last executing test programs: 8m31.322952449s ago: executing program 0 (id=2310): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) getresgid(&(0x7f0000000800), &(0x7f0000000840), &(0x7f0000000880)) 8m30.793888306s ago: executing program 0 (id=2311): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) setpriority(0x3, 0x0, 0xfffffffd) 8m30.608708743s ago: executing program 0 (id=2312): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)=ANY=[@ANYBLOB="48000000100005ff00000000000000000000004a", @ANYRES32=0x0, @ANYBLOB="0000000000000000140012800b00010062617461647600000400028008000a00", @ANYRES32], 0x48}}, 0x0) 8m30.113516918s ago: executing program 0 (id=2314): r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) writev(r0, &(0x7f00000009c0)=[{&(0x7f0000000800)='\x00', 0x1}], 0x1) 8m29.662813198s ago: executing program 0 (id=2315): bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x3c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0xffffffffffffffff}, 0x13) statfs(0x0, 0x0) 8m29.183936491s ago: executing program 0 (id=2316): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0xb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='debugfs\x00', 0x2014800, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 7m43.448351895s ago: executing program 32 (id=2316): mkdir(&(0x7f0000000000)='./file0\x00', 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0xb) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)='debugfs\x00', 0x2014800, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) 6m49.652627073s ago: executing program 2 (id=2453): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500001000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x100000001}, 0x18) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x7000000) 6m49.353061621s ago: executing program 2 (id=2454): r0 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setsig(r0, 0xa, 0x13) getpgid(0xffffffffffffffff) 6m49.142481241s ago: executing program 2 (id=2455): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x68, r1, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_PEERS={0x40, 0x8, 0x0, 0x1, [{0x3c, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e20, @local}}, @WGPEER_A_PUBLIC_KEY={0x24}]}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4004840}, 0x40000) 6m49.014398732s ago: executing program 2 (id=2456): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r3, @ANYBLOB="01032757c38d085641a7260000000c000180080001"], 0x20}, 0x1, 0x0, 0x0, 0x20040005}, 0x8840) 6m48.713401161s ago: executing program 2 (id=2457): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)={0x34, r1, 0x1, 0x70bd27, 0x25dfdbfb, {}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}]}, @ETHTOOL_A_COALESCE_PKT_RATE_LOW={0x8, 0xd, 0xaad6}]}, 0x34}, 0x1, 0x0, 0x0, 0x24000817}, 0x80d0) 6m48.481886952s ago: executing program 2 (id=2458): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 6m2.929079663s ago: executing program 33 (id=2458): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 6m0.347138623s ago: executing program 1 (id=2487): keyctl$update(0x2, 0x0, &(0x7f0000000d00)="ae37", 0x2) 5m59.803621784s ago: executing program 1 (id=2488): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r0}, 0x10) epoll_create(0x1ff) 5m58.353720519s ago: executing program 1 (id=2489): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) syz_open_procfs(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt(r1, 0x0, 0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r2, &(0x7f0000000040)='cgroup.threads\x00', 0x2, 0x0) rmdir(&(0x7f0000000540)='./cgroup/../file0\x00') 5m56.778553215s ago: executing program 1 (id=2490): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000300)='kfree\x00', r0}, 0x18) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000003580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0xffffffffffffffff}], 0x9, 0x0) 5m55.992592569s ago: executing program 1 (id=2491): unshare(0x6a040000) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @remote}, {0x2, 0x0, @private}, 0xd0}) 5m54.772612462s ago: executing program 1 (id=2492): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x400000000000004) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f00000004c0)=0x1000000, 0x4) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="480000001400190d7ebdeb75fd0d8c562c84d8c033ed7a80ffe0090f000000000000a2bc5603ca00000f7f89000000200000004a2471083ec6991778581acb6c0101ff0000000309", 0x48}], 0x1) 5m9.554689262s ago: executing program 34 (id=2492): r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x400000000000004) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), &(0x7f0000000840)=r3}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f00000004c0)=0x1000000, 0x4) writev(r1, &(0x7f0000000000)=[{&(0x7f0000000200)="480000001400190d7ebdeb75fd0d8c562c84d8c033ed7a80ffe0090f000000000000a2bc5603ca00000f7f89000000200000004a2471083ec6991778581acb6c0101ff0000000309", 0x48}], 0x1) 4m44.163862715s ago: executing program 4 (id=2658): r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000280), &(0x7f0000000280), 0xfd, r1}, 0x38) keyctl$restrict_keyring(0xa, r0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000180)='i=Ov:cb2e\xdf\xff\xff\x04\x00\xff\xff\xff') 4m43.880378782s ago: executing program 4 (id=2659): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xb, 0x9, 0x3, 0xc4f, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000100), 0x6c7, r0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000440), 0x3, r0}, 0x38) 4m43.57211016s ago: executing program 4 (id=2661): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) creat(&(0x7f0000000080)='./file0/file1\x00', 0x90) unlink(&(0x7f0000000100)='./file0/file1\x00') 4m43.333939173s ago: executing program 4 (id=2663): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x6, &(0x7f0000000140)={0x11, {{0x29, 0x0, 0x37000000, @local}}}, 0x88) 4m43.179296527s ago: executing program 4 (id=2665): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec8500000075000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) r1 = memfd_create(&(0x7f00000005c0)='\x103q}2[\xe0\x9a\xee\xaf\x03\x97\x9et\v\"|Ma\x86\xe7\xc0\x14\x9f\xb9h\xb1\x96\xe7=I\x860S6\xb5\xa8\xc2\x95Je%\xfeG\'\b\x00\x00\x00\x00\x00\x00\x00\x1c\xa6\xab\bi\xe4^\xd5\xfd\xa9\r\xac7A\x94k\xcd\t\x00\x90k\xd6\x05\xb6&\xd0\x9daA\xc5\x9c_\xd4\x18,\f\xd4s\xb2\x99/\xc0\x9a\xf2Oc\xc0c\x03gB!\xb0\xb8n\x01\x9bT\x95\x10\x86\xe8$\x7f\r[\xf9\x0e1v\xb1\n\x88\v\x95uy\xb5:`\x8b\nC\x18A;\xaa%\xaf\xc7\xa3\xac\xa2D\xb5\xe2\xe1\xdc(\xfd\x05\x9fB\x84O\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1a\xa0\x17\xe3\xac\xe9\xc9\xa7\x8a\x1b\x03\"&\xac\xcap>\xccZ\x01\xbc\x18\xc1\xb9\xe9\v\x8b\x9c\xb4Q\xd4\x96EV<>\x99\xca\xb3\xe0\xc4tL\xed\xf5W\xbd#\xcf\x8a\x84\xed\x9f/\xd4\xbb\xea;-Dp\xf8\xd0F\x90\xf8\x92Ip6\xf4\x16\xe8\x14\xe0\x92!\x92-F\xe2\x14D\x91\xa8b\x04\xdd\x1d\a\xdc\xe0\x18\x85{\x80Q\xf6k\x96\xfaQ\x9fW\vO\xf0\xe4O\\\xceS\xe2\x05\x049d\x06#\x88\xc3\xdf\x85O\x1c\xc3\xad?r\xd7\x0e\x00\xd7\x83\xb0\x88\x9c\xf6Y-F\x98\xdd\x9c~\xfd\x95\xc3\xb6lC\xaa\"Y\xa2K\xecz\x84:*\xf5Y\xd1\x9b1\xbd\x9b\x15\xd4\xec\x02o\x01&\xaa\x90w\xc4\xc7\x8en\xb5\x1ag\xab&?\xbe\xcb\xe8v\xa8\xe0\xa4\x81sW\xacf\x149\xd2}\xef\x03Ga\x9a$4\x8c\xa5!p\x83\x05\x96%\x02%\xabj\n\b\xc8NC\x91}&y\xd3\xe1\xeep\'\xc5\xab\x19GsX5\x8c\n\x9fh\xee;4\xb1%V\xe0\xa9\x8e\xf30:\xd8\x18N~G\x139\xcaf2\x02F1\xc6\x82\x00E\xae\x9d\x17\x871N:\xb4\xea \x8e\xdelP\x83\x1f\'\xe2\xd6\xc0\xc3\xfc\xc9677u\xf3RUP@o>\xee\xb8\xa3\t\x02\xb7\\,\xebK\xed\x1b\xc9e\xb3\x16\xce\x9bI\xdb\xfa\x82\x85\t\x9bg\xd0s\xe2\f{\x8cp~;\xf8\x96\xf2\x91\x06\x89\xa6D\xce\xac\x03\xc1\x83\xd1\xe6 |\xa75\xd7\x80t\xfc\xf8\xd2\x12N\x1cB7^\xfd4\xae\xb0VFw\b!\xae\x1baTv\xc0z\x19\xc5\xc8w\xba\x97N\x9a`\x8f\xfc\x9ee\xf9\x00\x1cQA\x14]\r\xd4\"\xc2\x12GD\xdb{\x88\xaa\x81\xc8\xa2\xdeI\xa2\xbel\x0e\xec\x17fNI\x05\xff\x8d\xf4_\x1a\vqA\xb7\x0ed<\x98\xee\xb8\x19\xec\x9f\xee\xe1_\xacG\x8b\xa3\xc3\x13\x80\x0f\xf4I\xdeAwG\xbdkno\xa2\b\x126\x97\x9b\xf9|P\xd94\v\x15\xcb\xc0\x9d\x11\xf3\x18\xae!2\x1b\x12\xa9\xc8~\xb7S\x94\xb5\xc7;\xa90D>s\xe9\xa4N\xf8\xdb\xab\xa0\x94~\xa1]b\xa4\xe5\xe2e\x1c\x8b\xd2\xc7Md\x93\x02\xd8\xb0,\xeb\x03\xaa\v\xed\x9bR\x8a\x80\xc2\x1f\x17ej\x973wv\x83a\xe06\x96\xde\xbc%Uh;H\xf8S\xf1\xa1g\x02\xc4\xc3\xa4\xa8\x96\t\xfex\xa2?\xcb\\Y\x1e\xfe\xca\xa0i\x80O\x11\xac\xb7$\xdb\xbc\xb0\xcb\xacqU\xb5*\x00\x00\x00\x00\x00\x00\x00\f\xda\xf8oV\x89\xd3\x1f\x99+\xe5T\x8eM4\x1c\xc6\x7f\xd4\xf2\xcc\xd3\x94\xca\xd4\x00\x00\x00\x00\x00\x00\x00\x00\x00~A9\xf6IBu2L\x9e\xa2\xd0\x92\xd1\xbc\xb8\tJ\xa1\aN\x87\x95\xbb\xa9s\xab\x90\x06\xc6!p\x9e?~\xf9\xe6\xae*\v\xa3\xd9gxKN\'z]*\x93\xf7\b\x91\xd0\xff\xd9\xc6a\xb5q\x9c\xa1Go\xd58\x93\xe0,\x9f\xe4\xa9\xd9A\x9e\x95e\x98\xd0V\x9d\xed\x97\xf1\xc5\xce\xf5\x90!d\x9a\xd8\x10\xbbx\r8\xff\x8bNUK\xebA\xe5\x92f\xc4\xd1\xa8\x15\xbf\xb5iW\xdb.kbf*\x89\xf0\xecq m-~\xbbf?\xec=\xd2\xe2\x1e\x8d/o\xcd\xc8x\xdb\xe6\xd0W\xca\xc5kz\x8e9\xfa\x86\x0f\x96p', 0x3) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000000}) fcntl$addseals(r1, 0x409, 0xb) 4m40.24686325s ago: executing program 4 (id=2669): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x8f, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r2, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 3m55.030873689s ago: executing program 35 (id=2669): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x10, &(0x7f0000000240), &(0x7f0000000280), 0x8, 0x8f, 0x8, 0x0, 0x0}}, 0x10) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000240)=@bpf_lsm={0x18, 0x7, &(0x7f0000000180)=ANY=[@ANYBLOB="8510000004000000950000000000000018000000000000000000000000000000950000000000000085100000fcffffff95"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r2, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) 2.541382283s ago: executing program 5 (id=3107): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const={0xc, 0x0, 0x0, 0xa, 0x5}]}}, 0x0, 0x26, 0x0, 0x0, 0x6, 0x0, @void, @value}, 0x28) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="8b33000000000000000005"], 0x28}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) 2.539742724s ago: executing program 3 (id=3108): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f00850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000c40)={{0x14}, [@NFT_MSG_NEWRULE={0x268, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x23c, 0x4, 0x0, 0x1, [{0x238, 0x1, 0x0, 0x1, @match={{0xa}, @val={0x228, 0x2, 0x0, 0x1, [@NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_MATCH_INFO={0x214, 0x3, "d67a8527f76ec1d39e537c4c3060c6a405106c72848aa8bcb429b3a20d532452032d5f166334739d1719a5778bd4f724ee4ca57f2527aeeb0c75755d68fc6fa55f4825682ee95e581039823e5963beedcf65b8b005623d90772b8b6ebd2498b0aff725a3eabb6c99cb2edfe10b9c33be8a971e08401bc0807e75a2ff376b7934473bc1f02bb512b77414daf260c9c7d4e1f0758b56ec5823892af310e6252fcfb1d9dbaddefdaa26f43f12f831fd221926d6536eeff641db46920ae0e48f3ff5de599714ba6510ce479d4116a519792281736f39c9fc0e10ef557392c43389271cebcf36543fcf6f83bf74b93ee4eb5e8c82e35bb4784cc1ed0ad291b16e8368487589f7590bf5896f340a36555a1cf69736da230a809176dbdfba3d47efb9a6932e5503d277532b7d4e6f7c7373a298e5843a9f74d5fd07fbc6ad22bc644ba9b3c94ec3c8f0b9321b16e5826b1f058f781760a5d4b6a8880202b41689139c37cd51f65a92d883f8901add03b650c9ec182fb565a4d657ebba9d6a5eb426b22d5933b72362e6ec327fb679aa8034b8b3b6680ad138be47652a3e77981187d2921cebfc1639aa280e3d38dba9b1af49ceded79c78a2d656b3a3e946e17e6257def6679f70f11aa01a2d906aecf4dbc7d1a332a8932ed719ce7eecb5450f494f944b3f6b637502ddba609c6e45dcfad1db7c7dda3e2c755ddcf27132985442e9b8df16f96c82e72e3e2491856d07756b9f"}, @NFTA_MATCH_NAME={0x8, 0x1, 'bpf\x00'}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x290}}, 0x4048010) 1.994507124s ago: executing program 3 (id=3109): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001440)={0x18, 0xb, &(0x7f0000000880)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x10000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = fsopen(&(0x7f0000000400)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000005c0)='\x00H\xeb', 0x0, r1) close(r1) 1.763235226s ago: executing program 5 (id=3110): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f00)={{0x14}, [@NFT_MSG_NEWRULE={0x270, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x23c, 0x4, 0x0, 0x1, [{0x238, 0x1, 0x0, 0x1, @match={{0xa}, @val={0x228, 0x2, 0x0, 0x1, [@NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_MATCH_INFO={0x214, 0x3, "d67a8527f76ec1d39e537c4c3060c6a405106c72848aa8bcb429b3a20d532452032d5f166334739d1719a5778bd4f724ee4ca57f2527aeeb0c75755d68fc6fa55f4825682ee95e581039823e5963beedcf65b8b005623d90772b8b6ebd2498b0aff725a3eabb6c99cb2edfe10b9c33be8a971e08401bc0807e75a2ff376b7934473bc1f02bb512b77414daf260c9c7d4e1f0758b56ec5823892af310e6252fcfb1d9dbaddefdaa26f43f12f831fd221926d6536eeff641db46920ae0e48f3ff5de599714ba6510ce479d4116a519792281736f39c9fc0e10ef557392c43389271cebcf36543fcf6f83bf74b93ee4eb5e8c82e35bb4784cc1ed0ad291b16e8368487589f7590bf5896f340a36555a1cf69736da230a809176dbdfba3d47efb9a6932e5503d277532b7d4e6f7c7373a298e5843a9f74d5fd07fbc6ad22bc644ba9b3c94ec3c8f0b9321b16e5826b1f058f781760a5d4b6a8880202b41689139c37cd51f65a92d883f8901add03b650c9ec182fb565a4d657ebba9d6a5eb426b22d5933b72362e6ec327fb679aa8034b8b3b6680ad138be47652a3e77981187d2921cebfc1639aa280e3d38dba9b1af49ceded79c78a2d656b3a3e946e17e6257def6679f70f11aa01a2d906aecf4dbc7d1a332a8932ed719ce7eecb5450f494f944b3f6b637502ddba609c6e45dcfad1db7c7dda3e2c755ddcf27132985442e9b8df16f96c82e72e3e2491856d07756b9f"}, @NFTA_MATCH_NAME={0x8, 0x1, 'bpf\x00'}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_USERDATA={0x7, 0x7, 0x1, 0x0, "c9cbc7"}]}], {0x14}}, 0x298}}, 0x4048010) 1.632483648s ago: executing program 5 (id=3111): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_pidfd_open(0x0, 0x0) 1.580471113s ago: executing program 3 (id=3112): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000002c0)=0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x52f}, 0x18) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x2) 1.371389452s ago: executing program 5 (id=3113): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a30000000002c00038008000140000000000800024000000000180003801400010076657468305f746f5f687372000000005c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a3000000000300003802c0003801400010076657468305f746f5f68737200000000140001"], 0xfc}}, 0x0) 1.06854785s ago: executing program 5 (id=3114): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) fsopen(0x0, 0x1) r1 = syz_open_dev$usbfs(&(0x7f0000000240), 0xb, 0x101301) ioctl$USBDEVFS_IOCTL(r1, 0x80045505, &(0x7f0000000040)=@usbdevfs_connect) 666.753108ms ago: executing program 3 (id=3115): r0 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000800)=@newqdisc={0x94, 0x24, 0xf0b, 0x70bd2b, 0x0, {0x0, 0x0, 0x12, r1, {}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x64, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1], 0x0, [0x8, 0x4, 0x0, 0x0, 0x16f8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x8, 0x2, 0x0, 0x1, [{0x4}]}]}}]}, 0x94}}, 0x0) 574.189876ms ago: executing program 5 (id=3116): socket(0x10, 0x3, 0x0) socket(0x2a, 0x2, 0x0) r0 = socket(0x8000000010, 0x2, 0x0) write(r0, &(0x7f00000002c0)="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", 0xfc) 304.837791ms ago: executing program 3 (id=3117): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2b, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r1, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000280)='./file0\x00', &(0x7f0000000100)=[0x7], 0x0, 0xe, 0x1}}, 0x40) 0s ago: executing program 3 (id=3118): open(0x0, 0x145142, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_COMPAT_GET(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="4c000000000b0101000000000000000003000008080003400000000105000100000000000800024000000005080003"], 0x4c}, 0x1, 0x0, 0x0, 0x60004000}, 0x40010) kernel console output (not intermixed with test programs): 17c) [ 1551.533525][T11700] r5:00001000 r4:85150000 [ 1551.533541][T11700] [<807c17d0>] (tomoyo_realpath_from_path) from [<807bd950>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1551.533618][T11700] r10:850c3000 r9:00000000 r8:00000003 r7:00008915 r6:00000004 r5:81cd63f8 [ 1551.533639][T11700] r4:8489c3e8 r3:826c0200 [ 1551.533658][T11700] [<807bd884>] (tomoyo_path_number_perm) from [<807c2230>] (tomoyo_file_ioctl+0x1c/0x20) [ 1551.533735][T11700] r9:8489c3c0 r8:00000003 r7:20002a80 r6:20002a80 r5:00008915 r4:8489c3c0 [ 1551.533761][T11700] [<807c2214>] (tomoyo_file_ioctl) from [<8076f37c>] (security_file_ioctl+0x64/0x1e4) [ 1551.533835][T11700] [<8076f318>] (security_file_ioctl) from [<8056ed10>] (sys_ioctl+0x4c/0xdc8) [ 1551.533922][T11700] r7:20002a80 r6:8489c3c1 r5:00000000 r4:00008915 [ 1551.533939][T11700] [<8056ecc4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1551.534004][T11700] Exception stack(0xed481fa8 to 0xed481ff0) [ 1551.534039][T11700] 1fa0: 00000000 00000000 00000003 00008915 20002a80 00000000 [ 1551.534073][T11700] 1fc0: 00000000 00000000 0012fed0 00000036 002d0000 00000000 00006364 76bbc0bc [ 1551.534100][T11700] 1fe0: 76bbbec0 76bbbeb0 00019384 00131f20 [ 1551.534134][T11700] r10:00000036 r9:850c3000 r8:8020029c r7:00000036 r6:0012fed0 r5:00000000 [ 1551.534154][T11700] r4:00000000 [ 1551.557374][T11700] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1551.712910][ T44] usb 1-1: new high-speed USB device number 63 using dummy_hcd [ 1551.746647][ T44] usb 1-1: device descriptor read/8, error -71 [ 1551.853646][ T44] usb usb1-port1: unable to enumerate USB device [ 1556.108282][T11718] fuse: Unknown parameter 'fd0x0000000000000003' [ 1562.462228][ T4234] usb 2-1: new high-speed USB device number 69 using dummy_hcd [ 1562.612814][ T4234] usb 2-1: device descriptor read/64, error -71 [ 1562.872091][ T4234] usb 2-1: new high-speed USB device number 70 using dummy_hcd [ 1562.910063][T11782] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=11782 comm=syz.0.2180 [ 1563.034443][ T4234] usb 2-1: device descriptor read/64, error -71 [ 1563.144690][ T4234] usb usb2-port1: attempt power cycle [ 1563.324908][T11789] FAULT_INJECTION: forcing a failure. [ 1563.324908][T11789] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1563.328169][T11789] CPU: 0 UID: 0 PID: 11789 Comm: syz.0.2183 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1563.328229][T11789] Hardware name: ARM-Versatile Express [ 1563.328241][T11789] Call trace: [ 1563.328261][T11789] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1563.328325][T11789] r7:ed681e20 r6:00000000 r5:60000113 r4:82259c04 [ 1563.328334][T11789] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1563.328370][T11789] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1563.328410][T11789] r5:850c1800 r4:82950490 [ 1563.328417][T11789] [<8021fe2c>] (dump_stack) from [<8096b71c>] (should_fail_ex+0x1c4/0x228) [ 1563.328454][T11789] [<8096b558>] (should_fail_ex) from [<8096b794>] (should_fail+0x14/0x18) [ 1563.328488][T11789] r8:00000000 r7:ed681e20 r6:20002180 r5:00000000 r4:ed681f20 [ 1563.328495][T11789] [<8096b780>] (should_fail) from [<8096b7b4>] (should_fail_usercopy+0x1c/0x20) [ 1563.328528][T11789] [<8096b798>] (should_fail_usercopy) from [<81529a24>] (copy_msghdr_from_user+0x50/0x130) [ 1563.328562][T11789] [<815299d4>] (copy_msghdr_from_user) from [<81529b7c>] (___sys_sendmsg+0x78/0xd0) [ 1563.328596][T11789] r8:00000000 r7:00000000 r6:84cdc280 r5:ed681f20 r4:ed681e64 [ 1563.328604][T11789] [<81529b04>] (___sys_sendmsg) from [<8152a038>] (__sys_sendmsg+0x8c/0xe0) [ 1563.328638][T11789] r10:00000128 r9:850c1800 r8:8489c300 r7:00000000 r6:20002180 r5:8489c301 [ 1563.328647][T11789] r4:00000004 [ 1563.328654][T11789] [<81529fac>] (__sys_sendmsg) from [<8152a0a0>] (sys_sendmsg+0x14/0x18) [ 1563.328688][T11789] r8:8020029c r7:00000128 r6:0012fed0 r5:00000000 r4:00000000 [ 1563.328696][T11789] [<8152a08c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1563.328720][T11789] Exception stack(0xed681fa8 to 0xed681ff0) [ 1563.328738][T11789] 1fa0: 00000000 00000000 00000004 20002180 00000000 00000000 [ 1563.328753][T11789] 1fc0: 00000000 00000000 0012fed0 00000128 002d0000 00000000 00006364 76b770bc [ 1563.328765][T11789] 1fe0: 76b76ec0 76b76eb0 00019384 00131f20 [ 1563.482462][ T4234] usb 2-1: new high-speed USB device number 71 using dummy_hcd [ 1563.513655][ T4234] usb 2-1: device descriptor read/8, error -71 [ 1563.752606][ T4234] usb 2-1: new high-speed USB device number 72 using dummy_hcd [ 1563.779970][ T4234] usb 2-1: device descriptor read/8, error -71 [ 1563.883014][ T4234] usb usb2-port1: unable to enumerate USB device [ 