audit(1639.310:3872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9933 comm="syz.0.2464" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1639.783120][ T30] audit: type=1326 audit(1639.320:3873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9933 comm="syz.0.2464" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1639.786182][ T30] audit: type=1326 audit(1639.320:3874): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9933 comm="syz.0.2464" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1639.791371][ T30] audit: type=1326 audit(1639.320:3875): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9933 comm="syz.0.2464" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1639.796113][ T30] audit: type=1326 audit(1639.330:3876): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9933 comm="syz.0.2464" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1639.800339][ T30] audit: type=1326 audit(1639.340:3877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9933 comm="syz.0.2464" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1640.383246][ T9943] xt_hashlimit: max too large, truncated to 1048576 [ 1641.551990][ T9962] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2477'. [ 1641.553886][ T9962] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2477'. [ 1642.891065][ T9980] SELinux: syz.0.2485 (9980) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1643.129368][ T9983] netlink: 32 bytes leftover after parsing attributes in process `syz.0.2487'. [ 1646.211469][ T30] kauditd_printk_skb: 59 callbacks suppressed [ 1646.212322][ T30] audit: type=1326 audit(1645.750:3937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10001 comm="syz.0.2493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1646.236841][ T30] audit: type=1326 audit(1645.770:3938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10001 comm="syz.0.2493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=127 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1646.247714][ T30] audit: type=1326 audit(1645.780:3939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10001 comm="syz.0.2493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1646.248299][ T30] audit: type=1326 audit(1645.780:3940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10001 comm="syz.0.2493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=153 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1646.248731][ T30] audit: type=1326 audit(1645.780:3941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10001 comm="syz.0.2493" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffff8cb5a768 code=0x7ffc0000 [ 1646.988724][ T30] audit: type=1400 audit(1646.530:3942): avc: denied { write } for pid=10007 comm="syz.1.2496" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1647.449142][ T30] audit: type=1400 audit(1646.990:3943): avc: denied { listen } for pid=10015 comm="syz.1.2500" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1648.049705][ T30] audit: type=1400 audit(1647.590:3944): avc: denied { create } for pid=10023 comm="syz.0.2503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1648.088212][ T30] audit: type=1400 audit(1647.630:3945): avc: denied { setopt } for pid=10023 comm="syz.0.2503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1648.273123][T10028] xt_hashlimit: max too large, truncated to 1048576 [ 1648.529320][ T30] audit: type=1400 audit(1648.070:3946): avc: denied { create } for pid=10030 comm="syz.0.2506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1648.530589][T10031] C: renamed from batadv_slave_0 (while UP) [ 1648.560995][T10031] netlink: 'syz.1.2507': attribute type 3 has an invalid length. [ 1648.561445][T10031] netlink: 152 bytes leftover after parsing attributes in process `syz.1.2507'. [ 1648.563605][T10031] A link change request failed with some changes committed already. Interface C may have been left with an inconsistent configuration, please check. [ 1651.364828][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 1651.369394][ T30] audit: type=1400 audit(1650.900:3953): avc: denied { sqpoll } for pid=10061 comm="syz.1.2519" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1652.518818][ T30] audit: type=1400 audit(1652.060:3954): avc: denied { mount } for pid=10072 comm="syz.1.2524" name="/" dev="configfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 1652.525522][ T30] audit: type=1400 audit(1652.060:3955): avc: denied { search } for pid=10072 comm="syz.1.2524" name="/" dev="configfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 1653.643595][ T2752] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1653.709669][ T2752] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1653.755248][ T2752] bond0 (unregistering): Released all slaves [ 1653.910039][T10075] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2525'. [ 1653.928157][T10075] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2525'. [ 1654.108012][ T2752] hsr_slave_0: left promiscuous mode [ 1654.137436][ T2752] hsr_slave_1: left promiscuous mode [ 1655.305266][ T30] audit: type=1326 audit(1654.840:3956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10081 comm="syz.1.2527" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1655.311560][ T30] audit: type=1326 audit(1654.850:3957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10081 comm="syz.1.2527" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1655.313338][ T30] audit: type=1326 audit(1654.850:3958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10081 comm="syz.1.2527" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1655.314989][ T30] audit: type=1326 audit(1654.850:3959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10081 comm="syz.1.2527" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1655.326056][ T30] audit: type=1326 audit(1654.860:3960): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10081 comm="syz.1.2527" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1655.327710][ T30] audit: type=1326 audit(1654.860:3961): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10081 comm="syz.1.2527" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1655.328157][ T30] audit: type=1326 audit(1654.860:3962): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10081 comm="syz.1.2527" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1657.035871][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 1657.037672][ T30] audit: type=1400 audit(1656.570:3969): avc: denied { read } for pid=10099 comm="syz.1.2536" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1657.040698][ T30] audit: type=1400 audit(1656.570:3970): avc: denied { open } for pid=10099 comm="syz.1.2536" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1657.128311][ T30] audit: type=1400 audit(1656.660:3971): avc: denied { ioctl } for pid=10099 comm="syz.1.2536" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1659.069106][ T30] audit: type=1400 audit(1658.610:3972): avc: denied { prog_run } for pid=10121 comm="+}[@" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1661.729028][ T30] audit: type=1400 audit(1661.260:3973): avc: denied { mount } for pid=10132 comm="syz.1.2551" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1661.774054][ T30] audit: type=1400 audit(1661.310:3974): avc: denied { unmount } for pid=9362 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1662.844679][ T30] audit: type=1400 audit(1662.380:3975): avc: denied { bind } for pid=10140 comm="syz.1.2554" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1662.850547][ T30] audit: type=1400 audit(1662.380:3976): avc: denied { node_bind } for pid=10140 comm="syz.1.2554" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 1665.470033][ T30] audit: type=1400 audit(1665.010:3977): avc: denied { write } for pid=10165 comm="syz.1.2559" name="event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1665.471963][ T30] audit: type=1400 audit(1665.010:3978): avc: denied { open } for pid=10165 comm="syz.1.2559" path="/dev/input/event0" dev="devtmpfs" ino=747 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1665.479819][ T30] audit: type=1400 audit(1665.020:3979): avc: denied { ioctl } for pid=10165 comm="syz.1.2559" path="/dev/input/event0" dev="devtmpfs" ino=747 ioctlcmd=0x45ff scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 1666.881399][T10040] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1666.922072][T10040] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1670.343818][T10040] hsr_slave_0: entered promiscuous mode [ 1670.353487][T10040] hsr_slave_1: entered promiscuous mode [ 1670.578341][T10176] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2561'. [ 1670.579153][T10176] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2561'. [ 1673.091550][ T30] audit: type=1400 audit(1672.630:3980): avc: denied { create } for pid=10214 comm="syz.1.2567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1673.630713][ T30] audit: type=1326 audit(1673.170:3981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10218 comm="syz.1.2569" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1673.634833][ T30] audit: type=1326 audit(1673.170:3982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10218 comm="syz.1.2569" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1673.640707][ T30] audit: type=1326 audit(1673.180:3983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10218 comm="syz.1.2569" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1673.644104][ T30] audit: type=1326 audit(1673.180:3984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10218 comm="syz.1.2569" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1673.647431][ T30] audit: type=1326 audit(1673.190:3985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10218 comm="syz.1.2569" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1673.651840][ T30] audit: type=1326 audit(1673.190:3986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10218 comm="syz.1.2569" exe="/syz-executor" sig=0 arch=c00000b7 syscall=240 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1673.653715][ T30] audit: type=1326 audit(1673.190:3987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10218 comm="syz.1.2569" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1674.093558][T10040] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1674.130266][T10040] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1674.163817][T10040] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1674.195573][T10040] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1674.747825][ T30] audit: type=1400 audit(1674.280:3988): avc: denied { shutdown } for pid=10223 comm="syz.1.2571" lport=57475 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1676.653678][T10040] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1682.740062][T10302] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2588'. [ 1683.049868][ T30] audit: type=1400 audit(1682.590:3989): avc: denied { getopt } for pid=10304 comm="syz.1.2589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1686.569152][T10040] veth0_vlan: entered promiscuous mode [ 1686.644834][T10040] veth1_vlan: entered promiscuous mode [ 1686.833264][ T30] audit: type=1400 audit(1686.370:3990): avc: denied { create } for pid=10328 comm="syz.1.2592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1687.002153][T10040] veth0_macvtap: entered promiscuous mode [ 1687.093058][T10040] veth1_macvtap: entered promiscuous mode [ 1687.284256][T10040] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1687.284733][T10040] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1687.284938][T10040] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1687.285101][T10040] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1687.514514][ T30] audit: type=1400 audit(1687.050:3991): avc: denied { mounton } for pid=10040 comm="syz-executor" path="/syzkaller.nfflww/syz-tmp" dev="vda" ino=1881 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1687.529433][ T30] audit: type=1400 audit(1687.060:3992): avc: denied { mount } for pid=10040 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1687.553610][ T30] audit: type=1400 audit(1687.090:3993): avc: denied { mount } for pid=10040 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1687.585442][ T30] audit: type=1400 audit(1687.120:3994): avc: denied { mounton } for pid=10040 comm="syz-executor" path="/syzkaller.nfflww/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1687.591510][ T30] audit: type=1400 audit(1687.120:3995): avc: denied { mounton } for pid=10040 comm="syz-executor" path="/syzkaller.nfflww/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=27483 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1687.623999][ T30] audit: type=1400 audit(1687.160:3996): avc: denied { unmount } for pid=10040 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1687.643597][ T30] audit: type=1400 audit(1687.170:3997): avc: denied { mounton } for pid=10040 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1687.650146][ T30] audit: type=1400 