last executing test programs: 2m52.814930003s ago: executing program 0 (id=160): r0 = syz_open_dev$loop(&(0x7f0000000440), 0x81, 0x2a82) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='fd\x00') readlinkat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f00000021c0)=""/102395, 0x18ffb) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x10) openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f00000100000000000000", @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000fd00000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='cpuset.effective_cpus\x00', 0x275a, 0x0) ioctl$LOOP_CONFIGURE(r0, 0x4c0a, &(0x7f00000002c0)={r7, 0x800, {0x2a00, 0x80010000, 0x0, 0x17, 0x0, 0x0, 0x0, 0x1, 0x1c, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd6447a4b4e00d9683dda1af1ea09de2b7fb0a0100000000000000000300", "2809e8dbe108598948224ad54afac11d875397bdb22d0000b420a1a93c5240f45f819e01177d3d458dd4992861ac00", "90be8b1c5512406c7f00", [0x4, 0x40000000000000]}}) r8 = syz_open_dev$loop(&(0x7f0000000000), 0x1, 0x8000) ioctl$LOOP_CONFIGURE(r8, 0x4c0a, &(0x7f0000000480)={r0, 0x0, {0x2a00, 0x80010000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x18, "fee8a2ab78fc179fd1f8a0e91ddaaca7bd64c6a4b4e00d9683dda1af1ea80000000000000000000000deff0000000000000000000000000000000800", "2809e8dbe108038948224ad54afac11d875397bdb22d0000b420a1a93c7540f4767f9e01177d3dd40600000061ac00", "90be8b1c55f96400", [0x800]}}) 2m46.78009826s ago: executing program 0 (id=163): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(0xffffffffffffffff, 0xc4c85512, &(0x7f0000000340)={{}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000]}) r0 = memfd_create(0x0, 0x0) write$binfmt_elf64(r0, 0x0, 0xfebe) execveat(r0, 0x0, 0x0, 0x0, 0x1000) creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049e9) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) unshare(0x6020400) r1 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x800000000004, @tid=r1}, &(0x7f0000bbdffc)=0x0) timer_settime(r2, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r3, &(0x7f00000001c0)=[{&(0x7f00000004c0)="7cd1", 0x2}], 0x1, 0x0) 2m43.582353283s ago: executing program 0 (id=164): openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000140), 0x12) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_type(r3, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_type(r4, &(0x7f0000000280), 0x9) 2m43.453057686s ago: executing program 0 (id=165): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000600)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(camellia)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5910fae9d6dcd3292ea54c7b6ef915d564c90c200", 0x18) r1 = accept4(r0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000440), r1) sendmsg$nl_route_sched_retired(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=@newtfilter={0x43c, 0x2c, 0x20, 0x70bd27, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xc, 0x1}, {0x9, 0x6}, {0xe}}, [@f_rsvp={{0x9}, {0x40c, 0x2, [@TCA_RSVP_POLICE={0x408, 0x5, [@TCA_POLICE_PEAKRATE={0x404, 0x3, [0xff, 0x8, 0x7, 0x0, 0x4, 0xfffffffc, 0x5, 0xfffffffa, 0x5, 0xfb29, 0x7, 0xa1, 0x2b, 0xd096, 0x9, 0x40, 0xc0000000, 0xb, 0xfff, 0x8, 0x80000000, 0x30000, 0x8, 0xfd2, 0x78f05b3e, 0x5, 0x7, 0x1ff, 0x2, 0x8001, 0x9, 0x8, 0xa3, 0x9, 0x5, 0xfffffff7, 0x2, 0x1, 0x80000000, 0x1aa, 0x5, 0x6, 0x2, 0x2, 0x1, 0x1, 0x3, 0x1, 0x1ff, 0x9, 0x101, 0x6, 0xffffffff, 0x2, 0x8, 0x9, 0x7, 0x9, 0x7, 0x8, 0x3, 0x2, 0x6, 0x8, 0xfffffffe, 0x9, 0x7ff, 0x1000, 0xdfc, 0xfd, 0x1, 0xffff, 0xe, 0x41, 0x0, 0x1, 0xfffffffe, 0x0, 0x7, 0x3, 0x1, 0x3c, 0x4c3, 0x5, 0x2a, 0x1, 0x9, 0xa, 0x200, 0x9, 0x5, 0xc8b, 0x400, 0x308, 0x3, 0x7, 0x8000, 0xd814, 0x6, 0x80000000, 0x3, 0x0, 0x9, 0x0, 0x5, 0x1, 0x4, 0x7ff, 0xfffffffa, 0x3, 0x2, 0x8000, 0x7ff, 0x0, 0x400, 0x4, 0x1000, 0xffffff3d, 0x8, 0x5, 0x800, 0xcb, 0x8, 0x4, 0x80000000, 0xbc, 0xe, 0xfffffff8, 0x6, 0x6, 0xffff, 0x0, 0xffffff6e, 0x893, 0x0, 0x401, 0x80000001, 0x3, 0x4, 0x8, 0x9, 0x69e0, 0x1, 0x5, 0x4, 0x3, 0x5657, 0x6, 0x4, 0x80000000, 0x6, 0x8, 0xaa4, 0x8, 0x7f, 0x3, 0x3b, 0xfffffffd, 0x5, 0x1, 0x7fff, 0x1, 0x3, 0xd9, 0x2, 0x9, 0x5f, 0x6, 0x4, 0xf8d5, 0x97, 0x6, 0x6, 0x3ff, 0x91fb, 0xb7, 0x1, 0x6, 0xd87, 0x7f, 0x8, 0x8, 0x3, 0x1, 0x5, 0x341ac6fc, 0x5, 0x3bf, 0x4, 0x2, 0x2, 0x5, 0x92, 0x5, 0x4, 0xfcbb, 0x80, 0x10, 0x1, 0x7, 0xe0, 0x5ed, 0x37, 0x7, 0x6, 0x8000, 0x8, 0x7ff, 0xffffffff, 0x3, 0x200, 0xc4b5, 0x1, 0x10001, 0x5, 0x2, 0x7fffffff, 0x100, 0x9, 0x10001, 0x6, 0x8abc, 0xd, 0x1000, 0x4, 0x1, 0xfffffff2, 0x4, 0x2, 0x9, 0xa65, 0x30, 0x9, 0x4, 0x10001, 0x6baeef53, 0x3242, 0xa, 0x9, 0x3, 0x1, 0x1, 0x8, 0x9, 0x80000001, 0x7, 0x8, 0xc0000000, 0x7, 0x27dd, 0x4, 0xffffffff, 0x4, 0x2, 0x592, 0x4]}]}]}}]}, 0x43c}, 0x1, 0x0, 0x0, 0x400d0}, 0x24008040) 2m40.773367246s ago: executing program 0 (id=170): r0 = syz_clone(0x4100000, 0x0, 0x0, 0x0, 0x0, 0x0) kcmp(r0, r0, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) 2m40.693290418s ago: executing program 0 (id=171): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x10, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r1, &(0x7f0000002540)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0x4, &(0x7f0000000740)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x81}]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x14, r4, 0x6c04073ee59f7719, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 1m55.240876548s ago: executing program 32 (id=171): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x10, 0x0, 0x0, 0x8, 0x0, 0x0, 0x41000, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r1, &(0x7f0000002540)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x0, 0x8b}, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0x4, &(0x7f0000000740)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x81}]}, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DAEMON(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)={0x14, r4, 0x6c04073ee59f7719, 0x0, 0x0, {0x4}}, 0x14}}, 0x0) 1m35.610474158s ago: executing program 2 (id=187): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = fanotify_init(0x202, 0x0) fanotify_mark(r1, 0x1, 0x4800003e, r0, 0x0) 1m35.192013589s ago: executing program 2 (id=202): socket$kcm(0x10, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ppoll(&(0x7f0000000500)=[{r1}], 0x1, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000340)=0x61ba, 0x4) sendmmsg$inet6(r0, &(0x7f00000002c0)=[{{&(0x7f0000000b00)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x63, 0x0}}], 0x1, 0x0) 49.832428937s ago: executing