last executing test programs: 2.761743213s ago: executing program 2 (id=550): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x8907, 0x0) 2.67992517s ago: executing program 2 (id=553): mlockall(0x1) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, 0x0, 0x20) 2.114086996s ago: executing program 3 (id=555): openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340), 0x181080, 0x0) 2.052204282s ago: executing program 3 (id=556): r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001180), 0x0, 0x0) close(r0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f0000001ec0)={0x0, 0x0, &(0x7f0000001e80)={&(0x7f0000001e00)={0x4c}, 0x4c}}, 0x0) 2.051950422s ago: executing program 3 (id=557): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) sendmsg$nl_xfrm(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) r2 = io_uring_setup(0x1989, &(0x7f0000001440)) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) close(r1) close(r2) 1.415194924s ago: executing program 2 (id=566): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$nl_xfrm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[], 0x33fe0}}, 0x0) r2 = io_uring_setup(0x3465, &(0x7f0000001440)) sendmsg$NL80211_CMD_SET_POWER_SAVE(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={0x0}}, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) close(r2) 1.206526021s ago: executing program 3 (id=567): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x441, 0x0) write$P9_RAUTH(r0, 0x0, 0x0) 1.152186995s ago: executing program 3 (id=568): r0 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.kill\x00', 0x26e1, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) sendmsg$nl_xfrm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[], 0x33fe0}}, 0x0) sendmsg$NL80211_CMD_DEL_STATION(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) keyctl$revoke(0x3, r0) 956.140392ms ago: executing program 0 (id=576): sendmsg$NL802154_CMD_SET_PAN_ID(0xffffffffffffffff, 0x0, 0x0) 955.960202ms ago: executing program 0 (id=577): r0 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 955.813312ms ago: executing program 0 (id=578): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='cpuacct.stat\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) sendmsg$nl_xfrm(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[], 0x33fe0}}, 0x0) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={0x0, 0x104}}, 0x0) timer_create(0x0, &(0x7f0000000180)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) timer_create(0x0, &(0x7f0000000000)={0x0, 0x14}, &(0x7f0000000040)=0x0) timer_settime(r2, 0x0, &(0x7f0000000300)={{0x77359400}, {0x0, 0x3938700}}, 0x0) close(r1) socket$unix(0x1, 0x1, 0x0) 928.101034ms ago: executing program 4 (id=580): r0 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x42, &(0x7f0000000080), &(0x7f0000000340)=0x10) 876.200989ms ago: executing program 4 (id=581): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000005b40), 0x141, 0x0) write$cgroup_type(r0, 0x0, 0x0) 875.971988ms ago: executing program 4 (id=582): r0 = syz_open_procfs(0x0, &(0x7f0000000000)='cgroup\x00') r1 = memfd_create(&(0x7f0000000480)='\x00\xac=\x9d\xd2\xdb\x1a\'\xf8\n\xedcJ\x8e\x84\xd4N\x00\x9b\x1f\t\xbd\x11+\x86T\x16\xa3\xb3\xae0\x9f9?\xefo\xa4k\x012>\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3Y\x12\"p^\x00\x02\xb4\xfd\xde\xe4\xb6\xbcK#^\x00}2\xc6:|R\x04\xc2\xb8I\xa3\xb9\xe2\xa2\xebw^I\x0f7i$\xf1\xd4\x9b\xc7\xb2\xbeD`\x8f\xc3\x96\xbc#4\x17\xf5\xb3\xc9\xb2\x94\xa8_f!\xdf\x90}\xba\xa3\x01\xe2\xcf\xb7\"S\a\x04ry\x00#4\x87m\xf7\xe3\xf5\xa7\xda\xb9\xcbU\xbe\x06]\xa9\xb6R~\xc9l}\xb7I\xfeH\xb3\x15\x8c\x06d\xf8c\xc0{\v\xd2\x9d\x8e\\\xae>\xf6qucC\xd42e9\xe0\xbf\xdd\xdc\x99\xf4\\\xd0\x96:\xfb\x8c\x12o\xcc-\x13\x14\xbev\xae\x80Zp\x95c]\x98\x8c\x01\x8fo\xafjN\xcb\x98\xdf\xd3[V\xbd[\xb9\x10v\xee\xdc\xc8G\xd0\xdc9\xccO\xf7\xb5\xbc\xcf\xfb\xe9\x14\x00\x00dU\x00\x00\x00\b\xfb\xb5Z\xb0-\xc8\xdb\xa3f\xf4W\xeb\x06\xc2\xd1\xb6\xd1%\xca\x8f\x013|\x8ez\x1eo\x18\xb6#@P&[\xad\xda\nmU\x823\\&P\xdc\xbcS\x80\xc1dJ!LH\xaa\a\x82\xf3\xde\x96\x85\xc5\xdd\xa8\x92\xc7\xcb\x91\xf2[Y\x06\x8a\x9fN\x10\xb9\xf4\xecq\xce\xd2\x17\x88\xae\xcc7r\xd7\xeaz\xcevR\xcau\r\xf1\t\xc2$k\xdf\x8f\xe2\xbe\xfe\x14AN\xf8\xc6\xa8`Fs[6kYH+\xa5\xdcxUY3\xa1\x9c\x86x\x1c\x9f\x84\x195\xde\x97_\t~\xf3\xceB\xfc\xd4c\x1a\x8d>Xt\xdd\xbb\x80!Y\x12\"p^\x00\x02\xb4\xfdHA\xce\x9a\xde\xe4\xb6\xbcK#^\x00}2\xc6\xde7\x17\x95$\xdd\x8ew\a\xe5\x1f\xe0:|R\x04\xc2\xb8I\xa3\xb9\xe2\xa2\xebw\xdeI\x0f7i$\xf1\xd4\x9b\xc7\xb2\xbeD`\x8f\t\xdbb\x9d\x9dN\xa2\xee\xb8\xf6\xe2\xb4c\xc4\xb0\xc3\x96\xbc#4\x17\xf5\xb3\xc9\xb2\x94\xa8_f!\xdf\x90}\xba\xa3\x01\xe2\xcf\xb7\"S\a\x04ry\x00#4\x87m\xf7\xe3\xf5\xa7\xda\xb9\xcbU\xbe\x06]\xa9\xb6R~\xc9l}\xb7I\xfeH\xb3\x15\x8c\x06d\xf8c\xc0{\v\xd2\x9d\x8e\\\xae>\xf6quc9\xe0\xbf\xdd\xdc\x99\xf4\\\xd0\x96:\xfb\x8c\x12o\xcc-\x13\x14\xbev\xae\x80Zp\x95c]\x98\x8c\x01\x8fo\xafjN\xcb\x98\xdf\xd3[V\xbd[\xb9\x10v\xee\xdc\xc8G\xd0\xdc9\xccO\xf74\x84o\x99\xe9\x14\x00\x00dU\x00\x00\x00\b\xfb\xb5Z\xb0-\xc8\xdb\x88f\xf4W\xeb\x06\xc2\xd1\xb6\xd1%\xca\x8f\x013|\x8ez\x1eo\x18\xb6#@P&[\xad\xda\nmU\x823\\&P\xdc\xbcS\x80\xc1dJ!LH\xaa\a\x82\f=_\t\x18L&\xaf\xb4v\"ukO\xa6\xf3\xde\x96\x85\xc5\xdd\x12|C.\x91\xf2[Y\x06\x8a\x9fN\x10\xb9\xf4\xecq\xce\xd2\x17\x88\xae\xcc7r\xd7\xeaz\xcevR\xcau\r\xf1\t\xc2$k\xdf\x8f\xe2\xbe\xfe\x14AN\xf8\xc6\xa8`Fs[6k\x00\x00+\xa5\xdcxUY30xffffffffffffffff}, 0x0) write$P9_RREADLINK(r0, &(0x7f0000010040), 0x1000b) write$P9_RWALK(r0, 0x0, 0x57) 356.890961ms ago: executing program 3 (id=594): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket(0x2c, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={0x0, 0x32}}, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000200)) getsockname$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000280)=0x6b) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3800000010000507000000000004000000000000", @ANYRES32, @ANYBLOB="03000016010000001800120008000100736974000c00020008000300", @ANYRES64], 0x38}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000079000000090000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r2], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000040000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200000a000000b703000000000000850000007500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='ext4_discard_preallocations\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) r4 = epoll_create1(0x0) close(0xffffffffffffffff) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) epoll_ctl$EPOLL_CTL_MOD(r4, 0x3, 