audit(1687.180:3998): avc: denied { mount } for pid=10040 comm="syz-executor" name="/" dev="gadgetfs" ino=3813 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1691.062078][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 1691.063063][ T30] audit: type=1400 audit(1690.590:4002): avc: denied { write } for pid=10334 comm="syz.0.2510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1696.034950][ T30] audit: type=1326 audit(1695.570:4003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10347 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1696.038527][ T30] audit: type=1326 audit(1695.570:4004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10347 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=164 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1696.040052][ T30] audit: type=1326 audit(1695.580:4005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10347 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1696.041400][ T30] audit: type=1326 audit(1695.580:4006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10347 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1696.043792][ T30] audit: type=1326 audit(1695.580:4007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10347 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=220 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1696.071247][ T30] audit: type=1326 audit(1695.610:4008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10347 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1696.085997][ T30] audit: type=1326 audit(1695.620:4009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10347 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1696.087148][ T30] audit: type=1326 audit(1695.620:4010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10349 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=115 compat=0 ip=0xffffae985e88 code=0x7ffc0000 [ 1696.105551][ T30] audit: type=1326 audit(1695.640:4011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10347 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1696.122926][ T30] audit: type=1326 audit(1695.660:4012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10347 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1696.123809][ T30] audit: type=1326 audit(1695.660:4013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10347 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1696.124114][ T30] audit: type=1326 audit(1695.660:4014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10347 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1696.132412][ T30] audit: type=1326 audit(1695.670:4015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10347 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=260 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1697.588867][ T30] audit: type=1326 audit(1697.120:4016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10349 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=93 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1697.619376][ T30] audit: type=1326 audit(1697.140:4017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10347 comm="syz.0.2597" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1702.242214][T10390] netlink: 5 bytes leftover after parsing attributes in process `syz.0.2615'. [ 1703.150557][ T30] kauditd_printk_skb: 6 callbacks suppressed [ 1703.151451][ T30] audit: type=1326 audit(1702.690:4024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10397 comm="syz.0.2618" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1703.155800][ T30] audit: type=1326 audit(1702.690:4025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10397 comm="syz.0.2618" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1703.159336][ T30] audit: type=1326 audit(1702.700:4026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10397 comm="syz.0.2618" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1703.161611][ T30] audit: type=1326 audit(1702.700:4027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10397 comm="syz.0.2618" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1703.171883][ T30] audit: type=1326 audit(1702.710:4028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10397 comm="syz.0.2618" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1703.174211][ T30] audit: type=1326 audit(1702.710:4029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10397 comm="syz.0.2618" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1703.181426][ T30] audit: type=1326 audit(1702.710:4030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10397 comm="syz.0.2618" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1703.185138][ T30] audit: type=1326 audit(1702.720:4031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10397 comm="syz.0.2618" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1703.197063][ T30] audit: type=1326 audit(1702.720:4032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10397 comm="syz.0.2618" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1703.199004][ T30] audit: type=1326 audit(1702.720:4033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10397 comm="syz.0.2618" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1705.753708][T10427] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 1707.162355][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.163722][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.164994][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.168000][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.169141][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.170162][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.171146][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.172079][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.173129][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.174131][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.175190][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.176148][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.189428][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.190630][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.191644][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.192616][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.193630][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.194590][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.195704][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.197714][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.199666][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.201117][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.207292][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.207840][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.208130][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.208390][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.208654][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.208917][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.209189][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.209449][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.214641][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.215833][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.217969][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.218979][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.221384][ T9538] hid-generic 0000:0004:0000.0010: unknown main item tag 0x0 [ 1707.247784][ T9538] hid-generic 0000:0004:0000.0010: hidraw0: HID v0.02 Device [syz0] on syz1 [ 1707.841819][T10446] fido_id[10446]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1708.294636][ T30] kauditd_printk_skb: 50 callbacks suppressed [ 1708.295958][ T30] audit: type=1326 audit(1963.826:4084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10451 comm="syz.1.2643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1708.299422][ T30] audit: type=1326 audit(1963.826:4085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10451 comm="syz.1.2643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1708.304905][ T30] audit: type=1326 audit(1963.836:4086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10451 comm="syz.1.2643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1708.312541][ T30] audit: type=1326 audit(1963.836:4087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10451 comm="syz.1.2643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1708.315142][ T30] audit: type=1326 audit(1963.846:4088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10451 comm="syz.1.2643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1708.318418][ T30] audit: type=1326 audit(1963.846:4089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10451 comm="syz.1.2643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=447 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1708.321384][ T30] audit: type=1326 audit(1963.846:4090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10451 comm="syz.1.2643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1708.324263][ T30] audit: type=1326 audit(1963.846:4091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10451 comm="syz.1.2643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=461 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1708.331782][ T30] audit: type=1326 audit(1963.856:4092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10451 comm="syz.1.2643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1708.333689][ T30] audit: type=1326 audit(1963.866:4093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10451 comm="syz.1.2643" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1709.935755][T10464] syz.1.2648: attempt to access beyond end of device [ 1709.935755][T10464] md33: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 1709.997728][T10464] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2648'. [ 1710.002084][T10464] hsr_slave_0: left promiscuous mode [ 1710.024440][T10464] hsr_slave_1: left promiscuous mode [ 1711.939181][T10480] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.2654'. [ 1711.969243][T10478] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.2654'. [ 1713.011087][T10491] netlink: 8 bytes leftover after parsing attributes in process `syz.1.2659'. [ 1717.767199][T10514] netlink: 'syz.1.2669': attribute type 1 has an invalid length. [ 1717.880728][T10514] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1717.890238][T10514] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2669'. [ 1718.260782][ T30] kauditd_printk_skb: 34 callbacks suppressed [ 1718.261293][ T30] audit: type=1400 audit(1973.796:4128): avc: denied { create } for pid=10516 comm="syz.0.2670" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1719.152378][T10514] bond1 (unregistering): Released all slaves [ 1719.997635][ T30] audit: type=1400 audit(1975.526:4129): avc: denied { write } for pid=10526 comm="syz.1.2674" name="ip6_mr_cache" dev="proc" ino=4026532858 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1729.463970][ T30] audit: type=1326 audit(1984.996:4130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10534 comm="syz.1.2677" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1729.478697][ T30] audit: type=1326 audit(1984.996:4131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10534 comm="syz.1.2677" exe="/syz-executor" sig=0 arch=c00000b7 syscall=48 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1729.493475][ T30] audit: type=1400 audit(1984.996:4132): avc: denied { execute } for pid=10534 comm="syz.1.2677" name="file0" dev="tmpfs" ino=1214 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1729.509888][ T30] audit: type=1326 audit(1985.006:4133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10534 comm="syz.1.2677" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1729.510547][ T30] audit: type=1326 audit(1985.006:4134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10534 comm="syz.1.2677" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1729.948206][T10539] IPv6: NLM_F_CREATE should be specified when creating new route [ 1731.854744][T10555] netlink: 14 bytes leftover after parsing attributes in process `syz.1.2686'. [ 1732.162896][ T30] audit: type=1326 audit(1987.696:4135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10558 comm="syz.0.2689" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1732.179266][ T30] audit: type=1326 audit(1987.716:4136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10558 comm="syz.0.2689" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1732.194004][ T30] audit: type=1326 audit(1987.726:4137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10558 comm="syz.0.2689" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1732.194590][ T30] audit: type=1326 audit(1987.726:4138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10558 comm="syz.0.2689" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1732.210145][ T30] audit: type=1326 audit(1987.746:4139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10558 