1563.904179][T11799] FAULT_INJECTION: forcing a failure. [ 1563.904179][T11799] name failslab, interval 1, probability 0, space 0, times 0 [ 1563.904435][T11799] CPU: 1 UID: 0 PID: 11799 Comm: syz.0.2187 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1563.904476][T11799] Hardware name: ARM-Versatile Express [ 1563.904495][T11799] Call trace: [ 1563.904523][T11799] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1563.904589][T11799] r7:00000d40 r6:00000000 r5:60000013 r4:82259c04 [ 1563.904598][T11799] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1563.904635][T11799] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1563.904764][T11799] r5:855fe000 r4:82919c40 [ 1563.904870][T11799] [<8021fe2c>] (dump_stack) from [<8096b71c>] (should_fail_ex+0x1c4/0x228) [ 1563.905032][T11799] [<8096b558>] (should_fail_ex) from [<8052377c>] (should_failslab+0x6c/0x94) [ 1563.905108][T11799] r8:855fe000 r7:00000d40 r6:85041028 r5:0000001b r4:83001240 [ 1563.905144][T11799] [<80523710>] (should_failslab) from [<8050850c>] (__kmalloc_noprof+0x9c/0x458) [ 1563.905385][T11799] [<80508470>] (__kmalloc_noprof) from [<807c1714>] (tomoyo_encode2+0x64/0xf0) [ 1563.905771][T11799] r10:00000fff r9:8309d800 r8:00000000 r7:83797c38 r6:85041028 r5:855e1ffd [ 1563.905802][T11799] r4:855e1fed [ 1563.905818][T11799] [<807c16b0>] (tomoyo_encode2) from [<807c17c4>] (tomoyo_encode+0x24/0x30) [ 1563.905883][T11799] r9:8309d800 r8:00000000 r7:83797c38 r6:85041028 r5:00001000 r4:855e1fee [ 1563.906584][T11799] [<807c17a0>] (tomoyo_encode) from [<807c1850>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1563.906776][T11799] r5:00001000 r4:855e1000 [ 1563.907282][T11799] [<807c17d0>] (tomoyo_realpath_from_path) from [<807bdc00>] (tomoyo_check_open_permission+0x150/0x1c0) [ 1563.907383][T11799] r10:855fe000 r9:00000004 r8:830aaf40 r7:00000000 r6:00000000 r5:85041028 [ 1563.907740][T11799] r4:00000001 r3:00000001 [ 1563.907848][T11799] [<807bdab0>] (tomoyo_check_open_permission) from [<807c26b4>] (tomoyo_file_open+0x34/0x38) [ 1563.908258][T11799] r9:85041300 r8:85041028 r7:00000000 r6:84c0b238 r5:81c20f00 r4:85041000 [ 1563.908759][T11799] [<807c2680>] (tomoyo_file_open) from [<8077f100>] (security_file_open+0x54/0x194) [ 1563.909016][T11799] r5:81c20f00 r4:85041000 [ 1563.909035][T11799] [<8077f0ac>] (security_file_open) from [<8054fcd8>] (do_dentry_open+0xe8/0x630) [ 1563.909749][T11799] r5:81c20f00 r4:85041000 [ 1563.909787][T11799] [<8054fbf0>] (do_dentry_open) from [<80551b3c>] (vfs_open+0x2c/0xe8) [ 1563.909866][T11799] r8:00000004 r7:835b2280 r6:85041028 r5:ed70de84 r4:85041000 [ 1563.909882][T11799] [<80551b10>] (vfs_open) from [<80551c38>] (dentry_open+0x40/0x68) [ 1563.910044][T11799] r6:855fe000 r5:ed70de84 r4:85041000 [ 1563.910058][T11799] [<80551bf8>] (dentry_open) from [<805a5264>] (open_namespace+0x6c/0xbc) [ 1563.910165][T11799] r5:00000000 r4:00000005 [ 1563.910501][T11799] [<805a51f8>] (open_namespace) from [<805a52d0>] (open_related_ns+0x1c/0x20) [ 1563.910596][T11799] r6:82c1c800 r5:00000000 r4:0000894c [ 1563.911219][T11799] [<805a52b4>] (open_related_ns) from [<815282c4>] (sock_ioctl+0x37c/0x600) [ 1563.913068][T11799] [<81527f48>] (sock_ioctl) from [<8056edf4>] (sys_ioctl+0x130/0xdc8) [ 1563.913148][T11799] r9:85041300 r8:00000004 r7:00000000 r6:85041301 r5:00000000 r4:0000894c [ 1563.913165][T11799] [<8056ecc4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1563.913225][T11799] Exception stack(0xed70dfa8 to 0xed70dff0) [ 1563.913257][T11799] dfa0: 00000000 00000000 00000004 0000894c 00000000 00000000 [ 1563.913283][T11799] dfc0: 00000000 00000000 0012fed0 00000036 002d0000 00000000 00006364 76b770bc [ 1563.913307][T11799] dfe0: 76b76ec0 76b76eb0 00019384 00131f20 [ 1563.913334][T11799] r10:00000036 r9:855fe000 r8:8020029c r7:00000036 r6:0012fed0 r5:00000000 [ 1563.913350][T11799] r4:00000000 [ 1563.930457][T11799] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1564.033767][T11801] netlink: 'syz.0.2188': attribute type 2 has an invalid length. [ 1564.033979][T11801] netlink: 'syz.0.2188': attribute type 2 has an invalid length. [ 1564.034093][T11801] netlink: 'syz.0.2188': attribute type 1 has an invalid length. [ 1564.034125][T11801] netlink: 'syz.0.2188': attribute type 2 has an invalid length. [ 1564.055543][ T31] audit: type=1400 audit(1563.950:3581): avc: denied { listen } for pid=11800 comm="syz.0.2188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1568.275027][T11814] FAULT_INJECTION: forcing a failure. [ 1568.275027][T11814] name failslab, interval 1, probability 0, space 0, times 0 [ 1568.276339][T11814] CPU: 0 UID: 0 PID: 11814 Comm: syz.0.2193 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1568.276431][T11814] Hardware name: ARM-Versatile Express [ 1568.276449][T11814] Call trace: [ 1568.276481][T11814] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1568.276581][T11814] r7:00000d40 r6:00000000 r5:60000013 r4:82259c04 [ 1568.276596][T11814] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1568.276661][T11814] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1568.276736][T11814] r5:855fb000 r4:82919c40 [ 1568.276749][T11814] [<8021fe2c>] (dump_stack) from [<8096b71c>] (should_fail_ex+0x1c4/0x228) [ 1568.276821][T11814] [<8096b558>] (should_fail_ex) from [<8052377c>] (should_failslab+0x6c/0x94) [ 1568.276898][T11814] r8:855fb000 r7:00000d40 r6:8489cda8 r5:00000019 r4:83001240 [ 1568.276912][T11814] [<80523710>] (should_failslab) from [<8050850c>] (__kmalloc_noprof+0x9c/0x458) [ 1568.276982][T11814] [<80508470>] (__kmalloc_noprof) from [<807c1714>] (tomoyo_encode2+0x64/0xf0) [ 1568.277110][T11814] r10:00000fff r9:8309f800 r8:00000000 r7:84c47d48 r6:8489cda8 r5:85153ffd [ 1568.277127][T11814] r4:85153fef [ 1568.277139][T11814] [<807c16b0>] (tomoyo_encode2) from [<807c17c4>] (tomoyo_encode+0x24/0x30) [ 1568.277236][T11814] r9:8309f800 r8:00000000 r7:84c47d48 r6:8489cda8 r5:00001000 r4:85153ff0 [ 1568.277249][T11814] [<807c17a0>] (tomoyo_encode) from [<807c1850>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1568.277310][T11814] r5:00001000 r4:85153000 [ 1568.277322][T11814] [<807c17d0>] (tomoyo_realpath_from_path) from [<807bd950>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1568.277464][T11814] r10:855fb000 r9:00000000 r8:00000003 r7:80049363 r6:00000004 r5:81cd63f8 [ 1568.277482][T11814] r4:8489cda8 r3:826c0200 [ 1568.277494][T11814] [<807bd884>] (tomoyo_path_number_perm) from [<807c2230>] (tomoyo_file_ioctl+0x1c/0x20) [ 1568.277564][T11814] r9:8489cd80 r8:00000003 r7:00000000 r6:00000000 r5:80049363 r4:8489cd80 [ 1568.277577][T11814] [<807c2214>] (tomoyo_file_ioctl) from [<8076f37c>] (security_file_ioctl+0x64/0x1e4) [ 1568.277641][T11814] [<8076f318>] (security_file_ioctl) from [<8056ed10>] (sys_ioctl+0x4c/0xdc8) [ 1568.277716][T11814] r7:00000000 r6:8489cd81 r5:00000000 r4:80049363 [ 1568.277730][T11814] [<8056ecc4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1568.277791][T11814] Exception stack(0xed681fa8 to 0xed681ff0) [ 1568.277819][T11814] 1fa0: 00000000 00000000 00000003 80049363 00000000 00000000 [ 1568.277845][T11814] 1fc0: 00000000 00000000 0012fed0 00000036 002d0000 00000000 00006364 76b770bc [ 1568.277866][T11814] 1fe0: 76b76ec0 76b76eb0 00019384 00131f20 [ 1568.277893][T11814] r10:00000036 r9:855fb000 r8:8020029c r7:00000036 r6:0012fed0 r5:00000000 [ 1568.277907][T11814] r4:00000000 [ 1568.294217][T11814] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1568.376587][T11816] FAULT_INJECTION: forcing a failure. [ 1568.376587][T11816] name failslab, interval 1, probability 0, space 0, times 0 [ 1568.378041][T11816] CPU: 0 UID: 0 PID: 11816 Comm: syz.0.2194 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1568.378153][T11816] Hardware name: ARM-Versatile Express [ 1568.378179][T11816] Call trace: [ 1568.378221][T11816] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1568.378335][T11816] r7:855fe000 r6:00000000 r5:60000013 r4:82259c04 [ 1568.378359][T11816] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1568.378437][T11816] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1568.378539][T11816] r5:855fe000 r4:82919c40 [ 1568.378558][T11816] [<8021fe2c>] (dump_stack) from [<8096b71c>] (should_fail_ex+0x1c4/0x228) [ 1568.378637][T11816] [<8096b558>] (should_fail_ex) from [<8052377c>] (should_failslab+0x6c/0x94) [ 1568.378729][T11816] r8:00000000 r7:855fe000 r6:00000cc0 r5:00000002 r4:83001540 [ 1568.378748][T11816] [<80523710>] (should_failslab) from [<8050753c>] (__kmalloc_cache_noprof+0x4c/0x33c) [ 1568.378833][T11816] [<805074f0>] (__kmalloc_cache_noprof) from [<8144b5bc>] (snd_pcm_hw_param_near.constprop.0+0x5c/0x274) [ 1568.378942][T11816] r10:00001f40 r9:8245c6c0 r8:84188a00 r7:0000000a r6:00001f40 r5:00000002 [ 1568.378968][T11816] r4:85931800 [ 1568.378987][T11816] [<8144b560>] (snd_pcm_hw_param_near.constprop.0) from [<8144bda0>] (snd_pcm_oss_change_params_locked+0x314/0xc84) [ 1568.379100][T11816] r10:00001f40 r9:00001f40 r8:85930000 r7:85931400 r6:00001f40 r5:84188a00 [ 1568.379123][T11816] r4:85931800 [ 1568.379143][T11816] [<8144ba8c>] (snd_pcm_oss_change_params_locked) from [<8144c980>] (snd_pcm_oss_get_active_substream+0x94/0xc0) [ 1568.379261][T11816] r10:855fe000 r9:ed8b5e98 r8:859302b8 r7:85310c80 r6:85310c84 r5:84188a00 [ 1568.379284][T11816] r4:84188a00 [ 1568.379301][T11816] [<8144c8ec>] (snd_pcm_oss_get_active_substream) from [<8144cb64>] (snd_pcm_oss_set_channels+0xa8/0x100) [ 1568.379438][T11816] r9:8489cd80 r8:859302b8 r7:00000002 r6:85310c80 r5:85310c80 r4:85930000 [ 1568.379456][T11816] [<8144cabc>] (snd_pcm_oss_set_channels) from [<8144df40>] (snd_pcm_oss_ioctl+0x718/0x1004) [ 1568.379571][T11816] r8:b5403587 r7:85310c80 r6:200000c0 r5:00000000 r4:b5003500 [ 1568.379591][T11816] [<8144d828>] (snd_pcm_oss_ioctl) from [<8056edf4>] (sys_ioctl+0x130/0xdc8) [ 1568.379716][T11816] r10:855fe000 r9:8489cd80 r8:00000003 r7:200000c0 r6:8489cd81 r5:00000000 [ 1568.379740][T11816] r4:c0045003 [ 1568.379758][T11816] [<8056ecc4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1568.379826][T11816] Exception stack(0xed8b5fa8 to 0xed8b5ff0) [ 1568.379865][T11816] 5fa0: 00000000 00000000 00000003 c0045003 200000c0 00000000 [ 1568.379899][T11816] 5fc0: 00000000 00000000 0012fed0 00000036 002d0000 00000000 00006364 76b770bc [ 1568.379927][T11816] 5fe0: 76b76ec0 76b76eb0 00019384 00131f20 [ 1568.379960][T11816] r10:00000036 r9:855fe000 r8:8020029c r7:00000036 r6:0012fed0 r5:00000000 [ 1568.379980][T11816] r4:00000000 [ 1568.961365][T11483] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1569.016763][T11483] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1569.075444][T11483] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1569.126805][T11483] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1569.442357][T11483] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1569.448151][T11483] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1569.455235][T11483] bond0 (unregistering): Released all slaves [ 1569.521336][T11483] hsr_slave_0: left promiscuous mode [ 1569.524572][T11483] hsr_slave_1: left promiscuous mode [ 1569.543596][T11483] veth1_macvtap: left promiscuous mode [ 1569.544134][T11483] veth0_macvtap: left promiscuous mode [ 1569.544547][T11483] veth1_vlan: left promiscuous mode [ 1569.544924][T11483] veth0_vlan: left promiscuous mode [ 1571.776975][T11824] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1571.784771][T11824] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1572.773878][T12063] random: crng reseeded on system resumption [ 1572.877299][ T31] audit: type=1400 audit(1572.770:3582): avc: denied { read } for pid=12060 comm="syz.1.2198" path="socket:[24960]" dev="sockfs" ino=24960 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1573.123961][T11824] hsr_slave_0: entered promiscuous mode [ 1573.124993][T11824] hsr_slave_1: entered promiscuous mode [ 1573.125738][T11824] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1573.125901][T11824] Cannot create hsr debugfs directory [ 1573.768561][T11824] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 1573.790570][T11824] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 1573.808818][T11824] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 1573.836263][T11824] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 1574.637416][ T31] audit: type=1400 audit(1574.530:3583): avc: denied { ioctl } for pid=12192 comm="syz.1.2200" path="socket:[24976]" dev="sockfs" ino=24976 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1574.734933][T11824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1576.633083][ T4234] usb 2-1: new high-speed USB device number 73 using dummy_hcd [ 1576.832810][ T4234] usb 2-1: device descriptor read/64, error -71 [ 1577.072865][ T4234] usb 2-1: new high-speed USB device number 74 using dummy_hcd [ 1577.212595][ T4234] usb 2-1: device descriptor read/64, error -71 [ 1577.323591][ T4234] usb usb2-port1: attempt power cycle [ 1577.672912][ T4234] usb 2-1: new high-speed USB device number 75 using dummy_hcd [ 1577.705813][ T4234] usb 2-1: device descriptor read/8, error -71 [ 1577.944137][ T4234] usb 2-1: new high-speed USB device number 76 using dummy_hcd [ 1577.976420][ T4234] usb 2-1: device descriptor read/8, error -71 [ 1578.084814][ T4234] usb usb2-port1: unable to enumerate USB device [ 1578.505798][T11824] veth0_vlan: entered promiscuous mode [ 1578.526376][T11824] veth1_vlan: entered promiscuous mode [ 1578.586712][T11824] veth0_macvtap: entered promiscuous mode [ 1578.599840][T11824] veth1_macvtap: entered promiscuous mode [ 1578.647182][T11824] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1578.648057][T11824] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1578.648672][T11824] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1578.649205][T11824] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1582.084954][ T31] audit: type=1400 audit(1581.980:3584): avc: denied { ioctl } for pid=12288 comm="syz.0.2210" path="cgroup:[4026532830]" dev="nsfs" ino=4026532830 ioctlcmd=0x54e3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1582.934438][T12301] FAULT_INJECTION: forcing a failure. [ 1582.934438][T12301] name failslab, interval 1, probability 0, space 0, times 0 [ 1582.934814][T12301] CPU: 1 UID: 0 PID: 12301 Comm: syz.0.2216 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1582.934888][T12301] Hardware name: ARM-Versatile Express [ 1582.934915][T12301] Call trace: [ 1582.934954][T12301] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1582.935066][T12301] r7:00000c40 r6:00000000 r5:60000013 r4:82259c04 [ 1582.935086][T12301] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1582.935226][T12301] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1582.935339][T12301] r5:83c90000 r4:82919c40 [ 1582.935460][T12301] [<8021fe2c>] (dump_stack) from [<8096b71c>] (should_fail_ex+0x1c4/0x228) [ 1582.935629][T12301] [<8096b558>] (should_fail_ex) from [<8052377c>] (should_failslab+0x6c/0x94) [ 1582.935855][T12301] r8:83c90000 r7:00000c40 r6:8533f1a8 r5:00001000 r4:830016c0 [ 1582.935970][T12301] [<80523710>] (should_failslab) from [<8050850c>] (__kmalloc_noprof+0x9c/0x458) [ 1582.936093][T12301] [<80508470>] (__kmalloc_noprof) from [<807c180c>] (tomoyo_realpath_from_path+0x3c/0x17c) [ 1582.936186][T12301] r10:83c90000 r9:8309e400 r8:00000000 r7:834e47f8 r6:8533f1a8 r5:00001000 [ 1582.936304][T12301] r4:00000000 [ 1582.936481][T12301] [<807c17d0>] (tomoyo_realpath_from_path) from [<807bd950>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1582.936658][T12301] r10:83c90000 r9:00000000 r8:00000003 r7:c0e05403 r6:00000004 r5:81cd63f8 [ 1582.937017][T12301] r4:8533f1a8 r3:826c0200 [ 1582.937222][T12301] [<807bd884>] (tomoyo_path_number_perm) from [<807c2230>] (tomoyo_file_ioctl+0x1c/0x20) [ 1582.937450][T12301] r9:8533f180 r8:00000003 r7:20000340 r6:20000340 r5:c0e05403 r4:8533f180 [ 1582.937897][T12301] [<807c2214>] (tomoyo_file_ioctl) from [<8076f37c>] (security_file_ioctl+0x64/0x1e4) [ 1582.938339][T12301] [<8076f318>] (security_file_ioctl) from [<8056ed10>] (sys_ioctl+0x4c/0xdc8) [ 1582.938622][T12301] r7:20000340 r6:8533f181 r5:00000000 r4:c0e05403 [ 1582.938674][T12301] [<8056ecc4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1582.939564][T12301] Exception stack(0xedcc9fa8 to 0xedcc9ff0) [ 1582.939890][T12301] 9fa0: 00000000 00000000 00000003 c0e05403 20000340 00000000 [ 1582.940026][T12301] 9fc0: 00000000 00000000 0012fed0 00000036 002d0000 00000000 00006364 76b1e0bc [ 1582.940262][T12301] 9fe0: 76b1dec0 76b1deb0 00019384 00131f20 [ 1582.940604][T12301] r10:00000036 r9:83c90000 r8:8020029c r7:00000036 r6:0012fed0 r5:00000000 [ 1582.940760][T12301] r4:00000000 [ 1582.941368][T12301] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1585.210544][ T31] audit: type=1400 audit(1585.100:3585): avc: denied { getopt } for pid=12314 comm="syz.0.2220" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1588.152799][T10931] usb 2-1: new high-speed USB device number 77 using dummy_hcd [ 1588.292628][T10931] usb 2-1: device descriptor read/64, error -71 [ 1588.532689][T10931] usb 2-1: new high-speed USB device number 78 using dummy_hcd [ 1588.682361][T10931] usb 2-1: device descriptor read/64, error -71 [ 1588.803290][T10931] usb usb2-port1: attempt power cycle [ 1589.152807][T10931] usb 2-1: new high-speed USB device number 79 using dummy_hcd [ 1589.182465][T10931] usb 2-1: device descriptor read/8, error -71 [ 1589.422403][T10931] usb 2-1: new high-speed USB device number 80 using dummy_hcd [ 1589.447441][T10931] usb 2-1: device descriptor read/8, error -71 [ 1589.552996][T10931] usb usb2-port1: unable to enumerate USB device [ 1598.447149][T12355] FAULT_INJECTION: forcing a failure. [ 1598.447149][T12355] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1598.447626][T12355] CPU: 1 UID: 0 PID: 12355 Comm: syz.1.2231 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1598.447739][T12355] Hardware name: ARM-Versatile Express [ 1598.447774][T12355] Call trace: [ 1598.447816][T12355] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1598.447940][T12355] r7:00000000 r6:00000000 r5:60000013 r4:82259c04 [ 1598.447959][T12355] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1598.448028][T12355] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1598.448108][T12355] r5:850c3000 r4:82950490 [ 1598.448124][T12355] [<8021fe2c>] (dump_stack) from [<8096b71c>] (should_fail_ex+0x1c4/0x228) [ 1598.448197][T12355] [<8096b558>] (should_fail_ex) from [<8096b794>] (should_fail+0x14/0x18) [ 1598.448491][T12355] r8:76bbbf30 r7:00000000 r6:00000000 r5:edc3df68 r4:00000002 [ 1598.448603][T12355] [<8096b780>] (should_fail) from [<8096b7b4>] (should_fail_usercopy+0x1c/0x20) [ 1598.448700][T12355] [<8096b798>] (should_fail_usercopy) from [<80590874>] (simple_read_from_buffer+0x80/0x13c) [ 1598.448804][T12355] [<805907f4>] (simple_read_from_buffer) from [<806089b8>] (proc_fail_nth_read+0xb8/0x100) [ 1598.448901][T12355] r10:00000001 r9:80608900 r8:00000002 r7:edc3df68 r6:0000000f r5:76bbbf30 [ 1598.448925][T12355] r4:850c3000 r3:edc3de9f [ 1598.448962][T12355] [<80608900>] (proc_fail_nth_read) from [<80555098>] (vfs_read+0x98/0x320) [ 1598.449145][T12355] r8:76bbbf30 r7:edc3df68 r6:850c3000 r5:0000000f r4:858249c0 [ 1598.449166][T12355] [<80555000>] (vfs_read) from [<80555d40>] (ksys_read+0x74/0xe8) [ 1598.449426][T12355] r10:00000003 r9:850c3000 r8:8020029c r7:00000000 r6:00000000 r5:858249c0 [ 1598.449634][T12355] r4:858249c3 [ 1598.449924][T12355] [<80555ccc>] (ksys_read) from [<80555dc4>] (sys_read+0x10/0x14) [ 1598.450018][T12355] r7:00000003 r6:00000005 r5:76bbbf30 r4:0000000f [ 1598.450099][T12355] [<80555db4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1598.450154][T12355] Exception stack(0xedc3dfa8 to 0xedc3dff0) [ 1598.450274][T12355] dfa0: 0000000f 76bbbf30 00000005 76bbbf30 0000000f 00000000 [ 1598.450384][T12355] dfc0: 0000000f 76bbbf30 00000005 00000003 002d0000 00000000 00006364 76bbc0bc [ 1598.450433][T12355] dfe0: 00000158 76bbbed0 000d7d50 0012fdf4 [ 1603.789228][T12403] FAULT_INJECTION: forcing a failure. [ 1603.789228][T12403] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1603.789457][T12403] CPU: 1 UID: 0 PID: 12403 Comm: syz.1.2241 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1603.789496][T12403] Hardware name: ARM-Versatile Express [ 1603.789511][T12403] Call trace: [ 1603.789574][T12403] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1603.789646][T12403] r7:00000000 r6:00000000 r5:60000013 r4:82259c04 [ 