program 33 (id=202): socket$kcm(0x10, 0x2, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) ppoll(&(0x7f0000000500)=[{r1}], 0x1, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000340)=0x61ba, 0x4) sendmmsg$inet6(r0, &(0x7f00000002c0)=[{{&(0x7f0000000b00)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x63, 0x0}}], 0x1, 0x0) 35.722848693s ago: executing program 1 (id=242): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000847fff)='X', 0x34000, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0x0, 0x1c9ae7fffe9a6f34}}, 0x1c) connect$inet6(r0, &(0x7f0000000340)={0xa, 0x0, 0x0, @private1}, 0x1c) pselect6(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70ee}, 0x0, &(0x7f0000000040)={0xb, 0xffffffffffffffff}, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) gettid() ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, 0x0) shutdown(r0, 0x1) 33.112453901s ago: executing program 1 (id=243): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) quotactl$Q_GETQUOTA(0x2, &(0x7f0000000140)=@filename='./file0/file0/file0/file0/file0\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f00000021c0)={0x2020}, 0x2020) read$FUSE(r0, &(0x7f0000008bc0)={0x2020, 0x0, 0x0}, 0x205c) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50, 0x0, r1, {0x7, 0x24}}, 0x50) 30.520131518s ago: executing program 1 (id=244): r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000300)) 30.331396183s ago: executing program 1 (id=245): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0xc7}, 0x1c) shutdown(r0, 0x0) 30.122883638s ago: executing program 1 (id=246): read$FUSE(0xffffffffffffffff, 0x0, 0x0) capset(&(0x7f0000000140)={0x20071026}, &(0x7f0000000100)={0x80, 0x80, 0x9, 0x4, 0x2, 0x5af0}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) ioctl$VHOST_VDPA_GET_STATUS(0xffffffffffffffff, 0x8001af71, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={0x0, &(0x7f0000000340)=""/142, 0x0, 0x8e, 0x1, 0x0, 0x0, @void, @value}, 0x28) ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0x0) capset(0x0, 0x0) syz_clone3(&(0x7f00000002c0)={0x230a8000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000000)=[0x0], 0x1}, 0x58) 19.362757767s ago: executing program 1 (id=250): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) ioctl$HIDIOCGUSAGE(0xffffffffffffffff, 0xc018480b, &(0x7f0000000300)={0x1, 0x1, 0x0, 0x9, 0x6, 0xffffffff}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x4}, @exit, @initr0, @exit, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffc}, @exit], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x8, 0x3, 0x498, 0x320, 0xa, 0x148, 0x368, 0x60, 0x400, 0x2a8, 0x2a8, 0x400, 0x2a8, 0x3, 0x0, {[{{@ip={@multicast2, @multicast2, 0x0, 0x0, 'bridge0\x00', 'rose0\x00'}, 0x0, 0x2f8, 0x368, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x8601, 0x6, './file0\x00'}}]}, @common=@unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x1d, 0x0, "f2f7b9f28413d9d8ad470ad2b60c45cb4ea6e7bf902bdc2ff8a9304d9f655c746adc0bdc773506378bc2d27efd6abb05175089830cc46186074d7de46d5af300"}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4f8) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r3, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmsg$nl_route(r4, 0x0, 0x0) 252.642934ms ago: executing program 3 (id=256): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) 162.379156ms ago: executing program 3 (id=257): r0 = openat$binfmt_register(0xffffff9c, &(0x7f0000000100), 0x1, 0x0) pwritev2(r0, &(0x7f0000001480)=[{&(0x7f0000000400)="244830c4e9abf753f553b3f7b4d0d15c6ef6612e141d05cd46301dece6757219e8060707ac46244d", 0x28}], 0x1, 0x1, 0x8, 0x0) 82.392078ms ago: executing program 3 (id=258): r0 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x25dfdbff, 0x20}, 0xc) 81.995368ms ago: executing program 3 (id=259): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='hugetlb.2MB.usage_in_bytes\x00', 0x26e1, 0x0) close(r0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0, 0x200}, 0x8) 1.11999ms ago: executing program 3 (id=260): creat(&(0x7f0000000100)='./file0\x00', 0x0) rmdir(&(0x7f0000000140)='./file0\x00') 0s ago: executing program 3 (id=261): r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xf, r0, 0xca, 0x0) kernel console output (not intermixed with test programs): syzkaller login: [ 41.995496][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 41.995624][ T31] audit: type=1400 audit(41.920:68): avc: denied { read write } for pid=3084 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 41.997509][ T31] audit: type=1400 audit(41.930:69): avc: denied { open } for pid=3084 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:18373' (ED25519) to the list of known hosts. [ 50.715049][ T31] audit: type=1400 audit(50.640:70): avc: denied { name_bind } for pid=3085 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 52.215446][ T31] audit: type=1400 audit(52.150:71): avc: denied { execute } for pid=3087 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 52.225379][ T31] audit: type=1400 audit(52.160:72): avc: denied { execute_no_trans } for pid=3087 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 55.213622][ T31] audit: type=1400 audit(55.140:73): avc: denied { mounton } for pid=3087 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 55.218919][ T31] audit: type=1400 audit(55.150:74): avc: denied { mount } for pid=3087 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 55.240242][ T3087] cgroup: Unknown subsys name 'net' [ 55.251971][ T31] audit: type=1400 audit(55.180:75): avc: denied { unmount } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 55.483003][ T3087] cgroup: Unknown subsys name 'cpuset' [ 55.489490][ T3087] cgroup: Unknown subsys name 'hugetlb' [ 55.490495][ T3087] cgroup: Unknown subsys name 'rlimit' [ 55.679817][ T31] audit: type=1400 audit(55.610:76): avc: denied { setattr } for pid=3087 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 55.680541][ T31] audit: type=1400 audit(55.610:77): avc: denied { mounton } for pid=3087 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 55.681149][ T31] audit: type=1400 audit(55.610:78): avc: denied { mount } for pid=3087 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 55.810332][ T3089] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 55.811194][ T31] audit: type=1400 audit(55.740:79): avc: denied { relabelto } for pid=3089 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 55.813949][ T31] audit: type=1400 audit(55.740:80): avc: denied { write } for pid=3089 