comm="syz.0.2689" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1732.973852][T10571] netlink: 'syz.1.2694': attribute type 10 has an invalid length. [ 1733.564577][T10579] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2697'. [ 1735.638608][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 1735.641645][ T30] audit: type=1400 audit(1991.176:4162): avc: denied { write } for pid=10605 comm="syz.0.2711" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1735.992548][T10610] netlink: 40 bytes leftover after parsing attributes in process `syz.0.2713'. [ 1736.351496][ T30] audit: type=1326 audit(1991.886:4163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10613 comm="syz.0.2715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1736.354703][ T30] audit: type=1326 audit(1991.886:4164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10613 comm="syz.0.2715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1736.362978][ T30] audit: type=1326 audit(1991.896:4165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10613 comm="syz.0.2715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1736.364728][ T30] audit: type=1326 audit(1991.896:4166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10613 comm="syz.0.2715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1736.367287][ T30] audit: type=1326 audit(1991.896:4167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10613 comm="syz.0.2715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1736.375232][ T30] audit: type=1326 audit(1991.906:4168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10613 comm="syz.0.2715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=430 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1736.386846][ T30] audit: type=1326 audit(1991.906:4169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10613 comm="syz.0.2715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1736.400403][ T30] audit: type=1326 audit(1991.936:4170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10613 comm="syz.0.2715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=431 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1736.405349][ T30] audit: type=1326 audit(1991.936:4171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10613 comm="syz.0.2715" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1738.424756][T10626] netlink: 'syz.0.2720': attribute type 13 has an invalid length. [ 1740.802087][T10626] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1740.803865][T10626] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1740.807794][T10626] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1740.809311][T10626] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1741.528844][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1741.529385][ T30] audit: type=1326 audit(1997.056:4176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10631 comm="syz.1.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1741.579639][ T30] audit: type=1326 audit(1997.116:4177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10631 comm="syz.1.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1741.580303][ T30] audit: type=1326 audit(1997.116:4178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10631 comm="syz.1.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=20 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1741.580579][ T30] audit: type=1326 audit(1997.116:4179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10631 comm="syz.1.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1741.594802][ T30] audit: type=1326 audit(1997.126:4180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10631 comm="syz.1.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1741.595447][ T30] audit: type=1326 audit(1997.126:4181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10631 comm="syz.1.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1741.595748][ T30] audit: type=1326 audit(1997.126:4182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10631 comm="syz.1.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1741.613565][ T30] audit: type=1326 audit(1997.146:4183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10631 comm="syz.1.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1741.614168][ T30] audit: type=1326 audit(1997.146:4184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10631 comm="syz.1.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1741.614608][ T30] audit: type=1326 audit(1997.146:4185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10631 comm="syz.1.2723" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1742.465251][T10638] netlink: 'syz.1.2725': attribute type 1 has an invalid length. [ 1742.731489][T10638] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1743.838850][T10638] bond1 (unregistering): Released all slaves [ 1746.103931][T10653] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 1748.145330][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1748.149638][ T30] audit: type=1400 audit(2003.676:4188): avc: denied { mounton } for pid=10654 comm="syz.0.2731" path="/proc/141/task/142/net/netfilter" dev="proc" ino=4026532636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=dir permissive=1 [ 1749.657015][T10655] infiniband syz2: set down [ 1749.662893][T10655] infiniband syz2: added veth0_to_bond [ 1749.721767][T10655] workqueue: Failed to create a rescuer kthread for wq "ib_mad1": -EINTR [ 1749.751341][T10655] infiniband syz2: Couldn't open port 1 [ 1750.081347][T10655] RDS/IB: syz2: added [ 1750.084934][T10655] smc: adding ib device syz2 with port count 1 [ 1750.092007][T10655] smc: ib device syz2 port 1 has pnetid SYZ2 (user defined) [ 1755.541085][ T30] audit: type=1326 audit(2011.076:4189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10697 comm="syz.0.2748" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1755.541706][ T30] audit: type=1326 audit(2011.076:4190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10697 comm="syz.0.2748" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1755.552523][ T30] audit: type=1326 audit(2011.086:4191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10697 comm="syz.0.2748" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1755.553177][ T30] audit: type=1326 audit(2011.086:4192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10697 comm="syz.0.2748" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1755.556125][ T30] audit: type=1326 audit(2011.086:4193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10697 comm="syz.0.2748" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1755.562904][ T30] audit: type=1326 audit(2011.096:4194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10697 comm="syz.0.2748" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1755.569358][ T30] audit: type=1326 audit(2011.106:4195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10697 comm="syz.0.2748" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1755.578363][ T30] audit: type=1326 audit(2011.106:4196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10697 comm="syz.0.2748" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1755.580552][ T30] audit: type=1326 audit(2011.116:4197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10697 comm="syz.0.2748" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1755.583607][ T30] audit: type=1326 audit(2011.116:4198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10697 comm="syz.0.2748" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1761.187712][T10732] netlink: 28 bytes leftover after parsing attributes in process `syz.1.2763'. [ 1763.327543][T10752] netlink: 256 bytes leftover after parsing attributes in process `syz.1.2771'. [ 1763.999481][T10760] xt_addrtype: ipv6 PROHIBIT (THROW, NAT ..) matching not supported [ 1764.023078][T10759] pim6reg1: entered promiscuous mode [ 1764.023646][T10759] pim6reg1: entered allmulticast mode [ 1764.581143][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 1764.581742][ T30] audit: type=1400 audit(2020.116:4207): avc: denied { read write } for pid=10764 comm="syz.1.2778" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1764.602951][ T30] audit: type=1400 audit(2020.126:4208): avc: denied { open } for pid=10764 comm="syz.1.2778" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1764.609314][ T30] audit: type=1400 audit(2020.136:4209): avc: denied { ioctl } for pid=10764 comm="syz.1.2778" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1764.957507][T10771] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2780'. [ 1766.222815][T10784] SELinux: Context  is not valid (left unmapped). [ 1767.045337][T10792] netlink: 'syz.1.2790': attribute type 27 has an invalid length. [ 1767.139039][T10792] gretap0: left promiscuous mode [ 1767.432519][T10792] 0ªX¹¦À: left allmulticast mode [ 1768.701968][T10792] netdevsim netdevsim1 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1768.703259][T10792] netdevsim netdevsim1 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1768.704344][T10792] netdevsim netdevsim1 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1768.705290][T10792] netdevsim netdevsim1 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1768.944308][ T30] audit: type=1400 audit(2024.476:4210): avc: denied { nlmsg_read } for pid=10797 comm="syz.0.2792" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 1768.991323][T10794] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1769.238624][T10801] netlink: 272 bytes leftover after parsing attributes in process `syz.0.2793'. [ 1769.305425][T10794] veth1_vlan: left promiscuous mode [ 1769.315666][T10794] veth0_vlan: left promiscuous mode [ 1769.330100][T10794] veth0_vlan: entered promiscuous mode [ 1769.345743][T10794] veth1_vlan: entered promiscuous mode [ 1769.382382][T10794] veth1_macvtap: left promiscuous mode [ 1769.402778][T10794] veth0_macvtap: left promiscuous mode [ 1769.409466][T10794] veth0_macvtap: entered promiscuous mode [ 1769.413711][T10794] veth1_macvtap: entered promiscuous mode [ 1769.420830][T10794] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1769.422083][T10794] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1769.423315][T10794] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1769.424342][T10794] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1770.077065][ T30] audit: type=1400 audit(2025.606:4211): avc: denied { ioctl } for pid=10805 comm="syz.0.2795" path="socket:[29834]" dev="sockfs" ino=29834 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1770.958444][ T30] audit: type=1400 audit(2026.386:4212): avc: denied { execmem } for pid=10813 comm="syz.0.2797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1771.512935][ T30] audit: type=1400 audit(2027.026:4213): avc: denied { create } for pid=10815 comm="syz.1.2798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1771.609154][ T30] audit: type=1400 audit(2027.146:4214): avc: denied { setopt } for pid=10815 comm="syz.1.2798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1771.636020][ T30] audit: type=1400 audit(2027.166:4215): avc: denied { ioctl } for pid=10815 comm="syz.1.2798" path="socket:[29848]" dev="sockfs" ino=29848 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1772.453699][ T30] audit: type=1400 audit(2027.986:4216): avc: denied { prog_load } for pid=10818 comm="syz.1.2799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1772.458033][ T30] audit: type=1400 audit(2027.996:4217): avc: denied { bpf } for pid=10818 comm="syz.1.2799" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1772.460919][ T30] audit: type=1400 audit(2027.996:4218): avc: denied { perfmon } for pid=10818 comm="syz.1.2799" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1772.477948][ T30] audit: type=1400 audit(2028.016:4219): avc: denied { create } for pid=10818 comm="syz.1.2799" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1773.470728][ T30] audit: type=1400 audit(2029.006:4220): avc: denied { map_create } for pid=10813 comm="syz.0.2797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1775.218597][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 1775.221160][ T30] audit: type=1400 audit(2030.746:4230): avc: denied { map_read map_write } for pid=10827 comm="syz.1.2802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1775.231768][T10828] netlink: 12 bytes leftover after parsing attributes in process `syz.1.2802'. [ 1775.249045][ T30] audit: type=1400 audit(2030.776:4231): avc: denied { map } for pid=10827 comm="syz.1.2802" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=29335 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1775.260135][ T30] audit: type=1400 audit(2030.786:4232): avc: denied { read write } for pid=10827 comm="syz.1.2802" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=29335 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1775.274086][ T30] audit: type=1400 audit(2030.806:4233): avc: denied { create } for pid=10827 comm="syz.1.2802" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1775.294411][ T30] audit: type=1400 audit(2030.826:4234): avc: denied { setopt } for pid=10827 comm="syz.1.2802" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1775.299374][ T30] audit: type=1400 audit(2030.836:4235): avc: denied { write } for pid=10827 comm="syz.1.2802" lport=5 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1775.315057][T10828] netlink: 14 bytes leftover after parsing attributes in process `syz.1.2802'. [ 1777.702805][ T30] audit: type=1400 audit(2033.236:4236): avc: denied { kexec_image_load } for pid=10831 comm="syz.1.2804" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 1778.641242][T10836] netlink: 'syz.1.2806': attribute type 1 has an invalid length. [ 1778.743109][T10836] 8021q: adding VLAN 0 to HW filter on device bond1 [ 1778.923010][T10836] bond1: (slave veth4): Enslaving as an active interface with a down link [ 1778.967552][T10836] bond1: (slave veth0_to_bond): making interface the new active one [ 1778.974333][T10836] veth0_to_bond: entered promiscuous mode [ 1778.979256][T10836] bond1: (slave veth0_to_bond): Enslaving as an active interface with an up link [ 1779.051370][T10836] vlan0: entered allmulticast mode [ 1779.052670][T10836] veth1: entered allmulticast mode [ 1779.057745][T10836] veth1: entered promiscuous mode [ 1779.061602][T10836] veth1: left promiscuous mode [ 1779.073588][T10836] bond1: (slave vlan0): Enslaving as an active interface with an up link [ 1779.533690][ T30] audit: type=1326 audit(2035.066:4237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10840 comm="syz.1.2808" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1779.537551][ T30] audit: type=1326 audit(2035.066:4238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10840 comm="syz.1.2808" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1779.540260][ T30] audit: type=1326 audit(2035.076:4239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10840 comm="syz.1.2808" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1780.284614][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 1780.285891][ T30] audit: type=1400 audit(2035.816:4252): avc: denied { create } for pid=10844 comm="syz.1.2810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1780.297823][ T30] audit: type=1400 audit(2035.836:4253): avc: denied { write } for pid=10844 comm="syz.1.2810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1780.634882][ T30] audit: type=1400 audit(2036.166:4254): avc: denied { create } for pid=10846 comm="syz.1.2811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1784.475662][ T30] audit: type=1400 audit(2040.006:4255): avc: denied { read write } for pid=10040 comm="syz-executor" name="loop0" dev="devtmpfs" ino=1608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1784.507007][ T30] audit: type=1400 audit(2040.036:4256): avc: denied { open } for pid=10040 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1608 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1784.507656][ T30] audit: type=1400 audit(2040.036:4257): avc: denied { ioctl } for pid=10040 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=1608 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1784.824329][ T30] audit: type=1400 audit(2040.356:4258): avc: denied { create } for pid=10851 comm="syz.0.2813" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1785.201757][ T30] audit: type=1400 audit(2040.736:4259): avc: denied { module_request } for pid=10854 comm="+}[@" kmod="net-pf-16-proto-16-family-TIPCv2" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 1785.590496][ T30] audit: type=1400 audit(2041.126:4260): avc: denied { read write } for pid=10854 comm="+}[@" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1785.607500][ T30] audit: type=1400 audit(2041.136:4261): avc: denied { open } for pid=10854 comm="+}[@" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1785.608107][ T30] audit: type=1400 audit(2041.136:4262): avc: denied { ioctl } for pid=10854 comm="+}[@" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1785.620139][T10855] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1785.623451][T10855] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1786.214955][ T30] audit: type=1400 audit(2041.746:4263): avc: denied { prog_run } for pid=10862 comm="syz.1.2817" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1787.148877][T10868] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2819'. [ 1788.117300][ T30] audit: type=1400 audit(2043.646:4264): avc: denied { sys_module } for pid=10871 comm="syz.1.2821" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1788.290228][ T30] audit: type=1400 audit(2043.826:4265): avc: denied { write } for pid=10871 comm="syz.1.2821" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1789.114012][ T30] audit: type=1400 audit(2044.646:4266): avc: denied { append } for pid=10880 comm="syz.1.2824" name="vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1789.125551][ T30] audit: type=1400 audit(2044.646:4267): avc: denied { open } for pid=10880 comm="syz.1.2824" path="/dev/vga_arbiter" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 1790.034309][ T30] audit: type=1326 audit(2045.566:4268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10890 comm="syz.0.2829" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1790.050428][ T30] audit: type=1326 audit(2045.586:4269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10890 comm="syz.0.2829" exe="/syz-executor" sig=0 arch=c00000b7 syscall=136 compat=0 ip=0xffffae95a768 code=0x7ffc0000 [ 1790.539366][ T26] veth0_to_bond: left promiscuous mode [ 1790.685894][ T30] kauditd_printk_skb: 2 callbacks suppressed [ 1790.688207][ T30] audit: type=1400 audit(2046.216:4272): avc: denied { create } for pid=10896 comm="syz.0.2832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1790.688776][ T30] audit: type=1400 audit(2046.216:4273): avc: denied { connect } for pid=10896 comm="syz.0.2832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1790.713962][ T30] audit: type=1400 audit(2046.246:4274): avc: denied { ioctl } for pid=10897 comm="syz.1.2833" path="pid:[4026532728]" dev="nsfs" ino=4026532728 ioctlcmd=0xb706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1790.908099][ T30] audit: type=1400 audit(2046.436:4275): avc: denied { name_connect } for pid=10900 comm="syz.1.2834" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 1790.935485][ T30] audit: type=1400 audit(2046.466:4276): avc: denied { shutdown } for pid=10900 comm="syz.1.2834" lport=42983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1790.945907][ T30] audit: type=1400 audit(2046.476:4277): avc: denied { getopt } for pid=10900 comm="syz.1.2834" lport=42983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1791.180706][ T30] audit: type=1400 audit(2046.716:4278): avc: denied { compute_member } for pid=10902 comm="syz.1.2835" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1791.214479][ T30] audit: type=1400 audit(2046.746:4279): avc: denied { write } for pid=10896 comm="syz.0.2832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1792.433364][ T30] audit: type=1400 audit(2047.966:4280): avc: denied { read write } for pid=10909 comm="syz.1.2838" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1792.446527][ T30] audit: type=1400 audit(2047.976:4281): avc: denied { open } for pid=10909 comm="syz.1.2838" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 1792.545129][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.545727][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.545945][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.560141][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.561159][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.561578][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.561848][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.562053][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.562264][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.562465][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.562665][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.562915][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.563143][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.563349][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.563550][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.563766][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.563972][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.564180][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.564409][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.564616][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.564829][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.565035][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.565248][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.565453][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.565653][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.565852][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.566053][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.596006][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.597089][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.597329][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.597544][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.597762][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.597968][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.598172][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.598372][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.598570][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.598769][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.599021][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.599232][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.599431][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.599629][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.599862][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.600067][ T9537] hid-generic 0000:0000:0000.0011: unknown main item tag 0x0 [ 1792.681069][ T9537] hid-generic 0000:0000:0000.0011: hidraw0: HID v0.00 Device [syz0] on syz0 [ 1793.524523][T10911] fido_id[10911]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 1795.185442][T10922] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2843'. [ 1802.899066][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 1802.899677][ T30] audit: type=1326 audit(2058.416:4313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10940 comm="syz.1.2851" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1802.900044][ T30] audit: type=1326 audit(2058.416:4314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10940 comm="syz.1.2851" exe="/syz-executor" sig=0 arch=c00000b7 syscall=146 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1802.900363][ T30] audit: type=1326 audit(2058.416:4315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10940 comm="syz.1.2851" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1804.020823][ T30] audit: type=1400 audit(2059.556:4316): avc: denied { write } for pid=10946 comm="syz.1.2854" name="tcp6" dev="proc" ino=4026532851 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1804.882660][T10950] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2854'. [ 1806.057014][ T30] audit: type=1400 audit(2061.586:4317): avc: denied { bind } for pid=10953 comm="syz.1.2856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1806.057611][ T30] audit: type=1400 audit(2061.586:4318): avc: denied { name_bind } for pid=10953 comm="syz.1.2856" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1806.058067][ T30] audit: type=1400 audit(2061.586:4319): avc: denied { node_bind } for pid=10953 comm="syz.1.2856" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 1806.367548][ T30] audit: type=1400 audit(2061.896:4320): avc: denied { create } for pid=10955 comm="syz.1.2857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1807.042953][ T30] audit: type=1326 audit(2062.576:4321): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10958 comm="syz.1.2858" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1807.060445][ T30] audit: type=1326 audit(2062.596:4322): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10958 comm="syz.1.2858" exe="/syz-executor" sig=0 arch=c00000b7 syscall=228 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1808.263220][ T30] kauditd_printk_skb: 12 callbacks suppressed [ 1808.265624][ T30] audit: type=1400 audit(2063.796:4335): avc: denied { ioctl } for pid=10965 comm="syz.1.2862" path="socket:[29496]" dev="sockfs" ino=29496 ioctlcmd=0x89e1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1808.757306][ T30] audit: type=1400 audit(2064.286:4336): avc: denied { sqpoll } for pid=10970 comm="syz.1.2863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1808.792494][ T30] audit: type=1400 audit(2064.326:4337): avc: denied { name_bind } for pid=10970 comm="syz.1.2863" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1809.247077][ T30] audit: type=1400 audit(2064.776:4338): avc: denied { create } for pid=10975 comm="syz.1.2865" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1809.263058][ T30] audit: type=1326 audit(2064.776:4339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10975 comm="syz.1.2865" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1809.263642][ T30] audit: type=1326 audit(2064.796:4340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10975 comm="syz.1.2865" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1809.263981][ T30] audit: type=1326 audit(2064.796:4341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10975 comm="syz.1.2865" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1809.264343][ T30] audit: type=1326 audit(2064.796:4342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10975 comm="syz.1.2865" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1809.264685][ T30] audit: type=1326 audit(2064.796:4343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10975 comm="syz.1.2865" exe="/syz-executor" sig=0 arch=c00000b7 syscall=280 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1809.265028][ T30] audit: type=1326 audit(2064.796:4344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=10975 comm="syz.1.2865" exe="/syz-executor" sig=0 arch=c00000b7 syscall=98 compat=0 ip=0xffffba15a768 code=0x7ffc0000 [ 1818.290915][ T30] kauditd_printk_skb: 8 callbacks suppressed [ 1818.293623][ T30] audit: type=1400 audit(2073.826:4353): avc: denied { mounton } for pid=10995 comm="syz.0.2870" path="/115/file0" dev="tmpfs" ino=594 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1818.299562][ T30] audit: type=1400 audit(2073.836:4354): avc: denied { read } for pid=10995 comm="syz.0.2870" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1818.301816][ T30] audit: type=1400 audit(2073.836:4355): avc: denied { open } for pid=10995 comm="syz.0.2870" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1818.317413][ T30] audit: type=1400 audit(2073.836:4356): avc: denied { ioctl } for pid=10995 comm="syz.0.2870" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 1818.381832][ T30] audit: type=1400 audit(2073.916:4357): avc: denied { unmount } for pid=10040 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1818.612275][ T30] audit: type=1400 audit(2074.146:4358): avc: denied { mount } for pid=10997 comm="syz.0.2871" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1818.622503][ T30] audit: type=1400 audit(2074.156:4359): avc: denied { unmount } for pid=10997 comm="syz.0.2871" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1819.580792][T11004] block device autoloading is deprecated and will be removed. [ 1819.584365][T11004] syz.0.2874: attempt to access beyond end of device [ 1819.584365][T11004] loop262144: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 1819.858371][T11004] block device autoloading is deprecated and will be removed. [ 1820.706186][ T30] audit: type=1400 audit(2076.236:4360): avc: denied { read write } for pid=11009 comm="syz.0.2876" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1820.713608][ T30] audit: type=1400 audit(2076.236:4361): avc: denied { open } for pid=11009 comm="syz.0.2876" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1821.488503][ T30] audit: type=1400 audit(2077.026:4362): avc: denied { read write } for pid=11015 comm="syz.0.2879" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 1823.649445][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 1823.653904][ T30] audit: type=1400 audit(2079.186:4367): avc: denied { read append } for pid=11026 comm="syz.0.2884" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1823.656046][ T30] audit: type=1400 audit(2079.186:4368): avc: denied { open } for pid=11026 comm="syz.0.2884" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 1824.517345][ T30] audit: type=1400 audit(2080.046:4369): avc: denied { read write } for pid=11030 comm="syz.0.2886" name="rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1824.518088][ T30] audit: type=1400 audit(2080.046:4370): avc: denied { open } for pid=11030 comm="syz.0.2886" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=711 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 1827.200940][ T30] audit: type=1400 audit(2082.736:4371): avc: denied { create } for pid=11048 comm="syz.0.2894" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1829.127095][ T30] audit: type=1400 audit(2084.656:4372): avc: denied { create } for pid=11062 comm="syz.0.2900" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 1831.852354][T11082] netlink: 'syz.0.2909': attribute type 29 has an invalid length. [ 1831.860004][T11082] netlink: 'syz.0.2909': attribute type 29 has an invalid length. [ 1833.951805][T11104] netlink: 'syz.0.2920': attribute type 4 has an invalid length. [ 1834.335582][T11108] netlink: 'syz.0.2922': attribute type 3 has an invalid length. [ 1834.336163][T11108] netlink: 132 bytes leftover after parsing attributes in process `syz.0.2922'. [ 1835.977630][T11118] netlink: 'syz.0.2927': attribute type 11 has an invalid length. [ 1839.465816][T11140] netlink: 'syz.0.2936': attribute type 29 has an invalid length. [ 1839.475251][T11140] netlink: 'syz.0.2936': attribute type 29 has an invalid length. [ 1839.479721][T11140] netlink: 'syz.0.2936': attribute type 29 has an invalid length. [ 1840.202577][ T30] audit: type=1400 audit(2095.736:4373): avc: denied { ioctl } for pid=11141 comm="syz.0.2937" path="socket:[30409]" dev="sockfs" ino=30409 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1840.209904][ T30] audit: type=1400 audit(2095.746:4374): avc: denied { write } for pid=11141 comm="syz.0.2937" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=socket permissive=1 [ 1842.524796][T11145] can: request_module (can-proto-0) failed. [ 1842.880072][T11150] Freezing with imperfect legacy cgroup freezer. See cgroup.freeze of cgroup v2 [ 1843.520739][T11158] netlink: 'syz.0.2944': attribute type 10 has an invalid length. [ 1850.002937][T11172] netlink: 'syz.0.2949': attribute type 29 has an invalid length. [ 1850.011842][T11172] netlink: 'syz.0.2949': attribute type 29 has an invalid length. [ 1850.018648][T11172] netlink: 'syz.0.2949': attribute type 29 has an invalid length. [ 1850.021827][T11172] netlink: 'syz.0.2949': attribute type 29 has an invalid length. [ 1850.798928][ T30] audit: type=1400 audit(2106.326:4375): avc: denied { execute } for pid=11175 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1850.803729][ T30] audit: type=1400 audit(2106.336:4376): avc: denied { execute_no_trans } for pid=11175 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1850.955991][ T30] audit: type=1400 audit(2106.486:4377): avc: denied { mounton } for pid=11176 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1852.044405][ T30] audit: type=1400 audit(2107.576:4378): avc: denied { read } for pid=3157 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 1852.262710][ T30] audit: type=1400 audit(2107.796:4379): avc: denied { search } for pid=3157 comm="dhcpcd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1852.264700][ T30] audit: type=1400 audit(2107.796:4380): avc: denied { search } for pid=3157 comm="dhcpcd" name="udev" dev="tmpfs" ino=7 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1852.268155][ T30] audit: type=1400 audit(2107.796:4381): avc: denied { search } for pid=3157 comm="dhcpcd" name="data" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1852.278837][ T30] audit: type=1400 audit(2107.796:4382): avc: denied { read } for pid=3157 comm="dhcpcd" name="n30" dev="tmpfs" ino=5891 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1852.279353][ T30] audit: type=1400 audit(2107.796:4383): avc: denied { open } for pid=3157 comm="dhcpcd" path="/run/udev/data/n30" dev="tmpfs" ino=5891 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1852.293072][ T30] audit: type=1400 audit(2107.826:4384): avc: denied { getattr } for pid=3157 comm="dhcpcd" path="/run/udev/data/n30" dev="tmpfs" ino=5891 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1855.089437][ T54] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1855.139437][ T54] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1855.184578][ T54] bond0 (unregistering): Released all slaves [ 1856.960919][ T30] audit: type=1400 audit(2112.486:4385): avc: denied { read open } for pid=11196 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=938 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1856.961705][ T30] audit: type=1400 audit(2112.496:4386): avc: denied { getattr } for pid=11196 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=938 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1857.060555][ T30] audit: type=1400 audit(2112.586:4387): avc: denied { add_name } for pid=11194 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1857.061327][ T30] audit: type=1400 audit(2112.586:4388): avc: denied { create } for pid=11194 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1857.061629][ T30] audit: type=1400 audit(2112.586:4389): avc: denied { write } for pid=11194 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth1.link" dev="tmpfs" ino=5895 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1857.061901][ T30] audit: type=1400 audit(2112.586:4390): avc: denied { append } for pid=11194 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" dev="tmpfs" ino=5895 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1857.848414][ T30] audit: type=1400 audit(2113.366:4391): avc: denied { remove_name } for pid=11200 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=5895 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1857.868253][ T30] audit: type=1400 audit(2113.386:4392): avc: denied { unlink } for pid=11200 comm="rm" name="resolv.conf.eth1.link" dev="tmpfs" ino=5895 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1858.075255][ T54] hsr_slave_0: left promiscuous mode [ 1858.093526][ T54] hsr_slave_1: left promiscuous mode [ 1863.032194][ T26] smc: removing ib device syz2 [ 1873.830957][T11176] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1873.853747][T11176] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1874.642306][T11185] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1874.712259][T11185] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1877.244762][T11176] hsr_slave_0: entered promiscuous mode [ 1877.273158][T11176] hsr_slave_1: entered promiscuous mode [ 1877.624255][T11185] hsr_slave_0: entered promiscuous mode [ 1877.631392][T11185] hsr_slave_1: entered promiscuous mode [ 1877.634223][T11185] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1877.634535][T11185] Cannot create hsr debugfs directory [ 1880.399177][T11185] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1880.461839][T11185] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1880.542411][T11185] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1880.591169][T11185] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1881.072536][T11176] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1881.132414][T11176] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1881.173421][T11176] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1881.223816][T11176] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1883.388514][T11185] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1883.961594][T11176] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1894.352607][T11176] veth0_vlan: entered promiscuous mode [ 1894.481938][T11176] veth1_vlan: entered promiscuous mode [ 1894.594776][T11185] veth0_vlan: entered promiscuous mode [ 1894.691037][T11185] veth1_vlan: entered promiscuous mode [ 1894.865211][T11176] veth0_macvtap: entered promiscuous mode [ 1894.964824][T11176] veth1_macvtap: entered promiscuous mode [ 1895.170355][T11185] veth0_macvtap: entered promiscuous mode [ 1895.284108][T11185] veth1_macvtap: entered promiscuous mode [ 1895.415503][T11176] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1895.437548][T11176] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1895.438970][T11176] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1895.440149][T11176] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1895.880088][T11185] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1895.881060][T11185] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1895.885562][T11185] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1895.888090][T11185] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1896.168759][ T30] audit: type=1400 audit(2151.676:4393): avc: denied { mounton } for pid=11176 comm="syz-executor" path="/syzkaller.PMDXQm/syz-tmp" dev="vda" ino=1882 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1896.184621][ T30] audit: type=1400 audit(2151.716:4394): avc: denied { mount } for pid=11176 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1896.205894][ T30] audit: type=1400 audit(2151.736:4395): avc: denied { mount } for pid=11176 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1896.245965][ T30] audit: type=1400 audit(2151.776:4396): avc: denied { mounton } for