0xffffffffffffffff, &(0x7f0000000240)) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/profiling', 0x22042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="18000038b8780000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70200000000000085000000860000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x10001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfdea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x14, &(0x7f0000000340)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}, @printk={@lu, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x2d}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$tun(r5, &(0x7f0000000040)=ANY=[@ANYRESDEC=r5], 0x15) 144.638519ms ago: executing program 0 (id=595): r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000e80)={'veth0_to_bridge\x00', &(0x7f0000000e40)=@ethtool_cmd={0x2c}}) 88.175734ms ago: executing program 0 (id=596): r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000600)={0x14, 0x0, 0x0, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 72.751985ms ago: executing program 0 (id=597): r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_script(r1, &(0x7f0000000340), 0xffffff46) dup3(r1, r0, 0x0) write$P9_RLINK(r0, &(0x7f0000000180)={0x7}, 0x7) close(r2) ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0x5450, 0x0) 64.641516ms ago: executing program 4 (id=598): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000000d40)={&(0x7f0000000000), 0xc, &(0x7f0000000d00)={0x0}}, 0x0) 151.951µs ago: executing program 4 (id=599): statfs(&(0x7f0000000000)='./file1\x00', 0x0) 0s ago: executing program 4 (id=600): mlockall(0x1) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) mmap$binder(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x1, 0x11, r0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.112' (ED25519) to the list of known hosts. [ 21.005339][ T23] audit: type=1400 audit(1719992156.439:66): avc: denied { mounton } for pid=342 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.006892][ T342] cgroup1: Unknown subsys name 'net' [ 21.027906][ T23] audit: type=1400 audit(1719992156.439:67): avc: denied { mount } for pid=342 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.034375][ T342] cgroup1: Unknown subsys name 'net_prio' [ 21.060667][ T342] cgroup1: Unknown subsys name 'devices' [ 21.066873][ T23] audit: type=1400 audit(1719992156.499:68): avc: denied { unmount } for pid=342 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.171809][ T342] cgroup1: Unknown subsys name 'hugetlb' [ 21.177529][ T342] cgroup1: Unknown subsys name 'rlimit' [ 21.370610][ T23] audit: type=1400 audit(1719992156.809:69): avc: denied { setattr } for pid=342 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=841 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.393601][ T23] audit: type=1400 audit(1719992156.809:70): avc: denied { mounton } for pid=342 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.418087][ T23] audit: type=1400 audit(1719992156.809:71): avc: denied { mount } for pid=342 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.424314][ T344] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.449724][ T23] audit: type=1400 audit(1719992156.889:72): avc: denied { relabelto } for pid=344 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.474942][ T23] audit: type=1400 audit(1719992156.889:73): avc: denied { write } for pid=344 comm="mkswap" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.505240][ T23] audit: type=1400 audit(1719992156.939:74): avc: denied { read } for pid=342 comm="syz-executor" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.530614][ T23] audit: type=1400 audit(1719992156.939:75): avc: denied { open } for pid=342 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.557301][ T342] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.924058][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.930951][ T352] bridge0: port 1(bridge_slave_0) entered disabled state [ 21.938373][ T352] device bridge_slave_0 entered promiscuous mode [ 21.961060][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 21.967902][ T352] bridge0: port 2(bridge_slave_1) entered disabled state [ 21.975361][ T352] device bridge_slave_1 entered promiscuous mode [ 21.991436][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 21.998277][ T351] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.005873][ T351] device bridge_slave_0 entered promiscuous mode [ 22.016170][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.023109][ T351] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.030442][ T351] device bridge_slave_1 entered promiscuous mode [ 22.065213][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.072457][ T353] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.079762][ T353] device bridge_slave_0 entered promiscuous mode [ 22.097655][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.104559][ T353] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.111962][ T353] device bridge_slave_1 entered promiscuous mode [ 22.151523][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.158369][ T355] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.165799][ T355] device bridge_slave_0 entered promiscuous mode [ 22.172328][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.179217][ T354] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.186552][ T354] device bridge_slave_0 entered promiscuous mode [ 22.198388][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.205330][ T354] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.212609][ T354] device bridge_slave_1 entered promiscuous mode [ 22.225181][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.232309][ T355] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.239548][ T355] device bridge_slave_1 entered promiscuous mode [ 22.445418][ T351] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.452285][ T351] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.459534][ T351] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.466352][ T351] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.477190][ T352] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.484046][ T352] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.491198][ T352] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.497916][ T352] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.512794][ T354] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.519655][ T354] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.526783][ T354] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.533556][ T354] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.544045][ T355] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.550906][ T355] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.558015][ T355] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.564798][ T355] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.584641][ T353] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.591513][ T353] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.598597][ T353] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.605412][ T353] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.674823][ T74] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.682702][ T74] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.690035][ T74] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.697066][ T74] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.704319][ T74] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.711518][ T74] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.718678][ T74] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.725663][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.733071][ T74] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.740253][ T74] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.747252][ T74] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.784434][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.793768][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 22.802478][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.810671][ T124] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.817786][ T124] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.825702][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.834080][ T124] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.840923][ T124] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.848290][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 22.856173][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 22.864113][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.890763][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 22.899717][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.907079][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.915529][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.923939][ T74] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.930787][ T74] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.938104][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.946251][ T74] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.953108][ T74] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.960230][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.968077][ T74] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.974949][ T74] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.982076][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.989379][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.997341][ T74] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.004185][ T74] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.011431][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.019458][ T74] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.026272][ T74] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.033617][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.041648][ T74] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.048796][ T74] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.056069][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.064274][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.073105][ T74] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.079957][ T74] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.105201][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.113593][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.121708][ T107] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.128725][ T107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.137077][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.145495][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.153450][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.161740][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.169584][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.177755][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.197382][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.205515][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.226328][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.235028][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.243519][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.255716][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.264418][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.272765][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.280678][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.302570][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.310824][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.320101][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.328148][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.336658][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.344788][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.372418][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.381160][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.390288][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.398515][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.407257][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.415928][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.424436][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.432525][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.449240][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.457639][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.481939][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.491597][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.500009][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.508066][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.516614][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.524705][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.533205][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.542113][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.569435][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.577904][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.590255][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.598061][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.606534][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.614812][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.622735][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.646287][ T379] bridge: RTM_NEWNEIGH bridge0 without NUD_PERMANENT [ 23.655259][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.667516][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.676862][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.685137][ T124] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.702988][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.712008][ T372] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.729840][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.738133][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.746600][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.756698][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.765070][ T373] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.782745][ T387] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 23.799617][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.807903][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.969165][ T343] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 24.209265][ T343] usb 2-1: Using ep0 maxpacket: 32 [ 24.231064][ T354] syz-executor (354) used greatest stack depth: 21528 bytes left [ 24.312665][ T409] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.319905][ T409] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.328078][ T409] device bridge_slave_0 entered promiscuous mode [ 24.332818][ T343] usb 2-1: config index 0 descriptor too short (expected 156, got 27) [ 24.343089][ T343] usb 2-1: too many endpoints for config 0 interface 0 altsetting 191: 144, using maximum allowed: 30 [ 24.343745][ T409] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.354363][ T343] usb 2-1: config 0 interface 0 altsetting 191 endpoint 0x87 has an invalid bInterval 0, changing to 7 [ 24.368274][ T409] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.383899][ T409] device bridge_slave_1 entered promiscuous mode [ 24.390362][ T343] usb 2-1: config 0 interface 0 altsetting 191 has 1 endpoint descriptor, different from the interface descriptor's value: 144 [ 24.406825][ T343] usb 2-1: config 0 interface 0 has no altsetting 0 [ 24.454407][ T434] syz.4.25 uses obsolete (PF_INET,SOCK_PACKET) [ 24.497566][ T409] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.504443][ T409] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.511594][ T409] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.518529][ T409] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.548554][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 24.557516][ T74] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.567722][ T74] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.570698][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Dropping request. Check SNMP counters. [ 24.585741][ T343] usb 2-1: New USB device found, idVendor=0f11, idProduct=1021, bcdDevice=86.66 [ 24.595028][ T343] usb 2-1: New USB device strings: Mfr=85, Product=120, SerialNumber=172 [ 24.603576][ T343] usb 2-1: Product: syz [ 24.607559][ T343] usb 2-1: Manufacturer: syz [ 24.612046][ T343] usb 2-1: SerialNumber: syz [ 24.618205][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 24.621609][ T343] usb 2-1: config 0 descriptor?? [ 24.626974][ T107] bridge0: port 1(bridge_slave_0) entered blocking state [ 24.637745][ T107] bridge0: port 1(bridge_slave_0) entered forwarding state [ 24.645256][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 24.653486][ T107] bridge0: port 2(bridge_slave_1) entered blocking state [ 24.660348][ T107] bridge0: port 2(bridge_slave_1) entered forwarding state [ 24.680770][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 24.690993][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 24.714144][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.725846][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.739914][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.769748][ T74] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.791253][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.829431][ T9] device bridge_slave_1 left promiscuous mode [ 24.835598][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 24.843101][ T9] device bridge_slave_0 left promiscuous mode [ 24.849044][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 24.877529][ T372] usb 2-1: USB disconnect, device number 2 [ 25.089217][ T107] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 25.216246][ T493] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=493 comm=syz.2.49 [ 25.329147][ T107] usb 4-1: Using ep0 maxpacket: 8 [ 25.365579][ T509] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=1281 sclass=netlink_tcpdiag_socket pid=509 comm=syz.2.57 [ 25.449242][ T107] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 25.459381][ T107] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 25.619238][ T107] usb 4-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 25.628181][ T107] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 25.640945][ T107] usb 4-1: Product: syz [ 25.644942][ T107] usb 4-1: Manufacturer: syz [ 25.649434][ T107] usb 4-1: SerialNumber: syz [ 25.691919][ T527] rtc_cmos 00:00: Alarms can be up to one day in the future [ 25.717110][ T533] serio: Serial port pts0 [ 25.787087][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Dropping request. Check SNMP counters. [ 26.101316][ T380] rtc_cmos 00:00: Alarms can be up to one day in the future [ 26.108583][ T380] rtc_cmos 00:00: Alarms can be up to one day in the future [ 26.115880][ T380] rtc_cmos 00:00: Alarms can be up to one day in the future [ 26.123190][ T380] rtc_cmos 00:00: Alarms can be up to one day in the future [ 26.130314][ T380] rtc rtc0: __rtc_set_alarm: err=-22 [ 26.159243][ T107] usb 4-1: 0:2 : does not exist [ 26.166127][ T107] usb 4-1: USB disconnect, device number 2 [ 26.174270][ T350] udevd[350]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:1.0/sound/card0/controlC0/../uevent} for writing: No such file or directory [ 26.296817][ T23] kauditd_printk_skb: 60 callbacks suppressed [ 26.296826][ T23] audit: type=1400 audit(1719992161.729:136): avc: denied { write } for pid=554 comm="syz.2.75" name="random" dev="devtmpfs" ino=41 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 [ 26.529320][ T23] audit: type=1400 