Warning: Permanently added '[localhost]:28953' (ED25519) to the list of known hosts. [ 301.605178][ T28] audit: type=1400 audit(301.080:58): avc: denied { name_bind } for pid=3131 comm="sshd" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 302.479998][ T28] audit: type=1400 audit(301.950:59): avc: denied { execute } for pid=3133 comm="sh" name="syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 302.486335][ T28] audit: type=1400 audit(301.960:60): avc: denied { execute_no_trans } for pid=3133 comm="sh" path="/syz-fuzzer" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 1970/01/01 00:05:05 fuzzer started [ 311.181621][ T28] audit: type=1400 audit(310.640:61): avc: denied { node_bind } for pid=3133 comm="syz-fuzzer" saddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 311.285763][ T28] audit: type=1400 audit(310.760:62): avc: denied { name_bind } for pid=3133 comm="syz-fuzzer" src=6060 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 1970/01/01 00:05:10 dialing manager at localhost:30002 [ 313.324143][ T28] audit: type=1400 audit(312.800:63): avc: denied { mounton } for pid=3142 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1737 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 313.342728][ T28] audit: type=1400 audit(312.820:64): avc: denied { mount } for pid=3142 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 313.403399][ T3142] cgroup: Unknown subsys name 'net' [ 313.447650][ T28] audit: type=1400 audit(312.920:65): avc: denied { unmount } for pid=3142 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 314.112171][ T3142] cgroup: Unknown subsys name 'rlimit' [ 314.593804][ T28] audit: type=1400 audit(314.070:66): avc: denied { mounton } for pid=3142 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 314.609662][ T28] audit: type=1400 audit(314.090:67): avc: denied { mount } for pid=3142 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 314.649166][ T28] audit: type=1400 audit(314.120:68): avc: denied { setattr } for pid=3142 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 315.343018][ T3144] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 315.355958][ T28] audit: type=1400 audit(314.830:69): avc: denied { relabelto } for pid=3144 comm="mkswap" name="swap-file" dev="vda" ino=1740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 315.367171][ T28] audit: type=1400 audit(314.840:70): avc: denied { write } for pid=3144 comm="mkswap" path="/swap-file" dev="vda" ino=1740 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 315.519032][ T3142] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k 1970/01/01 00:05:15 syscalls: 3048 1970/01/01 00:05:15 code coverage: CONFIG_KCOV is not enabled 1970/01/01 00:05:15 comparison tracing: CONFIG_KCOV is not enabled 1970/01/01 00:05:15 extra coverage: CONFIG_KCOV is not enabled 1970/01/01 00:05:15 delay kcov mmap: CONFIG_KCOV is not enabled 1970/01/01 00:05:15 setuid sandbox: enabled 1970/01/01 00:05:15 namespace sandbox: enabled 1970/01/01 00:05:15 Android sandbox: enabled 1970/01/01 00:05:15 fault injection: enabled 1970/01/01 00:05:15 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 1970/01/01 00:05:15 net packet injection: enabled 1970/01/01 00:05:15 net device setup: enabled 1970/01/01 00:05:15 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 1970/01/01 00:05:15 devlink PCI setup: PCI device 0000:00:10.0 is not available 1970/01/01 00:05:15 NIC VF setup: PCI device 0000:00:11.0 is not available 1970/01/01 00:05:15 USB emulation: enabled 1970/01/01 00:05:15 hci packet injection: /dev/vhci does not exist 1970/01/01 00:05:15 wifi device emulation: /sys/class/mac80211_hwsim/ does not exist 1970/01/01 00:05:15 802.15.4 emulation: /sys/bus/platform/devices/mac802154_hwsim does not exist 1970/01/01 00:05:15 swap file: enabled 1970/01/01 00:05:15 fetching corpus: 0, signal 0/2000 (executing program) 1970/01/01 00:05:15 fetching corpus: 50, signal 122/4080 (executing program) 1970/01/01 00:05:15 fetching corpus: 100, signal 244/6139 (executing program) 1970/01/01 00:05:15 fetching corpus: 150, signal 361/8152 (executing program) 1970/01/01 00:05:15 fetching corpus: 200, signal 464/10146 (executing program) 1970/01/01 00:05:16 fetching corpus: 250, signal 558/12107 (executing program) 1970/01/01 00:05:16 fetching corpus: 300, signal 666/14013 (executing program) 1970/01/01 00:05:16 fetching corpus: 350, signal 772/14306 (executing program) 1970/01/01 00:05:16 fetching corpus: 400, signal 890/14306 (executing program) 1970/01/01 00:05:16 fetching corpus: 450, signal 990/14306 (executing program) 1970/01/01 00:05:16 fetching corpus: 500, signal 1106/14306 (executing program) 1970/01/01 00:05:16 fetching corpus: 550, signal 1203/14306 (executing program) 1970/01/01 00:05:16 fetching corpus: 600, signal 1301/14306 (executing program) 1970/01/01 00:05:16 fetching corpus: 650, signal 1394/14306 (executing program) 1970/01/01 00:05:16 fetching corpus: 700, signal 1497/14306 (executing program) 1970/01/01 00:05:17 fetching corpus: 750, signal 1589/14306 (executing program) 1970/01/01 00:05:17 fetching corpus: 800, signal 1695/14306 (executing program) 1970/01/01 00:05:17 fetching corpus: 850, signal 1804/14306 (executing program) 1970/01/01 00:05:17 fetching corpus: 900, signal 1915/14306 (executing program) 1970/01/01 00:05:17 fetching corpus: 950, signal 2006/14306 (executing program) 1970/01/01 00:05:17 fetching corpus: 1000, signal 2104/14306 (executing program) 1970/01/01 00:05:17 fetching corpus: 1050, signal 2207/14306 (executing program) 1970/01/01 00:05:17 fetching corpus: 1100, signal 2306/14306 (executing program) 1970/01/01 00:05:18 fetching corpus: 1150, signal 2398/14306 (executing program) 1970/01/01 00:05:18 fetching corpus: 1200, signal 2493/14306 (executing program) 1970/01/01 00:05:18 fetching corpus: 1250, signal 2584/14306 (executing program) 1970/01/01 00:05:18 fetching corpus: 1300, signal 2673/14306 (executing program) 1970/01/01 00:05:18 fetching corpus: 1350, signal 2771/14306 (executing program) 1970/01/01 00:05:18 fetching corpus: 1400, signal 2851/14306 (executing program) 1970/01/01 00:05:18 fetching corpus: 1450, signal 2955/14306 (executing program) 1970/01/01 00:05:18 fetching corpus: 1500, signal 3023/14306 (executing program) 1970/01/01 00:05:18 fetching corpus: 1550, signal 3107/14308 (executing program) 1970/01/01 00:05:19 fetching corpus: 1600, signal 3215/14308 (executing program) 1970/01/01 00:05:19 fetching corpus: 1650, signal 3294/14308 (executing program) 1970/01/01 00:05:19 fetching corpus: 1700, signal 3375/14308 (executing program) 1970/01/01 00:05:19 fetching corpus: 1750, signal 3466/14308 (executing program) 1970/01/01 00:05:19 fetching corpus: 1800, signal 3556/14308 (executing program) 1970/01/01 00:05:19 fetching corpus: 1850, signal 3648/14308 (executing program) 1970/01/01 00:05:19 fetching corpus: 1900, signal 3738/14308 (executing program) 1970/01/01 00:05:20 fetching corpus: 1950, signal 3844/14308 (executing program) 1970/01/01 00:05:20 fetching corpus: 2000, signal 3938/14308 (executing program) 1970/01/01 00:05:20 fetching corpus: 2050, signal 4026/14308 (executing program) 1970/01/01 00:05:20 fetching corpus: 2100, signal 4110/14309 (executing program) 1970/01/01 00:05:20 fetching corpus: 2150, signal 4194/14309 (executing program) 1970/01/01 00:05:20 fetching corpus: 2200, signal 4276/14309 (executing program) 1970/01/01 00:05:21 fetching corpus: 2250, signal 4367/14309 (executing program) 1970/01/01 00:05:21 fetching corpus: 2300, signal 4448/14309 (executing program) 1970/01/01 00:05:21 fetching corpus: 2350, signal 4533/14309 (executing program) 1970/01/01 00:05:21 fetching corpus: 2400, signal 4624/14309 (executing program) 1970/01/01 00:05:21 fetching corpus: 2450, signal 4735/14309 (executing program) 1970/01/01 00:05:21 fetching corpus: 2500, signal 