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 55.836943][ T31] audit: type=1400 audit(55.770:81): avc: denied { read } for pid=3087 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 55.838323][ T31] audit: type=1400 audit(55.770:82): avc: denied { open } for pid=3087 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 60.105644][ T3087] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 62.130596][ T31] audit: type=1400 audit(62.060:83): avc: denied { execmem } for pid=3090 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 62.205312][ T31] audit: type=1400 audit(62.130:84): avc: denied { read } for pid=3092 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 62.206227][ T31] audit: type=1400 audit(62.130:85): avc: denied { open } for pid=3092 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 62.206987][ T31] audit: type=1400 audit(62.130:86): avc: denied { mounton } for pid=3092 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 62.226368][ T31] audit: type=1400 audit(62.150:88): avc: denied { module_request } for pid=3092 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 62.228229][ T31] audit: type=1400 audit(62.150:87): avc: denied { module_request } for pid=3093 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 62.320193][ T31] audit: type=1400 audit(62.250:89): avc: denied { sys_module } for pid=3093 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 62.995051][ T31] audit: type=1400 audit(62.900:90): avc: denied { ioctl } for pid=3093 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 63.971971][ T3093] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.976434][ T3093] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.140465][ T3092] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.150371][ T3092] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.888531][ T3093] hsr_slave_0: entered promiscuous mode [ 64.892168][ T3093] hsr_slave_1: entered promiscuous mode [ 64.989261][ T3092] hsr_slave_0: entered promiscuous mode [ 64.991145][ T3092] hsr_slave_1: entered promiscuous mode [ 64.992250][ T3092] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 64.992582][ T3092] Cannot create hsr debugfs directory [ 65.279559][ T31] audit: type=1400 audit(65.210:91): avc: denied { create } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 65.287448][ T31] audit: type=1400 audit(65.220:92): avc: denied { write } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 65.299516][ T3093] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 65.312928][ T3093] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 65.326329][ T3093] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 65.337631][ T3093] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 65.382266][ T3092] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 65.390083][ T3092] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 65.406460][ T3092] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 65.413385][ T3092] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 65.922533][ T3093] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.219837][ T3092] 8021q: adding VLAN 0 to HW filter on device bond0 [ 68.211838][ T3093] veth0_vlan: entered promiscuous mode [ 68.225329][ T3093] veth1_vlan: entered promiscuous mode [ 68.261934][ T3093] veth0_macvtap: entered promiscuous mode [ 68.273297][ T3093] veth1_macvtap: entered promiscuous mode [ 68.316895][ T3093] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.317385][ T3093] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.317698][ T3093] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.317944][ T3093] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.418305][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 68.418373][ T31] audit: type=1400 audit(68.350:94): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 68.421112][ T31] audit: type=1400 audit(68.350:95): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.uFdwqp/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 68.423895][ T31] audit: type=1400 audit(68.350:96): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 68.431247][ T31] audit: type=1400 audit(68.360:97): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.uFdwqp/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 68.439320][ T31] audit: type=1400 audit(68.370:98): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/syzkaller.uFdwqp/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2435 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 68.448393][ T31] audit: type=1400 audit(68.380:99): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 68.452058][ T31] audit: type=1400 audit(68.380:100): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 68.464943][ T31] audit: type=1400 audit(68.390:101): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 68.465549][ T31] audit: type=1400 audit(68.390:102): avc: denied { mounton } for pid=3093 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 68.466167][ T31] audit: type=1400 audit(68.390:103): avc: denied { mount } for pid=3093 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 68.508495][ T3093] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 68.772381][ T3092] veth0_vlan: entered promiscuous mode [ 68.782977][ T3092] veth1_vlan: entered promiscuous mode [ 68.820819][ T3092] veth0_macvtap: entered promiscuous mode [ 68.827399][ T3092] veth1_macvtap: entered promiscuous mode [ 68.867778][ T3092] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.868130][ T3092] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.868368][ T3092] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.868630][ T3092] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 70.835678][ T3777] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 74.333429][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 74.333541][ T31] audit: type=1400 audit(74.260:115): avc: denied { create } for pid=3781 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 74.341930][ T31] audit: type=1400 audit(74.270:116): avc: denied { write } for pid=3781 comm="syz.1.