1603.789656][T12403] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1603.789693][T12403] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1603.789734][T12403] r5:83884800 r4:82950490 [ 1603.789742][T12403] [<8021fe2c>] (dump_stack) from [<8096b71c>] (should_fail_ex+0x1c4/0x228) [ 1603.789779][T12403] [<8096b558>] (should_fail_ex) from [<8096b794>] (should_fail+0x14/0x18) [ 1603.789813][T12403] r8:76bbbf30 r7:00000000 r6:00000000 r5:ee4a1f68 r4:00000002 [ 1603.789821][T12403] [<8096b780>] (should_fail) from [<8096b7b4>] (should_fail_usercopy+0x1c/0x20) [ 1603.789850][T12403] [<8096b798>] (should_fail_usercopy) from [<80590874>] (simple_read_from_buffer+0x80/0x13c) [ 1603.789889][T12403] [<805907f4>] (simple_read_from_buffer) from [<806089b8>] (proc_fail_nth_read+0xb8/0x100) [ 1603.790267][T12403] r10:00000001 r9:80608900 r8:00000002 r7:ee4a1f68 r6:0000000f r5:76bbbf30 [ 1603.790376][T12403] r4:83884800 r3:ee4a1e9f [ 1603.790486][T12403] [<80608900>] (proc_fail_nth_read) from [<80555098>] (vfs_read+0x98/0x320) [ 1603.790526][T12403] r8:76bbbf30 r7:ee4a1f68 r6:83884800 r5:0000000f r4:85824840 [ 1603.790733][T12403] [<80555000>] (vfs_read) from [<80555d40>] (ksys_read+0x74/0xe8) [ 1603.791308][T12403] r10:00000003 r9:83884800 r8:8020029c r7:00000000 r6:00000000 r5:85824840 [ 1603.791457][T12403] r4:85824843 [ 1603.791756][T12403] [<80555ccc>] (ksys_read) from [<80555dc4>] (sys_read+0x10/0x14) [ 1603.792168][T12403] r7:00000003 r6:00000004 r5:76bbbf30 r4:0000000f [ 1603.792179][T12403] [<80555db4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1603.792216][T12403] Exception stack(0xee4a1fa8 to 0xee4a1ff0) [ 1603.792242][T12403] 1fa0: 0000000f 76bbbf30 00000004 76bbbf30 0000000f 00000000 [ 1603.792265][T12403] 1fc0: 0000000f 76bbbf30 00000004 00000003 002d0000 00000000 00006364 76bbc0bc [ 1603.792282][T12403] 1fe0: 00000158 76bbbed0 000d7d50 0012fdf4 [ 1609.828129][T12427] FAULT_INJECTION: forcing a failure. [ 1609.828129][T12427] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1609.833036][T12427] CPU: 0 UID: 0 PID: 12427 Comm: syz.0.2249 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1609.833155][T12427] Hardware name: ARM-Versatile Express [ 1609.833182][T12427] Call trace: [ 1609.833222][T12427] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1609.833388][T12427] r7:00000003 r6:00000000 r5:60000013 r4:82259c04 [ 1609.833407][T12427] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1609.833502][T12427] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1609.833600][T12427] r5:84a6d400 r4:82950490 [ 1609.833644][T12427] [<8021fe2c>] (dump_stack) from [<8096b71c>] (should_fail_ex+0x1c4/0x228) [ 1609.833741][T12427] [<8096b558>] (should_fail_ex) from [<8096b794>] (should_fail+0x14/0x18) [ 1609.833820][T12427] r8:20000080 r7:00000003 r6:00001000 r5:00000000 r4:20000040 [ 1609.833839][T12427] [<8096b780>] (should_fail) from [<8096b7b4>] (should_fail_usercopy+0x1c/0x20) [ 1609.833899][T12427] [<8096b798>] (should_fail_usercopy) from [<80971880>] (strncpy_from_user+0x20/0x1a0) [ 1609.833972][T12427] [<80971860>] (strncpy_from_user) from [<8058e1c0>] (setxattr_copy+0x2c/0x90) [ 1609.834071][T12427] r10:000000e4 r9:84a6d400 r8:20000080 r7:00000003 r6:00001000 r5:00000000 [ 1609.834092][T12427] r4:ee7c9e48 [ 1609.834109][T12427] [<8058e194>] (setxattr_copy) from [<8058e3f8>] (path_setxattrat+0x7c/0x17c) [ 1609.834199][T12427] r5:00000000 r4:20000040 [ 1609.834248][T12427] [<8058e37c>] (path_setxattrat) from [<8058e6f8>] (sys_fsetxattr+0x30/0x38) [ 1609.834380][T12427] r8:8020029c r7:000000e4 r6:0012fed0 r5:00000000 r4:00000001 [ 1609.834399][T12427] [<8058e6c8>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1609.834466][T12427] Exception stack(0xee7c9fa8 to 0xee7c9ff0) [ 1609.834503][T12427] 9fa0: 00000001 00000000 00000003 20000040 20000080 00000002 [ 1609.834535][T12427] 9fc0: 00000001 00000000 0012fed0 000000e4 002d0000 00000000 00006364 76b1e0bc [ 1609.834563][T12427] 9fe0: 76b1dec0 76b1deb0 00019384 00131f20 [ 1609.864381][T12427] 8021q: VLANs not supported on tunl0 [ 1617.047032][T12438] FAULT_INJECTION: forcing a failure. [ 1617.047032][T12438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1617.047401][T12438] CPU: 1 UID: 0 PID: 12438 Comm: syz.0.2252 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1617.047460][T12438] Hardware name: ARM-Versatile Express [ 1617.047484][T12438] Call trace: [ 1617.047515][T12438] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1617.047623][T12438] r7:00000003 r6:00000000 r5:60000013 r4:82259c04 [ 1617.047638][T12438] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1617.047848][T12438] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1617.048094][T12438] r5:84a69800 r4:82950490 [ 1617.048207][T12438] [<8021fe2c>] (dump_stack) from [<8096b71c>] (should_fail_ex+0x1c4/0x228) [ 1617.048444][T12438] [<8096b558>] (should_fail_ex) from [<8096b794>] (should_fail+0x14/0x18) [ 1617.048580][T12438] r8:00000000 r7:00000003 r6:00001000 r5:00000000 r4:200028c0 [ 1617.048695][T12438] [<8096b780>] (should_fail) from [<8096b7b4>] (should_fail_usercopy+0x1c/0x20) [ 1617.048794][T12438] [<8096b798>] (should_fail_usercopy) from [<80971880>] (strncpy_from_user+0x20/0x1a0) [ 1617.048935][T12438] [<80971860>] (strncpy_from_user) from [<8058e1c0>] (setxattr_copy+0x2c/0x90) [ 1617.049026][T12438] r10:000000e4 r9:84a69800 r8:00000000 r7:00000003 r6:00001000 r5:00000000 [ 1617.049041][T12438] r4:ee4a1e48 [ 1617.049081][T12438] [<8058e194>] (setxattr_copy) from [<8058e3f8>] (path_setxattrat+0x7c/0x17c) [ 1617.049268][T12438] r5:00000000 r4:200028c0 [ 1617.049287][T12438] [<8058e37c>] (path_setxattrat) from [<8058e6f8>] (sys_fsetxattr+0x30/0x38) [ 1617.049666][T12438] r8:8020029c r7:000000e4 r6:0012fed0 r5:00000000 r4:00000000 [ 1617.049787][T12438] [<8058e6c8>] (sys_fsetxattr) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1617.049918][T12438] Exception stack(0xee4a1fa8 to 0xee4a1ff0) [ 1617.050201][T12438] 1fa0: 00000000 00000000 00000003 200028c0 00000000 00000000 [ 1617.050396][T12438] 1fc0: 00000000 00000000 0012fed0 000000e4 002d0000 00000000 00006364 76b1e0bc [ 1617.050761][T12438] 1fe0: 76b1dec0 76b1deb0 00019384 00131f20 [ 1617.789114][T12442] nbd: must specify an index to disconnect [ 1619.702487][ T57] hid-generic 0002:0008:0001.000B: ignoring exceeding usage max [ 1619.704848][ T57] hid-generic 0002:0008:0001.000B: item fetching failed at offset 22/25 [ 1619.705415][ T57] hid-generic 0002:0008:0001.000B: probe with driver hid-generic failed with error -22 [ 1626.033922][ T31] audit: type=1400 audit(1625.920:3586): avc: denied { remount } for pid=12512 comm="syz.0.2262" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1632.362999][ T3782] usb 1-1: new high-speed USB device number 64 using dummy_hcd [ 1632.545205][ T3782] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1632.545599][ T3782] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1632.545929][ T3782] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 1632.546063][ T3782] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 1632.546134][ T3782] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 1632.553396][ T3782] usb 1-1: config 0 descriptor?? [ 1633.004563][ T3782] plantronics 0003:047F:FFFF.000C: reserved main item tag 0xe [ 1633.005352][ T3782] plantronics 0003:047F:FFFF.000C: unknown main item tag 0x0 [ 1633.006080][ T3782] plantronics 0003:047F:FFFF.000C: No inputs registered, leaving [ 1633.025309][ T3782] plantronics 0003:047F:FFFF.000C: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 1633.289024][ T2880] usb 1-1: USB disconnect, device number 64 [ 1639.026634][T12579] FAULT_INJECTION: forcing a failure. [ 1639.026634][T12579] name failslab, interval 1, probability 0, space 0, times 0 [ 1639.027052][T12579] CPU: 1 UID: 0 PID: 12579 Comm: syz.1.2274 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1639.027124][T12579] Hardware name: ARM-Versatile Express [ 1639.027152][T12579] Call trace: [ 1639.027189][T12579] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1639.027306][T12579] r7:00000d40 r6:00000000 r5:60000013 r4:82259c04 [ 1639.027325][T12579] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1639.027395][T12579] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1639.027643][T12579] r5:8324bc00 r4:82919c40 [ 1639.028112][T12579] [<8021fe2c>] (dump_stack) from [<8096b71c>] (should_fail_ex+0x1c4/0x228) [ 1639.028375][T12579] [<8096b558>] (should_fail_ex) from [<8052377c>] (should_failslab+0x6c/0x94) [ 1639.028574][T12579] r8:8324bc00 r7:00000d40 r6:8533f328 r5:00000019 r4:83001240 [ 1639.028730][T12579] [<80523710>] (should_failslab) from [<8050850c>] (__kmalloc_noprof+0x9c/0x458) [ 1639.028931][T12579] [<80508470>] (__kmalloc_noprof) from [<807c1714>] (tomoyo_encode2+0x64/0xf0) [ 1639.029043][T12579] r10:00000fff r9:8309f800 r8:00000000 r7:84ca3198 r6:8533f328 r5:84411ffd [ 1639.029066][T12579] r4:84411fef [ 1639.029099][T12579] [<807c16b0>] (tomoyo_encode2) from [<807c17c4>] (tomoyo_encode+0x24/0x30) [ 1639.029226][T12579] r9:8309f800 r8:00000000 r7:84ca3198 r6:8533f328 r5:00001000 r4:84411ff0 [ 1639.029242][T12579] [<807c17a0>] (tomoyo_encode) from [<807c1850>] (tomoyo_realpath_from_path+0x80/0x17c) [ 1639.029483][T12579] r5:00001000 r4:84411000 [ 1639.029607][T12579] [<807c17d0>] (tomoyo_realpath_from_path) from [<807bd950>] (tomoyo_path_number_perm+0xcc/0x22c) [ 1639.029846][T12579] r10:8324bc00 r9:00000000 r8:00000003 r7:0000894c r6:00000004 r5:81cd63f8 [ 1639.029955][T12579] r4:8533f328 r3:826c0200 [ 1639.029972][T12579] [<807bd884>] (tomoyo_path_number_perm) from [<807c2230>] (tomoyo_file_ioctl+0x1c/0x20) [ 1639.030070][T12579] r9:8533f300 r8:00000003 r7:00000000 r6:00000000 r5:0000894c r4:8533f300 [ 1639.030148][T12579] [<807c2214>] (tomoyo_file_ioctl) from [<8076f37c>] (security_file_ioctl+0x64/0x1e4) [ 1639.030285][T12579] [<8076f318>] (security_file_ioctl) from [<8056ed10>] (sys_ioctl+0x4c/0xdc8) [ 1639.030436][T12579] r7:00000000 r6:8533f301 r5:00000000 r4:0000894c [ 1639.030461][T12579] [<8056ecc4>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1639.030662][T12579] Exception stack(0xeecd9fa8 to 0xeecd9ff0) [ 1639.030820][T12579] 9fa0: 00000000 00000000 00000003 0000894c 00000000 00000000 [ 1639.030920][T12579] 9fc0: 00000000 00000000 0012fed0 00000036 002d0000 00000000 00006364 76bbc0bc [ 1639.031004][T12579] 9fe0: 76bbbec0 76bbbeb0 00019384 00131f20 [ 1639.031173][T12579] r10:00000036 r9:8324bc00 r8:8020029c r7:00000036 r6:0012fed0 r5:00000000 [ 1639.031404][T12579] r4:00000000 [ 1639.133103][T12579] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1640.298460][T12585] FAULT_INJECTION: forcing a failure. [ 1640.298460][T12585] name failslab, interval 1, probability 0, space 0, times 0 [ 1640.300590][T12585] CPU: 0 UID: 0 PID: 12585 Comm: syz.1.2276 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1640.300668][T12585] Hardware name: ARM-Versatile Express [ 1640.300690][T12585] Call trace: [ 1640.300726][T12585] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1640.300828][T12585] r7:8324b000 r6:00000000 r5:60000013 r4:82259c04 [ 1640.300845][T12585] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1640.300912][T12585] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1640.300997][T12585] r5:8324b000 r4:82919c40 [ 1640.301010][T12585] [<8021fe2c>] (dump_stack) from [<8096b71c>] (should_fail_ex+0x1c4/0x228) [ 1640.301080][T12585] [<8096b558>] (should_fail_ex) from [<8052377c>] (should_failslab+0x6c/0x94) [ 1640.301163][T12585] r8:00000000 r7:8324b000 r6:00000cc0 r5:ffffffff r4:830adb40 [ 1640.301179][T12585] [<80523710>] (should_failslab) from [<80507b1c>] (kmem_cache_alloc_node_noprof+0x50/0x338) [ 1640.301254][T12585] [<80507acc>] (kmem_cache_alloc_node_noprof) from [<815348d0>] (__alloc_skb+0x138/0x160) [ 1640.301319][T12585] r10:00000000 r9:fffffffe r8:00000cc0 r7:00000000 r6:830adb40 r5:ffffffff [ 1640.301337][T12585] r4:828060c0 [ 1640.301351][T12585] [<81534798>] (__alloc_skb) from [<8165538c>] (netlink_ack+0x70/0x214) [ 1640.301426][T12585] r8:85a293c0 r7:83c4a000 r6:00000000 r5:81656f58 r4:0000002c [ 1640.301441][T12585] [<8165531c>] (netlink_ack) from [<8165561c>] (netlink_rcv_skb+0xec/0x120) [ 1640.301628][T12585] r10:00000000 r9:00000000 r8:82c1c800 r7:00000028 r6:83c4a000 r5:81656f58 [ 1640.301655][T12585] r4:85a293c0 [ 1640.301672][T12585] [<81655530>] (netlink_rcv_skb) from [<816567e8>] (genl_rcv+0x2c/0x3c) [ 1640.301754][T12585] r7:85a293c0 r6:8332a480 r5:829dde68 r4:85a293c0 [ 1640.301764][T12585] [<816567bc>] (genl_rcv) from [<81654dd8>] (netlink_unicast+0x19c/0x29c) [ 1640.301810][T12585] r5:00000028 r4:8320c400 [ 1640.301818][T12585] [<81654c3c>] (netlink_unicast) from [<816550a4>] (netlink_sendmsg+0x1cc/0x444) [ 1640.301887][T12585] r9:00000000 r8:00000000 r7:84ae0800 r6:00000028 r5:85a293c0 r4:eedd1e98 [ 1640.301910][T12585] [<81654ed8>] (netlink_sendmsg) from [<81527524>] (__sock_sendmsg+0x44/0x78) [ 1640.301979][T12585] r10:00000122 r9:854a0b40 r8:854a0b41 r7:76bbae1c r6:84d1a780 r5:eedd1e98 [ 1640.301989][T12585] r4:00000000 [ 1640.301996][T12585] [<815274e0>] (__sock_sendmsg) from [<81529394>] (__sys_sendto+0x110/0x160) [ 1640.302026][T12585] r7:76bbae1c r6:84d1a780 r5:00000000 r4:00000000 [ 1640.302034][T12585] [<81529284>] (__sys_sendto) from [<81529400>] (sys_sendto+0x1c/0x24) [ 1640.302067][T12585] r9:8324b000 r8:8020029c r7:00000122 r6:00000000 r5:0000000c r4:76bbae1c [ 1640.302074][T12585] [<815293e4>] (sys_sendto) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1640.302098][T12585] Exception stack(0xeedd1fa8 to 0xeedd1ff0) [ 1640.302116][T12585] 1fa0: 76bbae1c 0000000c 00000004 76bbaeb0 00000028 00000000 [ 1640.302132][T12585] 1fc0: 76bbae1c 0000000c 00000000 00000122 00000004 00000000 76bbaeb0 76bbc0bc [ 1640.302144][T12585] 1fe0: 00000000 76bbadf0 000d7d50 001343b8 [ 1644.462901][ T2880] usb 1-1: new full-speed USB device number 65 using dummy_hcd [ 1644.602886][ T2880] usb 1-1: device descriptor read/64, error -71 [ 1644.852434][ T2880] usb 1-1: new full-speed USB device number 66 using dummy_hcd [ 1645.002596][ T2880] usb 1-1: device descriptor read/64, error -71 [ 1645.113353][ T2880] usb usb1-port1: attempt power cycle [ 1645.472769][ T2880] usb 1-1: new full-speed USB device number 67 using dummy_hcd [ 1645.502558][ T2880] usb 1-1: device descriptor read/8, error -71 [ 1645.613176][T12605] FAULT_INJECTION: forcing a failure. [ 1645.613176][T12605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1645.614892][T12605] CPU: 0 UID: 0 PID: 12605 Comm: syz.1.2282 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1645.615008][T12605] Hardware name: ARM-Versatile Express [ 1645.615035][T12605] Call trace: [ 1645.615075][T12605] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1645.615189][T12605] r7:00000000 r6:00000000 r5:60000013 r4:82259c04 [ 1645.615211][T12605] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1645.615291][T12605] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1645.615381][T12605] r5:83886000 r4:82950490 [ 1645.615399][T12605] [<8021fe2c>] (dump_stack) from [<8096b71c>] (should_fail_ex+0x1c4/0x228) [ 1645.615478][T12605] [<8096b558>] (should_fail_ex) from [<8096b794>] (should_fail+0x14/0x18) [ 1645.615567][T12605] r8:76bbbf30 r7:00000000 r6:00000000 r5:eee59f68 r4:00000002 [ 1645.615623][T12605] [<8096b780>] (should_fail) from [<8096b7b4>] (should_fail_usercopy+0x1c/0x20) [ 1645.615712][T12605] [<8096b798>] (should_fail_usercopy) from [<80590874>] (simple_read_from_buffer+0x80/0x13c) [ 1645.615786][T12605] [<805907f4>] (simple_read_from_buffer) from [<806089b8>] (proc_fail_nth_read+0xb8/0x100) [ 1645.615874][T12605] r10:00000001 r9:80608900 r8:00000002 r7:eee59f68 r6:0000000f r5:76bbbf30 [ 1645.615903][T12605] r4:83886000 r3:eee59e9f [ 1645.615922][T12605] [<80608900>] (proc_fail_nth_read) from [<80555098>] (vfs_read+0x98/0x320) [ 1645.615991][T12605] r8:76bbbf30 r7:eee59f68 r6:83886000 r5:0000000f r4:854a0180 [ 1645.616011][T12605] [<80555000>] (vfs_read) from [<80555d40>] (ksys_read+0x74/0xe8) [ 1645.616078][T12605] r10:00000003 r9:83886000 r8:8020029c r7:00000000 r6:00000000 r5:854a0180 [ 1645.616103][T12605] r4:854a0183 [ 1645.616122][T12605] [<80555ccc>] (ksys_read) from [<80555dc4>] (sys_read+0x10/0x14) [ 1645.616185][T12605] r7:00000003 r6:00000003 r5:76bbbf30 r4:0000000f [ 1645.616202][T12605] [<80555db4>] (sys_read) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1645.616248][T12605] Exception stack(0xeee59fa8 to 0xeee59ff0) [ 1645.616282][T12605] 9fa0: 0000000f 76bbbf30 00000003 76bbbf30 0000000f 00000000 [ 1645.616315][T12605] 9fc0: 0000000f 76bbbf30 00000003 00000003 002d0000 00000000 00006364 76bbc0bc [ 1645.616344][T12605] 9fe0: 00000158 76bbbed0 000d7d50 0012fdf4 [ 1645.742476][ T2880] usb 1-1: new full-speed USB device number 68 using dummy_hcd [ 1645.776014][ T2880] usb 1-1: device descriptor read/8, error -71 [ 1645.883438][ T2880] usb usb1-port1: unable to enumerate USB device [ 1656.363245][T12632] FAULT_INJECTION: forcing a failure. [ 1656.363245][T12632] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1656.372337][T12632] CPU: 1 UID: 0 PID: 12632 Comm: syz.0.2289 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1656.372434][T12632] Hardware name: ARM-Versatile Express [ 1656.372447][T12632] Call trace: [ 1656.372468][T12632] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1656.372536][T12632] r7:200000c0 r6:00000000 r5:60000113 r4:82259c04 [ 1656.372555][T12632] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1656.372597][T12632] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1656.372645][T12632] r5:850c3000 r4:82950490 [ 1656.372652][T12632] [<8021fe2c>] (dump_stack) from [<8096b71c>] (should_fail_ex+0x1c4/0x228) [ 1656.372748][T12632] [<8096b558>] (should_fail_ex) from [<8096b794>] (should_fail+0x14/0x18) [ 1656.372806][T12632] r8:00000000 r7:200000c0 r6:83cbc6c0 r5:00000000 r4:eeff5f20 [ 1656.372815][T12632] [<8096b780>] (should_fail) from [<8096b7b4>] (should_fail_usercopy+0x1c/0x20) [ 1656.372848][T12632] [<8096b798>] (should_fail_usercopy) from [<808bace8>] (_copy_from_iter+0x6c/0x7c8) [ 1656.372891][T12632] [<808bac7c>] (_copy_from_iter) from [<81655064>] (netlink_sendmsg+0x18c/0x444) [ 1656.372949][T12632] r10:00000000 r9:00000000 r8:eeff5f30 r7:859f9c00 r6:0000001c r5:8557b540 [ 1656.372958][T12632] r4:eeff5f20 [ 1656.372966][T12632] [<81654ed8>] (netlink_sendmsg) from [<81527524>] (__sock_sendmsg+0x44/0x78) [ 1656.373011][T12632] r10:00000000 r9:eeff5dc4 r8:eeff5dc4 r7:00000000 r6:84c72f00 r5:eeff5f20 [ 1656.373021][T12632] r4:00000000 [ 1656.373028][T12632] [<815274e0>] (__sock_sendmsg) from [<81527d94>] (____sys_sendmsg+0x298/0x2cc) [ 1656.373059][T12632] r7:00000000 r6:84c72f00 r5:04008010 r4:eeff5f20 [ 1656.373068][T12632] [<81527afc>] (____sys_sendmsg) from [<81529ba0>] (___sys_sendmsg+0x9c/0xd0) [ 1656.373106][T12632] r10:eeff5e24 r9:20000140 r8:04008010 r7:00000000 r6:84c72f00 r5:eeff5f20 [ 1656.373115][T12632] r4:00000000 [ 1656.373122][T12632] [<81529b04>] (___sys_sendmsg) from [<8152a038>] (__sys_sendmsg+0x8c/0xe0) [ 1656.373163][T12632] r10:00000128 r9:850c3000 r8:8533f0c0 r7:04008010 r6:20000140 r5:8533f0c1 [ 1656.373172][T12632] r4:00000003 [ 1656.373179][T12632] [<81529fac>] (__sys_sendmsg) from [<8152a0a0>] (sys_sendmsg+0x14/0x18) [ 1656.373217][T12632] r8:8020029c r7:00000128 r6:0012fed0 r5:00000000 r4:00000000 [ 1656.373225][T12632] [<8152a08c>] (sys_sendmsg) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1656.373252][T12632] Exception stack(0xeeff5fa8 to 0xeeff5ff0) [ 1656.373270][T12632] 5fa0: 00000000 00000000 00000003 20000140 04008010 00000000 [ 1656.373286][T12632] 5fc0: 00000000 00000000 0012fed0 00000128 002d0000 00000000 00006364 76b1e0bc [ 1656.373298][T12632] 5fe0: 76b1dec0 76b1deb0 00019384 00131f20 [ 1662.453134][T12661] serio: Serial port ptm0 [ 1666.946541][ T31] audit: type=1326 audit(1666.840:3587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12672 comm="syz.1.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1667.051942][ T31] audit: type=1326 audit(1666.940:3588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12672 comm="syz.1.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1667.102031][ T31] audit: type=1326 audit(1666.990:3589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12672 comm="syz.1.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1667.104171][ T31] audit: type=1326 audit(1666.990:3590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12672 comm="syz.1.