last executing test programs: 1m46.466808568s ago: executing program 2 (id=411): syz_emit_ethernet(0xbe, &(0x7f0000000580)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa000800450000b00000000000019078ac1e0001ac1414aa0300907800000000450000000000000000010000ac141400ac1414aa2a000dc045d45768dc37efa0fc584443dd0ddc0c00037f00000100000000890f0000000000ac1414bbffffffff444c0001ac1e00010000000000000000000000000000000000000000ac1414aa000000007f0000"], 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'wg2\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000820004000000000000000c00850000000f00"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) getpgid(0xffffffffffffffff) r4 = getpid() setreuid(0xee00, 0x0) r5 = syz_pidfd_open(r4, 0x0) setns(r5, 0x24020000) syz_clone3(&(0x7f00000008c0)={0x10860000, 0x0, 0x0, 0x0, {0x28}, 0x0, 0x0, 0x0, 0x0}, 0x58) 1m44.382260411s ago: executing program 2 (id=416): getpid() bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2f, &(0x7f0000000040), 0x4) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x3, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, 0x0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socket(0xa, 0x800, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r6 = openat$cgroup_int(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f00000002c0)=ANY=[@ANYBLOB='-'], 0x27) 1m43.277880984s ago: executing program 2 (id=426): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a80)={{0x14}, [@NFT_MSG_NEWRULE={0x44, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @masq={{0x9}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x6c}}, 0x0) r0 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r0, &(0x7f0000001000)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2f}, @loopback}}}], 0x20}, 0x0) 1m42.29513211s ago: executing program 2 (id=430): socket$inet6(0xa, 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00000002c0)={0x5, 0x0, 0x200000, 0x0, 0x4, "a05c7b5d00008023e9c5bcf5ff7700"}) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = syz_open_dev$usbfs(0x0, 0x76, 0x6b42) ioctl$USBDEVFS_ALLOW_SUSPEND(r0, 0x5522) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f00000000c0)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0xfffffe11, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r1 = syz_open_dev$MSR(&(0x7f0000000140), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r3 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) 1m41.039808215s ago: executing program 2 (id=437): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x18, 0x10, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x8, 0xb4, &(0x7f0000000140)=""/180, 0x41100, 0x3, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffe94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sched_setaffinity(0x0, 0x8, &(0x7f0000000280)=0x2) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) ioprio_set$pid(0x3, 0x0, 0x4004) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0xfffffffffffffc33, &(0x7f0000000280)=0x2) socket$inet6(0xa, 0x1, 0x0) socket$nl_rdma(0x10, 0x3, 0x14) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000280)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4003, 0x1, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 1m37.70069861s ago: executing program 2 (id=453): socket$inet6(0xa, 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00000002c0)={0x5, 0x0, 0x200000, 0x0, 0x4, "a05c7b5d00008023e9c5bcf5ff7700"}) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = syz_open_dev$usbfs(0x0, 0x76, 0x6b42) ioctl$USBDEVFS_ALLOW_SUSPEND(r0, 0x5522) bpf$PROG_LOAD(0x5, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0xfffffe11, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r1 = syz_open_dev$MSR(&(0x7f0000000140), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r3 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) 1m22.019944622s ago: executing program 32 (id=453): socket$inet6(0xa, 0x2, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00000002c0)={0x5, 0x0, 0x200000, 0x0, 0x4, "a05c7b5d00008023e9c5bcf5ff7700"}) prctl$PR_SET_TAGGED_ADDR_CTRL(0x37, 0x1) r0 = syz_open_dev$usbfs(0x0, 0x76, 0x6b42) ioctl$USBDEVFS_ALLOW_SUSPEND(r0, 0x5522) bpf$PROG_LOAD(0x5, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0xfffffe11, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x400000bce) r1 = syz_open_dev$MSR(&(0x7f0000000140), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0x3) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r3 = socket$inet6(0xa, 0x80002, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) 6.8241582s ago: executing program 0 (id=796): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000176c0)={'batadv_slave_1\x00'}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) sendmsg$nl_route(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000005c0)=@newlink={0x30, 0x10, 0x503, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x10, 0x12, 0x0, 0x1, @hsr={{0x8}, {0x4}}}]}, 0x30}}, 0x40004) 6.756811121s ago: executing program 3 (id=797): syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[], 0x48) r0 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000000)={'vxcan0\x00'}) ioctl$sock_inet_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) r1 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) connect$ax25(r1, 0x0, 0x0) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e21, @multicast2}, 0x10) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000040)={0x0, 0x6, 0x2, 0x5, 0x5, 0x5}, 0x14) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000003d80)={0x0, 0x969, 0x2, 0x8, 0x4, 0x7}, 0x0) ioctl$FIBMAP(r5, 0x1, 0x0) ioctl$EXT4_IOC_GETFSUUID(0xffffffffffffffff, 0x8008662c, &(0x7f0000000040)) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3}, 0x0, &(0x7f00000002c0)={0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) socket$alg(0x26, 0x5, 0x0) sendto(r2, &(0x7f0000000180)='%', 0x300000, 0x840, 0x0, 0x60) 6.700597847s ago: executing program 4 (id=799): sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r4 = openat$cgroup_procs(r3, &(0x7f0000000480)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f00000000c0), 0x12) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_procs(r5, 0x0, 0x2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) 6.521059274s ago: executing program 5 (id=800): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000000380), 0x0, 0x4008004) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="2c00000008060102000000000000000003000007050001000700000005000100070000000500"], 0x2c}, 0x1, 0x0, 0x0, 0x24000003}, 0x0) 6.427037813s ago: executing program 0 (id=802): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb7"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000fd00000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) r6 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r6, &(0x7f0000000240)={&(0x7f00000000c0)=@id, 0x10, 0x0}, 0x0) ppoll(&(0x7f0000000040)=[{r6}], 0x1, &(0x7f0000001340), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @void, @value}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c0000001800ef0100000000000000000a00000000000000000000000c000900080000", @ANYRES32=0x0, @ANYBLOB="14000500000000000000"], 0x3c}, 0x1, 0x11}, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000200), 0xa040, 0x0) 5.923716352s ago: executing program 5 (id=803): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000300)={'bond0\x00'}) sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB], 0x44}, 0x1, 0x0, 0x0, 0x1}, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000800)={r1, 0x5, 0x2, 0x4}) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e00000000010000000400000500000000000200", @ANYRES32=0x1, @ANYBLOB="f80400"/20, @ANYRES32, @ANYRES32=r2, @ANYBLOB="0300000000000007000000000b0000000000000000000000000000006da73301019269343b738dfc34847f51891ed040bfb24e8d28dff30ad5fbde531e7b3852b4c06869c65b14768dd6ecfe791bb6b598aef834bfe86d9e3674780955c8f80de182c2106d973f2a28e4c0681fb39de8789827c4da0885fd67d106ec671108bb557f075d09ce67f02d935ba5f17c5aa0ded3f59f37362bcdf83401328119897091cb3ccc07d5093ecf421b9d213b08cb57c0efda78ea449f717f0aa3f333b112ccc3873b4b0a24fd1e4cf97c831deac6b7ba5d9e11560480984d1b01ab099f60535f8889f11e7f4e"], 0x50) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$packet(0x11, 0x3, 0x300) pselect6(0x40, &(0x7f0000000040)={0x180000000000000, 0x6d7c, 0x6, 0x9, 0x100288, 0x8000000000000000, 0x75, 0x8}, &(0x7f0000000080)={0x6, 0x3, 0x8, 0x9, 0x4, 0x7, 0x400, 0xb}, &(0x7f00000001c0)={0x7, 0x6, 0x23, 0xd95, 0x9, 0xae2d, 0xa, 0x7}, &(0x7f0000000240)={0x77359400}, &(0x7f00000002c0)={&(0x7f0000000280)={[0xfffffffffffffffc]}, 0x8}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000500)={r1}) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT_OLD(r5, 0x28, 0x6, &(0x7f0000000540)={0x0, 0x2710}, 