4828/14309 (executing program) 1970/01/01 00:05:21 fetching corpus: 2550, signal 4907/14309 (executing program) 1970/01/01 00:05:21 fetching corpus: 2600, signal 4980/14309 (executing program) 1970/01/01 00:05:22 fetching corpus: 2650, signal 5058/14309 (executing program) 1970/01/01 00:05:22 fetching corpus: 2700, signal 5143/14309 (executing program) 1970/01/01 00:05:22 fetching corpus: 2750, signal 5224/14309 (executing program) 1970/01/01 00:05:22 fetching corpus: 2800, signal 5295/14309 (executing program) 1970/01/01 00:05:22 fetching corpus: 2850, signal 5373/14309 (executing program) 1970/01/01 00:05:22 fetching corpus: 2900, signal 5453/14309 (executing program) 1970/01/01 00:05:22 fetching corpus: 2950, signal 5538/14309 (executing program) 1970/01/01 00:05:22 fetching corpus: 3000, signal 5628/14309 (executing program) 1970/01/01 00:05:22 fetching corpus: 3050, signal 5704/14309 (executing program) 1970/01/01 00:05:22 fetching corpus: 3100, signal 5786/14309 (executing program) 1970/01/01 00:05:22 fetching corpus: 3150, signal 5863/14309 (executing program) 1970/01/01 00:05:23 fetching corpus: 3200, signal 5948/14309 (executing program) 1970/01/01 00:05:23 fetching corpus: 3250, signal 6032/14309 (executing program) 1970/01/01 00:05:23 fetching corpus: 3300, signal 6117/14309 (executing program) 1970/01/01 00:05:23 fetching corpus: 3350, signal 6207/14309 (executing program) 1970/01/01 00:05:23 fetching corpus: 3400, signal 6301/14309 (executing program) 1970/01/01 00:05:23 fetching corpus: 3450, signal 6372/14309 (executing program) 1970/01/01 00:05:23 fetching corpus: 3500, signal 6451/14309 (executing program) 1970/01/01 00:05:23 fetching corpus: 3550, signal 6530/14309 (executing program) 1970/01/01 00:05:23 fetching corpus: 3600, signal 6598/14309 (executing program) 1970/01/01 00:05:24 fetching corpus: 3650, signal 6675/14309 (executing program) 1970/01/01 00:05:24 fetching corpus: 3700, signal 6754/14309 (executing program) 1970/01/01 00:05:24 fetching corpus: 3750, signal 6825/14309 (executing program) 1970/01/01 00:05:24 fetching corpus: 3800, signal 6928/14309 (executing program) 1970/01/01 00:05:24 fetching corpus: 3850, signal 7022/14309 (executing program) 1970/01/01 00:05:25 fetching corpus: 3900, signal 7089/14309 (executing program) 1970/01/01 00:05:25 fetching corpus: 3949, signal 7157/14309 (executing program) 1970/01/01 00:05:25 fetching corpus: 3999, signal 7235/14309 (executing program) 1970/01/01 00:05:25 fetching corpus: 4049, signal 7330/14309 (executing program) 1970/01/01 00:05:25 fetching corpus: 4099, signal 7404/14309 (executing program) 1970/01/01 00:05:25 fetching corpus: 4149, signal 7484/14309 (executing program) 1970/01/01 00:05:25 fetching corpus: 4199, signal 7568/14309 (executing program) 1970/01/01 00:05:25 fetching corpus: 4249, signal 7647/14309 (executing program) 1970/01/01 00:05:26 fetching corpus: 4299, signal 7738/14309 (executing program) 1970/01/01 00:05:26 fetching corpus: 4349, signal 7811/14309 (executing program) 1970/01/01 00:05:26 fetching corpus: 4399, signal 7895/14309 (executing program) 1970/01/01 00:05:26 fetching corpus: 4449, signal 7971/14309 (executing program) 1970/01/01 00:05:26 fetching corpus: 4499, signal 8043/14309 (executing program) 1970/01/01 00:05:26 fetching corpus: 4549, signal 8112/14309 (executing program) 1970/01/01 00:05:26 fetching corpus: 4599, signal 8213/14310 (executing program) 1970/01/01 00:05:26 fetching corpus: 4649, signal 8296/14310 (executing program) 1970/01/01 00:05:26 fetching corpus: 4699, signal 8368/14310 (executing program) 1970/01/01 00:05:27 fetching corpus: 4749, signal 8443/14310 (executing program) 1970/01/01 00:05:27 fetching corpus: 4799, signal 8534/14310 (executing program) 1970/01/01 00:05:27 fetching corpus: 4849, signal 8623/14310 (executing program) 1970/01/01 00:05:27 fetching corpus: 4899, signal 8698/14310 (executing program) 1970/01/01 00:05:27 fetching corpus: 4949, signal 8781/14310 (executing program) 1970/01/01 00:05:27 fetching corpus: 4999, signal 8862/14310 (executing program) 1970/01/01 00:05:27 fetching corpus: 5049, signal 8944/14310 (executing program) 1970/01/01 00:05:27 fetching corpus: 5099, signal 9047/14310 (executing program) 1970/01/01 00:05:28 fetching corpus: 5149, signal 9114/14310 (executing program) 1970/01/01 00:05:28 fetching corpus: 5199, signal 9199/14310 (executing program) 1970/01/01 00:05:28 fetching corpus: 5249, signal 9263/14310 (executing program) 1970/01/01 00:05:28 fetching corpus: 5299, signal 9334/14310 (executing program) 1970/01/01 00:05:28 fetching corpus: 5349, signal 9411/14310 (executing program) 1970/01/01 00:05:28 fetching corpus: 5399, signal 9484/14310 (executing program) 1970/01/01 00:05:28 fetching corpus: 5449, signal 9555/14310 (executing program) 1970/01/01 00:05:29 fetching corpus: 5499, signal 9628/14310 (executing program) 1970/01/01 00:05:29 fetching corpus: 5549, signal 9693/14310 (executing program) 1970/01/01 00:05:29 fetching corpus: 5599, signal 9764/14310 (executing program) 1970/01/01 00:05:29 fetching corpus: 5649, signal 9832/14310 (executing program) 1970/01/01 00:05:29 fetching corpus: 5698, signal 9914/14310 (executing program) 1970/01/01 00:05:30 fetching corpus: 5748, signal 9998/14310 (executing program) 1970/01/01 00:05:30 fetching corpus: 5798, signal 10066/14310 (executing program) 1970/01/01 00:05:30 fetching corpus: 5848, signal 10131/14310 (executing program) 1970/01/01 00:05:30 fetching corpus: 5898, signal 10208/14310 (executing program) 1970/01/01 00:05:30 fetching corpus: 5948, signal 10284/14310 (executing program) 1970/01/01 00:05:30 fetching corpus: 5998, signal 10358/14310 (executing program) 1970/01/01 00:05:30 fetching corpus: 6048, signal 10435/14310 (executing program) 1970/01/01 00:05:30 fetching corpus: 6098, signal 10510/14310 (executing program) 1970/01/01 00:05:30 fetching corpus: 6148, signal 10591/14310 (executing program) 1970/01/01 00:05:31 fetching corpus: 6198, signal 10664/14310 (executing program) 1970/01/01 00:05:31 fetching corpus: 6248, signal 10747/14310 (executing program) 1970/01/01 00:05:31 fetching corpus: 6298, signal 10831/14310 (executing program) 1970/01/01 00:05:31 fetching corpus: 6348, signal 10894/14310 (executing program) 1970/01/01 00:05:31 fetching corpus: 6398, signal 10958/14310 (executing program) 1970/01/01 00:05:31 fetching corpus: 6448, signal 11034/14310 (executing program) 1970/01/01 00:05:31 fetching corpus: 6498, signal 11120/14310 (executing program) 1970/01/01 00:05:31 fetching corpus: 6548, signal 11199/14310 (executing program) 1970/01/01 00:05:31 fetching corpus: 6598, signal 11273/14310 (executing program) 1970/01/01 00:05:31 fetching corpus: 6648, signal 11342/14310 (executing program) 1970/01/01 00:05:32 fetching corpus: 6698, signal 11409/14310 (executing program) 1970/01/01 00:05:32 fetching corpus: 6748, signal 11493/14310 (executing program) 1970/01/01 00:05:32 fetching corpus: 6798, signal 11558/14310 (executing program) 1970/01/01 00:05:32 fetching corpus: 6848, signal 11627/14310 (executing program) 1970/01/01 00:05:32 fetching corpus: 6898, signal 11699/14310 (executing program) 1970/01/01 00:05:32 fetching corpus: 6948, signal 11770/14310 (executing program) 1970/01/01 00:05:32 fetching corpus: 6998, signal 11839/14310 (executing program) 1970/01/01 00:05:32 fetching corpus: 7048, signal 11902/14310 (executing program) 1970/01/01 00:05:33 fetching corpus: 7098, signal 11977/14310 (executing program) 1970/01/01 00:05:33 fetching corpus: 7148, signal 12038/14310 (executing program) 1970/01/01 00:05:33 fetching corpus: 7198, signal 12112/14310 (executing program) 1970/01/01 00:05:33 fetching corpus: 7247, signal 12192/14310 (executing program) 1970/01/01 00:05:33 fetching corpus: 7297, signal 12262/14310 (executing program) 1970/01/01 