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1667.105481][ T31] audit: type=1326 audit(1666.990:3591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12672 comm="syz.1.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1667.183796][ T31] audit: type=1326 audit(1667.080:3592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12672 comm="syz.1.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1667.185657][ T31] audit: type=1326 audit(1667.080:3593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12672 comm="syz.1.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1667.187497][ T31] audit: type=1326 audit(1667.080:3594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12672 comm="syz.1.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1667.322294][ T31] audit: type=1326 audit(1667.210:3595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12672 comm="syz.1.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1667.639138][ T31] audit: type=1326 audit(1667.530:3596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12672 comm="syz.1.2302" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1671.926230][T12703] netlink: 12 bytes leftover after parsing attributes in process `syz.0.2312'. [ 1673.282708][T12707] netlink: 'syz.1.2313': attribute type 6 has an invalid length. [ 1673.314765][ T31] kauditd_printk_skb: 27 callbacks suppressed [ 1673.315114][ T31] audit: type=1326 audit(1673.210:3624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12742 comm="syz.0.2316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1673.326108][ T31] audit: type=1326 audit(1673.220:3625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12742 comm="syz.0.2316" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1673.332489][ T31] audit: type=1326 audit(1673.220:3626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12742 comm="syz.0.2316" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1673.872510][ T31] audit: type=1400 audit(1673.760:3627): avc: denied { mount } for pid=12742 comm="syz.0.2316" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1673.872948][ T31] audit: type=1400 audit(1673.760:3628): avc: denied { unmount } for pid=12742 comm="syz.0.2316" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 1676.436672][ T31] audit: type=1326 audit(1676.330:3629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12746 comm="syz.1.2317" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1676.584166][ T31] audit: type=1326 audit(1676.470:3630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12746 comm="syz.1.2317" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1676.586394][ T31] audit: type=1326 audit(1676.470:3631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12746 comm="syz.1.2317" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1676.616017][ T31] audit: type=1326 audit(1676.510:3632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12746 comm="syz.1.2317" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1676.624643][ T31] audit: type=1326 audit(1676.510:3633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12746 comm="syz.1.2317" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1678.402482][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 1678.402833][ T31] audit: type=1400 audit(1678.290:3646): avc: denied { mount } for pid=12750 comm="syz.1.2318" name="/" dev="pipefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1682.992013][ T31] audit: type=1326 audit(1682.880:3647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12756 comm="syz.1.2320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1682.993422][ T31] audit: type=1326 audit(1682.890:3648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12756 comm="syz.1.2320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1683.066119][ T31] audit: type=1326 audit(1682.960:3649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12756 comm="syz.1.2320" exe="/syz-executor" sig=0 arch=40000028 syscall=77 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1683.067477][ T31] audit: type=1326 audit(1682.960:3650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12756 comm="syz.1.2320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1683.068987][ T31] audit: type=1326 audit(1682.960:3651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12756 comm="syz.1.2320" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1691.662377][ T31] audit: type=1326 audit(1691.550:3652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12781 comm="syz.1.2327" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1691.734520][ T31] audit: type=1326 audit(1691.630:3653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12781 comm="syz.1.2327" exe="/syz-executor" sig=0 arch=40000028 syscall=318 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1691.742721][ T31] audit: type=1326 audit(1691.630:3654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12781 comm="syz.1.2327" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1691.753744][ T31] audit: type=1326 audit(1691.630:3655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12781 comm="syz.1.2327" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1693.234027][ T31] audit: type=1326 audit(1693.130:3656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.1.2329" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1693.263971][ T31] audit: type=1326 audit(1693.160:3657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.1.2329" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1693.265871][ T31] audit: type=1326 audit(1693.160:3658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.1.2329" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1693.275307][ T31] audit: type=1326 audit(1693.170:3659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.1.2329" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1693.276757][ T31] audit: type=1326 audit(1693.170:3660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.1.2329" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1693.278079][ T31] audit: type=1326 audit(1693.170:3661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12787 comm="syz.1.2329" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1700.498503][T12810] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2336'. [ 1701.643739][T12810] netlink: 4 bytes leftover after parsing attributes in process `syz.1.2336'. [ 1702.618103][ T31] kauditd_printk_skb: 26 callbacks suppressed [ 1702.619449][ T31] audit: type=1400 audit(1702.510:3688): avc: denied { name_bind } for pid=12812 comm="syz.1.2337" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1713.071859][ T31] audit: type=1400 audit(1712.960:3689): avc: denied { read write } for pid=8747 comm="syz-executor" name="loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1713.074129][ T31] audit: type=1400 audit(1712.960:3690): avc: denied { open } for pid=8747 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1713.094575][ T31] audit: type=1400 audit(1712.960:3691): avc: denied { ioctl } for pid=8747 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=634 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 1713.609309][ T31] audit: type=1400 audit(1713.500:3692): avc: denied { read } for pid=12835 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1713.743062][ T31] audit: type=1400 audit(1713.640:3693): avc: denied { create } for pid=12835 comm="syz.1.2345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1713.842508][ T31] audit: type=1400 audit(1713.730:3694): avc: denied { ioctl } for pid=12835 comm="syz.1.2345" path="socket:[26926]" dev="sockfs" ino=26926 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1713.863385][ T31] audit: type=1400 audit(1713.760:3695): avc: denied { bind } for pid=12835 comm="syz.1.2345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1715.736155][ T31] audit: type=1400 audit(1715.630:3696): avc: denied { prog_load } for pid=12837 comm="syz.1.2346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1715.744509][ T31] audit: type=1400 audit(1715.630:3697): avc: denied { bpf } for pid=12837 comm="syz.1.2346" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1715.745927][ T31] audit: type=1400 audit(1715.630:3698): avc: denied { perfmon } for pid=12837 comm="syz.1.2346" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1715.952189][T12838] SELinux: syz.1.2346 (12838) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1718.774826][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 1718.775720][ T31] audit: type=1400 audit(1718.670:3705): avc: denied { create } for pid=12845 comm="syz.1.2349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1718.954300][ T31] audit: type=1400 audit(1718.850:3706): avc: denied { ioctl } for pid=12845 comm="syz.1.2349" path="socket:[26945]" dev="sockfs" ino=26945 ioctlcmd=0x89e2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 1719.062947][ T31] audit: type=1400 audit(1718.950:3707): avc: denied { execute } for pid=12847 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1719.074655][ T31] audit: type=1400 audit(1718.970:3708): avc: denied { execute_no_trans } for pid=12847 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 1719.262723][ T31] audit: type=1400 audit(1719.150:3709): avc: denied { execmem } for pid=12847 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1719.263151][ T31] audit: type=1400 audit(1719.150:3710): avc: denied { read } for pid=12848 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1719.263431][ T31] audit: type=1400 audit(1719.160:3711): avc: denied { open } for pid=12848 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 1719.263720][ T31] audit: type=1400 audit(1719.160:3712): avc: denied { mounton } for pid=12848 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1719.482582][ T31] audit: type=1400 audit(1719.370:3713): avc: denied { sys_module } for pid=12848 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1720.304716][ T31] audit: type=1400 audit(1720.200:3714): avc: denied { allowed } for pid=12845 comm="syz.1.2349" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1723.930111][T12848] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1723.954911][T12848] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1725.384530][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 1725.384772][ T31] audit: type=1326 audit(1725.280:3720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12981 comm="syz.1.2352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1725.420824][ T31] audit: type=1326 audit(1725.300:3721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12981 comm="syz.1.2352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1725.444807][ T31] audit: type=1326 audit(1725.340:3722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12981 comm="syz.1.2352" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1725.453553][ T31] audit: type=1326 audit(1725.350:3723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12981 comm="syz.1.2352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1725.507902][T12848] hsr_slave_0: entered promiscuous mode [ 1725.514470][ T31] audit: type=1326 audit(1725.410:3724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12981 comm="syz.1.2352" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1725.515708][T12848] hsr_slave_1: entered promiscuous mode [ 1725.516948][ T31] audit: type=1326 audit(1725.410:3725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12981 comm="syz.1.2352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1725.520725][T12848] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1725.521076][T12848] Cannot create hsr debugfs directory [ 1725.565300][ T31] audit: type=1326 audit(1725.460:3726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12981 comm="syz.1.2352" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1725.567365][ T31] audit: type=1326 audit(1725.460:3727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12981 comm="syz.1.2352" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127d1c code=0x7ffc0000 [ 1725.575095][ T31] audit: type=1326 audit(1725.460:3728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12981 comm="syz.1.2352" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef168 code=0x7ffc0000 [ 1725.577222][ T31] audit: type=1326 audit(1725.460:3729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=12981 comm="syz.1.2352" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1726.167534][T12848] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 1726.196496][T12848] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 1726.209303][T12848] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 1726.237096][T12848] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 1728.156376][T12848] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1734.366407][T12848] veth0_vlan: entered promiscuous mode [ 1734.385335][T12848] veth1_vlan: entered promiscuous mode [ 1734.494792][T12848] veth0_macvtap: entered promiscuous mode [ 1734.501492][T12848] veth1_macvtap: entered promiscuous mode [ 1734.626025][T12848] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1734.626680][T12848] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1734.627154][T12848] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1734.627733][T12848] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1734.819920][ T31] kauditd_printk_skb: 136 callbacks suppressed [ 1734.820222][ T31] audit: type=1400 audit(1734.710:3866): avc: denied { mounton } for pid=12848 comm="syz-executor" path="/syzkaller.AgjIZc/syz-tmp" dev="vda" ino=819 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 1734.841992][ T31] audit: type=1400 audit(1734.730:3867): avc: denied { mount } for pid=12848 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1734.842283][ T31] audit: type=1400 audit(1734.730:3868): avc: denied { mounton } for pid=12848 comm="syz-executor" path="/syzkaller.AgjIZc/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1734.842620][ T31] audit: type=1400 audit(1734.730:3869): avc: denied { mount } for pid=12848 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1734.857601][ T31] audit: type=1400 audit(1734.750:3870): avc: denied { mounton } for pid=12848 comm="syz-executor" path="/syzkaller.AgjIZc/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1734.861496][ T31] audit: type=1400 audit(1734.750:3871): avc: denied { mounton } for pid=12848 comm="syz-executor" path="/syzkaller.AgjIZc/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=27725 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1734.958311][ T31] audit: type=1400 audit(1734.850:3872): avc: denied { unmount } for pid=12848 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1734.995458][ T31] audit: type=1400 audit(1734.890:3873): avc: denied { mounton } for pid=12848 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=766 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 1734.995918][ T31] audit: type=1400 audit(1734.890:3874): avc: denied { mount } for pid=12848 comm="syz-executor" name="/" dev="gadgetfs" ino=775 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 1734.999120][ T31] audit: type=1400 audit(1734.890:3875): avc: denied { mount } for pid=12848 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 1739.894619][ T31] kauditd_printk_skb: 6 callbacks suppressed [ 1739.895222][ T31] audit: type=1400 audit(1739.770:3882): avc: denied { sqpoll } for pid=13244 comm="syz.2.2365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1740.086280][ T31] audit: type=1400 audit(1739.910:3883): avc: denied { name_bind } for pid=13244 comm="syz.2.2365" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 1740.089553][ T31] audit: type=1400 audit(1739.980:3884): avc: denied { node_bind } for pid=13244 comm="syz.2.2365" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 1740.255595][ T31] audit: type=1400 audit(1740.150:3885): avc: denied { create } for pid=13244 comm="syz.2.2365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1740.258317][T13245] netlink: 20 bytes leftover after parsing attributes in process `syz.2.2365'. [ 1740.260081][ T31] audit: type=1400 audit(1740.150:3886): avc: denied { write } for pid=13244 comm="syz.2.2365" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1741.070659][ T31] audit: type=1400 audit(1740.960:3887): avc: denied { create } for pid=13249 comm="syz.2.2366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1741.083916][ T31] audit: type=1400 audit(1740.960:3888): avc: denied { bind } for pid=13249 comm="syz.2.2366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1741.086302][ T31] audit: type=1400 audit(1740.960:3889): avc: denied { write } for pid=13249 comm="syz.2.2366" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1741.413056][ T31] audit: type=1400 audit(1741.300:3890): avc: denied { create } for pid=13252 comm="syz.2.2368" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1741.415953][ T31] audit: type=1400 audit(1741.300:3891): avc: denied { setopt } for pid=13252 comm="syz.2.2368" lport=8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1746.248371][ T31] audit: type=1400 audit(1746.140:3892): avc: denied { append } for pid=13286 comm="syz.1.2372" name="001" dev="devtmpfs" ino=690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1746.633338][T13292] netlink: 'syz.2.2374': attribute type 10 has an invalid length. [ 1747.468159][ T31] audit: type=1400 audit(1747.360:3893): avc: denied { create } for pid=13301 comm="syz.2.2378" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1748.131071][ T31] audit: type=1400 audit(1748.020:3894): avc: denied { create } for pid=13306 comm="syz.2.2379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1748.149604][ T31] audit: type=1400 audit(1748.040:3895): avc: denied { getopt } for pid=13306 comm="syz.2.2379" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1748.293908][ T31] audit: type=1400 audit(1748.190:3896): avc: denied { connect } for pid=13299 comm="syz.1.2375" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1748.397711][ T31] audit: type=1400 audit(1748.290:3897): avc: denied { create } for pid=13311 comm="syz.2.2381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1748.399527][ T31] audit: type=1400 audit(1748.290:3898): avc: denied { bind } for pid=13311 comm="syz.2.2381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1748.401259][ T31] audit: type=1400 audit(1748.290:3899): avc: denied { write } for pid=13299 comm="syz.1.2375" path="socket:[27870]" dev="sockfs" ino=27870 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1748.404615][ T31] audit: type=1400 audit(1748.290:3900): avc: denied { listen } for pid=13311 comm="syz.2.2381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1748.425934][ T31] audit: type=1400 audit(1748.320:3901): avc: denied { connect } for pid=13311 comm="syz.2.2381" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1750.455983][T13327] netlink: 12 bytes leftover after parsing attributes in process `syz.2.2386'. [ 1750.938565][T13332] netlink: 16 bytes leftover after parsing attributes in process `syz.2.2389'. [ 1751.463087][T13335] netlink: 36 bytes leftover after parsing attributes in process `syz.1.2387'. [ 1751.464543][T13335] netlink: 16 bytes leftover after parsing attributes in process `syz.1.2387'. [ 1751.465670][T13335] netlink: 36 bytes leftover after parsing attributes in process `syz.1.2387'. [ 1751.499756][T13335] netlink: 36 bytes leftover after parsing attributes in process `syz.1.2387'. [ 1753.198456][ T31] audit: type=1326 audit(1753.090:3902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13352 comm="syz.2.2396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1753.198819][ T31] audit: type=1326 audit(1753.090:3903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13352 comm="syz.2.2396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1753.217495][ T31] audit: type=1326 audit(1753.110:3904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13352 comm="syz.2.2396" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1753.218092][ T31] audit: type=1326 audit(1753.110:3905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13352 comm="syz.2.2396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1753.225827][ T31] audit: type=1326 audit(1753.110:3906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13352 comm="syz.2.2396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1753.229447][ T31] audit: type=1326 audit(1753.120:3907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13352 comm="syz.2.2396" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1753.248183][ T31] audit: type=1326 audit(1753.140:3908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13352 comm="syz.2.2396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1753.248707][ T31] audit: type=1326 audit(1753.140:3909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13352 comm="syz.2.2396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1753.265376][ T31] audit: type=1326 audit(1753.160:3910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13352 comm="syz.2.2396" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1753.266328][ T31] audit: type=1326 audit(1753.160:3911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13352 comm="syz.2.2396" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1753.882392][T13361] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=13361 comm=syz.2.2399 [ 1753.903269][T13361] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5 sclass=netlink_audit_socket pid=13361 comm=syz.2.2399 [ 1755.423509][T13370] syzkaller0: entered promiscuous mode [ 1755.423962][T13370] syzkaller0: entered allmulticast mode [ 1755.729731][T13380] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2404'. [ 1755.770273][T13370] netlink: 16402 bytes leftover after parsing attributes in process `syz.1.2401'. [ 1756.028545][T13380] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2404'. [ 1757.714572][T13392] SELinux: failed to load policy [ 1758.421511][ T31] kauditd_printk_skb: 23 callbacks suppressed [ 1758.422500][ T31] audit: type=1400 audit(1758.310:3935): avc: denied { setopt } for pid=13400 comm="syz.1.2410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1758.429264][ T31] audit: type=1400 audit(1758.320:3936): avc: denied { wake_alarm } for pid=13405 comm="syz.2.2413" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1758.456823][ T31] audit: type=1326 audit(1758.350:3937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1758.458653][ T31] audit: type=1326 audit(1758.350:3938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1758.462120][ T31] audit: type=1326 audit(1758.350:3939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fd18 code=0x7ffc0000 [ 1758.463836][ T31] audit: type=1326 audit(1758.360:3940): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x12fd18 code=0x7ffc0000 [ 1758.468036][ T31] audit: type=1326 audit(1758.360:3941): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1758.469578][ T31] audit: type=1326 audit(1758.360:3942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1758.477687][ T31] audit: type=1326 audit(1758.370:3943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1758.480832][ T31] audit: type=1326 audit(1758.370:3944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13405 comm="syz.2.2413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1761.605905][T13433] bond0: (slave bond_slave_0): Releasing backup interface [ 1761.638694][T13433] bond0: (slave bond_slave_1): Releasing backup interface [ 1763.202589][T13449] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 1763.808258][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 1763.809850][ T31] audit: type=1400 audit(1763.700:3980): avc: denied { setopt } for pid=13457 comm="syz.2.2429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1764.112129][ T31] audit: type=1326 audit(1764.000:3981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13459 comm="syz.2.2430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1764.115613][ T31] audit: type=1326 audit(1764.010:3982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13459 comm="syz.2.2430" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1764.118289][ T31] audit: type=1326 audit(1764.010:3983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13459 comm="syz.2.2430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1764.120844][ T31] audit: type=1326 audit(1764.010:3984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13459 comm="syz.2.2430" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1764.122928][ T31] audit: type=1326 audit(1764.010:3985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13459 comm="syz.2.2430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1764.123790][ T31] audit: type=1326 audit(1764.020:3986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13459 comm="syz.2.2430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1764.124878][ T31] audit: type=1326 audit(1764.020:3987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13459 comm="syz.2.2430" exe="/syz-executor" sig=0 arch=40000028 syscall=435 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1764.134489][ T31] audit: type=1326 audit(1764.030:3988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13459 comm="syz.2.2430" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1764.138377][ T31] audit: type=1326 audit(1764.030:3989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13461 comm="syz.2.2430" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15f9d4 code=0x7ffc0000 [ 1766.014661][T13487] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1767.005559][T13505] netlink: 4 bytes leftover after parsing attributes in process `syz.2.2443'. [ 1770.784865][ T31] kauditd_printk_skb: 62 callbacks suppressed [ 1770.785966][ T31] audit: type=1400 audit(1770.680:4052): avc: denied { write } for pid=13525 comm="syz.2.2449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1771.430282][T13530] netlink: 'syz.2.2451': attribute type 27 has an invalid length. [ 1772.302633][T13530] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1772.303042][T13530] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1772.303260][T13530] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1772.303347][T13530] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1782.366184][ T1056] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1782.569835][ T1056] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1782.627563][ T1056] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1782.776501][ T1056] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1783.294929][ T1056] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1783.317556][ T1056] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1783.333089][ T1056] bond0 (unregistering): Released all slaves [ 1783.572511][ T1056] hsr_slave_0: left promiscuous mode [ 1783.582888][ T1056] hsr_slave_1: left promiscuous mode [ 1783.597586][ T1056] veth1_macvtap: left promiscuous mode [ 1783.598413][ T1056] veth0_macvtap: left promiscuous mode [ 1783.598629][ T1056] veth1_vlan: left promiscuous mode [ 1783.598822][ T1056] veth0_vlan: left promiscuous mode [ 1785.239490][ T31] audit: type=1400 audit(1785.130:4053): avc: denied { write } for pid=13586 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1785.240035][ T31] audit: type=1400 audit(1785.130:4054): avc: denied { open } for pid=13586 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 1785.831976][ T31] audit: type=1400 audit(1785.720:4055): avc: denied { search } for pid=13587 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1785.834873][ T31] audit: type=1400 audit(1785.720:4056): avc: denied { search } for pid=13587 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1785.836643][ T31] audit: type=1400 audit(1785.720:4057): avc: denied { search } for pid=13587 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1785.845271][ T31] audit: type=1400 audit(1785.720:4058): avc: denied { search } for pid=13587 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1785.966915][ T31] audit: type=1400 audit(1785.860:4059): avc: denied { read open } for pid=13588 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1785.969055][ T31] audit: type=1400 audit(1785.860:4060): avc: denied { getattr } for pid=13588 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1786.276379][ T31] audit: type=1400 audit(1786.170:4061): avc: denied { add_name } for pid=13587 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 1786.276816][ T31] audit: type=1400 audit(1786.170:4062): avc: denied { create } for pid=13587 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1795.592578][ T31] kauditd_printk_skb: 8 callbacks suppressed [ 1795.592972][ T31] audit: type=1400 audit(1795.480:4071): avc: denied { create } for pid=13620 comm="syz.1.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1795.733811][ T31] audit: type=1326 audit(1795.630:4072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13620 comm="syz.1.2465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1795.742664][ T31] audit: type=1326 audit(1795.640:4073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13620 comm="syz.1.2465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1795.753371][ T31] audit: type=1326 audit(1795.650:4074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13620 comm="syz.1.2465" exe="/syz-executor" sig=0 arch=40000028 syscall=15 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1795.753647][ T31] audit: type=1326 audit(1795.650:4075): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13620 comm="syz.1.2465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1795.753791][ T31] audit: type=1326 audit(1795.650:4076): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13620 comm="syz.1.2465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1795.842658][ T31] audit: type=1326 audit(1795.740:4077): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13620 comm="syz.1.2465" exe="/syz-executor" sig=0 arch=40000028 syscall=295 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1795.843328][ T31] audit: type=1400 audit(1795.740:4078): avc: denied { getopt } for pid=13620 comm="syz.1.2465" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1795.844014][ T31] audit: type=1326 audit(1795.740:4079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13620 comm="syz.1.2465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1795.844492][ T31] audit: type=1326 audit(1795.740:4080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13620 comm="syz.1.2465" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1801.824208][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 1801.824615][ T31] audit: type=1400 audit(1801.720:4082): avc: denied { connect } for pid=13644 comm="syz.1.2470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1807.708540][T13666] wg2: entered promiscuous mode [ 1807.709221][T13666] wg2: entered allmulticast mode [ 1816.474787][ T31] audit: type=1326 audit(1816.370:4083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13712 comm="syz.1.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1816.475587][ T31] audit: type=1326 audit(1816.370:4084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13712 comm="syz.1.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1816.483027][ T31] audit: type=1326 audit(1816.380:4085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13712 comm="syz.1.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1816.483715][ T31] audit: type=1326 audit(1816.380:4086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13712 comm="syz.1.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1816.484025][ T31] audit: type=1326 audit(1816.380:4087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13712 comm="syz.1.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1816.493313][ T31] audit: type=1326 audit(1816.390:4088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13712 comm="syz.1.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=288 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1816.497445][ T31] audit: type=1326 audit(1816.390:4089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13712 comm="syz.1.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1816.497810][ T31] audit: type=1326 audit(1816.390:4090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13712 comm="syz.1.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1816.792783][ T31] audit: type=1326 audit(1816.520:4091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13712 comm="syz.1.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1816.794723][ T31] audit: type=1326 audit(1816.690:4092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13712 comm="syz.1.2482" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1823.152507][ T31] kauditd_printk_skb: 12 callbacks suppressed [ 1823.152866][ T31] audit: type=1326 audit(1823.030:4105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13853 comm="syz.1.2488" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1823.153181][ T31] audit: type=1326 audit(1823.030:4106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13853 comm="syz.1.2488" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1823.370162][ T31] audit: type=1326 audit(1823.260:4107): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13853 comm="syz.1.2488" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1823.616889][ T31] audit: type=1326 audit(1823.510:4108): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13853 comm="syz.1.2488" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1823.632727][ T31] audit: type=1326 audit(1823.530:4109): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13853 comm="syz.1.2488" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1823.644300][ T31] audit: type=1326 audit(1823.540:4110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13853 comm="syz.1.2488" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1823.655576][ T31] audit: type=1326 audit(1823.550:4111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13853 comm="syz.1.2488" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1823.656606][ T31] audit: type=1326 audit(1823.550:4112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13853 comm="syz.1.2488" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1823.656751][ T31] audit: type=1326 audit(1823.550:4113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13853 comm="syz.1.2488" exe="/syz-executor" sig=0 arch=40000028 syscall=250 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1823.656803][ T31] audit: type=1326 audit(1823.550:4114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13853 comm="syz.1.2488" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1823.794466][T13722] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1823.815933][T13722] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1826.044986][T13722] hsr_slave_0: entered promiscuous mode [ 1826.046509][T13722] hsr_slave_1: entered promiscuous mode [ 1826.047570][T13722] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1826.047824][T13722] Cannot create hsr debugfs directory [ 1826.972754][T13722] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 1826.979142][T13722] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 1827.000234][T13722] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 1827.018637][T13722] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 1828.906452][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 1828.906847][ T31] audit: type=1400 audit(1828.800:4117): avc: denied { setopt } for pid=14075 comm="syz.1.2492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 1829.288332][T13722] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1830.518709][T13722] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1835.663142][T13722] veth0_vlan: entered promiscuous mode [ 1835.745237][T13722] veth1_vlan: entered promiscuous mode [ 1835.946978][T13722] veth0_macvtap: entered promiscuous mode [ 1835.966322][T13722] veth1_macvtap: entered promiscuous mode [ 1836.146627][T13722] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1836.147033][T13722] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1836.147793][T13722] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1836.147908][T13722] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1836.437831][ T31] audit: type=1400 audit(1836.330:4118): avc: denied { add_name } for pid=13722 comm="syz-executor" name="syz3" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 1836.438994][ T31] audit: type=1400 audit(1836.330:4119): avc: denied { create } for pid=13722 comm="syz-executor" name="syz3" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 1836.439427][ T31] audit: type=1400 audit(1836.330:4120): avc: denied { associate } for pid=13722 comm="syz-executor" name="syz3" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 1839.993278][T14131] pim6reg1: entered promiscuous mode [ 1840.003450][T14131] pim6reg1: entered allmulticast mode [ 1840.713841][ T31] audit: type=1400 audit(1840.600:4121): avc: denied { name_bind } for pid=14141 comm="syz.3.2503" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 1842.382901][ T31] audit: type=1400 audit(1842.270:4122): avc: denied { write } for pid=14152 comm="syz.3.2507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1842.566160][T14159] random: crng reseeded on system resumption [ 1845.065913][T14178] netlink: 132 bytes leftover after parsing attributes in process `syz.3.2514'. [ 1849.594571][ T31] audit: type=1400 audit(1849.490:4123): avc: denied { map } for pid=14218 comm="syz.3.2528" path="socket:[29957]" dev="sockfs" ino=29957 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 1852.994396][ T31] audit: type=1400 audit(1852.880:4124): avc: denied { relabelfrom } for pid=14250 comm="syz.3.2539" name="" dev="pipefs" ino=29111 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 1853.533555][ T31] audit: type=1400 audit(1853.430:4125): avc: denied { validate_trans } for pid=14254 comm="syz.3.2541" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1854.148116][T14264] netlink: 20 bytes leftover after parsing attributes in process `syz.3.2544'. [ 1857.024727][ T31] audit: type=1326 audit(1856.920:4126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14292 comm="syz.3.2555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1857.032926][ T31] audit: type=1326 audit(1856.930:4127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14292 comm="syz.3.2555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1857.049070][ T31] audit: type=1326 audit(1856.940:4128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14292 comm="syz.3.2555" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1857.049437][ T31] audit: type=1326 audit(1856.940:4129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14292 comm="syz.3.2555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1857.049555][ T31] audit: type=1326 audit(1856.940:4130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14292 comm="syz.3.2555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1857.063150][ T31] audit: type=1326 audit(1856.960:4131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14292 comm="syz.3.2555" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1857.065645][ T31] audit: type=1326 audit(1856.960:4132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14292 comm="syz.3.2555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1857.073625][ T31] audit: type=1326 audit(1856.970:4133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14292 comm="syz.3.2555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1857.076314][ T31] audit: type=1326 audit(1856.970:4134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14292 comm="syz.3.2555" exe="/syz-executor" sig=0 arch=40000028 syscall=162 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1857.076603][ T31] audit: type=1326 audit(1856.970:4135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14292 comm="syz.3.2555" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1860.436273][T14311] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2560'. [ 1861.650293][T14323] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2565'. [ 1861.938672][T14323] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2565'. [ 1863.626749][ T31] kauditd_printk_skb: 21 callbacks suppressed [ 1863.626964][ T31] audit: type=1326 audit(1863.520:4157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14340 comm="syz.3.2571" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1863.630228][ T31] audit: type=1326 audit(1863.520:4158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14340 comm="syz.3.2571" exe="/syz-executor" sig=0 arch=40000028 syscall=52 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1863.632383][ T31] audit: type=1400 audit(1863.520:4159): avc: denied { unmount } for pid=14340 comm="syz.3.2571" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1863.639041][ T31] audit: type=1326 audit(1863.530:4160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14340 