0x10) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000240)=ANY=[@ANYBLOB="7c02000021000100000000000000000000440000000000000000000000000000fe8000200000000000000000000000bb00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000019021100e0000001000000000000000000000000ac1414aa000000000000000000000000ac1414aa000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000ac1e0001000000000000000000000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fe8000000000000000000000000000bbff020000000000000000000000000001000000000000000000000000ac1414aa000000000000000000000000fe8000000000000000000000000000aa00000000000000000000000000000000fc020000000000000000000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000ffffe000000200000000000000000000000000000000ac141400000000000000000000000000000000000000000000000000ff020000000000000000000000000001ffffffff000000000000000000000000fc020000000000000000000000000000fe8000000000000000000000000000bb0000000000000000000000000a00100000000000000000004000170009000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005001900000000000c0015000000000000000000"], 0x27c}}, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000200)={0x11, 0xd, 0x0, 0x1, 0x49, 0x6, @random="7c1c5f3dd6d6"}, 0x14) setsockopt$packet_int(r4, 0x107, 0x10, &(0x7f0000000100)=0xcce4, 0x4) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="540100001000132700000000000000007f00000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ac1414bb0000000000000000000000000000000032000000ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0004006a0000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001c0004000700"/268], 0x154}}, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'geneve1\x00', 0x0}) sendto$packet(r4, &(0x7f0000000180)="0b03f6ffe0ff64000200475400f6a13bb1000000086086dd4803", 0x100a6, 0x0, &(0x7f0000000140)={0x11, 0x8100, r7}, 0x14) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000640)={'pimreg\x00', 0x2}) socket(0x11, 0x80a, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000010400"/20, @ANYRES32], 0x3c}}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000300)="2e00000010008188040f80ec59acbc0413a181000b00000000010000000000000e000a000f000000028002002d1f", 0x2e}], 0x1}, 0x0) 5.720609594s ago: executing program 4 (id=805): sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd4242"], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 4.629268874s ago: executing program 4 (id=806): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a3200000000140000001100"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a80)={{0x14}, [@NFT_MSG_NEWRULE={0x44, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x18, 0x4, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @masq={{0x9}, @val={0x4}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x6c}}, 0x0) r1 = socket$kcm(0x2, 0x3, 0x84) sendmsg$inet(r1, &(0x7f0000001000)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x2f}, @loopback}}}], 0x20}, 0x0) 4.526656889s ago: executing program 3 (id=807): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[], 0x7c}}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={{0x14}, [@NFT_MSG_NEWRULE={0x70, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x44, 0x4, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, @inner={{0xa}, @val={0x30, 0x2, 0x0, 0x1, [@NFTA_INNER_TYPE={0x8, 0x2, 0x1, 0x0, 0x84}, @NFTA_INNER_FLAGS={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_INNER_NUM={0x8}, @NFTA_INNER_EXPR={0x14, 0x5, 0x0, 0x1, @meta={{0x9}, @val={0x4}}}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x98}}, 0x0) 4.50556357s ago: executing program 5 (id=808): socket$unix(0x1, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) ppoll(&(0x7f0000000500)=[{r0, 0x4080}], 0x1, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0x0, 0x1}, 0x0, &(0x7f00000002c0)={0x3ff, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) 4.467132357s ago: executing program 1 (id=809): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet6(0xa, 0x3, 0x7) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x4, @loopback}, 0x1c) setsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x39}, @in6=@loopback, 0x4e21, 0x0, 0x4e20, 0x0, 0xa, 0x0, 0x20}, {0x0, 0x80000000000000, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x4, 0x3}, {0x2000000000000000}, 0x0, 0x6e6bb9, 0x1}, {{@in=@broadcast, 0xfffffffc, 0x33}, 0x0, @in=@empty, 0x0, 0x3, 0x1, 0x7}}, 0xe8) sendmmsg(r3, 0x0, 0x0, 0x0) 4.180319239s