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 74.665986][ T2888] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 74.844100][ T2888] usb 2-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 74.845424][ T2888] usb 2-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47 [ 74.846183][ T2888] usb 2-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 74.846539][ T2888] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 74.866964][ T3784] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 74.880617][ T2888] usb 2-1: Quirk or no altset; falling back to MIDI 1.0 [ 75.196567][ T3772] usb 2-1: USB disconnect, device number 2 [ 75.325830][ T3816] syz.1.5 uses obsolete (PF_INET,SOCK_PACKET) [ 75.330416][ T31] audit: type=1400 audit(75.260:117): avc: denied { ioctl } for pid=3815 comm="syz.1.5" path="socket:[2465]" dev="sockfs" ino=2465 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 75.332632][ T3816] syzkaller1: entered promiscuous mode [ 75.333176][ T3816] syzkaller1: entered allmulticast mode [ 75.519355][ T31] audit: type=1400 audit(75.450:118): avc: denied { perfmon } for pid=3821 comm="syz.1.6" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 75.533213][ T31] audit: type=1400 audit(75.460:119): avc: denied { bind } for pid=3821 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 75.553417][ T31] audit: type=1400 audit(75.480:120): avc: denied { setopt } for pid=3821 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 75.907720][ T3824] netlink: 12 bytes leftover after parsing attributes in process `syz.1.7'. [ 75.909368][ T31] audit: type=1400 audit(75.840:121): avc: denied { create } for pid=3827 comm="syz.0.8" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 75.912400][ T31] audit: type=1400 audit(75.840:122): avc: denied { map } for pid=3827 comm="syz.0.8" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2473 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 75.913970][ T31] audit: type=1400 audit(75.840:123): avc: denied { read write } for pid=3827 comm="syz.0.8" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2473 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 77.009930][ T31] audit: type=1400 audit(76.940:124): avc: denied { map_create } for pid=3829 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 94.720305][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 94.720405][ T31] audit: type=1400 audit(94.650:127): avc: denied { create } for pid=3848 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 94.745048][ T31] audit: type=1400 audit(94.670:128): avc: denied { write } for pid=3848 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 99.127532][ T31] audit: type=1400 audit(99.060:129): avc: denied { create } for pid=3854 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 99.820326][ T31] audit: type=1400 audit(99.750:130): avc: denied { ioctl } for pid=3860 comm="syz.0.17" path="socket:[2521]" dev="sockfs" ino=2521 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 99.823808][ T31] audit: type=1400 audit(99.750:131): avc: denied { bind } for pid=3860 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.831464][ T31] audit: type=1400 audit(99.760:132): avc: denied { setopt } for pid=3860 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 99.836350][ T31] audit: type=1400 audit(99.770:133): avc: denied { write } for pid=3860 comm="syz.0.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 101.445466][ T31] audit: type=1400 audit(101.370:134): avc: denied { create } for pid=3869 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 101.485956][ T31] audit: type=1400 audit(101.420:135): avc: denied { getopt } for pid=3869 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 101.634088][ T31] audit: type=1400 audit(101.560:136): avc: denied { create } for pid=3858 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 101.649999][ T31] audit: type=1400 audit(101.580:137): avc: denied { ioctl } for pid=3858 comm="syz.1.16" path="socket:[2541]" dev="sockfs" ino=2541 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 101.683502][ T31] audit: type=1400 audit(101.610:138): avc: denied { connect } for pid=3858 comm="syz.1.16" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 101.704192][ T31] audit: type=1400 audit(101.630:139): avc: denied { setopt } for pid=3858 comm="syz.1.16" laddr=::1 lport=7 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 105.472860][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 105.472950][ T31] audit: type=1400 audit(105.400:141): avc: denied { create } for pid=3869 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 105.510719][ T31] audit: type=1400 audit(105.440:142): avc: denied { bind } for pid=3869 comm="syz.0.20" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 112.515207][ T31] audit: type=1400 audit(112.430:143): avc: denied { name_bind } for pid=3889 comm="syz.0.25" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 112.516169][ T31] audit: type=1400 audit(112.430:144): avc: denied { node_bind } for pid=3889 comm="syz.0.25" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 112.563224][ T3890] TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies. [ 113.596220][ T3885] [U] ^C [ 118.793552][ T3897] trusted_key: encrypted_key: insufficient parameters specified [ 118.809716][ T31] audit: type=1400 audit(118.740:145): avc: denied { create } for pid=3895 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 118.820264][ T31] audit: type=1400 audit(118.750:146): avc: denied { name_bind } for pid=3895 comm="syz.1.27" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 121.473182][ T3905] netlink: 28 bytes leftover after parsing attributes in process `syz.0.30'. [ 121.473812][ T3905] netlink: 28 bytes leftover after parsing attributes in process `syz.0.30'. [ 121.485854][ T3905] Zero length message leads to an empty skb [ 121.772371][ T31] audit: type=1400 audit(121.700:147): avc: denied { write } for pid=3906 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 122.775777][ T31] audit: type=1400 audit(122.710:148): avc: denied { create } for pid=3919 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 125.295151][ T3923] input: syz1 as /devices/virtual/input/input3 [ 126.818794][ T31] audit: type=1400 audit(126.750:149): avc: denied { create } for pid=3921 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 127.467706][ T31] audit: type=1400 audit(127.400:150): avc: denied { create } for pid=3921 comm="syz.1.37" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 127.472724][ T3931] netlink: 8 bytes leftover after parsing attributes in process `syz.1.37'. [ 147.521209][ T31] audit: type=1400 audit(147.450:151): avc: denied { unmount } for pid=3961 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 153.609088][ T31] audit: type=1400 audit(153.540:152): avc: denied { create } for pid=3995 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 153.610402][ T3996] netlink: 16 bytes leftover after parsing attributes in process `syz.1.55'. [ 153.611637][ T31] audit: type=1400 audit(153.540:153): avc: denied { write } for pid=3995 comm="syz.1.