audit(1719992161.969:137): avc: denied { connect } for pid=557 comm="syz.2.76" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 26.593102][ T23] audit: type=1400 audit(1719992162.029:138): avc: denied { write } for pid=561 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 26.593119][ T562] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=562 comm=syz.0.77 [ 26.647084][ T23] audit: type=1400 audit(1719992162.079:139): avc: denied { bind } for pid=561 comm="syz.0.77" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 26.673371][ T566] serio: Serial port pts0 [ 26.704244][ T23] audit: type=1400 audit(1719992162.139:140): avc: denied { ioctl } for pid=568 comm="syz.3.80" path="socket:[14363]" dev="sockfs" ino=14363 ioctlcmd=0x8903 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.823815][ T582] syz.3.85[582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.823869][ T582] syz.3.85[582] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 26.857246][ T23] audit: type=1400 audit(1719992162.289:141): avc: denied { create } for pid=581 comm="syz.3.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 26.932058][ T23] audit: type=1400 audit(1719992162.329:142): avc: denied { write } for pid=581 comm="syz.3.85" path="socket:[14433]" dev="sockfs" ino=14433 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 27.259948][ T596] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=596 comm=syz.2.90 [ 27.289593][ T598] Zero length message leads to an empty skb [ 27.304856][ T600] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=600 comm=syz.2.92 [ 27.353404][ T23] audit: type=1400 audit(1719992162.789:143): avc: denied { bind } for pid=607 comm="syz.2.96" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 27.438685][ T23] audit: type=1400 audit(1719992162.869:144): avc: denied { read write } for pid=616 comm="syz.2.100" name="fuse" dev="devtmpfs" ino=9170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 27.492288][ T623] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1551 sclass=netlink_route_socket pid=623 comm=syz.2.103 [ 27.494879][ T23] audit: type=1400 audit(1719992162.909:145): avc: denied { open } for pid=616 comm="syz.2.100" path="/dev/fuse" dev="devtmpfs" ino=9170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 27.656498][ T635] capability: warning: `syz.0.108' uses deprecated v2 capabilities in a way that may be insecure [ 27.912216][ T352] syz-executor (352) used greatest stack depth: 20152 bytes left [ 27.982624][ T662] bridge0: port 1(bridge_slave_0) entered blocking state [ 27.999117][ T662] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.006532][ T662] device bridge_slave_0 entered promiscuous mode [ 28.041151][ T662] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.048040][ T662] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.071891][ T662] device bridge_slave_1 entered promiscuous mode [ 28.075621][ T683] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=683 comm=syz.3.130 [ 28.177149][ T662] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.184053][ T662] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.191251][ T662] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.198090][ T662] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.237648][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 28.245941][ T107] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.253842][ T107] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.280458][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 28.292006][ T18] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.298891][ T18] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.312650][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 28.322039][ T18] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.328987][ T18] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.348137][ T688] bridge: RTM_NEWNEIGH bridge0 without NUD_PERMANENT [ 28.357525][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 28.365840][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 28.387211][ T485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 28.408980][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 28.429490][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 28.456927][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.475481][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.544415][ T702] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2304 sclass=netlink_route_socket pid=702 comm=syz.0.138 [ 28.560210][ T385] device bridge_slave_1 left promiscuous mode [ 28.566184][ T385] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.582267][ T385] device bridge_slave_0 left promiscuous mode [ 28.596929][ T385] bridge0: port 1(bridge_slave_0) entered disabled state [ 29.022274][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Dropping request. Check SNMP counters. [ 29.271166][ T735] input: syz0 as /devices/virtual/input/input4 [ 29.575308][ T758] input: syz0 as /devices/virtual/input/input5 [ 30.341570][ T799] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=799 comm=syz.4.180 [ 30.531934][ T815] serio: Serial port pts0 [ 30.963690][ T852] serio: Serial port pts1 [ 31.455308][ T23] kauditd_printk_skb: 30 callbacks suppressed [ 31.455317][ T23] audit: type=1400 audit(1719992166.889:176): avc: denied { setopt } for pid=872 comm="syz.4.210" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 31.480973][ T875] input: syz0 as /devices/virtual/input/input6 [ 31.487664][ T23] audit: type=1400 audit(1719992166.889:177): avc: denied { read } for pid=872 comm="syz.4.210" path="socket:[15733]" dev="sockfs" ino=15733 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 32.059358][ T23] audit: type=1400 audit(1719992167.439:178): avc: denied { mount } for pid=886 comm="syz.1.216" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 32.227208][ T896] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=896 comm=syz.3.219 [ 32.256485][ T23] audit: type=1400 audit(1719992167.689:179): avc: denied { read } for pid=899 comm="syz.3.