ago: executing program 4 (id=810): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) timerfd_settime(0xffffffffffffffff, 0x2, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) openat$selinux_user(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) r5 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) writev(r5, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}, {0x0, 0x900}], 0x2) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000003c0)='cpuacct.usage_sys\x00', 0x275a, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, &(0x7f0000000080)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) 3.302287064s ago: executing program 1 (id=811): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="30003300c0000000ffffffffffff080211000000505050505050000000008c10000031d48cd3fb"], 0x54}}, 0x0) 2.729950692s ago: executing program 0 (id=812): r0 = socket(0x2000000000000021, 0x2, 0x10000000000002) connect$rxrpc(r0, &(0x7f0000000140)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @multicast2}}, 0x24) sendmmsg(r0, &(0x7f0000000180)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000000001001000001"], 0x18, 0xe000}, 0x5}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000d00)=[{{&(0x7f0000000400)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000240)=""/39, 0x27}, {&(0x7f0000000480)=""/182, 0xb6}, {&(0x7f0000000540)=""/75, 0x4b}, {&(0x7f0000000340)=""/28, 0x1c}, {&(0x7f0000000e00)=""/121, 0x79}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x6, &(0x7f00000006c0)=""/213, 0xd5}}, {{&(0x7f00000007c0)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000000900)=[{&(0x7f0000000840)=""/8, 0x8}, {&(0x7f0000000880)=""/78, 0x4e}], 0x2, &(0x7f0000000a40)=""/186, 0xba}}, {{&(0x7f0000000940)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private1}}}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000b00)=""/39, 0x27}, {&(0x7f0000000b40)=""/158, 0x9e}], 0x2, &(0x7f0000000c40)=""/156, 0x9c}}], 0x3, 0x10002, 0x0) recvfrom$packet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 2.726622199s ago: executing program 5 (id=813): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000000380), 0x0, 0x4008004) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0x0) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="2c00000008060102000000000000000003000007050001000700000005000100070000000500"], 0x2c}, 0x1, 0x0, 0x0, 0x24000003}, 0x0) 2.698327546s ago: executing program 3 (id=814): sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="00000000000000001c0012800b00010067656e65766500000c00028008000200ac1414bb080004"], 0x44}, 0x1, 0x2}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0], 0x50}}, 0x4000000) 2.696298547s ago: executing program 4 (id=815): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xe, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = socket$netlink(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000040)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$tipc(0x1e, 0x5, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @void, @value}, 0x94) sendmsg$nl_route(r1, 0x0, 0x0) openat$random(0xffffffffffffff9c, &(0x7f0000000200), 0xa040, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) 2.666145455s ago: executing program 1 (id=816): vmsplice(0xffffffffffffffff, &(0x7f00000004c0)=[{0x0}], 0x1, 0x4) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)=ANY=[@ANYBLOB="98030000", @ANYRES16=r2, @ANYBLOB="010028057000fcdbdf253b00000008000300", @ANYRES32=r3, @ANYBLOB="04008e00080057001b0a000004006c000500190107000000080026006c0900005603330080b0c000ffffffffffff"], 0x398}}, 0x0) 2.561277944s ago: executing program 3 (id=817): r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000001c0)={0x34, 0x2d, 0x1, 0x0, 0x21000000, "", [@nested={0x24, 0x0, 0x0, 0x1, [@typed={0xc, 0x0, 0x0, 0x0, @u64}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@loopback={0x100000000000000}}]}]}, 0x34}], 0x1}, 0x0) 2.464847781s ago: executing program 3 (id=818): socket$unix(0x1, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) ppoll(&(0x7f0000000500)=[{r0, 0x4080}], 0x1, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0x0, 0x1}, 0x0, &(0x7f00000002c0)={0x3ff, 0xfffffffffffffffe, 0x2, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0) 2.45234912s ago: executing program 0 (id=819): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x18, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fb000000000000000000e50002"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394f903", 