pid=11176 comm="syz-executor" path="/syzkaller.PMDXQm/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1896.280473][ T30] audit: type=1400 audit(2151.816:4397): avc: denied { mounton } for pid=11176 comm="syz-executor" path="/syzkaller.PMDXQm/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=31406 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1896.315435][ T30] audit: type=1400 audit(2151.846:4398): avc: denied { unmount } for pid=11176 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1896.346966][ T30] audit: type=1400 audit(2151.866:4399): avc: denied { mounton } for pid=11176 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1896.349092][ T30] audit: type=1400 audit(2151.876:4400): avc: denied { mount } for pid=11176 comm="syz-executor" name="/" dev="gadgetfs" ino=3813 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1896.390375][ T30] audit: type=1400 audit(2151.906:4401): avc: denied { mount } for pid=11176 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1896.393287][ T30] audit: type=1400 audit(2151.916:4402): avc: denied { mounton } for pid=11176 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 1897.795049][ T9519] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1898.223018][ T9519] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1898.541935][ T9519] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1898.914223][ T9519] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1901.437379][ T30] audit: type=1400 audit(2156.966:4403): avc: denied { create } for pid=11420 comm="syz.2.2956" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1905.172325][ T30] audit: type=1400 audit(2160.676:4404): avc: denied { shutdown } for pid=11423 comm="syz.2.2957" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1906.350783][ T9519] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1906.484280][ T9519] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1906.612073][ T9519] bond0 (unregistering): Released all slaves [ 1907.078344][ T9519] hsr_slave_0: left promiscuous mode [ 1907.091103][ T9519] hsr_slave_1: left promiscuous mode [ 1907.293307][ T9519] veth1_macvtap: left promiscuous mode [ 1907.298933][ T9519] veth0_macvtap: left promiscuous mode [ 1907.303006][ T9519] veth1_vlan: left promiscuous mode [ 1907.313309][ T9519] veth0_vlan: left promiscuous mode [ 1909.877348][ T30] audit: type=1400 audit(2165.406:4405): avc: denied { read } for pid=11432 comm="syz.2.2959" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1909.879512][ T30] audit: type=1400 audit(2165.406:4406): avc: denied { open } for pid=11432 comm="syz.2.2959" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1909.889336][ T30] audit: type=1400 audit(2165.426:4407): avc: denied { ioctl } for pid=11432 comm="syz.2.2959" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1912.181651][ T30] audit: type=1400 audit(2167.706:4408): avc: denied { getopt } for pid=11442 comm="syz.2.2963" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1914.244804][T11450] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1914.258043][T11450] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1915.159925][ T30] audit: type=1400 audit(2170.696:4409): avc: denied { create } for pid=11454 comm="syz.2.2968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1915.172789][ T30] audit: type=1400 audit(2170.706:4410): avc: denied { setopt } for pid=11454 comm="syz.2.2968" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1920.999229][ T30] audit: type=1400 audit(2176.526:4411): avc: denied { read } for pid=11481 comm="syz.2.2971" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1921.019481][ T30] audit: type=1400 audit(2176.556:4412): avc: denied { open } for pid=11481 comm="syz.2.2971" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1921.057742][ T30] audit: type=1400 audit(2176.586:4413): avc: denied { ioctl } for pid=11481 comm="syz.2.2971" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 1921.061359][T11484] binder: 11484:11481 cannot find target node [ 1921.080512][T11484] binder: 11481:11484 transaction call to 0:0 failed 44/29189/-22, code 0 size 0-0 line 3150 [ 1921.099991][T10800] binder: undelivered TRANSACTION_ERROR: 29189 [ 1921.841629][ T30] audit: type=1400 audit(2177.376:4414): avc: denied { read } for pid=11490 comm="syz.2.2973" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1921.843964][ T30] audit: type=1400 audit(2177.376:4415): avc: denied { open } for pid=11490 comm="syz.2.2973" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1921.855280][ T30] audit: type=1400 audit(2177.386:4416): avc: denied { ioctl } for pid=11490 comm="syz.2.2973" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 1922.184251][T11399] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1922.264884][T11399] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1925.915713][ T30] audit: type=1400 audit(2181.446:4417): avc: denied { map } for pid=11514 comm="syz.2.2976" path="socket:[31559]" dev="sockfs" ino=31559 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1925.920137][ T30] audit: type=1400 audit(2181.456:4418): avc: denied { read } for pid=11514 comm="syz.2.2976" path="socket:[31559]" dev="sockfs" ino=31559 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1926.115677][T11399] hsr_slave_0: entered promiscuous mode [ 1926.121858][T11399] hsr_slave_1: entered promiscuous mode [ 1929.931006][T11399] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1929.964239][T11399] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1930.043501][T11399] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1930.125809][T11399] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1933.228971][T11399] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1940.173487][ T30] audit: type=1400 audit(2195.706:4419): avc: denied { ioctl } for pid=11596 comm="syz.2.2985" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=32581 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1940.200375][ T30] audit: type=1400 audit(2195.726:4420): avc: denied { map } for pid=11596 comm="syz.2.2985" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1940.203677][ T30] audit: type=1400 audit(2195.726:4421): avc: denied { execute } for pid=11596 comm="syz.2.2985" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1941.274117][ T30] audit: type=1400 audit(2196.806:4422): avc: denied { getopt } for pid=11602 comm="syz.2.2986" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1941.665842][ T30] audit: type=1400 audit(2197.196:4423): avc: denied { bind } for pid=11608 comm="syz.2.2988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1941.673031][ T30] audit: type=1400 audit(2197.206:4424): avc: denied { write } for pid=11608 comm="syz.2.2988" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1942.853924][T11399] veth0_vlan: entered promiscuous mode [ 1942.892533][T11399] veth1_vlan: entered promiscuous mode [ 1943.114611][T11399] veth0_macvtap: entered promiscuous mode [ 1943.204991][T11399] veth1_macvtap: entered promiscuous mode [ 1943.420779][T11399] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1943.421318][T11399] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1943.421486][T11399] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1943.421649][T11399] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1944.793488][ T93] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1945.280952][ T93] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1945.618643][ T93] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1946.030764][ T93] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1948.585562][ T30] audit: type=1400 audit(2204.106:4425): avc: denied { read } for pid=11656 comm="syz.2.3004" name="usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1948.587015][ T30] audit: type=1400 audit(2204.106:4426): avc: denied { open } for pid=11656 comm="syz.2.3004" path="/dev/usbmon0" dev="devtmpfs" ino=695 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 1951.459890][ T93] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1951.514591][ T93] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1951.571948][ T93] bond0 (unregistering): Released all slaves [ 1952.246790][ T93] hsr_slave_0: left promiscuous mode [ 1952.270214][ T93] hsr_slave_1: left promiscuous mode [ 1952.524337][ T93] veth1_macvtap: left promiscuous mode [ 1952.525472][ T93] veth0_macvtap: left promiscuous mode [ 1952.557740][ T93] veth1_vlan: left promiscuous mode [ 1952.558766][ T93] veth0_vlan: left promiscuous mode [ 1964.938751][T11631] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1964.977934][T11631] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1967.410421][ T30] audit: type=1400 audit(2222.946:4427): avc: denied { mount } for pid=11728 comm="syz.2.3026" name="/" dev="ramfs" ino=33028 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 1973.396026][T11631] hsr_slave_0: entered promiscuous mode [ 1973.402004][T11631] hsr_slave_1: entered promiscuous mode [ 1977.719615][T11631] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1977.758757][T11631] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1977.806025][T11631] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1977.844564][T11631] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1981.179675][T11631] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1982.679658][ T30] audit: type=1400 audit(2238.206:4428): avc: denied { mount } for pid=11792 comm="syz.2.3030" name="/" dev="autofs" ino=33937 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1982.732478][ T30] audit: type=1400 audit(2238.266:4429): avc: denied { unmount } for pid=11185 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1989.757563][T11848] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1989.762128][T11848] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1992.933637][T11631] veth0_vlan: entered promiscuous mode [ 1993.141021][T11631] veth1_vlan: entered promiscuous mode [ 1993.807959][T11631] veth0_macvtap: entered promiscuous mode [ 1993.973033][T11631] veth1_macvtap: entered promiscuous mode [ 1994.781892][T11631] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1994.783416][T11631] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1994.788181][T11631] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1994.791292][T11631] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1995.809075][T11885] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1995.830897][T11885] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1996.103882][ T6815] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1996.462951][ T6815] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1996.901426][ T6815] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1997.459405][ T6815] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2000.429430][ T30] audit: type=1400 audit(2255.966:4430): avc: denied { setopt } for pid=11916 comm="syz.2.3062" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2000.854653][ T30] audit: type=1326 audit(2256.386:4431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=11920 comm="syz.2.3064" exe="/syz-executor" sig=9 arch=c00000b7 syscall=98 compat=0 ip=0xffff8795a768 code=0x0 [ 2002.070390][ T6815] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2002.167893][ T6815] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2002.241954][ T6815] bond0 (unregistering): Released all slaves [ 2002.687023][ T6815] hsr_slave_0: left promiscuous mode [ 2002.695025][ T6815] hsr_slave_1: left promiscuous mode [ 2002.839806][ T6815] veth1_macvtap: left promiscuous mode [ 2002.841299][ T6815] veth0_macvtap: left promiscuous mode [ 2002.845235][ T6815] veth1_vlan: left promiscuous mode [ 2002.849326][ T6815] veth0_vlan: left promiscuous mode [ 2006.671658][ T30] audit: type=1400 audit(2262.206:4432): avc: denied { create } for pid=11931 comm="syz.2.3068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 2006.915077][ T30] audit: type=1400 audit(2262.446:4433): avc: denied { read write } for pid=11931 comm="syz.2.3068" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 2006.915740][ T30] audit: type=1400 audit(2262.446:4434): avc: denied { open } for pid=11931 comm="syz.2.3068" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 2013.215151][T11962] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2013.223710][T11962] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2015.452745][T11890] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2015.495465][T11890] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2018.762678][T11890] hsr_slave_0: entered promiscuous mode [ 2018.778591][T11890] hsr_slave_1: entered promiscuous mode [ 2022.354420][T11890] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2022.426014][T11890] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2022.495000][T11890] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2022.545914][T11890] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2025.143842][T11890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2036.063904][T11890] veth0_vlan: entered promiscuous mode [ 2036.152668][T11890] veth1_vlan: entered promiscuous mode [ 2036.423236][T11890] veth0_macvtap: entered promiscuous mode [ 2036.455495][T11890] veth1_macvtap: entered promiscuous mode [ 2036.775112][T11890] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2036.786688][T11890] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2036.790064][T11890] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2036.794064][T11890] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2038.122722][ T9519] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2038.535487][ T9519] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2038.891158][ T9519] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2039.140681][ T9519] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2043.162180][ T9519] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2043.228072][ T9519] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2043.272958][ T9519] bond0 (unregistering): Released all slaves [ 2043.552402][ T9519] hsr_slave_0: left promiscuous mode [ 2043.567493][ T9519] hsr_slave_1: left promiscuous mode [ 2043.670816][ T9519] veth1_macvtap: left promiscuous mode [ 2043.671692][ T9519] veth0_macvtap: left promiscuous mode [ 2043.673730][ T9519] veth1_vlan: left promiscuous mode [ 2043.689111][ T9519] veth0_vlan: left promiscuous mode [ 2062.760939][T12083] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2062.810696][T12083] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2063.843677][ T30] audit: type=1400 audit(2319.356:4435): avc: denied { connect } for pid=12142 comm="syz.2.3088" lport=56 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 2069.244249][ T30] audit: type=1400 audit(2324.776:4436): avc: denied { accept } for pid=12167 comm="syz.2.3089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2069.895639][T12083] hsr_slave_0: entered promiscuous mode [ 2069.909632][T12083] hsr_slave_1: entered promiscuous mode [ 2073.847347][ T30] audit: type=1400 audit(2329.376:4437): avc: denied { execute } for pid=12201 comm="syz.2.3097" path="/144/cgroup.controllers" dev="tmpfs" ino=745 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 2073.944336][T12083] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2073.975751][T12083] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2074.021926][T12083] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2074.073234][T12083] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2074.144103][ T30] audit: type=1400 audit(2329.676:4438): avc: denied { connect } for pid=12204 comm="syz.2.3098" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 2079.763190][T12083] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2082.644622][ T30] audit: type=1400 audit(2338.176:4439): avc: denied { read write } for pid=12232 comm="syz.2.3100" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2082.661485][ T30] audit: type=1400 audit(2338.186:4440): avc: denied { open } for pid=12232 comm="syz.2.3100" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2082.694774][ T30] audit: type=1400 audit(2338.226:4441): avc: denied { ioctl } for pid=12232 comm="syz.2.3100" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5501 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 2082.739769][T12235] input: syz1 as /devices/virtual/input/input3 [ 2090.598956][T12083] veth0_vlan: entered promiscuous mode [ 2090.694540][T12083] veth1_vlan: entered promiscuous mode [ 2091.089499][T12083] veth0_macvtap: entered promiscuous mode [ 2091.138660][T12083] veth1_macvtap: entered promiscuous mode [ 2091.518041][T12083] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2091.518667][T12083] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2091.518957][T12083] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2091.519143][T12083] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2092.872905][ T93] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2093.060709][ T93] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2093.446767][ T93] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2094.014736][ T93] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2102.512554][ T30] audit: type=1400 audit(2358.036:4442): avc: denied { write } for pid=12311 comm="syz.2.3107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 2102.811745][ T93] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2102.858401][ T93] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2102.950062][ T93] bond0 (unregistering): Released all slaves [ 2103.254705][ T93] hsr_slave_0: left promiscuous mode [ 2103.320415][ T93] hsr_slave_1: left promiscuous mode [ 2103.483299][ T93] veth1_macvtap: left promiscuous mode [ 2103.498622][ T93] veth0_macvtap: left promiscuous mode [ 2103.500851][ T93] veth1_vlan: left promiscuous mode [ 2103.501560][ T93] veth0_vlan: left promiscuous mode [ 2104.728939][T12329] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2104.744526][T12329] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2115.573844][ T30] audit: type=1400 audit(2371.106:4443): avc: denied { create } for pid=12341 comm="syz.2.3118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2115.579555][ T30] audit: type=1400 audit(2371.116:4444): avc: denied { write } for pid=12341 comm="syz.2.3118" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 2119.016936][ T30] audit: type=1400 audit(2374.536:4445): avc: denied { bind } for pid=12363 comm="syz.2.3123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2119.503559][ T30] audit: type=1400 audit(2375.036:4446): avc: denied { setopt } for pid=12363 comm="syz.2.3123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 2121.705409][T12293] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2121.761751][T12293] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2124.544157][T12293] hsr_slave_0: entered promiscuous mode [ 2124.553130][T12293] hsr_slave_1: entered promiscuous mode [ 2126.260719][T12425] netlink: 48 bytes leftover after parsing attributes in process `syz.2.3131'. [ 2126.267174][ T30] audit: type=1400 audit(2381.796:4447): avc: denied { nlmsg_read } for pid=12423 comm="syz.2.3131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2126.275126][ T30] audit: type=1400 audit(2381.806:4448): avc: denied { read } for pid=12423 comm="syz.2.3131" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2128.192350][T12293] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2128.265472][T12293] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2128.315087][T12293] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2128.415100][T12293] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2129.749369][T12455] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2129.762815][T12455] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2130.677562][ T30] audit: type=1400 audit(2386.206:4449): avc: denied { name_bind } for pid=12464 comm="syz.2.3141" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 2131.390155][T12293] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2136.281152][ T30] audit: type=1400 audit(2391.816:4450): avc: denied { create } for pid=12468 comm="syz.2.3142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 2141.441101][T12293] veth0_vlan: entered promiscuous mode [ 2141.483294][T12293] veth1_vlan: entered promiscuous mode [ 2141.664698][T12293] veth0_macvtap: entered promiscuous mode [ 2141.729045][T12293] veth1_macvtap: entered promiscuous mode [ 2141.914276][T12293] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2141.915988][T12293] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2141.917565][T12293] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2141.918580][T12293] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2143.161153][ T93] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2143.518770][ T93] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2143.833780][ T93] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2144.155048][ T93] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2147.523390][T12534] IPv6: NLM_F_CREATE should be specified when creating new route [ 2149.340073][ T93] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2149.481032][ T93] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2149.590765][ T93] bond0 (unregistering): Released all slaves [ 2150.205535][T12552] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2150.219872][T12552] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2150.369380][ T93] hsr_slave_0: left promiscuous mode [ 2150.487496][ T93] hsr_slave_1: left promiscuous mode [ 2150.729867][ T93] veth1_macvtap: left promiscuous mode [ 2150.730606][ T93] veth0_macvtap: left promiscuous mode [ 2150.733980][ T93] veth1_vlan: left promiscuous mode [ 2150.734751][ T93] veth0_vlan: left promiscuous mode [ 2152.065942][T12561] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2152.074390][T12561] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2152.702459][ T30] audit: type=1400 audit(2408.236:4451): avc: denied { create } for pid=12564 comm="syz.2.3157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 2152.710636][ T30] audit: type=1400 audit(2408.246:4452): avc: denied { bind } for pid=12564 comm="syz.2.3157" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 2156.788924][ T30] audit: type=1400 audit(2412.326:4453): avc: denied { create } for pid=12581 comm="syz.2.3159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=mctp_socket permissive=1 [ 2156.934204][ T30] audit: type=1400 audit(2412.466:4454): avc: denied { write } for pid=12581 comm="syz.2.3159" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 2157.030195][ T30] audit: type=1400 audit(2412.566:4455): avc: denied { bind } for pid=12581 comm="syz.2.3159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2164.379713][T12523] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2164.423959][T12523] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2166.101795][ T30] audit: type=1400 audit(2421.636:4456): avc: denied { ioctl } for pid=12625 comm="syz.2.3161" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0xaf00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 2167.733902][T12523] hsr_slave_0: entered promiscuous mode [ 2167.751968][T12523] hsr_slave_1: entered promiscuous mode [ 2167.831577][T12644] netlink: 'syz.2.3164': attribute type 10 has an invalid length. [ 2171.816052][T12523] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2171.903001][T12523] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2171.932526][T12523] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2171.974564][T12523] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2172.638122][T12666] netlink: 32 bytes leftover after parsing attributes in process `syz.2.3168'. [ 2174.595677][T12523] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2175.773195][T12694] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2175.794051][T12694] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2180.060177][T12722] netlink: 24 bytes leftover after parsing attributes in process `syz.2.3181'. [ 2184.343648][T12746] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3185'. [ 2184.348156][T12746] netlink: 8 bytes leftover after parsing attributes in process `syz.2.3185'. [ 2190.668769][T12523] veth0_vlan: entered promiscuous mode [ 2190.770639][T12523] veth1_vlan: entered promiscuous mode [ 2191.053575][T12523] veth0_macvtap: entered promiscuous mode [ 2191.123279][T12523] veth1_macvtap: entered promiscuous mode [ 2191.409686][T12523] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2191.410339][T12523] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2191.410682][T12523] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2191.411049][T12523] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2193.438130][T12339] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2193.645366][T12339] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2193.938337][T12339] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2194.264237][T12339] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2198.696597][T12339] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2198.752434][T12339] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2198.820157][T12339] bond0 (unregistering): Released all slaves [ 2199.217560][T12339] hsr_slave_0: left promiscuous mode [ 2199.285511][T12339] hsr_slave_1: left promiscuous mode [ 2199.620674][T12339] veth1_macvtap: left promiscuous mode [ 2199.630846][T12339] veth0_macvtap: left promiscuous mode [ 2199.632765][T12339] veth1_vlan: left promiscuous mode [ 2199.634436][T12339] veth0_vlan: left promiscuous mode [ 2207.085886][T12817] workqueue: Failed to create a rescuer kthread for wq "bond1": -EINTR [ 2212.044601][T12777] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 2212.092016][T12777] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 2215.362985][ T30] audit: type=1400 audit(2470.896:4457): avc: denied { map } for pid=12878 