comm="syz.3.2571" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1863.640046][ T31] audit: type=1326 audit(1863.530:4161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14340 comm="syz.3.2571" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1863.860356][ T31] audit: type=1400 audit(1863.750:4162): avc: denied { mount } for pid=14346 comm="syz.3.2573" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1863.873580][ T31] audit: type=1400 audit(1863.770:4163): avc: denied { unmount } for pid=13722 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 1865.527673][ T31] audit: type=1400 audit(1865.420:4164): avc: denied { create } for pid=14361 comm="syz.3.2578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1865.529903][ T31] audit: type=1400 audit(1865.420:4165): avc: denied { getopt } for pid=14361 comm="syz.3.2578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1868.210711][ T31] audit: type=1400 audit(1868.100:4166): avc: denied { block_suspend } for pid=14383 comm="syz.3.2584" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1870.190476][ T31] audit: type=1326 audit(1870.080:4167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14405 comm="syz.3.2589" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1870.200518][ T31] audit: type=1326 audit(1870.080:4168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14405 comm="syz.3.2589" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1870.200965][ T31] audit: type=1326 audit(1870.090:4169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14405 comm="syz.3.2589" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1870.201214][ T31] audit: type=1326 audit(1870.090:4170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14405 comm="syz.3.2589" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1870.221009][ T31] audit: type=1326 audit(1870.090:4171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14405 comm="syz.3.2589" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1870.233798][ T31] audit: type=1326 audit(1870.110:4172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14405 comm="syz.3.2589" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1870.235775][ T31] audit: type=1326 audit(1870.110:4173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14405 comm="syz.3.2589" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1870.237381][ T31] audit: type=1326 audit(1870.110:4174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14405 comm="syz.3.2589" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1870.252379][ T31] audit: type=1326 audit(1870.130:4175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14405 comm="syz.3.2589" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1870.252917][ T31] audit: type=1326 audit(1870.130:4176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14405 comm="syz.3.2589" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1875.297390][T14414] Failed to initialize the IGMP autojoin socket (err -2) [ 1878.284366][ T31] kauditd_printk_skb: 5 callbacks suppressed [ 1878.286643][ T31] audit: type=1400 audit(1878.180:4182): avc: denied { write } for pid=14556 comm="syz.3.2607" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 1878.553557][T14414] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1878.560227][T14414] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1878.636604][ T31] audit: type=1400 audit(1878.530:4183): avc: denied { create } for pid=14589 comm="syz.3.2608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1878.650487][ T31] audit: type=1400 audit(1878.540:4184): avc: denied { write } for pid=14589 comm="syz.3.2608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 1879.116929][ T31] audit: type=1326 audit(1879.010:4185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14624 comm="syz.3.2610" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1879.120203][ T31] audit: type=1326 audit(1879.010:4186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14624 comm="syz.3.2610" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1879.125915][ T31] audit: type=1326 audit(1879.020:4187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14624 comm="syz.3.2610" exe="/syz-executor" sig=0 arch=40000028 syscall=36 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1879.173440][ T31] audit: type=1326 audit(1879.060:4188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14624 comm="syz.3.2610" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1879.173914][ T31] audit: type=1326 audit(1879.070:4189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14624 comm="syz.3.2610" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1879.364781][ T31] audit: type=1326 audit(1879.260:4190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14628 comm="syz.3.2611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1879.372985][ T31] audit: type=1326 audit(1879.270:4191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14628 comm="syz.3.2611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1880.563777][T14414] hsr_slave_0: entered promiscuous mode [ 1880.565685][T14414] hsr_slave_1: entered promiscuous mode [ 1880.566933][T14414] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1880.567190][T14414] Cannot create hsr debugfs directory [ 1881.550133][T14414] netdevsim netdevsim4 netdevsim0: renamed from eth5 [ 1881.577820][T14414] netdevsim netdevsim4 netdevsim1: renamed from eth6 [ 1881.595001][T14414] netdevsim netdevsim4 netdevsim2: renamed from eth7 [ 1881.611271][T14414] netdevsim netdevsim4 netdevsim3: renamed from eth8 [ 1883.257190][T14843] bond0: (slave bond_slave_0): Releasing backup interface [ 1883.265591][T14843] bond0: (slave bond_slave_1): Releasing backup interface [ 1884.463288][T14871] random: crng reseeded on system resumption [ 1884.492338][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 1884.492723][ T31] audit: type=1326 audit(1884.380:4205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14870 comm="syz.3.2630" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x0 [ 1887.210112][ T31] audit: type=1400 audit(1887.100:4206): avc: denied { kexec_image_load } for pid=14895 comm="syz.3.2631" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 1888.908825][ T31] audit: type=1326 audit(1888.800:4207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.2636" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1888.916952][ T31] audit: type=1326 audit(1888.810:4208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.2636" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1888.933393][ T31] audit: type=1326 audit(1888.820:4209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.2636" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1888.938097][ T31] audit: type=1326 audit(1888.830:4210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.2636" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1888.939472][ T31] audit: type=1326 audit(1888.830:4211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.2636" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1888.948037][ T31] audit: type=1326 audit(1888.840:4212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.2636" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1888.954653][ T31] audit: type=1326 audit(1888.850:4213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.2636" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1888.981001][ T31] audit: type=1326 audit(1888.860:4214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14918 comm="syz.3.2636" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1889.254598][T14924] netlink: 'syz.3.2637': attribute type 1 has an invalid length. [ 1889.549515][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 1889.549948][ T31] audit: type=1400 audit(1889.440:4218): avc: denied { bind } for pid=14927 comm="syz.3.2638" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1889.997946][T14937] SELinux: syz.3.2640 (14937) set checkreqprot to 1. This is no longer supported. [ 1890.002649][ T31] audit: type=1400 audit(1889.890:4219): avc: denied { setcheckreqprot } for pid=14935 comm="syz.3.2640" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1890.407884][ T31] audit: type=1400 audit(1890.300:4220): avc: denied { write } for pid=14941 comm="syz.3.2641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1890.423579][ T31] audit: type=1400 audit(1890.310:4221): avc: denied { nlmsg_write } for pid=14941 comm="syz.3.2641" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1890.432487][T14942] netlink: 76 bytes leftover after parsing attributes in process `syz.3.2641'. [ 1892.031230][T14414] veth0_vlan: entered promiscuous mode [ 1892.067533][T14414] veth1_vlan: entered promiscuous mode [ 1892.215278][T14414] veth0_macvtap: entered promiscuous mode [ 1892.260711][T14414] veth1_macvtap: entered promiscuous mode [ 1892.453582][T14414] A link change request failed with some changes committed already. Interface geneve0 may have been left with an inconsistent configuration, please check. [ 1892.480905][T14414] A link change request failed with some changes committed already. Interface geneve1 may have been left with an inconsistent configuration, please check. [ 1892.510123][T14414] wireguard: wg0: Could not create IPv4 socket [ 1892.531374][T14414] wireguard: wg1: Could not create IPv4 socket [ 1892.551302][T14414] wireguard: wg2: Could not create IPv4 socket [ 1897.202480][T15008] SELinux: syz.3.2649 (15008) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1897.385005][T15014] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 1898.093422][ T31] audit: type=1400 audit(1897.990:4222): avc: denied { mounton } for pid=15027 comm="syz.3.2656" path="/152/file0" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:devpts_t tclass=dir permissive=1 [ 1898.136022][ T31] audit: type=1326 audit(1898.030:4223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15030 comm="syz.4.2657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1898.142368][ T31] audit: type=1326 audit(1898.030:4224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15030 comm="syz.4.2657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1898.142594][ T31] audit: type=1326 audit(1898.030:4225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15030 comm="syz.4.2657" exe="/syz-executor" sig=0 arch=40000028 syscall=174 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1898.142792][ T31] audit: type=1326 audit(1898.030:4226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15030 comm="syz.4.2657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1898.142852][ T31] audit: type=1326 audit(1898.040:4227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15030 comm="syz.4.2657" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1904.046971][ T31] audit: type=1326 audit(1903.940:4228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15099 comm="syz.3.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1904.047683][ T31] audit: type=1326 audit(1903.940:4229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15099 comm="syz.3.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1904.051118][ T31] audit: type=1326 audit(1903.940:4230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15099 comm="syz.3.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1904.054265][ T31] audit: type=1326 audit(1903.940:4231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15099 comm="syz.3.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1904.057155][ T31] audit: type=1326 audit(1903.940:4232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15099 comm="syz.3.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1904.059904][ T31] audit: type=1326 audit(1903.950:4233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15099 comm="syz.3.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1904.066938][ T31] audit: type=1326 audit(1903.960:4234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15099 comm="syz.3.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1904.082880][ T31] audit: type=1326 audit(1903.970:4235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15099 comm="syz.3.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1904.083310][ T31] audit: type=1326 audit(1903.970:4236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15099 comm="syz.3.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1904.089291][ T31] audit: type=1326 audit(1903.980:4237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15099 comm="syz.3.2676" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1910.807015][T15165] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2691'. [ 1910.811470][T15165] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2691'. [ 1911.096899][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 1911.097919][ T31] audit: type=1326 audit(1910.970:4247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15166 comm="syz.3.2692" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1911.102815][ T31] audit: type=1326 audit(1910.990:4248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15166 comm="syz.3.2692" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1911.118219][ T31] audit: type=1326 audit(1911.000:4249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15166 comm="syz.3.2692" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1911.126954][ T31] audit: type=1326 audit(1911.000:4250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15166 comm="syz.3.2692" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1911.127366][ T31] audit: type=1326 audit(1911.020:4251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15166 comm="syz.3.2692" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1911.127630][ T31] audit: type=1326 audit(1911.020:4252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15166 comm="syz.3.2692" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1911.127908][ T31] audit: type=1326 audit(1911.020:4253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15166 comm="syz.3.2692" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1911.149478][ T31] audit: type=1326 audit(1911.040:4254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15166 comm="syz.3.2692" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1911.153089][ T31] audit: type=1326 audit(1911.040:4255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15166 comm="syz.3.2692" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1911.155508][ T31] audit: type=1326 audit(1911.040:4256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15166 comm="syz.3.2692" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1914.868065][T15179] Invalid ELF header magic: != ELF [ 1917.394637][T15207] Invalid ELF header magic: != ELF [ 1924.254279][ T31] kauditd_printk_skb: 720 callbacks suppressed [ 1924.254765][ T31] audit: type=1400 audit(1924.150:4977): avc: denied { read } for pid=15223 comm="syz.3.2708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1929.003663][T15253] binfmt_misc: register: failed to install interpreter file ./file0 [ 1929.712174][ T31] audit: type=1400 audit(1929.600:4978): avc: denied { read } for pid=15259 comm="syz.3.2713" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1930.825591][T15267] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2714'. [ 1931.335655][T15273] SELinux: syz.3.2716 (15273) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1935.019755][T15301] Failed to initialize the IGMP autojoin socket (err -2) [ 1949.242476][T15343] Failed to initialize the IGMP autojoin socket (err -2) [ 1949.372425][ T31] audit: type=1400 audit(1949.250:4979): avc: denied { relabelfrom } for pid=15343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1949.385042][ T31] audit: type=1400 audit(1949.280:4980): avc: denied { relabelto } for pid=15343 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 1950.711093][T15367] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1950.722426][T15367] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1950.723488][T15367] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1950.724831][T15367] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1951.956105][T15359] Failed to initialize the IGMP autojoin socket (err -2) [ 1954.174206][T15402] Failed to initialize the IGMP autojoin socket (err -2) [ 1956.264624][T15422] Failed to initialize the IGMP autojoin socket (err -2) [ 1957.379409][ T1056] bond0 (unregistering): Released all slaves [ 1957.495597][ T1056] hsr_slave_0: left promiscuous mode [ 1957.506494][ T1056] hsr_slave_1: left promiscuous mode [ 1959.053499][T15442] Failed to initialize the IGMP autojoin socket (err -2) [ 1961.635466][T15471] Failed to initialize the IGMP autojoin socket (err -2) [ 1964.867955][T15488] Failed to initialize the IGMP autojoin socket (err -2) [ 1966.555083][T14076] vmalloc_node_range for size 268443648 failed: Address range restricted to 0xdf800000 - 0xff800000 [ 1966.555638][T14076] syz.1.2492: vmalloc error: size 268439552, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 1966.557360][T14076] CPU: 0 UID: 0 PID: 14076 Comm: syz.1.2492 Not tainted 6.16.0-rc2-syzkaller #0 PREEMPT [ 1966.557446][T14076] Hardware name: ARM-Versatile Express [ 1966.557515][T14076] Call trace: [ 1966.557662][T14076] [<80201a00>] (dump_backtrace) from [<80201afc>] (show_stack+0x18/0x1c) [ 1966.557773][T14076] r7:00000dc0 r6:82275104 r5:600f0113 r4:82259c04 [ 1966.557912][T14076] [<80201ae4>] (show_stack) from [<8021fe20>] (dump_stack_lvl+0x70/0x7c) [ 1966.558012][T14076] [<8021fdb0>] (dump_stack_lvl) from [<8021fe44>] (dump_stack+0x18/0x1c) [ 1966.558099][T14076] r5:8573e000 r4:00000000 [ 1966.558114][T14076] [<8021fe2c>] (dump_stack) from [<804fa24c>] (warn_alloc+0xd8/0x178) [ 1966.558197][T14076] [<804fa174>] (warn_alloc) from [<804e9018>] (__vmalloc_node_range_noprof+0xc0/0x544) [ 1966.558270][T14076] r3:10001000 r2:82275104 [ 1966.558291][T14076] r6:df800000 r5:ff800000 r4:10001000 [ 1966.558306][T14076] [<804e8f58>] (__vmalloc_node_range_noprof) from [<804e9574>] (vmalloc_user_noprof+0x6c/0x74) [ 1966.558379][T14076] r10:00000126 r9:8573e000 r8:85eebe40 r7:85eebeb0 r6:00000000 r5:8574e780 [ 1966.558397][T14076] r4:10001000 [ 1966.558444][T14076] [<804e9508>] (vmalloc_user_noprof) from [<819c12e8>] (xskq_create+0x78/0xac) [ 1966.558535][T14076] [<819c1270>] (xskq_create) from [<819bf5d0>] (xsk_setsockopt+0x238/0x2d4) [ 1966.558635][T14076] r7:85eebeb0 r6:85eebc00 r5:00000000 r4:00000002 [ 1966.558731][T14076] [<819bf39c>] (xsk_setsockopt) from [<81526168>] (do_sock_setsockopt+0xb0/0x17c) [ 1966.558917][T14076] r8:00000000 r7:85041a80 r6:84d1b900 r5:00000000 r4:819bf398 [ 1966.559015][T14076] [<815260b8>] (do_sock_setsockopt) from [<81529664>] (__sys_setsockopt+0x7c/0xc4) [ 1966.559176][T14076] r6:85041a81 r5:00000002 r4:0000011b [ 1966.559286][T14076] [<815295e8>] (__sys_setsockopt) from [<815296c8>] (sys_setsockopt+0x1c/0x24) [ 1966.559423][T14076] r8:8020029c r7:00000126 r6:002e6308 r5:00000000 r4:00000004 [ 1966.559443][T14076] [<815296ac>] (sys_setsockopt) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 1966.559560][T14076] Exception stack(0xe00b9fa8 to 0xe00b9ff0) [ 1966.559622][T14076] 9fa0: 00000004 00000000 00000003 0000011b 00000002 200004c0 [ 1966.559705][T14076] 9fc0: 00000004 00000000 002e6308 00000126 002d0000 00000000 00006364 76bbc0bc [ 1966.559745][T14076] 9fe0: 76bbbec0 76bbbeb0 00019384 00131f20 [ 1966.559916][T14076] Mem-Info: [ 1966.561071][T14076] active_anon:5440 inactive_anon:0 isolated_anon:0 [ 1966.561071][T14076] active_file:96 inactive_file:40443 isolated_file:0 [ 1966.561071][T14076] unevictable:768 dirty:31 writeback:0 [ 1966.561071][T14076] slab_reclaimable:1255 slab_unreclaimable:7942 [ 1966.561071][T14076] mapped:5292 shmem:3647 pagetables:450 [ 1966.561071][T14076] sec_pagetables:0 bounce:0 [ 1966.561071][T14076] kernel_misc_reclaimable:0 [ 1966.561071][T14076] free:427381 free_pcp:1249 free_cma:4032 [ 1966.561485][T14076] Node 0 active_anon:21760kB inactive_anon:0kB active_file:384kB inactive_file:161772kB unevictable:3072kB isolated(anon):0kB isolated(file):0kB mapped:21168kB dirty:124kB writeback:0kB shmem:14588kB writeback_tmp:0kB kernel_stack:4144kB pagetables:1800kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 1966.566521][T14076] Normal free:1374716kB boost:0kB min:4772kB low:6196kB high:7620kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:3248kB unevictable:0kB writepending:96kB present:1556480kB managed:1426968kB mlocked:0kB bounce:0kB free_pcp:4996kB local_pcp:3092kB free_cma:0kB [ 1966.566979][T14076] lowmem_reserve[]: 