00:05:33 fetching corpus: 7347, signal 12330/14310 (executing program) 1970/01/01 00:05:33 fetching corpus: 7397, signal 12400/14310 (executing program) 1970/01/01 00:05:34 fetching corpus: 7447, signal 12466/14310 (executing program) 1970/01/01 00:05:34 fetching corpus: 7497, signal 12532/14310 (executing program) 1970/01/01 00:05:34 fetching corpus: 7547, signal 12602/14310 (executing program) 1970/01/01 00:05:34 fetching corpus: 7597, signal 12667/14310 (executing program) 1970/01/01 00:05:34 fetching corpus: 7647, signal 12731/14310 (executing program) 1970/01/01 00:05:35 fetching corpus: 7697, signal 12807/14310 (executing program) 1970/01/01 00:05:35 fetching corpus: 7747, signal 12874/14310 (executing program) 1970/01/01 00:05:35 fetching corpus: 7797, signal 12954/14310 (executing program) 1970/01/01 00:05:35 fetching corpus: 7847, signal 13048/14310 (executing program) 1970/01/01 00:05:35 fetching corpus: 7897, signal 13146/14310 (executing program) 1970/01/01 00:05:35 fetching corpus: 7947, signal 13213/14310 (executing program) 1970/01/01 00:05:36 fetching corpus: 7997, signal 13295/14310 (executing program) 1970/01/01 00:05:36 fetching corpus: 8047, signal 13394/14310 (executing program) 1970/01/01 00:05:36 fetching corpus: 8097, signal 13456/14310 (executing program) 1970/01/01 00:05:36 fetching corpus: 8147, signal 13530/14310 (executing program) 1970/01/01 00:05:36 fetching corpus: 8197, signal 13602/14310 (executing program) 1970/01/01 00:05:36 fetching corpus: 8247, signal 13673/14310 (executing program) 1970/01/01 00:05:36 fetching corpus: 8297, signal 13762/14310 (executing program) 1970/01/01 00:05:36 fetching corpus: 8347, signal 13827/14310 (executing program) 1970/01/01 00:05:36 fetching corpus: 8397, signal 13892/14314 (executing program) 1970/01/01 00:05:36 fetching corpus: 8447, signal 13960/14314 (executing program) 1970/01/01 00:05:37 fetching corpus: 8497, signal 14023/14314 (executing program) 1970/01/01 00:05:37 fetching corpus: 8547, signal 14092/14314 (executing program) 1970/01/01 00:05:37 fetching corpus: 8597, signal 14163/14314 (executing program) 1970/01/01 00:05:37 fetching corpus: 8641, signal 14236/14314 (executing program) 1970/01/01 00:05:37 fetching corpus: 8641, signal 14236/14314 (executing program) 1970/01/01 00:06:41 starting 2 fuzzer processes 00:06:41 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x20bc0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:06:42 executing program 1: r0 = openat$mixer(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = socket(0xa, 0x2, 0x0) dup2(r0, r1) ioctl$FS_IOC_GETFLAGS(r1, 0x80046601, &(0x7f00000000c0)) [ 402.801657][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 402.801809][ T28] audit: type=1400 audit(402.280:73): avc: denied { execmem } for pid=3145 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 402.946832][ T28] audit: type=1400 audit(402.420:74): avc: denied { mounton } for pid=3147 comm="syz-executor.0" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 402.952396][ T28] audit: type=1400 audit(402.430:75): avc: denied { mount } for pid=3147 comm="syz-executor.0" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 402.974462][ T28] audit: type=1400 audit(402.450:76): avc: denied { read } for pid=3147 comm="syz-executor.0" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 402.988853][ T28] audit: type=1400 audit(402.460:77): avc: denied { open } for pid=3147 comm="syz-executor.0" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 403.014307][ T28] audit: type=1400 audit(402.490:78): avc: denied { mounton } for pid=3147 comm="syz-executor.0" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 403.119825][ T28] audit: type=1400 audit(402.600:79): avc: denied { module_request } for pid=3147 comm="syz-executor.0" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 403.593635][ T28] audit: type=1400 audit(403.070:80): avc: denied { sys_module } for pid=3147 comm="syz-executor.0" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 414.499733][ T3148] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 414.557565][ T3147] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 414.623020][ T3148] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 414.665909][ T3147] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 420.168906][ T3147] hsr_slave_0: entered promiscuous mode [ 420.261520][ T3147] hsr_slave_1: entered promiscuous mode [ 421.607197][ T3148] hsr_slave_0: entered promiscuous mode [ 421.730230][ T3148] hsr_slave_1: entered promiscuous mode [ 421.798628][ T3148] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 421.800942][ T3148] Cannot create hsr debugfs directory [ 425.614118][ T28] audit: type=1400 audit(425.090:81): avc: denied { create } for pid=3147 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 425.627120][ T28] audit: type=1400 audit(425.100:82): avc: denied { write } for pid=3147 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 425.667715][ T28] audit: type=1400 audit(425.120:83): avc: denied { read } for pid=3147 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 425.714359][ T3147] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 425.870258][ T3147] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 426.272301][ T3147] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 426.400971][ T3147] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 427.109338][ T3148] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 427.161755][ T3148] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 427.330349][ T3148] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 427.498218][ T3148] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 433.312815][ T3147] 8021q: adding VLAN 0 to HW filter on device bond0 [ 433.674015][ T3148] 8021q: adding VLAN 0 to HW filter on device bond0 [ 453.711236][ T3148] veth0_vlan: entered promiscuous mode [ 453.973157][ T3147] veth0_vlan: entered promiscuous mode [ 454.095857][ T3148] veth1_vlan: entered promiscuous mode [ 454.484508][ T3147] veth1_vlan: entered promiscuous mode [ 454.991172][ T3148] veth0_macvtap: entered promiscuous mode [ 455.120396][ T3148] veth1_macvtap: entered promiscuous mode [ 455.460467][ T3147] veth0_macvtap: entered promiscuous mode [ 455.806834][ T3147] veth1_macvtap: entered promiscuous mode [ 456.362273][ T3148] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.364333][ T3148] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.373701][ T3148] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.377074][ T3148] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.534077][ T3147] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.536503][ T3147] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.537125][ T3147] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.537747][ T3147] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 457.777865][ T28] audit: type=1400 audit(457.240:84): avc: denied { mounton } for pid=3148 comm="syz-executor.1" path="/dev/binderfs" dev="devtmpfs" ino=1517 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 457.938898][ T28] audit: type=1400 audit(457.350:85): avc: denied { mount } for pid=3148 comm="syz-executor.1" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 459.326190][ T28] audit: type=1400 audit(458.790:86): avc: denied { read write } for pid=3148 comm="syz-executor.1" name="loop1" dev="devtmpfs" ino=641 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 459.327820][ T28] audit: type=1400 audit(458.800:87): avc: denied { open } for pid=3148 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=641 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 459.378389][ T28] audit: type=1400 audit(458.800:88): avc: denied { ioctl } for pid=3148 comm="syz-executor.1" path="/dev/loop1" dev="devtmpfs" ino=641 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 