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 161.502101][ T31] audit: type=1400 audit(161.430:154): avc: denied { append } for pid=4005 comm="syz.0.58" name="dsp" dev="devtmpfs" ino=718 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 167.605330][ T8] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 167.781853][ T8] usb 1-1: config 1 interface 0 has no altsetting 0 [ 167.818437][ T8] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 167.819326][ T8] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 167.819742][ T8] usb 1-1: Product: syz [ 167.820902][ T8] usb 1-1: Manufacturer: syz [ 167.822250][ T8] usb 1-1: SerialNumber: syz [ 168.467882][ T8] usblp 1-1:1.0: usblp0: USB Unidirectional printer dev 2 if 0 alt 253 proto 1 vid 0x0525 pid 0xA4A8 [ 168.692806][ T8] usb 1-1: USB disconnect, device number 2 [ 168.717031][ T8] usblp0: removed [ 171.816150][ T50] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 172.106209][ T50] usb 1-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 172.106534][ T50] usb 1-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47 [ 172.106729][ T50] usb 1-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 172.106888][ T50] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 172.111724][ T4057] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 172.117127][ T50] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 172.495937][ T1781] usb 1-1: USB disconnect, device number 3 [ 175.363788][ T31] audit: type=1400 audit(175.290:155): avc: denied { ioctl } for pid=4098 comm="syz.0.76" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2806 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 188.715564][ T8] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 188.865852][ T8] usb 1-1: Using ep0 maxpacket: 32 [ 188.882798][ T8] usb 1-1: config index 0 descriptor too short (expected 29220, got 36) [ 188.883181][ T8] usb 1-1: config 0 has too many interfaces: 81, using maximum allowed: 32 [ 188.883433][ T8] usb 1-1: config 0 has 1 interface, different from the descriptor's value: 81 [ 188.883732][ T8] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 188.883987][ T8] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 188.884231][ T8] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 188.890857][ T8] usb 1-1: New USB device found, idVendor=03f0, idProduct=6c17, bcdDevice= 0.40 [ 188.891138][ T8] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 188.896870][ T8] usb 1-1: config 0 descriptor?? [ 189.118218][ T8] usblp 1-1:0.0: usblp0: USB Bidirectional printer dev 4 if 0 alt 0 proto 3 vid 0x03F0 pid 0x6C17 [ 189.128469][ T8] usb 1-1: USB disconnect, device number 4 [ 189.136732][ T8] usblp0: removed [ 189.540868][ T31] audit: type=1400 audit(189.470:156): avc: denied { write } for pid=4137 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 189.543529][ T31] audit: type=1400 audit(189.470:157): avc: denied { accept } for pid=4137 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 189.546868][ T31] audit: type=1400 audit(189.480:158): avc: denied { create } for pid=4137 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 189.550929][ T31] audit: type=1400 audit(189.480:159): avc: denied { shutdown } for pid=4137 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 189.553257][ T31] audit: type=1400 audit(189.480:160): avc: denied { connect } for pid=4137 comm="syz.1.81" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 189.553673][ T31] audit: type=1400 audit(189.480:161): avc: denied { name_connect } for pid=4137 comm="syz.1.81" dest=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 189.596207][ T105] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 189.755387][ T105] usb 1-1: Using ep0 maxpacket: 8 [ 189.768100][ T105] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid maxpacket 1536, setting to 1024 [ 189.768684][ T105] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 1024 [ 189.769113][ T105] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 189.769868][ T105] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 189.770958][ T105] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1a, bcdDevice=61.23 [ 189.771239][ T105] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 189.988304][ T105] usb 1-1: usb_control_msg returned -32 [ 189.988614][ T105] usbtmc 1-1:16.0: can't read capabilities [ 195.765008][ T105] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 195.929261][ T105] usb 2-1: config 1 has too many interfaces: 66, using maximum allowed: 32 [ 195.929730][ T105] usb 2-1: config 1 has an invalid descriptor of length 55, skipping remainder of the config [ 195.930061][ T105] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 66 [ 195.930382][ T105] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 55, changing to 9 [ 195.930704][ T105] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 8496, setting to 1024 [ 195.944953][ T105] usb 2-1: New USB device found, idVendor=7d25, idProduct=a415, bcdDevice= 0.40 [ 195.945412][ T105] usb 2-1: New USB device strings: Mfr=1, Product=4, SerialNumber=0 [ 195.945732][ T105] usb 2-1: Product: syz [ 195.945939][ T105] usb 2-1: Manufacturer: syz [ 195.953536][ T105] cdc_wdm 2-1:1.0: skipping garbage [ 195.953902][ T105] cdc_wdm 2-1:1.0: skipping garbage [ 195.959741][ T105] cdc_wdm 2-1:1.0: cdc-wdm1: USB WDM device [ 196.160160][ T105] usb 2-1: USB disconnect, device number 3 [ 196.238847][ T31] audit: type=1400 audit(196.170:162): avc: denied { nlmsg_write } for pid=4172 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 202.366025][ T31] audit: type=1400 audit(202.280:163): avc: denied { mounton } for pid=4185 comm="syz.1.89" path="/52/file0" dev="tmpfs" ino=280 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 203.515098][ T50] usb 1-1: USB disconnect, device number 5 [ 206.947494][ T4198] syz.0.90[4198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.947856][ T4198] syz.0.90[4198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 206.948418][ T4198] syz.0.90[4198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.134879][ T31] audit: type=1400 audit(219.060:164): avc: denied { unmount } for pid=4211 comm="syz.0.94" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 219.520495][ T31] audit: type=1400 audit(219.450:165): avc: denied { nlmsg_write } for pid=4217 comm="syz.0.