0x11}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe, @void, @value}, 0x90) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 1.437107729s ago: executing program 5 (id=820): socket$inet_udp(0x2, 0x2, 0x0) socket$alg(0x26, 0x5, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000400)={0x101ff, 0x0, 0xeeee0000, 0x2000, &(0x7f0000000000/0x2000)=nil}) r0 = syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x0) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f00000000c0)={0x1, 0x2}) ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000140)={0x1, 0x7, 0x6, 0x4000}) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000340)='/sys/power/pm_wakeup_irq', 0x149a82, 0x242) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000480)={0x24, 0x3, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x5}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, 0x0, 0x0, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) write$cgroup_int(r2, &(0x7f0000000000)=0xfe8e, 0x12) r6 = socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000000)={0x8, 0x0, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={{0x14}, [@NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELTABLE={0xe8, 0x2, 0xa, 0x301, 0x0, 0x0, {0x3, 0x0, 0x4}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}, @NFTA_TABLE_USERDATA={0x48, 0x6, "540cc5449a34efb816559ac730544a883eeef5414d186292cbec4ebff7d44a0c36357e26de691404bb164b8d7948e0e0bdb132096dadf20f21dcc19636c7231ba18e0cd9"}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_TABLE_USERDATA={0x76, 0x6, "33df0fcc73f0ec2ab80a3651bf2c406af3ef79480cef263303433fb47558b5d6a180c4f5f1cc7eb4b6ee1724f3fac6dd4ee8375c87ca2edd4134ad7459e6f3a317fe665403853bd7c5f284102415a3dc43716220f048892958a4e56d4d8349275f14eaf189f94b7cfd43fb84dd27cd279a0f"}]}], {0x14}}, 0x13c}, 0x1, 0x0, 0x0, 0x50}, 0x4000040) sendmsg$nl_generic(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)={0x1c, 0x43, 0x9, 0xffffffff, 0x25dfdbfd, {0x1}, [@nested={0x5, 0x4, 0x0, 0x1, [@generic='3']}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40088c0}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000140), &(0x7f00000003c0)=0xc) 995.432279ms ago: executing program 1 (id=821): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000003c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000400)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@chandef_params=[@NL80211_ATTR_WIPHY_FREQ={0x8, 0x26, @random=0x994}], @NL80211_ATTR_CH_SWITCH_COUNT={0x8, 0xb7, 0x4a}]}, 0x2c}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r3, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000080)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="2a003300d0000000f20211000001080211000000a514a0ed377ef00f0404"], 0x50}, 0x1, 0x0, 0x0, 0xc0}, 0x0) 975.302584ms ago: executing program 3 (id=822): r0 = socket(0x10, 0x803, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b0000000500000002000000020000000500", @ANYRES32=0x0], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x2, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000100)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000880)=@raw={'raw\x00', 0x9, 0x3, 0x300, 0x118, 0xffffffff, 0xffffffff, 0x118, 0xffffffff, 0x258, 0xffffffff, 0xffffffff, 0x258, 0xffffffff, 0x3, &(0x7f00000003c0), {[{{@uncond, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'batadv_slave_1\x00', {0x5}}}}, {{@ipv6={@empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xffffff00, 0xffffffff, 0xffffff00, 0xff000000], [0xffffffff, 0xffffff00, 0xffffffff, 0xffffff00], 'bond_slave_0\x00', 'macvtap0\x00', {0xff}, {0xff}, 0x33, 0x80, 0x2, 0x10}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x6}}, @common=@ipv6header={{0x28}, {0x8, 0x44, 0x1}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x297, 'syz1\x00', {0x819}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x360) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) pipe2$9p(&(0x7f00000001c0), 0x4900) r5 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$nl_route_sched(r5, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newlink={0xb, 0x10, 0x437, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x1020}}, 0x44}}, 0x800) 458.019704ms ago: executing program 1 (id=823): bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x6, 0x4, &(0x7f0000000740)=@framed={{}, [@call={0x85, 0x0, 0x0, 