00:07:40 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x20bc0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:07:40 executing program 1: r0 = openat$mixer(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = socket(0xa, 0x2, 0x0) dup2(r0, r1) ioctl$FS_IOC_GETFLAGS(r1, 0x80046601, &(0x7f00000000c0)) 00:07:42 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x20bc0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:07:42 executing program 1: r0 = openat$mixer(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = socket(0xa, 0x2, 0x0) dup2(r0, r1) ioctl$FS_IOC_GETFLAGS(r1, 0x80046601, &(0x7f00000000c0)) 00:07:44 executing program 0: r0 = open(&(0x7f0000000080)='./file0\x00', 0x20bc0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_PAUSE_GET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:07:44 executing program 1: r0 = openat$mixer(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = socket(0xa, 0x2, 0x0) dup2(r0, r1) ioctl$FS_IOC_GETFLAGS(r1, 0x80046601, &(0x7f00000000c0)) 00:07:45 executing program 0: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = dup2(r0, r0) ioctl$IOMMU_TEST_OP_DESTROY_ACCESS_PAGES(r1, 0x3ba0, 0x0) 00:07:46 executing program 1: mount$binderfs(&(0x7f0000000000), &(0x7f0000000040)='./binderfs\x00', &(0x7f0000000080), 0x2800000, &(0x7f0000002100)) [ 467.627210][ T28] audit: type=1400 audit(467.100:89): avc: denied { read write } for pid=3310 comm="syz-executor.0" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 467.698881][ T28] audit: type=1400 audit(467.160:90): avc: denied { open } for pid=3310 comm="syz-executor.0" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 467.787128][ T28] audit: type=1400 audit(467.260:91): avc: denied { ioctl } for pid=3310 comm="syz-executor.0" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0x3ba0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 00:07:47 executing program 0: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = dup2(r0, r0) ioctl$IOMMU_TEST_OP_DESTROY_ACCESS_PAGES(r1, 0x3ba0, 0x0) [ 468.976781][ T28] audit: type=1400 audit(468.440:92): avc: denied { mounton } for pid=3312 comm="syz-executor.1" path="/dev/binderfs" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 00:07:48 executing program 1: mount$binderfs(&(0x7f0000000000), &(0x7f0000000040)='./binderfs\x00', &(0x7f0000000080), 0x2800000, &(0x7f0000002100)) 00:07:49 executing program 0: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = dup2(r0, r0) ioctl$IOMMU_TEST_OP_DESTROY_ACCESS_PAGES(r1, 0x3ba0, 0x0) 00:07:50 executing program 0: r0 = openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) r1 = dup2(r0, r0) ioctl$IOMMU_TEST_OP_DESTROY_ACCESS_PAGES(r1, 0x3ba0, 0x0) 00:07:51 executing program 1: mount$binderfs(&(0x7f0000000000), &(0x7f0000000040)='./binderfs\x00', &(0x7f0000000080), 0x2800000, &(0x7f0000002100)) 00:07:52 executing program 0: r0 = openat$null(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$UHID_INPUT2(r0, 0x0, 0x0) 00:07:53 executing program 1: mount$binderfs(&(0x7f0000000000), &(0x7f0000000040)='./binderfs\x00', &(0x7f0000000080), 0x2800000, &(0x7f0000002100)) 00:07:54 executing program 0: r0 = openat$null(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$UHID_INPUT2(r0, 0x0, 0x0) 00:07:54 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 00:07:55 executing program 0: r0 = openat$null(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$UHID_INPUT2(r0, 0x0, 0x0) 00:07:56 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 00:07:57 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 00:07:57 executing program 0: r0 = openat$null(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) write$UHID_INPUT2(r0, 0x0, 0x0) 00:07:58 executing program 1: r0 = openat$dlm_plock(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 00:07:58 executing program 0: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f0000002540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:07:59 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:08:00 executing program 0: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f0000002540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:08:01 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:08:01 executing program 0: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f0000002540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:08:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:08:03 executing program 0: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) write$binfmt_elf64(r0, &(0x7f0000002540)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 00:08:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 00:08:05 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086405, &(0x7f0000000040)) 00:08:06 executing program 1: r0 = openat$full(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) read$hiddev(r0, 0x0, 0x0) [ 487.289369][ T28] audit: type=1400 audit(486.770:93): avc: denied { read } for pid=3359 comm="syz-executor.0" name="card0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 487.350072][ T28] audit: type=1400 audit(486.770:94): avc: denied { open } for pid=3359 comm="syz-executor.0" path="/dev/dri/card0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 487.518797][ T28] audit: type=1400 audit(486.990:95): avc: denied { ioctl } for pid=3359 comm="syz-executor.0" path="/dev/dri/card0" dev="devtmpfs" ino=620 ioctlcmd=0x6405 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 00:08:07 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086405, &(0x7f0000000040)) 00:08:08 executing program 1: r0 = openat$full(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) read$hiddev(r0, 0x0, 0x0) 00:08:09 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086405, &(0x7f0000000040)) 00:08:09 executing program 1: r0 = openat$full(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) read$hiddev(r0, 0x0, 0x0) 00:08:10 executing program 0: r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_NEW_CTX(r0, 0x40086405, &(0x7f0000000040)) 00:08:11 executing program 1: r0 = openat$full(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) read$hiddev(r0, 0x0, 0x0) 00:08:11 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 00:08:12 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) write$binfmt_misc(r0, 0x0, 0xbcf99959a36b1dbf) [ 493.902258][ T28] audit: type=1400 audit(493.380:96): avc: denied { create } for pid=3376 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 493.920355][ T3377] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 494.005979][ T28] audit: type=1400 audit(493.460:97): avc: denied { ioctl } for pid=3376 comm="syz-executor.0" path="socket:[3730]" dev="sockfs" ino=3730 ioctlcmd=0x5411 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 00:08:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 00:08:14 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) write$binfmt_misc(r0, 0x0, 0xbcf99959a36b1dbf) 00:08:15 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 00:08:15 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) write$binfmt_misc(r0, 0x0, 0xbcf99959a36b1dbf) 00:08:16 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 00:08:16 executing program 1: r0 = socket$nl_audit(0x10, 0x3, 0x9) write$binfmt_misc(r0, 0x0, 0xbcf99959a36b1dbf) 00:08:16 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0xc0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000180)=""/64) 00:08:17 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) write$FUSE_INIT(r2, 0x0, 0x0) [ 499.056279][ T28] audit: type=1400 audit(498.530:98): avc: denied { create } for pid=3393 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 499.100797][ T28] audit: type=1400 audit(498.580:99): avc: denied { write } for pid=3393 comm="syz-executor.1" path="socket:[4447]" dev="sockfs" ino=4447 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 