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 220.405181][ T31] audit: type=1400 audit(220.330:166): avc: denied { watch } for pid=4207 comm="syz.1.92" path="/54/file0" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=dir permissive=1 [ 221.476182][ T31] audit: type=1400 audit(221.410:167): avc: denied { connect } for pid=4219 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 221.481016][ T31] audit: type=1400 audit(221.410:168): avc: denied { write } for pid=4219 comm="syz.0.98" path="socket:[3210]" dev="sockfs" ino=3210 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 221.492793][ T31] audit: type=1400 audit(221.420:169): avc: denied { shutdown } for pid=4219 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 226.437084][ T31] audit: type=1400 audit(226.370:170): avc: denied { create } for pid=4224 comm="syz.0.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 227.333284][ T31] audit: type=1400 audit(227.260:171): avc: denied { unmount } for pid=3093 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 230.537141][ T31] audit: type=1400 audit(230.470:172): avc: denied { mounton } for pid=4248 comm="syz.0.105" path="/47/file0" dev="tmpfs" ino=257 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 235.849926][ T4261] capability: warning: `syz.0.107' uses deprecated v2 capabilities in a way that may be insecure [ 235.853781][ T31] audit: type=1400 audit(235.780:173): avc: denied { create } for pid=4255 comm="syz.0.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 244.670542][ T31] audit: type=1400 audit(244.600:174): avc: denied { create } for pid=4277 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 245.290350][ T4283] netlink: 148 bytes leftover after parsing attributes in process `syz.0.115'. [ 251.701723][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 251.958184][ T31] audit: type=1400 audit(251.890:175): avc: denied { connect } for pid=4305 comm="syz.1.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 265.655811][ T4110] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 265.835870][ T4110] usb 2-1: Using ep0 maxpacket: 16 [ 265.848858][ T4110] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 265.855668][ T4110] usb 2-1: New USB device found, idVendor=045e, idProduct=0721, bcdDevice=90.c4 [ 265.855947][ T4110] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 265.856255][ T4110] usb 2-1: Product: syz [ 265.856460][ T4110] usb 2-1: Manufacturer: syz [ 265.856665][ T4110] usb 2-1: SerialNumber: syz [ 265.866864][ T4110] usb 2-1: config 0 descriptor?? [ 266.758103][ T31] audit: type=1400 audit(266.690:176): avc: denied { create } for pid=4343 comm="syz.0.132" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 269.363466][ T31] audit: type=1400 audit(269.290:177): avc: denied { setopt } for pid=4348 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 269.365962][ T31] audit: type=1400 audit(269.300:178): avc: denied { bind } for pid=4348 comm="syz.0.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 269.375048][ T31] audit: type=1400 audit(269.300:179): avc: denied { name_bind } for pid=4348 comm="syz.0.133" src=65532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 269.377906][ T31] audit: type=1400 audit(269.310:180): avc: denied { node_bind } for pid=4348 comm="syz.0.133" saddr=::1 src=65532 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 279.281618][ T4357] usb 2-1: USB disconnect, device number 4 [ 292.710427][ T4387] capability: warning: `syz.1.142' uses 32-bit capabilities (legacy support in use) [ 298.318761][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 298.985032][ T4110] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 299.155614][ T4110] usb 1-1: Using ep0 maxpacket: 8 [ 299.169931][ T4110] usb 1-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2d.ee [ 299.170323][ T4110] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 299.170517][ T4110] usb 1-1: Product: syz [ 299.170641][ T4110] usb 1-1: Manufacturer: syz [ 299.170737][ T4110] usb 1-1: SerialNumber: syz [ 299.181217][ T4110] usb 1-1: config 0 descriptor?? [ 300.903532][ T31] audit: type=1400 audit(300.830:181): avc: denied { bind } for pid=4411 comm="syz.1.150" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 300.909500][ T4412] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 302.184150][ T31] audit: type=1326 audit(302.110:182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4411 comm="syz.1.150" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x0 [ 309.403486][ T24] usb 1-1: USB disconnect, device number 6 [ 310.118743][ C1] hrtimer: interrupt took 13189952 ns [ 318.995368][ T31] audit: type=1400 audit(318.900:183): avc: denied { nlmsg_read } for pid=4442 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 334.147262][ T31] audit: type=1400 audit(334.080:184): avc: denied { write } for pid=4478 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 334.150486][ T31] audit: type=1400 audit(334.080:185): avc: denied { read } for pid=4478 comm="syz.0.165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 377.592008][ T31] audit: type=1400 audit(377.520:186): avc: denied { write } for pid=4538 comm="syz.1.186" name="mcfilter" dev="proc" ino=4026532681 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 382.683991][ T31] audit: type=1400 audit(382.610:187): avc: denied { create } for pid=4550 comm="syz.1.190" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 385.448290][ T4544] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 385.482228][ T4544] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 387.936445][ T4544] hsr_slave_0: entered promiscuous mode [ 387.947589][ T4544] hsr_slave_1: entered promiscuous mode [ 387.957170][ T4544] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 387.957660][ T4544] Cannot create hsr debugfs directory [ 388.540709][ T4544] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 388.566868][ T4544] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 388.590094][ T4544] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 388.617203][ T4544] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 389.217410][ T31] audit: type=1400 audit(389.050:188): avc: denied { read } for pid=4883 comm="syz.1.198" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 389.217976][ T31] audit: type=1400 audit(389.050:189): avc: denied { open } for pid=4883 comm="syz.1.198" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 389.218464][ T31] audit: type=1400 audit(389.110:190): avc: denied { setopt } for pid=4883 comm="syz.1.