0x56}]}, &(0x7f0000000640)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, 0x0, 0x0) connect$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x0, @any, 0xff, 0x2}, 0xe) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r0, &(0x7f0000000380)=[{{0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f00000030c0)}}], 0x1, 0x4008004) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e21, @multicast2}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @empty}, 0x10) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000100)=0x5) readv(0xffffffffffffffff, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f00000002c0)='%', 0x300000, 0x0, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[], 0x88}}, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)={0x58, r3, 0x1, 0xffffffff, 0x0, {}, [@TIPC_NLA_NODE={0x44, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "e3de3d7b4cd07ec3ee777de774fc7987cca41989"}}, @TIPC_NLA_NODE_KEY_MASTER={0x4}]}]}, 0x58}}, 0x4000000) socket$key(0xf, 0x3, 0x2) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000001080)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000000)=ANY=[@ANYBLOB], 0x6c}}, 0x0) sendmsg$IPSET_CMD_SAVE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="2c000000080601020000000000000000030000070500010007000000050001000700000005000100070000007f538970b98626869fcb25b2b223e327a2438b"], 0x2c}, 0x1, 0x0, 0x0, 0x24000003}, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000002ac0)=ANY=[@ANYBLOB="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"/3593], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x2e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r4}, 0x10) shutdown(0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000055c0), 0x400023c, 0x0, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) 455.016794ms ago: executing program 4 (id=824): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x6}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000009a40)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000008010000040900010073797a300000000040000000030a01080000000000000000010000000900030073797a32000000001400038008000240fffffffe08000140000000000900010073797a300000000050000000060a010400000000000000000100000008000b40000000000900010073797a30000000002800048024000180090001006d"], 0xd8}}, 0x0) 305.894227ms ago: executing program 0 (id=825): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x7c}}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={{0x14}, [@NFT_MSG_NEWRULE={0x70, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x44, 0x4, 0x0, 0x1, [{0x40, 0x1, 0x0, 0x1, @inner={{0xa}, @val={0x30, 0x2, 0x0, 0x1, [@NFTA_INNER_TYPE={0x8, 0x2, 0x1, 0x0, 0x84}, @NFTA_INNER_FLAGS={0x8, 0x3, 0x1, 0x0, 0xa}, @NFTA_INNER_NUM={0x8}, @NFTA_INNER_EXPR={0x14, 0x5, 0x0, 0x1, @meta={{0x9}, @val={0x4}}}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x98}}, 0x0) 164.85024ms ago: executing program 1 (id=826): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000009c0)=ANY=[@ANYBLOB="2400000001040102000000c9fd000000000000000800034000"], 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x30, 0x1, 0x4, 0x5, 0x0, 0x0, {0x3}, [@NFULA_CFG_CMD={0x5, 0x1, 0x1}, @NFULA_CFG_MODE={0xa, 0x2, {0x58d9, 0x1}}, @NFULA_CFG_FLAGS={0x6, 0x6, 0x1, 0x0, 0x2}]}, 0x30}}, 0x2000004) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000300)=@deltfilter={0x24, 0x2d, 0x1, 0x1, 0x25dfdbfd, {0x0, 0x0, 0x0, 0x0, {0xc, 0xb}, {0x1, 0xfff2}, {0xc}}}, 0x24}, 0x1, 0x0, 0x0, 0x1000}, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$l2tp6(0xa, 0x2, 0x73) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000005c0)=@mangle={'mangle\x00', 0x64, 0x6, 0x510, 0xf8, 0xf8, 0x0, 0x2b0, 0x398, 0x468, 0x468, 0x468, 0x468, 0x468, 0x6, 0x0, {[{{@ipv6={@empty, @loopback, [], [], 'gre0\x00', 'bond0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@CONNSECMARK={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@inet=@LOG={0x40, 'LOG\x00', 0x0, {0x0, 0x0, "23d6eb5c3e1597414aab894c685206260c91f9e86793623b5db1828eb179"}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0x2b0}}, {{@ipv6={@empty, @private1, [0x0, 0xffffff00], [0x0, 0x0, 0x0, 0xffffff00], 'gre0\x00', 'vlan1\x00', {}, {}, 0x88}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x9, 0x4, @ipv4=@rand_addr=0x64010100, 0x4e23}}}, {{@ipv6={@private0, @mcast2, [], [], 'tunl0\x00', 'bond_slave_0\x00', {}, {}, 0x6}, 0x0, 0xa8, 