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 32.392555][ T23] audit: type=1400 audit(1719992167.829:180): avc: denied { getopt } for pid=919 comm="syz.4.231" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 32.742761][ T23] audit: type=1400 audit(1719992168.179:181): avc: denied { read write } for pid=931 comm="syz.1.236" name="uhid" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 32.766159][ T23] audit: type=1400 audit(1719992168.199:182): avc: denied { open } for pid=931 comm="syz.1.236" path="/dev/uhid" dev="devtmpfs" ino=849 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 32.923490][ T941] input: syz0 as /devices/virtual/input/input7 [ 33.079126][ T485] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 33.243783][ T23] audit: type=1400 audit(1719992168.679:183): avc: denied { write } for pid=953 comm="syz.3.246" name="netlink" dev="proc" ino=4026532907 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 33.285375][ T23] audit: type=1400 audit(1719992168.719:184): avc: denied { getopt } for pid=956 comm="syz.4.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 33.329126][ T485] usb 2-1: Using ep0 maxpacket: 32 [ 33.449238][ T485] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 33.460081][ T485] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 33.469598][ T485] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 33.482218][ T485] usb 2-1: New USB device found, idVendor=1b96, idProduct=000a, bcdDevice= 0.00 [ 33.491006][ T485] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 33.499950][ T485] usb 2-1: config 0 descriptor?? [ 33.603605][ T992] serio: Serial port pts0 [ 33.991266][ T1001] serio: Serial port pts1 [ 34.049225][ T485] usbhid 2-1:0.0: can't add hid device: -71 [ 34.055132][ T485] usbhid: probe of 2-1:0.0 failed with error -71 [ 34.062849][ T485] usb 2-1: USB disconnect, device number 3 [ 34.137063][ T1003] mmap: syz.3.268 (1003) uses deprecated remap_file_pages() syscall. See Documentation/vm/remap_file_pages.rst. [ 34.264323][ T1029] serio: Serial port pts1 [ 34.547270][ T23] audit: type=1400 audit(1719992169.979:185): avc: denied { ioctl } for pid=1084 comm="syz.2.301" path="socket:[17541]" dev="sockfs" ino=17541 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 35.809640][ T1162] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.816689][ T1162] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.824276][ T1162] device bridge_slave_0 entered promiscuous mode [ 35.834663][ T1162] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.841617][ T1162] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.849290][ T1162] device bridge_slave_1 entered promiscuous mode [ 35.926860][ T1162] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.933751][ T1162] bridge0: port 2(bridge_slave_1) entered forwarding state [ 35.940884][ T1162] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.947704][ T1162] bridge0: port 1(bridge_slave_0) entered forwarding state [ 35.981986][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 35.989902][ T18] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.997192][ T18] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.014046][ T485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 36.022978][ T485] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.029921][ T485] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.037354][ T485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 36.045943][ T485] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.052809][ T485] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.069967][ T485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 36.078080][ T485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 36.099303][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 36.117339][ T485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 36.144841][ T485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 36.164444][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 36.177211][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 36.314454][ T1195] ====================================================== [ 36.314454][ T1195] WARNING: the mand mount option is being deprecated and [ 36.314454][ T1195] will be removed in v5.15! [ 36.314454][ T1195] ====================================================== [ 36.351468][ T9] device bridge_slave_1 left promiscuous mode [ 36.358517][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.378689][ T9] device bridge_slave_0 left promiscuous mode [ 36.398719][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.470047][ T23] kauditd_printk_skb: 3 callbacks suppressed [ 36.470057][ T23] audit: type=1400 audit(1719992171.909:189): avc: denied { read } for pid=1204 comm="syz.1.354" name="loop-control" dev="devtmpfs" ino=9188 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 36.554886][ T23] audit: type=1400 audit(1719992171.909:190): avc: denied { open } for pid=1204 comm="syz.1.354" path="/dev/loop-control" dev="devtmpfs" ino=9188 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 36.590549][ T23] audit: type=1400 audit(1719992171.909:191): avc: denied { ioctl } for pid=1204 comm="syz.1.354" path="/dev/loop-control" dev="devtmpfs" ino=9188 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 36.676106][ T23] audit: type=1326 audit(1719992172.109:192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1181 comm="syz.3.342" exe="/root/syz-executor" sig=31 arch=c000003e syscall=39 compat=0 ip=0x7f50a3087be7 code=0x0 [ 36.721539][ T1221] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2050 sclass=netlink_route_socket pid=1221 comm=syz.0.361 [ 36.941749][ T1225] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.954024][ T1225] bridge0: port 1(bridge_slave_0) entered disabled state [ 36.961950][ T1225] device bridge_slave_0 entered promiscuous mode [ 36.974394][ T1225] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.981904][ T1225] bridge0: port 2(bridge_slave_1) entered disabled state [ 36.994633][ T1225] device bridge_slave_1 entered promiscuous mode [ 37.097918][ T1225] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.104817][ T1225] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.111929][ T1225] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.118668][ T1225] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.153768][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 37.162501][ T5] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.170586][ T5] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.188032][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 37.196808][ T343] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.203683][ T343] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.211482][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 37.219606][ T343] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.226450][ T343] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.244062][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 37.255029][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 