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 389.218776][ T31] audit: type=1400 audit(389.130:191): avc: denied { bind } for pid=4883 comm="syz.1.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 389.466764][ T31] audit: type=1326 audit(389.400:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 389.478365][ T31] audit: type=1326 audit(389.400:193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1291cc code=0x7ffc0000 [ 389.479048][ T31] audit: type=1326 audit(389.400:194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xefda8 code=0x7ffc0000 [ 389.479380][ T31] audit: type=1326 audit(389.400:195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=369 compat=0 ip=0x133450 code=0x7ffc0000 [ 389.479735][ T31] audit: type=1326 audit(389.400:196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 389.480202][ T31] audit: type=1326 audit(389.400:197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4886 comm="syz.1.199" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 390.747358][ T4544] 8021q: adding VLAN 0 to HW filter on device bond0 [ 397.445539][ T2942] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 397.530084][ T2942] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 397.597243][ T2942] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 397.678882][ T2942] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 398.320077][ T2942] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 398.331112][ T2942] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 398.333440][ T2942] bond0 (unregistering): Released all slaves [ 398.465594][ T2942] hsr_slave_0: left promiscuous mode [ 398.513279][ T2942] hsr_slave_1: left promiscuous mode [ 398.521662][ T2942] veth1_macvtap: left promiscuous mode [ 398.522060][ T2942] veth0_macvtap: left promiscuous mode [ 398.522289][ T2942] veth1_vlan: left promiscuous mode [ 398.522688][ T2942] veth0_vlan: left promiscuous mode [ 400.727841][ T4544] veth0_vlan: entered promiscuous mode [ 400.800639][ T4544] veth1_vlan: entered promiscuous mode [ 400.990372][ T4544] veth0_macvtap: entered promiscuous mode [ 401.041318][ T4544] veth1_macvtap: entered promiscuous mode [ 401.296291][ T4544] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 401.297355][ T4544] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 401.297751][ T4544] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 401.298123][ T4544] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 402.221758][ T31] kauditd_printk_skb: 604 callbacks suppressed [ 402.221872][ T31] audit: type=1326 audit(402.150:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 402.263194][ T31] audit: type=1326 audit(402.190:803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x133450 code=0x7ffc0000 [ 402.264157][ T31] audit: type=1326 audit(402.190:804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 402.284383][ T31] audit: type=1326 audit(402.200:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=367 compat=0 ip=0x133450 code=0x7ffc0000 [ 402.285850][ T31] audit: type=1326 audit(402.200:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 402.303715][ T31] audit: type=1326 audit(402.220:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=368 compat=0 ip=0x133450 code=0x7ffc0000 [ 402.313774][ T31] audit: type=1326 audit(402.240:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4951 comm="syz.2.187" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x133450 code=0x7ffc0000 [ 413.339778][ T4987] netlink: 'syz.1.203': attribute type 1 has an invalid length. [ 413.375104][ T4987] 8021q: adding VLAN 0 to HW filter on device bond1 [ 413.390268][ T4987] 8021q: adding VLAN 0 to HW filter on device bond1 [ 413.392237][ T4987] bond1: (slave ip6tnl1): The slave device specified does not support setting the MAC address [ 413.400962][ T4987] bond1: (slave ip6tnl1): Error -95 calling set_mac_address [ 415.940276][ T31] audit: type=1400 audit(415.870:809): avc: denied { create } for pid=5041 comm="syz.1.208" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 432.215323][ T5103] netlink: 64 bytes leftover after parsing attributes in process `syz.1.217'. [ 450.405858][ T5131] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 450.416640][ T5131] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 451.651069][ T5131] hsr_slave_0: entered promiscuous mode [ 451.652962][ T5131] hsr_slave_1: entered promiscuous mode [ 451.669213][ T5131] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 451.669499][ T5131] Cannot create hsr debugfs directory [ 452.152896][ T5131] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 452.169441][ T5131] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 452.173895][ T5131] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 452.190591][ T5131] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 453.272986][ T5131] 8021q: adding VLAN 0 to HW filter on device bond0 [ 456.326874][ T5131] veth0_vlan: entered promiscuous mode [ 456.377062][ T5131] veth1_vlan: entered promiscuous mode [ 456.444415][ T5131] veth0_macvtap: entered promiscuous mode [ 456.459698][ T5131] veth1_macvtap: entered promiscuous mode [ 456.520098][ T5131] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.520492][ T5131] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.520937][ T5131] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 456.521222][ T5131] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 460.448930][ T5508] Driver unsupported XDP return value 0 on prog (id 39) dev N/A, expect packet loss! [ 460.505457][ T31] audit: type=1400 audit(460.430:810): avc: denied { bind } for pid=5509 comm="syz.3.