0xd0}, @HL={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x570) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000380)='udp_fail_queue_rcv_skb\x00', r5, 0x0, 0x6}, 0x18) r7 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r7, r6, 0x0, 0xf, &(0x7f00000001c0)='\x00'}, 0x11) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000140)={r4, 0xfffffffffffffff7, 0x10001, 0x4}) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={r7, r8, 0x0, 0x6, &(0x7f0000000180)='tunl0\x00'}, 0x30) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000009a40)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000008010000040900010073797a300000000040000000030a01080000000000000000010000000900030073797a32000000001400038008000240fffffffe08000140000000000900010073797a300000000050000000060a010400000000000000000100000008000b40000000000900010073797a30000000002800048024000180090001006d6574610000000014000280080001400000001708000240000000"], 0xd8}}, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x275a, 0x0) writev(r9, &(0x7f0000000400)=[{&(0x7f00000004c0)='~', 0x1}], 0x1) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000500)={r9}, 0xc) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r9, 0x0) r10 = socket$igmp(0x2, 0x3, 0x2) getsockopt$MRT(r10, 0x0, 0xcf, 0x0, &(0x7f0000000200)) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="ac1e010100000a01010100"/20], 0x14) r11 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_int(r11, 0x29, 0x35, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000001c0)='mmap_lock_acquire_returned\x00'}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x275a, 0x0) writev(r12, &(0x7f0000000200)=[{&(0x7f0000000080)='/', 0x1}], 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="b40800000000000061108900000000000600000000c8bf009500000000000000713a8a4f794bc216ab4a3907e7d12758fdd71498f15ece7ff79ecc34dfc5dec2b734064ffdf45e298ff02d5e92812df833dcab040c6ac398626c0ca34fafe6df4bb008c0758f060fe77b12ea8ddd221090a79985289c3af8a2e8ffa206e9dae665e29afbf2227e8eeacf20541e6c8acd70e5976af4db39bfcaa969995f51f70c58da8ef2556e7880cc0af8ed3699090b5c9aecedd3e8c3278d7d573848a1027c5e4af4eb2bc1270255aad956a41d21cf66349339f9b21d271685dd43e939d3c28a1847df936ff2e591e409a102ef77f9385aa1637534cd1fa84fcfe13bfa"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f00000000c0), 0x0, 0x10, &(0x7f0000000080), 0xffffffffffffffb2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, r12, 0x0) 92.117577ms ago: executing program 5 (id=827): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000002c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000300)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r2, @ANYBLOB="30003300c0000000ffffffffffff080211000000505050505050000000008c10000031d48cd3fb"], 0x54}}, 0x0) 0s ago: executing program 0 (id=828): r0 = openat$dir(0xffffffffffffff9c, 0x0, 0x140, 0x82) r1 = fanotify_init(0x81, 0x0) fanotify_mark(r1, 0x105, 0x40001032, r0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/13], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r3 = getpid() setresuid(0x0, 0x0, 0x0) statx(0xffffffffffffffff, 0x0, 0x6d00, 0x20, 0x0) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, 0x0, 0x0) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) read$FUSE(r1, 0x0, 0x0) kernel console output (not intermixed with test programs): 551:177): avc: denied { write } for pid=5991 comm="syz.4.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 65.092415][ T29] audit: type=1400 audit(1733459006.551:178): avc: denied { read } for pid=5991 comm="syz.4.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 65.125484][ T5920] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 65.130637][ T29] audit: type=1400 audit(1733459006.551:179): avc: denied { create } for pid=5991 comm="syz.4.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 65.173601][ T29] audit: type=1400 audit(1733459006.551:180): avc: denied { ioctl } for pid=5991 comm="syz.4.30" path="socket:[7831]" dev="sockfs" ino=7831 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 65.223495][ T29] audit: type=1400 audit(1733459006.681:181): avc: denied { read } for pid=5999 comm="syz.0.32" dev="nsfs" ino=4026533383 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 65.245220][ T29] audit: type=1400 audit(1733459006.681:182): avc: denied { open } for pid=5999 comm="syz.0.32" path="net:[4026533383]" dev="nsfs" ino=4026533383 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 65.309131][ T29] audit: type=1400 audit(1733459006.681:183): avc: denied { create } for pid=5999 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 65.374455][ T29] audit: type=1400 audit(1733459006.711:184): avc: denied { unmount } for pid=5821 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 65.466771][ T29] audit: type=1400 audit(1733459006.731:185): avc: denied { create } for pid=6002 comm="syz.4.