00:08:18 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) write$FUSE_INIT(r2, 0x0, 0x0) 00:08:18 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0xc0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000180)=""/64) 00:08:20 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) write$FUSE_INIT(r2, 0x0, 0x0) 00:08:20 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0xc0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000180)=""/64) 00:08:21 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0xc0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000180)=""/64) 00:08:21 executing program 1: socketpair(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) r2 = dup3(r1, r0, 0x0) write$FUSE_INIT(r2, 0x0, 0x0) 00:08:22 executing program 1: r0 = socket(0x1d, 0x2, 0x6) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:08:22 executing program 0: r0 = openat$cachefiles(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) [ 504.463287][ T28] audit: type=1400 audit(503.930:100): avc: denied { create } for pid=3408 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 504.555928][ T28] audit: type=1400 audit(504.030:101): avc: denied { write } for pid=3408 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 504.762108][ T28] audit: type=1400 audit(504.230:102): avc: denied { read } for pid=3409 comm="syz-executor.0" name="cachefiles" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cachefiles_device_t tclass=chr_file permissive=1 [ 504.788348][ T28] audit: type=1400 audit(504.250:103): avc: denied { open } for pid=3409 comm="syz-executor.0" path="/dev/cachefiles" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cachefiles_device_t tclass=chr_file permissive=1 00:08:24 executing program 1: r0 = socket(0x1d, 0x2, 0x6) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:08:24 executing program 0: r0 = openat$cachefiles(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 00:08:25 executing program 1: r0 = socket(0x1d, 0x2, 0x6) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:08:26 executing program 0: r0 = openat$cachefiles(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 00:08:27 executing program 1: r0 = socket(0x1d, 0x2, 0x6) sendmsg$NFT_MSG_GETCHAIN(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 00:08:27 executing program 0: r0 = openat$cachefiles(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) openat$vhost_vsock(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) 00:08:28 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000600)=ANY=[], 0x3c}}, 0x0) 00:08:29 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f00000003c0)=0x80) dup2(r0, r1) sendmsg$NL80211_CMD_SET_CQM(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 00:08:30 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) quotactl_fd$Q_SYNC(r0, 0xffffffff80000600, 0x0, 0x0) 00:08:31 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f00000003c0)=0x80) dup2(r0, r1) sendmsg$NL80211_CMD_SET_CQM(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 00:08:31 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) quotactl_fd$Q_SYNC(r0, 0xffffffff80000600, 0x0, 0x0) 00:08:32 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f00000003c0)=0x80) dup2(r0, r1) sendmsg$NL80211_CMD_SET_CQM(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 00:08:32 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) quotactl_fd$Q_SYNC(r0, 0xffffffff80000600, 0x0, 0x0) 00:08:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f00000003c0)=0x80) dup2(r0, r1) sendmsg$NL80211_CMD_SET_CQM(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) 00:08:34 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) quotactl_fd$Q_SYNC(r0, 0xffffffff80000600, 0x0, 0x0) 00:08:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_crypto(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) [ 516.147192][ T28] audit: type=1400 audit(515.620:104): avc: denied { create } for pid=3445 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 516.320681][ T28] audit: type=1400 audit(515.790:105): avc: denied { bind } for pid=3445 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 00:08:35 executing program 1: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = openat$binder_debug(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$BLKREPORTZONE(r2, 0xc0101282, 0x0) [ 516.427158][ T28] audit: type=1400 audit(515.900:106): avc: denied { accept } for pid=3445 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 516.489356][ T28] audit: type=1400 audit(515.970:107): avc: denied { write } for pid=3445 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 00:08:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_crypto(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) [ 517.503102][ T28] audit: type=1400 audit(516.980:108): avc: denied { read } for pid=3448 comm="syz-executor.1" name="loop-control" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 517.504360][ T28] audit: type=1400 audit(516.980:109): avc: denied { open } for pid=3448 comm="syz-executor.1" path="/dev/loop-control" dev="devtmpfs" ino=639 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 517.569373][ T28] audit: type=1400 audit(517.040:110): avc: denied { ioctl } for pid=3448 comm="syz-executor.1" path="/dev/loop-control" dev="devtmpfs" ino=639 ioctlcmd=0x1282 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 00:08:37 executing program 1: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = openat$binder_debug(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$BLKREPORTZONE(r2, 0xc0101282, 0x0) 00:08:37 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_crypto(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 00:08:38 executing program 1: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = openat$binder_debug(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$BLKREPORTZONE(r2, 0xc0101282, 0x0) 00:08:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'streebog512-generic\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) sendmsg$nl_crypto(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={0x0}}, 0x0) 00:08:39 executing program 1: r0 = openat$loop_ctrl(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = openat$binder_debug(0xffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/stats\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$BLKREPORTZONE(r2, 0xc0101282, 0x0) 00:08:40 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x804810, &(0x7f00000001c0), 0x4, 0x756, &(0x7f00000002c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:08:41 executing program 1: mknod$loop(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x403010, 0x0) mount$cgroup(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x40000, 0x0) [ 523.318482][ T28] audit: type=1400 audit(522.790:111): avc: denied { mounton } for pid=3464 comm="syz-executor.1" path="/syzkaller-testdir1503001253/syzkaller.Hc55aT/41/file1" dev="vda" ino=1753 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 523.336203][ T28] audit: type=1400 audit(522.810:112): avc: denied { mounton } for pid=3464 comm="syz-executor.1" path="/syzkaller-testdir1503001253/syzkaller.Hc55aT/41/file1" dev="devtmpfs" ino=640 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 00:08:42 executing program 1: mknod$loop(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x403010, 0x0) mount$cgroup(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x40000, 0x0) [ 523.536542][ T28] audit: type=1400 audit(522.990:113): avc: denied { unmount } for pid=3148 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 523.976768][ T3463] loop0: detected capacity change from 0 to 2048 00:08:44 executing program 1: mknod$loop(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x403010, 0x0) mount$cgroup(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x40000, 0x0) [ 524.746782][ T3463] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 524.761988][ T28] audit: type=1400 audit(524.230:114): avc: denied { mount } for pid=3462 comm="syz-executor.0" name="/" dev="loop0" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 524.911905][ T28] audit: type=1400 audit(524.390:115): avc: denied { write } for pid=3462 comm="syz-executor.0" name="file0" dev="loop0" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 00:08:44 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x804810, &(0x7f00000001c0), 0x4, 0x756, &(0x7f00000002c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 525.090417][ T28] audit: type=1400 audit(524.570:116): avc: denied { unmount } for pid=3147 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 525.169610][ T3147] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:08:45 executing program 1: mknod$loop(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x403010, 0x0) mount$cgroup(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x40000, 0x0) 00:08:46 executing program 1: mknod$loop(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x403010, 0x0) mount$cgroup(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x40000, 0x0) [ 527.733832][ T3476] loop0: detected capacity change from 0 to 2048 [ 528.213279][ T3476] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 00:08:48 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x804810, &(0x7f00000001c0), 0x4, 0x756, &(0x7f00000002c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) 00:08:48 executing program 1: mknod$loop(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x403010, 0x0) mount$cgroup(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x40000, 0x0) [ 528.841502][ T3147] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:08:49 executing program 1: mknod$loop(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) mount$fuseblk(&(0x7f00000001c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x403010, 0x0) mount$cgroup(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x40000, 0x0) 00:08:50 executing program 1: setuid(0xee01) openat$dlm_monitor(0xffffff9c, &(0x7f00000003c0), 0x0, 0x0) [ 531.449643][ T3486] loop0: detected capacity change from 0 to 2048 [ 532.030606][ T3486] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 00:08:51 executing program 1: setuid(0xee01) openat$dlm_monitor(0xffffff9c, &(0x7f00000003c0), 0x0, 0x0) 00:08:52 executing program 0: syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x804810, &(0x7f00000001c0), 0x4, 0x756, &(0x7f00000002c0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000240)={0x1, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0}) [ 532.888139][ T3147] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. 00:08:53 executing program 1: setuid(0xee01) openat$dlm_monitor(0xffffff9c, &(0x7f00000003c0), 0x0, 0x0) 00:08:54 executing program 1: setuid(0xee01) openat$dlm_monitor(0xffffff9c, &(0x7f00000003c0), 0x0, 0x0) [ 535.333663][ T3496] loop0: detected capacity change from 0 to 2048 [ 535.712858][ T3496] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. 00:08:55 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x89a2, &(0x7f0000000100)) 00:08:55 executing program 0: r0 = openat$tun(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$TCSETAF(r1, 0x5408, 0x0) [ 536.593557][ T3147] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 538.260542][ T28] audit: type=1400 audit(537.730:117): avc: denied { create } for pid=3504 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 00:08:57 executing program 0: r0 = openat$tun(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$TCSETAF(r1, 0x5408, 0x0) [ 538.392452][ T28] audit: type=1400 audit(537.870:118): avc: denied { ioctl } for pid=3504 comm="syz-executor.1" path="socket:[4577]" dev="sockfs" ino=4577 ioctlcmd=0x89a2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 00:08:59 executing program 0: r0 = openat$tun(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$TCSETAF(r1, 0x5408, 0x0) 00:09:00 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x89a2, &(0x7f0000000100)) 00:09:01 executing program 0: r0 = openat$tun(0xffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$TCSETAF(r1, 0x5408, 0x0) 00:09:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0xd, &(0x7f0000000180)="3b6c3e27e8cfdda86afa8d2c0497a39c", 0x10) 00:09:04 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x89a2, &(0x7f0000000100)) 00:09:07 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0xd, &(0x7f0000000180)="3b6c3e27e8cfdda86afa8d2c0497a39c", 0x10) 00:09:08 executing program 1: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$sock_SIOCGIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r0, 0x89a2, &(0x7f0000000100)) 00:09:11 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0xd, &(0x7f0000000180)="3b6c3e27e8cfdda86afa8d2c0497a39c", 0x10) 00:09:13 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:14 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0xd, &(0x7f0000000180)="3b6c3e27e8cfdda86afa8d2c0497a39c", 0x10) 00:09:15 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:16 executing program 0: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:09:17 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) [ 558.266271][ T28] audit: type=1400 audit(557.740:119): avc: denied { create } for pid=3544 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 558.282051][ T28] audit: type=1400 audit(557.760:120): avc: denied { write } for pid=3544 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 00:09:18 executing program 0: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:09:18 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 00:09:19 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, 0x0, 0x0) 00:09:19 executing program 0: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:09:20 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, 0x0, 0x0) 00:09:21 executing program 0: r0 = openat$dlm_monitor(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) close(r0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 00:09:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, 0x0, 0x0) 00:09:22 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) 00:09:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, 0x0, 0x0) [ 565.763368][ T28] audit: type=1400 audit(565.240:121): avc: denied { ioctl } for pid=3562 comm="syz-executor.0" path="socket:[4644]" dev="sockfs" ino=4644 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 00:09:25 executing program 1: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0x5f, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16, @ANYBLOB="100025bd7000fcdbdf256a0000000c0035ce49704b1819a2b199000080ff00420000000a00060008021100000000000500d2000f002c5300000a000600080211000001002da3000a00060008021100000100000400d2000d000000f5ffd1000600000048ce7559080211000000000a0006000802119da04634e5f8f84900000000000002221efdf6"], 0x74}, 0x1, 0x0, 0x0, 0x20000010}, 0xc00) [ 566.470107][ T3567] ================================================================== [ 566.471606][ T3567] BUG: KASAN: slab-out-of-bounds in dsa_user_changeupper+0x3bc/0x49c [ 566.473281][ T3567] Read of size 8 at addr ffff00000bdc4c70 by task syz-executor.0/3567 [ 566.473708][ T3567] [ 566.474866][ T3567] CPU: 0 PID: 3567 Comm: syz-executor.0 Not tainted 6.7.0-syzkaller-10085-g1b1934dbbdcf #0 [ 566.475748][ T3567] Hardware name: linux,dummy-virt (DT) [ 566.476791][ T3567] Call trace: [ 566.477062][ T3567] dump_backtrace+0x9c/0x11c [ 566.477400][ T3567] show_stack+0x18/0x24 [ 566.477644][ T3567] dump_stack_lvl+0x74/0xd4 [ 566.477906][ T3567] print_report+0xd8/0x598 [ 566.478157][ T3567] kasan_report+0xc8/0x108 [ 566.478396][ T3567] __asan_report_load8_noabort+0x20/0x2c [ 566.478720][ T3567] dsa_user_changeupper+0x3bc/0x49c [ 566.479078][ T3567] dsa_user_netdevice_event+0xb68/0x1ef0 [ 566.479418][ T3567] notifier_call_chain+0x134/0x3f4 [ 566.479798][ T3567] raw_notifier_call_chain+0x18/0x24 [ 566.480139][ T3567] call_netdevice_notifiers_info+0x88/0xe8 [ 566.480490][ T3567] __netdev_upper_dev_link+0x2c8/0x598 [ 566.480816][ T3567] netdev_upper_dev_link+0x80/0xb0 [ 566.481154][ T3567] register_vlan_dev+0x270/0x69c [ 566.481504][ T3567] vlan_ioctl_handler+0x58c/0x918 [ 566.481835][ T3567] sock_ioctl+0x434/0x5dc [ 566.482166][ T3567] compat_sock_ioctl+0x26c/0x538 [ 566.482513][ T3567] __arm64_compat_sys_ioctl+0x1d4/0x220 [ 566.482874][ T3567] invoke_syscall+0x6c/0x258 [ 566.483193][ T3567] el0_svc_common.constprop.0+0xac/0x230 [ 566.483552][ T3567] do_el0_svc_compat+0x40/0x68 [ 566.483913][ T3567] el0_svc_compat+0x54/0x13c [ 566.484262][ T3567] el0t_32_sync_handler+0x98/0x13c [ 566.484820][ T3567] el0t_32_sync+0x194/0x198 [ 566.485429][ T3567] [ 566.486067][ T3567] Allocated by task 3147: [ 566.486588][ T3567] kasan_save_stack+0x3c/0x64 [ 566.487023][ T3567] kasan_save_track+0x20/0x3c [ 566.487393][ T3567] kasan_save_alloc_info+0x68/0x78 [ 566.487846][ T3567] __kasan_kmalloc+0xb8/0xbc [ 566.488231][ T3567] __kmalloc_node+0x1e0/0x420 [ 566.488682][ T3567] kvmalloc_node+0x1c/0x144 [ 566.489088][ T3567] alloc_netdev_mqs+0x6c/0xe08 [ 566.489435][ T3567] rtnl_create_link+0x900/0xbc8 [ 566.489809][ T3567] __rtnl_newlink+0xac4/0x11e0 [ 566.490148][ T3567] rtnl_newlink+0x6c/0xa4 [ 566.490451][ T3567] rtnetlink_rcv_msg+0x2e8/0x870 [ 566.490698][ T3567] netlink_rcv_skb+0x18c/0x330 [ 566.491007][ T3567] rtnetlink_rcv+0x18/0x24 [ 566.491282][ T3567] netlink_unicast+0x3bc/0x660 [ 566.491595][ T3567] netlink_sendmsg+0x654/0xa40 [ 566.491907][ T3567] __sock_sendmsg+0xc8/0x168 [ 566.492147][ T3567] __sys_sendto+0x1a8/0x254 [ 566.492385][ T3567] __arm64_sys_sendto+0xc0/0x134 [ 566.492715][ T3567] invoke_syscall+0x6c/0x258 [ 566.492972][ T3567] el0_svc_common.constprop.0+0xac/0x230 [ 566.493313][ T3567] do_el0_svc_compat+0x40/0x68 [ 566.493565][ T3567] el0_svc_compat+0x54/0x13c [ 566.493821][ T3567] el0t_32_sync_handler+0x98/0x13c [ 566.494077][ T3567] el0t_32_sync+0x194/0x198 [ 566.494379][ T3567] [ 566.494730][ T3567] The buggy address belongs to the object at ffff00000bdc4000 [ 566.494730][ T3567] which belongs to the cache kmalloc-cg-4k of size 4096 [ 566.495313][ T3567] The buggy address is located 1 bytes to the right of [ 566.495313][ T3567] allocated 3183-byte region [ffff00000bdc4000, ffff00000bdc4c6f) [ 566.495755][ T3567] [ 566.496056][ T3567] The buggy address belongs to the physical page: [ 566.496681][ T3567] page:000000000f2d6572 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x4bdc0 [ 566.497581][ T3567] head:000000000f2d6572 order:3 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 566.498172][ T3567] flags: 0x1ffc00000000840(slab|head|node=0|zone=0|lastcpupid=0x7ff) [ 566.499033][ T3567] page_type: 0xffffffff() [ 566.499940][ T3567] raw: 01ffc00000000840 ffff000009c0f500 dead000000000122 0000000000000000 [ 566.500273][ T3567] raw: 0000000000000000 0000000000040004 00000001ffffffff 0000000000000000 [ 566.500640][ T3567] page dumped because: kasan: bad access detected [ 566.500928][ T3567] [ 566.501126][ T3567] Memory state around the buggy address: [ 566.501707][ T3567] ffff00000bdc4b00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 566.502037][ T3567] ffff00000bdc4b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 566.502356][ T3567] >ffff00000bdc4c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 07 fc fc [ 566.502729][ T3567] ^ [ 566.503100][ T3567] ffff00000bdc4c80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 566.503400][ T3567] ffff00000bdc4d00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 566.503827][ T3567] ================================================================== [ 566.598303][ T3567] Disabling lock debugging due to kernel taint [ 566.947977][ T3571] Only authenc() type AEADs are supported by ESSIV 00:09:26 executing program 1: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0x5f, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16, @ANYBLOB="100025bd7000fcdbdf256a0000000c0035ce49704b1819a2b199000080ff00420000000a00060008021100000000000500d2000f002c5300000a000600080211000001002da3000a00060008021100000100000400d2000d000000f5ffd1000600000048ce7559080211000000000a0006000802119da04634e5f8f84900000000000002221efdf6"], 0x74}, 0x1, 0x0, 0x0, 0x20000010}, 0xc00) 00:09:26 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) 00:09:27 executing program 1: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0x5f, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16, @ANYBLOB="100025bd7000fcdbdf256a0000000c0035ce49704b1819a2b199000080ff00420000000a00060008021100000000000500d2000f002c5300000a000600080211000001002da3000a00060008021100000100000400d2000d000000f5ffd1000600000048ce7559080211000000000a0006000802119da04634e5f8f84900000000000002221efdf6"], 0x74}, 0x1, 0x0, 0x0, 0x20000010}, 0xc00) 00:09:27 executing program 1: r0 = socket(0x2, 0x2, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0x5f, &(0x7f0000000040)={&(0x7f0000000140)=ANY=[@ANYBLOB='t\x00\x00\x00', @ANYRES16, @ANYBLOB="100025bd7000fcdbdf256a0000000c0035ce49704b1819a2b199000080ff00420000000a00060008021100000000000500d2000f002c5300000a000600080211000001002da3000a00060008021100000100000400d2000d000000f5ffd1000600000048ce7559080211000000000a0006000802119da04634e5f8f84900000000000002221efdf6"], 0x74}, 0x1, 0x0, 0x0, 0x20000010}, 0xc00) [ 568.482522][ T3583] Only authenc() type AEADs are supported by ESSIV 00:09:28 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) 00:09:28 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 570.232682][ T3595] Only authenc() type AEADs are supported by ESSIV 00:09:29 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 570.527114][ T3596] Only authenc() type AEADs are supported by ESSIV 00:09:30 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 571.373793][ T3605] Only authenc() type AEADs are supported by ESSIV 00:09:31 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 571.928349][ T3608] Only authenc() type AEADs are supported by ESSIV 00:09:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 573.140514][ T3617] Only authenc() type AEADs are supported by ESSIV 00:09:32 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 573.493764][ T3619] Only authenc() type AEADs are supported by ESSIV 00:09:33 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 574.835773][ T3630] Only authenc() type AEADs are supported by ESSIV [ 574.877290][ T3631] Only authenc() type AEADs are supported by ESSIV 00:09:34 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) 00:09:34 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 575.836970][ T3640] Only authenc() type AEADs are supported by ESSIV 00:09:35 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 576.585612][ T3644] Only authenc() type AEADs are supported by ESSIV 00:09:36 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 577.824309][ T3654] Only authenc() type AEADs are supported by ESSIV 00:09:37 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 578.493181][ T3656] Only authenc() type AEADs are supported by ESSIV 00:09:38 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 579.291556][ T3664] Only authenc() type AEADs are supported by ESSIV 00:09:38 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 579.790197][ T3666] Only authenc() type AEADs are supported by ESSIV 00:09:39 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 580.926299][ T3676] Only authenc() type AEADs are supported by ESSIV [ 580.935237][ C0] hrtimer: interrupt took 520304 ns 00:09:40 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 581.674121][ T3681] Only authenc() type AEADs are supported by ESSIV 00:09:41 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 582.676186][ T3688] Only