37.276888][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 37.292759][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 37.314866][ T380] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 37.339204][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 37.347834][ T18] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 37.500440][ T9] device bridge_slave_1 left promiscuous mode [ 37.506599][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 37.516095][ T9] device bridge_slave_0 left promiscuous mode [ 37.522652][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 37.583535][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Dropping request. Check SNMP counters. [ 37.667035][ T1278] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=1278 comm=syz.0.385 [ 38.327578][ T23] audit: type=1400 audit(1719992173.759:193): avc: denied { ioctl } for pid=1320 comm="syz.1.405" path="socket:[19562]" dev="sockfs" ino=19562 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 38.452528][ T23] audit: type=1400 audit(1719992173.889:194): avc: denied { write } for pid=1335 comm="syz.3.413" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 38.504608][ T23] audit: type=1400 audit(1719992173.939:195): avc: denied { lock } for pid=1345 comm="syz.2.417" path="/dev/fuse" dev="devtmpfs" ino=9170 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 38.633377][ T23] audit: type=1400 audit(1719992174.069:196): avc: denied { read } for pid=1356 comm="syz.4.422" path="socket:[19654]" dev="sockfs" ino=19654 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 38.884103][ T23] audit: type=1400 audit(1719992174.309:197): avc: denied { setopt } for pid=1375 comm="syz.4.429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 39.268754][ T23] audit: type=1400 audit(1719992174.699:198): avc: denied { read } for pid=1413 comm="syz.1.446" path="socket:[20891]" dev="sockfs" ino=20891 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 39.488630][ T1420] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.495846][ T1420] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.503833][ T1420] device bridge_slave_0 entered promiscuous mode [ 39.511365][ T1420] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.518332][ T1420] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.526296][ T1420] device bridge_slave_1 entered promiscuous mode [ 39.607646][ T1420] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.614521][ T1420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.621733][ T1420] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.628465][ T1420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.661959][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 39.670385][ T343] bridge0: port 1(bridge_slave_0) entered disabled state [ 39.677628][ T343] bridge0: port 2(bridge_slave_1) entered disabled state [ 39.700805][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 39.709009][ T5] bridge0: port 1(bridge_slave_0) entered blocking state [ 39.715878][ T5] bridge0: port 1(bridge_slave_0) entered forwarding state [ 39.723913][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 39.733467][ T5] bridge0: port 2(bridge_slave_1) entered blocking state [ 39.740439][ T5] bridge0: port 2(bridge_slave_1) entered forwarding state [ 39.747656][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 39.760279][ T107] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 39.778249][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 39.798967][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 39.807231][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 39.823727][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 39.832991][ T343] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 40.069655][ T1174] device bridge_slave_1 left promiscuous mode [ 40.071298][ T1453] syz.4.462[1453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.071347][ T1453] syz.4.462[1453] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 40.075749][ T1174] bridge0: port 2(bridge_slave_1) entered disabled state [ 40.117625][ T1174] device bridge_slave_0 left promiscuous mode [ 40.123974][ T1174] bridge0: port 1(bridge_slave_0) entered disabled state [ 40.567194][ T1493] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=1493 comm=syz.0.479 [ 41.078129][ C1] TCP: request_sock_TCP: Possible SYN flooding on port 2. Dropping request. Check SNMP counters. [ 41.347517][ T1565] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=1565 comm=syz.2.511 [ 41.467168][ T1589] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=513 sclass=netlink_route_socket pid=1589 comm=syz.2.523 [ 41.985474][ T23] kauditd_printk_skb: 2 callbacks suppressed [ 41.985483][ T23] audit: type=1400 audit(1719992177.419:201): avc: denied { bind } for pid=1606 comm="syz.3.531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 42.039551][ T23] audit: type=1400 audit(1719992177.479:202): avc: denied { setattr } for pid=1611 comm="syz.3.533" name="KEY" dev="sockfs" ino=21866 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 42.359240][ T23] audit: type=1400 audit(1719992177.799:203): avc: denied { setopt } for pid=1647 comm="syz.2.549" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 42.433430][ T23] audit: type=1400 audit(1719992177.849:204): avc: denied { create } for pid=1649 comm="syz.0.551" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 42.503714][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 2. Dropping request. Check SNMP counters. [ 44.342065][ T1731] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=1731 comm=syz.1.583 [ 44.482861][ T1746] serio: Serial port pts0 [ 44.795052][ T23] audit: type=1400 audit(1719992180.229:205): avc: denied { write } for pid=1757 comm="syz.3.594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 44.797172][ T1758] kernel profiling enabled (shift: 0) [ 45.030066][ T1763] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=1763 comm=syz.0.596 [ 45.169083][ C0] ================================================================== [ 45.177010][ C0] BUG: KASAN: stack-out-of-bounds in profile_pc+0xa4/0xe0 [ 45.183925][ C0] Read of size 8 at addr ffff8881c1197b00 by task syz.4.600/1771 [ 45.191468][ C0] [ 45.193736][ C0] CPU: 0 PID: 1771 Comm: syz.4.600 Not tainted 5.4.276-syzkaller-00021-g58de09405d1e #0 [ 45.203276][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 45.213170][ C0] Call Trace: [ 45.216379][ C0] SYZFAIL: failed to recv rpc fd=3 want=4 sent=0 n=0 (errno 9: Bad file descriptor) [ 45.219088][ C0] dump_stack+0x1d8/0x241 [ 45.223249][ C0] ? nf_ct_l4proto_log_invalid+0x258/0x258 [ 45.228892][ C0] ? printk+0xd1/0x111 [ 45.232892][ C0] ? profile_pc+0xa4/0xe0 [ 45.237057][ C0] ? wake_up_klogd+0xb2/0xf0 [ 45.241486][ C0] ? profile_pc+0xa4/0xe0 [ 45.245643][ C0] print_address_description+0x8c/0x600 [ 45.251026][ C0] ? panic+0x89d/0x89d [ 45.254943][ C0] ? profile_pc+0xa4/0xe0 [ 45.259451][ C0] __kasan_report+0xf3/0x120 [ 45.263875][ C0] ? profile_pc+0xa4/0xe0 [ 45.268038][ C0] ? _raw_spin_lock+0xa9/0x1b0 [ 45.272727][ C0] kasan_report+0x30/0x60 [ 45.276898][ C0] profile_pc+0xa4/0xe0 [ 45.280886][ C0] profile_tick+0xb9/0x100 [ 45.285135][ C0] tick_sched_timer+0x237/0x3c0 [ 45.289827][ C0] ? tick_setup_sched_timer+0x460/0x460 [ 45.295208][ C0] __hrtimer_run_queues+0x3e9/0xb90 [ 45.300249][ C0] ? hrtimer_interrupt+0x890/0x890 [ 45.305187][ C0] ? kvm_sched_clock_read+0x14/0x40 [ 45.310240][ C0] ? sched_clock+0x36/0x40 [ 45.314476][ C0] ? sched_clock_cpu+0x18/0x3a0 [ 45.319171][ C0] ? ktime_get_update_offsets_now+0x26c/0x280 [ 45.325074][ C0] hrtimer_interrupt+0x38a/0x890 [ 45.329850][ C0] smp_apic_timer_interrupt+0x110/0x460 [ 45.335497][ C0] apic_timer_interrupt+0xf/0x20 [ 45.340243][ C0] [ 45.343033][ C0] RIP: 0010:_raw_spin_lock+0xa9/0x1b0 [ 45.348234][ C0] Code: 00 00 00 c7 44 24 20 00 00 00 00 4c 89 ef be 04 00 00 00 e8 39 dc 42 fd 4c 89 ff be 04 00 00 00 e8 2c dc 42 fd 43 0f b6 04 26 <84> c0 0f 85 aa 00 00 00 8b 44 24 20 b9 01 00 00 00 f0 41 0f b1 4d [ 45.367759][ C0] RSP: 0018:ffff8881c1197b00 EFLAGS: 00000297 ORIG_RAX: ffffffffffffff13 [ 45.376009][ C0] RAX: 0000000000000004 RBX: 1ffff11038232f60 RCX: ffffffff84511564 [ 45.383828][ C0] RDX: 0000000000000001 RSI: 0000000000000004 RDI: ffff8881c1197b20 [ 45.391719][ C0] RBP: ffff8881c1197b88 R08: dffffc0000000000 R09: 0000000000000003 [ 45.399521][ C0] R10: ffffffffffffffff R11: dffffc0000000001 R12: dffffc0000000000 [ 45.407329][ C0] R13: ffffea0007045d28 R14: 1ffff11038232f64 R15: ffff8881c1197b20 [ 45.415161][ C0] ? _raw_spin_lock+0xa4/0x1b0 [ 45.419749][ C0] ? _raw_spin_trylock_bh+0x190/0x190 [ 45.424952][ C0] follow_page_pte+0x1d9/0xcc0 [ 45.429671][ C0] __get_user_pages+0xbd1/0x13b0 [ 45.434443][ C0] ? populate_vma_page_range+0xf0/0xf0 [ 45.439737][ C0] ? __init_rwsem+0x210/0x210 [ 45.444252][ C0] ? vmacache_update+0x9f/0xf0 [ 45.448848][ C0] __mm_populate+0x369/0x510 [ 45.453281][ C0] ? __get_user_pages+0x13b0/0x13b0 [ 45.458313][ C0] ? security_capable+0x86/0xb0 [ 45.462999][ C0] __se_sys_mlockall+0x315/0x360 [ 45.467773][ C0] do_syscall_64+0xca/0x1c0 [ 45.472112][ C0] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 45.477841][ C0] RIP: 0033:0x7f55e72aab99 [ 45.482197][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.501736][ C0] RSP: 002b:00007f55e652c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000097 [ 45.509978][ C0] RAX: ffffffffffffffda RBX: 00007f55e7438f60 RCX: 00007f55e72aab99 [ 45.517789][ C0] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001 [ 45.525738][ C0] RBP: 00007f55e7319a7a R08: 0000000000000000 R09: 0000000000000000 [ 45.533528][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 45.541463][ C0] R13: 000000000000000b R14: 00007f55e7438f60 R15: 00007ffe062c6298 [ 45.549250][ C0] [ 45.551410][ C0] The buggy address belongs to the page: [ 45.556894][ C0] page:ffffea00070465c0 refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 [ 45.565829][ C0] flags: 0x8000000000000000() [ 45.570344][ C0] raw: 8000000000000000 ffffea00070465c8 ffffea00070465c8 0000000000000000 [ 45.578843][ C0] raw: 0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 [ 45.587265][ C0] page dumped because: kasan: bad access detected [ 45.593525][ C0] page_owner tracks the page as allocated [ 45.599071][ C0] page last allocated via order 3, migratetype Unmovable, gfp_mask 0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT) [ 45.610854][ C0] prep_new_page+0x18f/0x370 [ 45.615410][ C0] get_page_from_freelist+0x2d13/0x2d90 [ 45.620878][ C0] __alloc_pages_nodemask+0x393/0x840 [ 45.626102][ C0] dup_task_struct+0x85/0x600 [ 45.630605][ C0] copy_process+0x56d/0x3230 [ 45.635032][ C0] _do_fork+0x197/0x900 [ 45.639016][ C0] __x64_sys_clone3+0x2da/0x300 [ 45.643705][ C0] do_syscall_64+0xca/0x1c0 [ 45.648043][ C0] entry_SYSCALL_64_after_hwframe+0x5c/0xc1 [ 45.653772][ C0] page_owner free stack trace missing [ 45.659089][ C0] [ 45.661241][ C0] addr ffff8881c1197b00 is located in stack of task syz.4.600/1771 at offset 0 in frame: [ 45.670877][ C0] _raw_spin_lock+0x0/0x1b0 [ 45.675203][ C0] [ 45.677383][ C0] this frame has 1 object: [ 45.681648][ C0] [32, 36) 'val.i.i.i' [ 45.681651][ C0] [ 45.687897][ C0] Memory state around the buggy address: [ 45.693368][ C0] ffff8881c1197a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 45.701264][ C0] ffff8881c1197a80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 45.709166][ C0] >ffff8881c1197b00: f1 f1 f1 f1 04 f3 f3 f3 00 00 00 00 00 00 00 00 [ 45.717072][ C0] ^ [ 45.720972][ C0] ffff8881c1197b80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 45.728868][ C0] ffff8881c1197c00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 45.736849][ C0] ================================================================== [ 45.744839][ C0] Disabling lock debugging due to kernel taint [ 46.860385][ T7] device bridge_slave_1 left promiscuous mode [ 46.866987][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 46.874486][ T7] device bridge_slave_0 left promiscuous mode [ 46.880626][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.439973][ T7] device bridge_slave_1 left promiscuous mode [ 48.446178][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.453653][ T7] device bridge_slave_0 left promiscuous mode [ 48.459657][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.466943][ T7] device bridge_slave_1 left promiscuous mode [ 48.472933][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.480046][ T7] device bridge_slave_0 left promiscuous mode [ 48.485958][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.493662][ T7] device bridge_slave_1 left promiscuous mode [ 48.499747][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.506853][ T7] device bridge_slave_0 left promiscuous mode [ 48.513356][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 48.520720][ T7] device bridge_slave_1 left promiscuous mode [ 48.526815][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 48.534191][ T7] device bridge_slave_0 left promiscuous mode [ 48.540295][ T7] bridge0: port 1(bridge_slave_0) entered disabled state