0 4224 4224 [ 1966.568990][T14076] Normal: 55*4kB (U) 8*8kB (UME) 8*16kB (UE) 23*32kB (UM) 6*64kB (UE) 4*128kB (UME) 0*256kB 5*512kB (UM) 6*1024kB (UM) 4*2048kB (UME) 331*4096kB (UM) = 1374716kB [ 1966.570740][T14076] 44188 total pagecache pages [ 1966.571823][T14076] 0 pages in swap cache [ 1966.571952][T14076] Free swap = 124996kB [ 1966.583614][T14076] Total swap = 124996kB [ 1966.583816][T14076] 524288 pages RAM [ 1966.583875][T14076] 135168 pages HighMem/MovableOnly [ 1966.583928][T14076] 32378 pages reserved [ 1966.584613][T14076] 4096 pages cma reserved [ 1967.025059][T13176] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1967.088427][T13176] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1967.195290][T13176] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1967.268703][T13176] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1967.858574][T13176] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1967.923635][T13176] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1967.934926][T13176] bond0 (unregistering): Released all slaves [ 1968.078559][T13176] hsr_slave_0: left promiscuous mode [ 1968.080619][T13176] hsr_slave_1: left promiscuous mode [ 1968.104239][T13176] veth1_macvtap: left promiscuous mode [ 1968.104656][T13176] veth0_macvtap: left promiscuous mode [ 1968.104940][T13176] veth1_vlan: left promiscuous mode [ 1968.106567][T13176] veth0_vlan: left promiscuous mode [ 1969.179842][T15507] Failed to initialize the IGMP autojoin socket (err -2) [ 1972.860794][T15540] Failed to initialize the IGMP autojoin socket (err -2) [ 1975.956041][T15562] Failed to initialize the IGMP autojoin socket (err -2) [ 1978.888822][ T31] audit: type=1400 audit(1978.780:4981): avc: denied { audit_write } for pid=15606 comm="syz.3.2742" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1978.890855][ T31] audit: type=1107 audit(1978.780:4982): pid=15606 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 1979.553549][T15581] Failed to initialize the IGMP autojoin socket (err -2) [ 1983.132955][T15663] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 1983.133836][T15663] SELinux: failed to load policy [ 1983.288655][T15625] Failed to initialize the IGMP autojoin socket (err -2) [ 1986.471001][T15687] Invalid ELF header magic: != ELF [ 1986.748180][T15671] Failed to initialize the IGMP autojoin socket (err -2) [ 1990.254753][T15702] Failed to initialize the IGMP autojoin socket (err -2) [ 1992.714896][T15730] netlink: 'syz.3.2768': attribute type 2 has an invalid length. [ 1993.860981][T15721] Failed to initialize the IGMP autojoin socket (err -2) [ 1996.446333][ T31] audit: type=1400 audit(1996.340:4983): avc: denied { setopt } for pid=15750 comm="syz.3.2773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1997.145517][T15757] netlink: 'syz.3.2775': attribute type 1 has an invalid length. [ 1997.147070][T15757] netlink: 'syz.3.2775': attribute type 2 has an invalid length. [ 1997.149042][T15757] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2775'. [ 1997.412280][ T31] audit: type=1326 audit(1997.290:4984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15759 comm="syz.3.2776" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1997.412585][ T31] audit: type=1326 audit(1997.300:4985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15759 comm="syz.3.2776" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1997.415095][ T31] audit: type=1326 audit(1997.310:4986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15759 comm="syz.3.2776" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1997.415329][ T31] audit: type=1326 audit(1997.310:4987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15759 comm="syz.3.2776" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1997.416380][ T31] audit: type=1326 audit(1997.310:4988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15759 comm="syz.3.2776" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1997.418867][ T31] audit: type=1326 audit(1997.310:4989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15759 comm="syz.3.2776" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 1998.237985][ T31] audit: type=1400 audit(1998.130:4990): avc: denied { watch watch_reads } for pid=15774 comm="syz.3.2781" path="/269/file0" dev="tmpfs" ino=1397 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1998.277039][T15748] Failed to initialize the IGMP autojoin socket (err -2) [ 2003.448044][T15780] Failed to initialize the IGMP autojoin socket (err -2) [ 2009.691082][T15801] Failed to initialize the IGMP autojoin socket (err -2) [ 2023.376915][T15801] A link change request failed with some changes committed already. Interface geneve0 may have been left with an inconsistent configuration, please check. [ 2023.384595][T15801] A link change request failed with some changes committed already. Interface geneve1 may have been left with an inconsistent configuration, please check. [ 2023.397431][T15801] wireguard: wg0: Could not create IPv4 socket [ 2023.406558][T15801] wireguard: wg1: Could not create IPv4 socket [ 2023.416801][T15801] wireguard: wg2: Could not create IPv4 socket [ 2023.982066][ T31] audit: type=1326 audit(2023.870:4991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15911 comm="syz.5.2722" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2023.996329][ T31] audit: type=1326 audit(2023.890:4992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15911 comm="syz.5.2722" exe="/syz-executor" sig=0 arch=40000028 syscall=116 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2024.007396][ T31] audit: type=1326 audit(2023.890:4993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15911 comm="syz.5.2722" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2028.123739][ T31] audit: type=1326 audit(2028.010:4994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15935 comm="syz.5.2798" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2028.125986][ T31] audit: type=1326 audit(2028.010:4995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15935 comm="syz.5.2798" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2028.132748][ T31] audit: type=1326 audit(2028.020:4996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15935 comm="syz.5.2798" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2028.135994][ T31] audit: type=1326 audit(2028.030:4997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15935 comm="syz.5.2798" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2028.142300][ T31] audit: type=1326 audit(2028.030:4998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15935 comm="syz.5.2798" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2028.146729][ T31] audit: type=1326 audit(2028.040:4999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15935 comm="syz.5.2798" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2028.148267][ T31] audit: type=1326 audit(2028.040:5000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15935 comm="syz.5.2798" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2028.664868][T15942] (unnamed net_device) (uninitialized): option packets_per_slave: mode dependency failed, not supported in mode balance-alb(6) [ 2031.297570][ T31] kauditd_printk_skb: 4 callbacks suppressed [ 2031.297992][ T31] audit: type=1326 audit(2031.190:5005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.5.2813" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2031.302335][ T31] audit: type=1326 audit(2031.190:5006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.5.2813" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2031.304211][ T31] audit: type=1326 audit(2031.200:5007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.5.2813" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2031.307573][ T31] audit: type=1326 audit(2031.200:5008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.5.2813" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2031.308616][ T31] audit: type=1326 audit(2031.200:5009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.5.2813" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2031.311222][ T31] audit: type=1326 audit(2031.200:5010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.5.2813" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2031.316283][ T31] audit: type=1326 audit(2031.210:5011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.5.2813" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2031.318050][ T31] audit: type=1326 audit(2031.210:5012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.5.2813" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2031.335403][ T31] audit: type=1326 audit(2031.230:5013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.5.2813" exe="/syz-executor" sig=0 arch=40000028 syscall=378 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2031.337234][ T31] audit: type=1326 audit(2031.230:5014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15980 comm="syz.5.2813" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2031.532971][T15987] SELinux: policydb string length 242 does not match expected length 8 [ 2031.534295][T15987] SELinux: failed to load policy [ 2036.545634][ T31] kauditd_printk_skb: 33 callbacks suppressed [ 2036.546237][ T31] audit: type=1326 audit(2036.440:5048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15994 comm="syz.5.2820" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2036.547825][ T31] audit: type=1326 audit(2036.440:5049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15994 comm="syz.5.2820" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2036.619856][ T31] audit: type=1326 audit(2036.510:5050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15994 comm="syz.5.2820" exe="/syz-executor" sig=0 arch=40000028 syscall=91 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2036.648422][ T31] audit: type=1326 audit(2036.540:5051): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15994 comm="syz.5.2820" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2036.663553][ T31] audit: type=1326 audit(2036.560:5052): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15994 comm="syz.5.2820" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2036.667760][ T31] audit: type=1326 audit(2036.560:5053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15994 comm="syz.5.2820" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2036.680078][ T31] audit: type=1326 audit(2036.560:5054): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15994 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2036.684149][ T31] audit: type=1326 audit(2036.580:5055): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15994 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2036.694096][ T31] audit: type=1326 audit(2036.580:5056): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15994 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2036.714361][ T31] audit: type=1326 audit(2036.610:5057): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15994 comm="+}[@" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2036.773109][T15995] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2036.799020][T15995] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2039.045469][T16034] netlink: 16402 bytes leftover after parsing attributes in process `syz.5.2833'. [ 2039.047109][T16031] netlink: 16402 bytes leftover after parsing attributes in process `syz.5.2833'. [ 2041.715249][T16075] netlink: 76 bytes leftover after parsing attributes in process `syz.5.2851'. [ 2041.737046][ T31] kauditd_printk_skb: 35 callbacks suppressed [ 2041.737361][ T31] audit: type=1326 audit(2041.630:5093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16074 comm="syz.3.2852" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2041.752510][ T31] audit: type=1326 audit(2041.640:5094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16074 comm="syz.3.2852" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2041.763329][ T31] audit: type=1326 audit(2041.660:5095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16074 comm="syz.3.2852" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2041.766826][ T31] audit: type=1326 audit(2041.660:5096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16074 comm="syz.3.2852" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2041.767889][ T31] audit: type=1326 audit(2041.660:5097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16074 comm="syz.3.2852" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2041.780103][ T31] audit: type=1326 audit(2041.670:5098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16074 comm="syz.3.2852" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2041.780501][ T31] audit: type=1326 audit(2041.670:5099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16074 comm="syz.3.2852" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2041.780600][ T31] audit: type=1326 audit(2041.670:5100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16074 comm="syz.3.2852" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2041.786572][ T31] audit: type=1326 audit(2041.680:5101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16074 comm="syz.3.2852" exe="/syz-executor" sig=0 arch=40000028 syscall=116 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2041.787044][ T31] audit: type=1326 audit(2041.680:5102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16074 comm="syz.3.2852" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2042.450453][T16087] usb usb1: usbfs: interface 0 claimed by hub while 'syz.3.2857' sets config #1 [ 2043.514286][T16103] netlink: 'syz.5.2863': attribute type 1 has an invalid length. [ 2043.515778][T16103] netlink: 'syz.5.2863': attribute type 2 has an invalid length. [ 2043.517077][T16103] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2863'. [ 2046.818617][T16111] bond1: entered promiscuous mode [ 2046.819052][T16111] bond1: entered allmulticast mode [ 2046.820296][T16111] 8021q: adding VLAN 0 to HW filter on device bond1 [ 2046.881624][T16111] bond1 (unregistering): Released all slaves [ 2050.794318][T16189] Failed to initialize the IGMP autojoin socket (err -2) [ 2060.898319][ T31] kauditd_printk_skb: 22 callbacks suppressed [ 2060.898679][ T31] audit: type=1326 audit(2060.790:5125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16218 comm="syz.5.2881" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2060.904285][ T31] audit: type=1326 audit(2060.800:5126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16218 comm="syz.5.2881" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2060.906494][ T31] audit: type=1326 audit(2060.800:5127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16218 comm="syz.5.2881" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2060.909227][ T31] audit: type=1326 audit(2060.800:5128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16218 comm="syz.5.2881" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2060.922462][ T31] audit: type=1326 audit(2060.820:5129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16218 comm="syz.5.2881" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2060.923422][ T31] audit: type=1326 audit(2060.820:5130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16218 comm="syz.5.2881" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2060.925265][ T31] audit: type=1326 audit(2060.820:5131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16218 comm="syz.5.2881" exe="/syz-executor" sig=0 arch=40000028 syscall=399 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2060.926900][ T31] audit: type=1326 audit(2060.820:5132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16218 comm="syz.5.2881" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2060.929111][ T31] audit: type=1326 audit(2060.820:5133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16218 comm="syz.5.2881" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2069.455550][ T31] audit: type=1326 audit(2069.350:5134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16221 comm="syz.5.2883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2069.456100][ T31] audit: type=1326 audit(2069.350:5135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16221 comm="syz.5.2883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2069.466749][ T31] audit: type=1326 audit(2069.360:5136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16221 comm="syz.5.2883" exe="/syz-executor" sig=0 arch=40000028 syscall=360 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2069.467226][ T31] audit: type=1326 audit(2069.360:5137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16221 comm="syz.5.2883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2069.467407][ T31] audit: type=1326 audit(2069.360:5138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16221 comm="syz.5.2883" exe="/syz-executor" sig=0 arch=40000028 syscall=317 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2069.467507][ T31] audit: type=1326 audit(2069.360:5139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16221 comm="syz.5.2883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2069.483089][ T31] audit: type=1326 audit(2069.370:5140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16221 comm="syz.5.2883" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2070.563306][ T31] audit: type=1326 audit(2070.450:5141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16233 comm="syz.5.2888" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2070.565332][ T31] audit: type=1326 audit(2070.450:5142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16233 comm="syz.5.2888" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2070.623919][ T31] audit: type=1326 audit(2070.480:5143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16233 comm="syz.5.2888" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2071.027615][T16239] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2889'. [ 2071.033167][T16239] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2889'. [ 2075.049455][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 2075.049805][ T31] audit: type=1326 audit(2074.940:5155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16301 comm="syz.3.2906" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x0 [ 2075.545780][ T31] audit: type=1400 audit(2075.440:5156): avc: denied { associate } for pid=16304 comm="syz.5.2907" name="0" dev="devpts" ino=3 scontext=system_u:object_r:mouse_device_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 2075.847496][T16308] netlink: 100 bytes leftover after parsing attributes in process `syz.5.2909'. [ 2076.320086][ T31] audit: type=1400 audit(2076.210:5157): avc: denied { ioctl } for pid=16312 comm="syz.3.2911" path="socket:[33563]" dev="sockfs" ino=33563 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 2077.458721][T16323] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2911'. [ 2077.461179][T16314] netlink: 4 bytes leftover after parsing attributes in process `syz.3.2911'. [ 2081.467594][T16335] Failed to initialize the IGMP autojoin socket (err -2) [ 2081.565241][T16334] Failed to initialize the IGMP autojoin socket (err -2) [ 2096.110419][ T31] audit: type=1326 audit(2096.000:5158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16338 comm="syz.5.2918" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2096.111023][ T31] audit: type=1326 audit(2096.000:5159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16338 comm="syz.5.2918" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2096.115953][ T31] audit: type=1326 audit(2096.010:5160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16338 comm="syz.5.2918" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2096.118980][ T31] audit: type=1326 audit(2096.010:5161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16338 comm="syz.5.2918" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2096.123578][ T31] audit: type=1326 audit(2096.010:5162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16338 comm="syz.5.2918" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2096.125608][ T31] audit: type=1326 audit(2096.020:5163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16338 comm="syz.5.2918" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2096.127829][ T31] audit: type=1326 audit(2096.020:5164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16338 comm="syz.5.2918" exe="/syz-executor" sig=0 arch=40000028 syscall=116 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2096.129613][ T31] audit: type=1326 