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 460.509956][ T31] audit: type=1400 audit(460.440:811): avc: denied { connect } for pid=5509 comm="syz.3.236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 461.868812][ T31] audit: type=1400 audit(461.800:812): avc: denied { name_connect } for pid=5525 comm="syz.1.242" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 469.123069][ C1] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 497.612036][ T5591] usercopy: Kernel memory overwrite attempt detected to SLUB object 'task_struct' (offset 80, size 116)! [ 497.613179][ T5591] ------------[ cut here ]------------ [ 497.613401][ T5591] kernel BUG at mm/usercopy.c:102! [ 497.613627][ T5591] Internal error: Oops - BUG: 0 [#1] PREEMPT SMP ARM [ 497.613969][ T5591] Modules linked in: [ 497.615777][ T5591] CPU: 1 UID: 0 PID: 5591 Comm: syz.3.261 Not tainted 6.12.0-syzkaller #0 [ 497.616037][ T5591] Hardware name: ARM-Versatile Express [ 497.616284][ T5591] PC is at usercopy_abort+0x98/0x9c [ 497.619814][ T5591] LR is at __wake_up_klogd.part.0+0x7c/0xac [ 497.620050][ T5591] pc : [<819be580>] lr : [<802be434>] psr: 60000013 [ 497.620258][ T5591] sp : dfab9e38 ip : dfab9d78 fp : dfab9e5c [ 497.620404][ T5591] r10: 0000001a r9 : 847e1800 r8 : 847e6c50 [ 497.620577][ T5591] r7 : dde9ab80 r6 : 00000000 r5 : 00000074 r4 : 00000050 [ 497.620796][ T5591] r3 : 847e1800 r2 : 00000000 r1 : 00000000 r0 : 00000066 [ 497.621067][ T5591] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 497.621328][ T5591] Control: 30c5387d Table: 850fb280 DAC: 00000000 [ 497.621622][ T5591] Register r0 information: non-paged memory [ 497.622152][ T5591] Register r1 information: NULL pointer [ 497.622310][ T5591] Register r2 information: NULL pointer [ 497.622493][ T5591] Register r3 information: slab task_struct start 847e1800 pointer offset 0 size 3072 [ 497.623459][ T5591] Register r4 information: non-paged memory [ 497.623826][ T5591] Register r5 information: non-paged memory [ 497.624146][ T5591] Register r6 information: NULL pointer [ 497.624355][ T5591] Register r7 information: non-slab/vmalloc memory [ 497.624812][ T5591] Register r8 information: slab task_struct start 847e6c00 pointer offset 80 size 3072 [ 497.625192][ T5591] Register r9 information: slab task_struct start 847e1800 pointer offset 0 size 3072 [ 497.625643][ T5591] Register r10 information: non-paged memory [ 497.625814][ T5591] Register r11 information: 2-page vmalloc region starting at 0xdfab8000 allocated at kernel_clone+0xac/0x3e4 [ 497.626215][ T5591] Register r12 information: 2-page vmalloc region starting at 0xdfab8000 allocated at kernel_clone+0xac/0x3e4 [ 497.626574][ T5591] Process syz.3.261 (pid: 5591, stack limit = 0xdfab8000) [ 497.626952][ T5591] Stack: (0xdfab9e38 to 0xdfaba000) [ 497.627280][ T5591] 9e20: 8205f678 82030fcc [ 497.627610][ T5591] 9e40: 820464dc 00000050 00000074 847e1800 dfab9e8c dfab9e60 804d5d54 819be4f4 [ 497.627865][ T5591] 9e60: 00000074 dfab9e70 80214800 847e6c50 00000074 00000000 847e6cc4 dde9ab80 [ 497.628127][ T5591] 9e80: dfab9ec4 dfab9e90 80514b34 804d5c88 00000074 000000ca dfab9eb4 847e6c50 [ 497.628362][ T5591] 9ea0: 00000074 000000ca 00000000 00000000 847e1800 0000001a dfab9ef4 dfab9ec8 [ 497.628758][ T5591] 9ec0: 80209db4 805148b8 847e6c00 ddde4180 dfab9ef4 dfab9ee0 819e37e4 00000000 [ 497.629184][ T5591] 9ee0: 0000000c 000000ca dfab9f6c dfab9ef8 8020a468 80209d30 00000000 00000000 [ 497.629494][ T5591] 9f00: dfab9f1c dfab9f10 819e36b0 8027c778 dfab9f6c dfab9f20 802813ec 819e368c [ 497.629767][ T5591] 9f20: dfab9f54 00000000 8027e354 60000013 81990410 819a7694 dfab9f54 b45b1c86 [ 497.630026][ T5591] 9f40: 0000000f 847e6c00 0000000f b45b1c86 847e6c00 0000000f 000000ca 00000000 [ 497.630212][ T5591] 9f60: dfab9fa4 dfab9f70 80252fdc 8020a140 80202cc0 b45b1c86 dfab9fac 00000000 [ 497.630488][ T5591] 9f80: 00000000 002862f4 0000001a 8020029c 847e1800 0000001a 00000000 dfab9fa8 [ 497.630804][ T5591] 9fa0: 80200060 80252db0 00000000 00000000 0000000f 00000039 000000ca 00000000 [ 497.631173][ T5591] 9fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76b9d0bc [ 497.631576][ T5591] 9fe0: 76b9cec0 76b9ceb0 00018af0 00133450 60000010 0000000f 00000000 00000000 [ 497.632049][ T5591] Call trace: [ 497.632532][ T5591] [<819be4e8>] (usercopy_abort) from [<804d5d54>] (__check_heap_object+0xd8/0xf4) [ 497.633380][ T5591] [<804d5c7c>] (__check_heap_object) from [<80514b34>] (__check_object_size+0x288/0x304) [ 497.633938][ T5591] r8:dde9ab80 r7:847e6cc4 r6:00000000 r5:00000074 r4:847e6c50 [ 497.634272][ T5591] [<805148ac>] (__check_object_size) from [<80209db4>] (fpa_set+0x90/0x118) [ 497.635062][ T5591] r10:0000001a r9:847e1800 r8:00000000 r7:00000000 r6:000000ca r5:00000074 [ 497.635703][ T5591] r4:847e6c50 [ 497.635887][ T5591] [<80209d24>] (fpa_set) from [<8020a468>] (arch_ptrace+0x334/0x424) [ 497.636238][ T5591] r6:000000ca r5:0000000c r4:00000000 [ 497.636460][ T5591] [<8020a134>] (arch_ptrace) from [<80252fdc>] (sys_ptrace+0x238/0x4dc) [ 497.636852][ T5591] r7:00000000 r6:000000ca r5:0000000f r4:847e6c00 [ 497.637127][ T5591] [<80252da4>] (sys_ptrace) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 497.637493][ T5591] Exception stack(0xdfab9fa8 to 0xdfab9ff0) [ 497.637791][ T5591] 9fa0: 00000000 00000000 0000000f 00000039 000000ca 00000000 [ 497.638268][ T5591] 9fc0: 00000000 00000000 002862f4 0000001a 00000000 00006364 003d0f00 76b9d0bc [ 497.638593][ T5591] 9fe0: 76b9cec0 76b9ceb0 00018af0 00133450 [ 497.638881][ T5591] r10:0000001a r9:847e1800 r8:8020029c r7:0000001a r6:002862f4 r5:00000000 [ 497.639222][ T5591] r4:00000000 [ 497.639699][ T5591] Code: e30f067c e3480205 e58dc000 ebfff265 (e7f001f2) [ 497.640453][ T5591] ---[ end trace 0000000000000000 ]--- [ 497.641189][ T5591] Kernel panic - not syncing: Fatal exception [ 497.644727][ T5591] Rebooting in 86400 seconds.. VM DIAGNOSIS: 18:41:41 Registers: info registers vcpu 0 CPU#0 R00=ffffffff R01=00000004 R02=000001e4 R03=00000000 R04=00000000 R05=00000000 R06=00000000 R07=00000000 R08=00000000 R09=00006364 R10=003d0f00 R11=76ba50bc R12=20001490 R13=20001490 R14=00018b8c R15=00018b8c PSR=20000010 --C- A S usr32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=005127e9 s17=00000000 d08=00000000005127e9 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=cbac1206 s33=381d2444 d16=381d2444cbac1206 s34=e48a95f9 s35=f8d12ccb d17=f8d12ccbe48a95f9 s36=8a67b6b1 s37=21c10727 d18=21c107278a67b6b1 s38=5056cf35 s39=95c57972 d19=95c579725056cf35 s40=5eb3107c s41=28b9489f d20=28b9489f5eb3107c s42=67bdd6a9 s43=468bede1 d21=468bede167bdd6a9 s44=86c0cfcd s45=2b82771a d22=2b82771a86c0cfcd s46=af5ec0bb s47=2fe0e672 d23=2fe0e672af5ec0bb s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=000cffff s53=00010000 d26=00010000000cffff s54=00000000 s55=00000300 d27=0000030000000000 s56=ffba0000 s57=0008ffff d28=0008ffffffba0000 s58=00000000 s59=00000300 d29=0000030000000000 s60=ffea0000 s61=000cffff d30=000cffffffea0000 s62=00010000 s63=00000000 d31=0000000000010000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=83dc7c40 R01=00000038 R02=ebbf7000 R03=ebbf7018 R04=8287744e R05=83dc7c40 R06=809f5e5c R07=82877454 R08=8287741c R09=00000039 R10=00000001 R11=dfab9b5c R12=00000002 R13=dfab9b50 R14=8275b574 R15=809f5e6c PSR=80000093 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000