authenc() type AEADs are supported by ESSIV 00:09:42 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 583.569098][ T3694] Only authenc() type AEADs are supported by ESSIV 00:09:43 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 584.256302][ T3698] Only authenc() type AEADs are supported by ESSIV 00:09:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 585.267055][ T3705] Only authenc() type AEADs are supported by ESSIV 00:09:44 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 586.036519][ T3710] Only authenc() type AEADs are supported by ESSIV 00:09:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 587.042892][ T3718] Only authenc() type AEADs are supported by ESSIV 00:09:46 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 587.816498][ T3722] Only authenc() type AEADs are supported by ESSIV 00:09:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vsock(0xffffff9c, &(0x7f0000000440), 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_ASSOCIATE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 588.687480][ T3726] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3726 comm=syz-executor.1 00:09:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vsock(0xffffff9c, &(0x7f0000000440), 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_ASSOCIATE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 589.281342][ T3730] Only authenc() type AEADs are supported by ESSIV 00:09:48 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) [ 589.566731][ T3731] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3731 comm=syz-executor.1 00:09:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vsock(0xffffff9c, &(0x7f0000000440), 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_ASSOCIATE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 590.299993][ T3736] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3736 comm=syz-executor.1 00:09:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$vsock(0xffffff9c, &(0x7f0000000440), 0x0, 0x0) dup2(r0, r1) sendmsg$NL80211_CMD_ASSOCIATE(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) [ 591.198750][ T3740] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3740 comm=syz-executor.1 [ 591.202666][ T3741] Only authenc() type AEADs are supported by ESSIV 00:09:50 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x1e80c2, 0x0) close(r0) openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDCTL_SYNTH_MEMAVL(r0, 0xc004510e, &(0x7f0000000040)) 00:09:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = dup(r1) bind$alg(r1, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'essiv(gcm(aes),sha1_mb)\x00'}, 0x58) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha3-256\x00'}, 0x58) r3 = socket$alg(0x26, 0x5, 0x0) r4 = dup(r3) bind$alg(r4, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r4, 0x0, &(0x7f0000000080)) r5 = dup(r4) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r5, 0x8982, &(0x7f0000000140)={0x0, 'dummy0\x00', {}, 0x81}) r6 = accept4(r0, 0x0, 0x0, 0x0) r7 = dup(0xffffffffffffffff) bind$alg(r7, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha224\x00'}, 0x58) accept$nfc_llcp(r7, 0x0, &(0x7f0000000080)) fcntl$F_SET_RW_HINT(r7, 0x40c, &(0x7f0000000100)=0x4) r8 = accept$inet6(r6, 0x0, 0x0) accept4$inet6(r8, 0x0, 0x0, 0x101800) r9 = openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.stat\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(r9, 0x6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) 00:09:51 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x1e80c2, 0x0) close(r0) openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDCTL_SYNTH_MEMAVL(r0, 0xc004510e, &(0x7f0000000040)) [ 592.840871][ T3751] Only authenc() type AEADs are supported by ESSIV 00:09:52 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) semctl$IPC_STAT(r0, 0x0, 0xf, 0x0) 00:09:52 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x1e80c2, 0x0) close(r0) openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDCTL_SYNTH_MEMAVL(r0, 0xc004510e, &(0x7f0000000040)) 00:09:53 executing program 1: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x1e80c2, 0x0) close(r0) openat$mixer(0xffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$SNDCTL_SYNTH_MEMAVL(r0, 0xc004510e, &(0x7f0000000040)) 00:09:53 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) semctl$IPC_STAT(r0, 0x0, 0xf, 0x0) 00:09:53 executing program 1: r0 = semget$private(0x0, 0x3, 0x0) semctl$IPC_STAT(r0, 0x0, 0xf, 0x0) 00:09:53 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) semctl$IPC_STAT(r0, 0x0, 0xf, 0x0) 00:09:54 executing program 1: r0 = semget$private(0x0, 0x3, 0x0) semctl$IPC_STAT(r0, 0x0, 0xf, 0x0) 00:09:54 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) semctl$IPC_STAT(r0, 0x0, 0xf, 0x0) 00:09:54 executing program 1: r0 = semget$private(0x0, 0x3, 0x0) semctl$IPC_STAT(r0, 0x0, 0xf, 0x0) 00:09:54 executing program 0: timer_create(0x0, &(0x7f0000000680)={0x0, 0x21}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000340)=ANY=[], 0xfffffcdd) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='net/udp\x00') sendfile(r0, r1, 0x0, 0x37) r2 = memfd_create(&(0x7f0000000300)='c\x9c\\\xd4\xa4-K\x98.U\xb4#\xe1)\x94:\x04\xff\x96\x13\xae\x83\x1d##\xe8A\x0fB\x13\xb7\xc9\xcc\x8c\xacn(sN\xe4\xfb?\xc5\xd0\"`\n)\xf0\xfc\xfb\x8fY\xa8\xc8\xa6\xe7\x97\xac3\'\x02m\xc1\xbfBR\xbe\xef\xb16\xe57\xb9\x13\xc4\x81j\x10\xaf\x95e|\x90\xf7\x99V\xfa\xc0&\xf2\xb8N\xb6\x1d\x8cG\xb9\xe7\xa5\x1d&\xc1\b\x8b\x88\x144r?3\xb6\x01#\xe2\x8c`QV\x9eA\xe4\x88C\x81\xc5\x01P\xd1^=', 0x0) prlimit64(0x0, 0x7, &(0x7f0000000080)={0x80000001, 0xfffffffffffffffa}, 0x0) r3 = socket(0x1, 0x2, 0x0) recvmmsg(r3, &(0x7f0000000040)=[{{&(0x7f0000000340)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, 0x0}}], 0x1, 0x0, 0x0) r5 = signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendfile(r5, 0xffffffffffffffff, 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='comm\x00') dup3(r3, r4, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close_range(r2, r4, 0x0) 00:09:55 executing program 1: r0 = landlock_create_ruleset(&(0x7f0000000000)={0x105}, 0x8, 0x0) r1 = dup(r0) write$yama_ptrace_scope(r1, 0x0, 0x0) 00:09:55 executing program 1: r0 = landlock_create_ruleset(&(0x7f0000000000)={0x105}, 0x8, 0x0) r1 = dup(r0) write$yama_ptrace_scope(r1, 0x0, 0x0) VM DIAGNOSIS: 00:06:56 Registers: info registers vcpu 0 CPU#0 PC=ffff8000802ec09c X00=00000000000000c0 X01=0000000000000000 X02=1fffe000017a73b9 X03=0000000000000000 X04=0000000000000000 X05=ffff700011a06dda X06=dfff800000000000 X07=00000000f1f1f1f1 X08=00008fffef32af24 X09=dfff800000000000 X10=ffff700010cd50dc X11=1ffff00010cd50dc X12=ffff700010cd50dd X13=205d373635335420 X14=6f4e20302e726f74 X15=65746e6961742074 X16=2d302e372e362064 X17=656c6c616b7a7973 X18=ffff00000bd3a818 X19=dfff800000000000 X20=ffff800087081be0 X21=ffff8000866a7ce0 X22=1ffff00010e10387 X23=ffff8000866a86e0 X24=ffff800089127480 X25=0000000000000000 X26=ffff800087081c38 X27=00000000000000c0 X28=ffff80008d037140 X29=ffff80008d036f50 X30=ffff8000802ec088 SP=ffff80008d036f50 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800084d7e75c X00=ffff800084d7e758 X01=0000000000000003 X02=0000000000000000 X03=1fffe00001dd7001 X04=1fffe0000d5196ae X05=ffff70001128cf96 X06=dfff800000000000 X07=00000000f1f1f1f1 X08=ffff00000eeb8a58 X09=0000000000000041 X10=ffff00006a8b6f0c X11=0000000000000000 X12=0000000000000007 X13=1fffe00001dd7147 X14=1fffe00001dd714f X15=1fffe00001dd714a X16=0000000000000006 X17=ffff7fffe4362000 X18=ffff00000eeb8a58 X19=ffff8000867d0d70 X20=ffff8000867d0d40 X21=0000000000000000 X22=0000000000000004 X23=0000000000000028 X24=ffff8000867d0d70 X25=ffff7fffe4362000 X26=dfff800000000000 X27=ffff00000aa72cc8 X28=ffff00000eeb8000 X29=ffff80008d017740 X30=ffff800084d7cf00 SP=ffff80008d017740 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000