audit(2096.020:5165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16338 comm="syz.5.2918" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2096.944679][T16347] IPv4: Oversized IP packet from 127.202.26.0 [ 2097.681442][T16355] binfmt_misc: register: failed to install interpreter file ./file2 [ 2099.724234][ T31] audit: type=1326 audit(2099.620:5166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16383 comm="syz.5.2937" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2099.727335][ T31] audit: type=1326 audit(2099.620:5167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16383 comm="syz.5.2937" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2101.217513][ T31] kauditd_printk_skb: 60 callbacks suppressed [ 2101.217872][ T31] audit: type=1326 audit(2101.110:5228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16408 comm="syz.5.2947" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x0 [ 2104.904767][ T31] audit: type=1326 audit(2104.790:5229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16440 comm="syz.5.2961" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x0 [ 2107.658409][ T31] audit: type=1400 audit(2107.550:5230): avc: denied { read } for pid=16456 comm="syz.5.2967" path="socket:[34973]" dev="sockfs" ino=34973 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 2108.440012][ T31] audit: type=1326 audit(2108.330:5231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16462 comm="syz.3.2969" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2108.454274][ T31] audit: type=1326 audit(2108.340:5232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16462 comm="syz.3.2969" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2108.458536][ T31] audit: type=1326 audit(2108.350:5233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16462 comm="syz.3.2969" exe="/syz-executor" sig=0 arch=40000028 syscall=183 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2108.461202][ T31] audit: type=1326 audit(2108.350:5234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16462 comm="syz.3.2969" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2108.463990][ T31] audit: type=1326 audit(2108.350:5235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16462 comm="syz.3.2969" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2109.003721][T16475] netlink: 26 bytes leftover after parsing attributes in process `syz.3.2972'. [ 2110.528101][ T31] audit: type=1326 audit(2110.420:5236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16493 comm="syz.3.2982" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2110.530298][ T31] audit: type=1326 audit(2110.420:5237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16493 comm="syz.3.2982" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2110.535886][ T31] audit: type=1326 audit(2110.420:5238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16493 comm="syz.3.2982" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2110.539661][ T31] audit: type=1326 audit(2110.420:5239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16493 comm="syz.3.2982" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2110.797447][T16498] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2984'. [ 2110.799220][T16498] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2984'. [ 2110.803929][T16498] netlink: 20 bytes leftover after parsing attributes in process `syz.5.2984'. [ 2110.804206][T16498] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2984'. [ 2112.133471][T16522] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2994'. [ 2112.153362][T16522] netlink: 4 bytes leftover after parsing attributes in process `syz.5.2994'. [ 2113.417879][ T31] kauditd_printk_skb: 44 callbacks suppressed [ 2113.418197][ T31] audit: type=1326 audit(2113.310:5284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16545 comm="syz.5.3003" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2113.418504][ T31] audit: type=1326 audit(2113.310:5285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16545 comm="syz.5.3003" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2113.422204][ T31] audit: type=1326 audit(2113.310:5286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16545 comm="syz.5.3003" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2113.423395][ T31] audit: type=1326 audit(2113.320:5287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16545 comm="syz.5.3003" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2113.425215][ T31] audit: type=1326 audit(2113.320:5288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16545 comm="syz.5.3003" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2113.433016][ T31] audit: type=1326 audit(2113.320:5289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16545 comm="syz.5.3003" exe="/syz-executor" sig=0 arch=40000028 syscall=14 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2113.433318][ T31] audit: type=1400 audit(2113.320:5290): avc: denied { create } for pid=16545 comm="syz.5.3003" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2113.434222][ T31] audit: type=1326 audit(2113.330:5291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16545 comm="syz.5.3003" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2113.458515][ T31] audit: type=1400 audit(2113.350:5292): avc: denied { unlink } for pid=15801 comm="syz-executor" name="file0" dev="tmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 2113.914281][ T31] audit: type=1326 audit(2113.810:5293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16501 comm="syz.3.2986" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2117.965228][T16548] netlink: 32 bytes leftover after parsing attributes in process `syz.5.3004'. [ 2118.432547][ T31] kauditd_printk_skb: 11 callbacks suppressed [ 2118.432895][ T31] audit: type=1326 audit(2118.310:5305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.5.3006" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2118.433209][ T31] audit: type=1326 audit(2118.320:5306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.5.3006" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2118.433313][ T31] audit: type=1326 audit(2118.320:5307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.5.3006" exe="/syz-executor" sig=0 arch=40000028 syscall=293 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2118.433397][ T31] audit: type=1326 audit(2118.320:5308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.5.3006" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2118.433480][ T31] audit: type=1326 audit(2118.320:5309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16556 comm="syz.5.3006" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2119.636116][ T31] audit: type=1400 audit(2119.530:5310): avc: denied { write } for pid=16562 comm="syz.5.3009" path="socket:[36033]" dev="sockfs" ino=36033 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2120.497761][T16567] netlink: 132 bytes leftover after parsing attributes in process `syz.5.3010'. [ 2120.993700][ T31] audit: type=1326 audit(2120.890:5311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16570 comm="syz.5.3012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2120.994095][ T31] audit: type=1326 audit(2120.890:5312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16570 comm="syz.5.3012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2120.998530][ T31] audit: type=1326 audit(2120.890:5313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16570 comm="syz.5.3012" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2121.007630][ T31] audit: type=1326 audit(2120.900:5314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16570 comm="syz.5.3012" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2121.062411][T16571] syz.5.3012 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 2137.322655][ T31] kauditd_printk_skb: 10 callbacks suppressed [ 2137.323042][ T31] audit: type=1326 audit(2137.210:5325): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16590 comm="syz.3.3020" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2137.325742][ T31] audit: type=1326 audit(2137.220:5326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16590 comm="syz.3.3020" exe="/syz-executor" sig=0 arch=40000028 syscall=175 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2137.326977][ T31] audit: type=1326 audit(2137.220:5327): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16590 comm="syz.3.3020" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2137.901308][T16598] netlink: 36 bytes leftover after parsing attributes in process `syz.3.3023'. [ 2138.970884][ T31] audit: type=1400 audit(2138.860:5328): avc: denied { bind } for pid=16604 comm="syz.3.3027" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 2139.194217][ T31] audit: type=1326 audit(2139.070:5329): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16606 comm="syz.3.3028" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2139.194617][ T31] audit: type=1326 audit(2139.090:5330): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16606 comm="syz.3.3028" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2139.199036][ T31] audit: type=1326 audit(2139.090:5331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16606 comm="syz.3.3028" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2139.200553][ T31] audit: type=1326 audit(2139.090:5332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16606 comm="syz.3.3028" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2139.202878][ T31] audit: type=1326 audit(2139.090:5333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16606 comm="syz.3.3028" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2139.205498][ T31] audit: type=1326 audit(2139.100:5334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16606 comm="syz.3.3028" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2142.656103][T16620] Invalid ELF header magic: != ELF [ 2142.906873][T16628] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 2142.908270][T16628] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 2143.039849][T16632] netlink: 12 bytes leftover after parsing attributes in process `syz.5.3038'. [ 2143.092230][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 2143.092757][ T31] audit: type=1326 audit(2142.980:5342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.3039" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2143.093062][ T31] audit: type=1326 audit(2142.980:5343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.3039" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2143.099934][ T31] audit: type=1326 audit(2142.990:5344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.3039" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2143.104603][ T31] audit: type=1326 audit(2142.990:5345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.3039" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2143.104930][ T31] audit: type=1326 audit(2142.990:5346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.3039" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2143.105190][ T31] audit: type=1326 audit(2143.000:5347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.3039" exe="/syz-executor" sig=0 arch=40000028 syscall=299 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2143.113764][ T31] audit: type=1326 audit(2143.000:5348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.3039" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2143.115796][ T31] audit: type=1326 audit(2143.000:5349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.3039" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2143.523769][T16640] bond1: entered promiscuous mode [ 2143.528819][T16640] bond1: entered allmulticast mode [ 2143.530606][T16640] 8021q: adding VLAN 0 to HW filter on device bond1 [ 2143.677742][T16640] bond1 (unregistering): Released all slaves [ 2147.524532][T16777] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3061'. [ 2151.057154][ T31] audit: type=1326 audit(2150.950:5350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16815 comm="syz.5.3074" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2151.066184][ T31] audit: type=1326 audit(2150.950:5351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16815 comm="syz.5.3074" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2151.075837][ T31] audit: type=1326 audit(2150.950:5352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16815 comm="syz.5.3074" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2151.079854][ T31] audit: type=1326 audit(2150.970:5353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16815 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2151.088889][ T31] audit: type=1326 audit(2150.970:5354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16815 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2151.091878][ T31] audit: type=1326 audit(2150.980:5355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16815 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2151.106056][ T31] audit: type=1326 audit(2151.000:5356): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16815 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2151.109530][ T31] audit: type=1326 audit(2151.000:5357): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16815 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2151.129290][ T31] audit: type=1326 audit(2151.020:5358): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16815 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2151.129662][ T31] audit: type=1326 audit(2151.020:5359): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16815 comm="gtp" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2167.214221][T16830] syzkaller0: entered promiscuous mode [ 2167.215847][T16830] syzkaller0: entered allmulticast mode [ 2170.797346][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 2170.798881][ T31] audit: type=1400 audit(2170.690:5363): avc: denied { bind } for pid=16845 comm="syz.5.3082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2170.815000][ T31] audit: type=1400 audit(2170.710:5364): avc: denied { setopt } for pid=16845 comm="syz.5.3082" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 2170.828050][T16846] netlink: 'syz.5.3082': attribute type 10 has an invalid length. [ 2170.847880][T16846] netlink: 'syz.5.3082': attribute type 10 has an invalid length. [ 2171.620888][ T31] audit: type=1400 audit(2171.510:5365): avc: denied { setopt } for pid=16851 comm="syz.5.3085" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 2174.414449][ T31] audit: type=1326 audit(2174.310:5366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16881 comm="syz.5.3095" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2174.417207][ T31] audit: type=1326 audit(2174.310:5367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16881 comm="syz.5.3095" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2174.419893][ T31] audit: type=1326 audit(2174.310:5368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16881 comm="syz.5.3095" exe="/syz-executor" sig=0 arch=40000028 syscall=354 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2174.422980][ T31] audit: type=1326 audit(2174.310:5369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16881 comm="syz.5.3095" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2174.425081][ T31] audit: type=1326 audit(2174.310:5370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16881 comm="syz.5.3095" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2174.430107][ T31] audit: type=1326 audit(2174.310:5371): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16881 comm="syz.5.3095" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2174.442889][ T31] audit: type=1326 audit(2174.310:5372): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16881 comm="syz.5.3095" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2178.408200][T16903] netlink: 'syz.3.3101': attribute type 10 has an invalid length. [ 2178.520443][T16903] netlink: 'syz.3.3101': attribute type 10 has an invalid length. [ 2180.845570][ T31] kauditd_printk_skb: 16 callbacks suppressed [ 2180.845961][ T31] audit: type=1326 audit(2180.740:5389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16925 comm="syz.5.3111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2180.846313][ T31] audit: type=1326 audit(2180.740:5390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16925 comm="syz.5.3111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2180.849664][ T31] audit: type=1326 audit(2180.740:5391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16925 comm="syz.5.3111" exe="/syz-executor" sig=0 arch=40000028 syscall=434 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2180.849850][ T31] audit: type=1326 audit(2180.740:5392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16925 comm="syz.5.3111" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x131f20 code=0x7ffc0000 [ 2181.635581][T16933] usb usb1: usbfs: interface 0 claimed by hub while 'syz.5.3114' sets config #0 [ 2182.384611][T16938] netlink: 'syz.5.3116': attribute type 12 has an invalid length. [ 2182.511172][T16943] netlink: 24 bytes leftover after parsing attributes in process `syz.3.3118'. VM DIAGNOSIS: 11:27:20 Registers: info registers vcpu 0 CPU#0 R00=00000001 R01=00000007 R02=7ecd91c0 R03=7ecd92bc R04=00000008 R05=00000000 R06=00000000 R07=0000019e R08=00000001 R09=00e49e10 R10=00000007 R11=7ecd92bc R12=00000001 R13=df961ff8 R14=76988590 R15=76988590 PSR=60010093 -ZC- A S svc32 s00=f0000000 s01=ffffffff d00=fffffffff0000000 s02=00000000 s03=00035aa1 d01=00035aa100000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=ff3e6942 s09=fff99ee2 d04=fff99ee2ff3e6942 s10=ffffffff s11=ffffffff d05=ffffffffffffffff s12=feccc769 s13=00f2bfe4 d06=00f2bfe4feccc769 s14=ffffffff s15=00000000 d07=00000000ffffffff s16=fe000000 s17=f79bef52 d08=f79bef52fe000000 s18=76000000 s19=fffe67ec d09=fffe67ec76000000 s20=ffe8139d s21=00f2bfe2 d10=00f2bfe2ffe8139d s22=ffffffff s23=00000000 d11=00000000ffffffff s24=f13e6942 s25=ffffffff d12=fffffffff13e6942 s26=00000000 s27=00035aa1 d13=00035aa100000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=0020587a s33=00581675 d16=005816750020587a s34=00000000 s35=00000000 d17=0000000000000000 s36=feea149e s37=009db56a d18=009db56afeea149e s38=ffffffff s39=00000000 d19=00000000ffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=fd9be2b1 s43=ffffffff d21=fffffffffd9be2b1 s44=fffffffc s45=ffffffff d22=fffffffffffffffc s46=ff33f63b s47=ffffffff d23=ffffffffff33f63b s48=fe494b5c s49=f79bef52 d24=f79bef52fe494b5c s50=f0db4661 s51=ffffffff d25=fffffffff0db4661 s52=00afd5a9 s53=fff50624 d26=fff5062400afd5a9 s54=0106fec6 s55=01bee1be d27=01bee1be0106fec6 s56=006686f1 s57=0068e386 d28=0068e386006686f1 s58=003471c3 s59=0106fec6 d29=0106fec6003471c3 s60=fca18b40 s61=00035aa0 d30=00035aa0fca18b40 s62=9a6322e1 s63=000dccaa d31=000dccaa9a6322e1 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=82259c04 R02=002ec1b9 R03=80239c80 R04=83246000 R05=00000001 R06=83246000 R07=8280c6d0 R08=00000001 R09=00000000 R10=00000000 R11=df865f64 R12=df865f68 R13=df865f58 R14=80228714 R15=80239c88 PSR=60000093 -ZC- A S svc32 s00=34000000 s01=00000000 d00=0000000034000000 s02=50000000 s03=00057356 d01=0005735650000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=ff3e6942 s09=fff99ee2 d04=fff99ee2ff3e6942 s10=ffffffff s11=ffffffff d05=ffffffffffffffff s12=feccc769 s13=00f2bfe4 d06=00f2bfe4feccc769 s14=ffffffff s15=00000000 d07=00000000ffffffff s16=00000000 s17=1019636b d08=1019636b00000000 s18=f0000000 s19=00054f31 d09=00054f31f0000000 s20=fee59a28 s21=00f2bfe1 d10=00f2bfe1fee59a28 s22=ffffffff s23=00000000 d11=00000000ffffffff s24=353e6942 s25=00000000 d12=00000000353e6942 s26=50000000 s27=00057356 d13=0005735650000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=0020587a s33=00581675 d16=005816750020587a s34=00000000 s35=00000000 d17=0000000000000000 s36=feea149e s37=009db56a d18=009db56afeea149e s38=ffffffff s39=00000000 d19=00000000ffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=07f6cae8 s43=00000000 d21=0000000007f6cae8 s44=0000000d s45=00000000 d22=000000000000000d s46=02a798f8 s47=00000000 d23=0000000002a798f8 s48=00a124ae s49=1019636b d24=1019636b00a124ae s50=32705a68 s51=00000000 d25=0000000032705a68 s52=0174db9c s53=01dff13e d26=01dff13e0174db9c s54=00e35230 s55=ff02c8e6 d27=ff02c8e600e35230 s56=fe7b7bce s57=0096d4d4 d28=0096d4d4fe7b7bce s58=004b6a6a s59=00e35230 d29=00e35230004b6a6a s60=5696be02 s61=00057356 d30=000573565696be02 s62=44ce0eda s63=0091b2a6 d31=0091b2a644ce0eda FPSCR: 00000000