comm="syz.2.3213" path="/dev/zero" dev="devtmpfs" ino=6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:zero_device_t tclass=chr_file permissive=1 [ 2216.747528][T12777] hsr_slave_0: entered promiscuous mode [ 2216.751195][T12777] hsr_slave_1: entered promiscuous mode [ 2220.921891][T12777] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 2220.958934][T12777] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 2220.977486][T12777] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 2220.994806][T12777] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 2227.772631][T12777] 8021q: adding VLAN 0 to HW filter on device bond0 [ 2234.006805][ T30] audit: type=1400 audit(2489.536:4458): avc: denied { mount } for pid=12975 comm="syz.2.3228" name="/" dev="configfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 2234.018532][ T30] audit: type=1400 audit(2489.556:4459): avc: denied { search } for pid=12975 comm="syz.2.3228" name="/" dev="configfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2234.034473][ T30] audit: type=1400 audit(2489.556:4460): avc: denied { search } for pid=12975 comm="syz.2.3228" name="/" dev="configfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2234.050269][ T30] audit: type=1400 audit(2489.586:4461): avc: denied { read open } for pid=12975 comm="syz.2.3228" path="/" dev="configfs" ino=113 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 2235.249221][T12991] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2235.251815][T12991] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2238.180265][ T93] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2238.592988][ T93] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2238.927197][ T93] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2239.075902][T12777] veth0_vlan: entered promiscuous mode [ 2239.254256][ T93] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2239.448622][T12777] veth1_vlan: entered promiscuous mode [ 2240.548639][T12777] veth0_macvtap: entered promiscuous mode [ 2240.787887][T12777] veth1_macvtap: entered promiscuous mode [ 2244.672734][ T93] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 2244.831124][ T93] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 2244.872916][ T93] bond0 (unregistering): Released all slaves [ 2245.141597][ T93] hsr_slave_0: left promiscuous mode [ 2245.152135][ T93] hsr_slave_1: left promiscuous mode [ 2245.225500][ T93] veth1_macvtap: left promiscuous mode [ 2245.227943][ T93] veth0_macvtap: left promiscuous mode [ 2245.228817][ T93] veth1_vlan: left promiscuous mode [ 2245.229506][ T93] veth0_vlan: left promiscuous mode [ 2253.734807][T12777] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 2253.735477][T12777] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 2253.735645][T12777] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 2253.735803][T12777] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 2255.517274][T12339] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2255.830646][T12339] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2256.055075][T12339] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2256.400434][T12339] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 2258.227921][ T33] INFO: task kworker/0:2:962 blocked for more than 430 seconds. [ 2258.228486][ T33] Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 [ 2258.228920][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2258.229407][ T33] task:kworker/0:2 state:D stack:0 pid:962 tgid:962 ppid:2 task_flags:0x4208060 flags:0x00000010 [ 2258.244926][ T33] Workqueue: events rfkill_sync_work [ 2258.245425][ T33] Call trace: [ 2258.245650][ T33] __switch_to+0x208/0x4f4 (T) [ 2258.245875][ T33] __schedule+0xd34/0x3184 [ 2258.258225][ T30] audit: type=1400 audit(2513.786:4462): avc: denied { write } for pid=3307 comm="syz-executor" path="pipe:[2289]" dev="pipefs" ino=2289 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 2258.260298][ T33] schedule+0xd0/0x344 [ 2258.261223][ T33] schedule_preempt_disabled+0x18/0x2c [ 2258.262034][ T33] __mutex_lock+0x5d8/0x9d8 [ 2258.262832][ T33] mutex_lock_nested+0x24/0x30 [ 2258.263639][ T33] nfc_dev_down+0x2c/0x234 [ 2258.279500][ T33] nfc_rfkill_set_block+0x28/0xb8 [ 2258.279976][ T33] rfkill_set_block+0x160/0x3c4 [ 2258.280213][ T33] rfkill_sync+0x104/0x1ac [ 2258.280418][ T33] rfkill_sync_work+0x30/0x48 [ 2258.280620][ T33] process_one_work+0x7cc/0x18d4 [ 2258.280830][ T33] worker_thread+0x734/0xb84 [ 2258.281028][ T33] kthread+0x348/0x5fc [ 2258.281234][ T33] ret_from_fork+0x10/0x20 [ 2258.281761][ T33] INFO: task kworker/0:0:9537 blocked for more than 430 seconds. [ 2258.281979][ T33] Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 [ 2258.282182][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2258.282365][ T33] task:kworker/0:0 state:D stack:0 pid:9537 tgid:9537 ppid:2 task_flags:0x4208060 flags:0x00000010 [ 2258.282722][ T33] Workqueue: events rfkill_global_led_trigger_worker [ 2258.283079][ T33] Call trace: [ 2258.283270][ T33] __switch_to+0x208/0x4f4 (T) [ 2258.283476][ T33] __schedule+0xd34/0x3184 [ 2258.283674][ T33] schedule+0xd0/0x344 [ 2258.283871][ T33] schedule_preempt_disabled+0x18/0x2c [ 2258.284067][ T33] __mutex_lock+0x5d8/0x9d8 [ 2258.284274][ T33] mutex_lock_nested+0x24/0x30 [ 2258.284472][ T33] rfkill_global_led_trigger_worker+0x2c/0x10c [ 2258.284673][ T33] process_one_work+0x7cc/0x18d4 [ 2258.284872][ T33] worker_thread+0x734/0xb84 [ 2258.285068][ T33] kthread+0x348/0x5fc [ 2258.285280][ T33] ret_from_fork+0x10/0x20 [ 2258.285490][ T33] INFO: task syz.1.2865:10975 blocked for more than 430 seconds. [ 2258.285751][ T33] Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 [ 2258.285975][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2258.326934][ T33] task:syz.1.2865 state:D stack:0 pid:10975 tgid:10975 ppid:9362 task_flags:0x400040 flags:0x00000011 [ 2258.328645][ T33] Call trace: [ 2258.329339][ T33] __switch_to+0x208/0x4f4 (T) [ 2258.330184][ T33] __schedule+0xd34/0x3184 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 2258.333934][ T33] schedule+0xd0/0x344 [ 2258.334767][ T33] schedule_timeout+0x1ec/0x224 [ 2258.335569][ T33] __wait_for_common+0x1d0/0x3f8 [ 2258.336836][ T33] wait_for_completion+0x20/0x2c [ 2258.337678][ T33] __flush_work+0x488/0x954 [ 2258.347281][ T33] __cancel_work_sync+0xb0/0x108 [ 2258.348284][ T33] cancel_work_sync+0x14/0x20 [ 2258.349053][ T33] rfkill_unregister+0x70/0x240 [ 2258.349839][ T33] nfc_unregister_device+0x68/0x298 [ 2258.350599][ T33] nci_unregister_device+0x1bc/0x294 [ 2258.351439][ T33] virtual_ncidev_close+0x48/0xb0 [ 2258.352218][ T33] __fput+0x2c8/0x954 [ 2258.352939][ T33] ____fput+0x14/0x20 [ 2258.353652][ T33] task_work_run+0x128/0x210 [ 2258.354379][ T33] do_notify_resume+0x1dc/0x264 [ 2258.355142][ T33] el0_svc+0x118/0x198 [ 2258.355857][ T33] el0t_64_sync_handler+0x10c/0x138 [ 2258.357479][ T33] el0t_64_sync+0x198/0x19c [ 2258.358669][ T33] [ 2258.358669][ T33] Showing all locks held in the system: [ 2258.359758][ T33] 1 lock held by khungtaskd/33: [ 2258.360577][ T33] #0: ffff80008733fd60 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 2258.370422][ T33] 4 locks held by kworker/0:2/962: [ 2258.371296][ T33] #0: ffff00000dc28d48 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 2258.374213][ T33] #1: ffff80008ef97c80 ((work_completion)(&rfkill->sync_work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 2258.377968][ T33] #2: ffff800088acb288 (rfkill_global_mutex){+.+.}-{4:4}, at: rfkill_sync_work+0x28/0x48 [ 2258.390165][ T33] #3: ffff00001f942100 (&dev->mutex){....}-{4:4}, at: nfc_dev_down+0x2c/0x234 [ 2258.392981][ T33] 2 locks held by kworker/u8:6/1207: [ 2258.393768][ T33] #0: ffff00000dc31148 ((wq_completion)events_unbound){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 2258.398032][ T33] #1: ffff80008f447c80 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 2258.400987][ T33] 1 lock held by syslogd/3112: [ 2258.401816][ T33] 2 locks held by getty/3251: [ 2258.402584][ T33] #0: ffff000012e920a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 2258.405369][ T33] #1: ffff80008d5db2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e4/0xdb4 [ 2258.409666][ T33] 2 locks held by syz-executor/3307: [ 2258.409857][ T33] 3 locks held by kworker/0:0/9537: [ 2258.409994][ T33] #0: ffff00000dc28d48 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 2258.410546][ T33] #1: ffff80008dea7c80 ((work_completion)(&rfkill_global_led_trigger_work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 2258.411082][ T33] #2: ffff800088acb288 (rfkill_global_mutex){+.+.}-{4:4}, at: rfkill_global_led_trigger_worker+0x2c/0x10c [ 2258.411634][ T33] 1 lock held by syz.1.2865/10975: [ 2258.411766][ T33] #0: ffff00001f942100 (&dev->mutex){....}-{4:4}, at: nfc_unregister_device+0x48/0x298 [ 2258.412282][ T33] 6 locks held by kworker/u8:8/12339: [ 2258.412411][ T33] #0: ffff00000e162948 ((wq_completion)netns){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 2258.412959][ T33] #1: ffff8000a0397c80 (net_cleanup_work){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 2258.413492][ T33] #2: ffff800088890270 (pernet_ops_rwsem){++++}-{4:4}, at: cleanup_net+0xc8/0x750 [ 2258.414067][ T33] #3: ffff00001fe2a0e8 (&dev->mutex){....}-{4:4}, at: devlink_pernet_pre_exit+0x108/0x23c [ 2258.414568][ T33] #4: ffff00001fe2d250 (&devlink->lock_key#7){+.+.}-{4:4}, at: devlink_pernet_pre_exit+0x114/0x23c [ 2258.415261][ T33] #5: ffff8000888a4e68 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 2258.415804][ T33] 5 locks held by syz-executor/13016: [ 2258.415948][ T33] 1 lock held by udevd/13054: [ 2258.440078][ T33] 3 locks held by cmp/13063: [ 2258.441640][ T33] [ 2258.442337][ T33] ============================================= [ 2258.442337][ T33] [ 2258.443765][ T33] Kernel panic - not syncing: hung_task: blocked tasks [ 2258.444325][ T33] CPU: 0 UID: 0 PID: 33 Comm: khungtaskd Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT [ 2258.444643][ T33] Hardware name: linux,dummy-virt (DT) [ 2258.444832][ T33] Call trace: [ 2258.444967][ T33] show_stack+0x18/0x24 (C) [ 2258.445183][ T33] dump_stack_lvl+0x38/0xf4 [ 2258.445366][ T33] dump_stack+0x1c/0x28 [ 2258.445524][ T33] panic+0x5b0/0x664 [ 2258.445686][ T33] watchdog+0x4d8/0xdf8 [ 2258.445851][ T33] kthread+0x348/0x5fc [ 2258.446116][ T33] ret_from_fork+0x10/0x20 [ 2258.446832][ T33] SMP: stopping secondary CPUs [ 2258.448364][ T33] Kernel Offset: disabled [ 2258.448628][ T33] CPU features: 0x1040,000800d0,02000800,0400421b [ 2258.448953][ T33] Memory Limit: none [ 2258.449984][ T33] Rebooting in 86400 seconds.. VM DIAGNOSIS: 08:34:51 Registers: info registers vcpu 0 CPU#0 PC=ffff800080315df8 X00=000000000000033e X01=ffff800089a96518 X02=00000000000003fd X03=00000000000003fd X04=000000000002aea4 X05=00000000000003fd X06=0000000000000000 X07=0000000000000000 X08=ffff800080006140 X09=dfff800000000000 X10=ffff700010000c27 X11=1ffff00010000c27 X12=ffff700010000c28 X13=0000000000000028 X14=0000000000037b2c X15=0000000000000007 X16=c61d0000d953ffff X17=cd196dc8e7b8da12 X18=1fffe000023c863a X19=ffff800089846188 X20=0000000000000284 X21=0000000000000030 X22=ffff800080314b48 X23=ffff8000800060b0 X24=ffff800088f51cc0 X25=ffff800088f59cc0 X26=ffff800088caf7e0 X27=000000000000034a X28=ffff800089a33408 X29=ffff800080005f90 X30=ffff800080315e50 SP=ffff800080005f90 PSTATE=600000c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=3d48544150564544:000073253a73252b Q02=0000000000000000:ffff000000000000 Q03=0000000000000000:ffff00ff0000ff00 Q04=0000000000000000:00000000ff0f00f0 Q05=bcbc000030000003:bcbc000030000003 Q06=63627c2a6476787c:2a64767c2a64737c Q07=7361647c2a737369:63637c2a65686361 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffda469650:0000ffffda469650 Q17=ffffff80ffffffd0:0000ffffda469620 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff8000854bafac X00=ffff8000854bafa8 X01=0000000000000000 X02=0000000000000000 X03=1fffe00001c65791 X04=1fffe00001c65791 X05=ffff80008d687940 X06=ffff700011ad0f28 X07=0000000000000001 X08=0000000000000003 X09=dfff800000000000 X10=ffff700011ad0f28 X11=1ffff00011ad0f28 X12=ffff700011ad0f29 X13=0000000000000000 X14=ffff00006a0b3368 X15=ffff00006a0b2f54 X16=ffff80008d4d0000 X17=ffff7fffe2fd5000 X18=0000000000000000 X19=ffff800087382c30 X20=ffff00000e32bc80 X21=0000000000000003 X22=0000000000000028 X23=dfff800000000000 X24=ffff800087382c00 X25=0000000000000000 X26=0000000000000004 X27=ffff800087382c30 X28=1fffe0000d418947 X29=ffff80008d6878b0 X30=ffff8000804335ec SP=ffff80008d6878b0 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=2f2f2f2f2f2f2f2f:2f2f2f2f2f2f2f2f Q01=0000aaab02290ef0:00646e6100706d63 Q02=cccc000000000000:cc000000cc000000 Q03=0000000000000000:0000000000000000 Q04=3333333333333333:3333333333333333 Q05=0000000000000000:cc000000c000c000 Q06=0000ffff9512da98:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000fffff4576420:0000fffff4576420 Q17=ffffff80ffffffc8:0000fffff45763e0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000