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 65.668449][ T29] audit: type=1400 audit(1733459006.731:186): avc: denied { write } for pid=6002 comm="syz.4.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 65.716753][ T5920] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 65.787020][ T5920] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.894666][ T5920] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 66.964262][ T5920] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.089783][ T5920] syz.1.10 (5920) used greatest stack depth: 20512 bytes left [ 68.970891][ T6042] netlink: 100 bytes leftover after parsing attributes in process `syz.2.46'. [ 69.025981][ T6042] netlink: 'syz.2.46': attribute type 10 has an invalid length. [ 69.035758][ T6042] syz_tun: entered promiscuous mode [ 69.945471][ T6042] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 69.971512][ T6051] netlink: 8 bytes leftover after parsing attributes in process `syz.4.47'. [ 70.129028][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 70.129057][ T29] audit: type=1400 audit(1733459011.631:221): avc: denied { write } for pid=6036 comm="syz.3.44" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 70.747422][ T6062] netlink: 8 bytes leftover after parsing attributes in process `syz.3.50'. [ 71.769935][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.776446][ T1290] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.849893][ T29] audit: type=1400 audit(1733459013.341:222): avc: denied { getopt } for pid=6061 comm="syz.3.50" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 71.896126][ T29] audit: type=1400 audit(1733459013.381:223): avc: denied { read write } for pid=6069 comm="syz.4.53" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 72.174385][ T5863] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 72.187426][ T29] audit: type=1400 audit(1733459013.381:224): avc: denied { open } for pid=6069 comm="syz.4.53" path="/dev/raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 72.210687][ T29] audit: type=1400 audit(1733459013.391:225): avc: denied { ioctl } for pid=6069 comm="syz.4.53" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 72.212137][ T6078] bridge0: port 3(gretap0) entered disabled state [ 72.236035][ T29] audit: type=1400 audit(1733459013.571:226): avc: denied { create } for pid=6072 comm="syz.2.56" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 72.266156][ T29] audit: type=1400 audit(1733459013.581:227): avc: denied { ioctl } for pid=6072 comm="syz.2.56" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=8642 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 72.293092][ T29] audit: type=1400 audit(1733459013.581:228): avc: denied { read } for pid=6072 comm="syz.2.56" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=8642 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 72.317457][ T29] audit: type=1400 audit(1733459013.651:229): avc: denied { read } for pid=6075 comm="syz.3.54" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 72.340141][ T29] audit: type=1400 audit(1733459013.661:230): avc: denied { open } for pid=6075 comm="syz.3.54" path="/dev/dri/card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 72.346183][ T6082] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 72.375224][ T6078] bridge0: port 1(bridge_slave_0) entered disabled state [ 72.385555][ T6078] bridge0: port 2(bridge_slave_1) entered disabled state [ 72.404748][ T5863] usb 5-1: Using ep0 maxpacket: 32 [ 72.425272][ T5863] usb 5-1: config index 0 descriptor too short (expected 1051, got 27) [ 72.435347][ T5863] usb 5-1: config 0 has an invalid interface number: 35 but max is 0 [ 72.472988][ T5863] usb 5-1: config 0 has no interface number 0 [ 72.483951][ T5863] usb 5-1: config 0 interface 35 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 72.520992][ T5863] usb 5-1: New USB device found, idVendor=10c4, idProduct=818a, bcdDevice=7d.8f [ 72.530736][ T5863] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 72.541151][ T5863] usb 5-1: Product: syz [ 72.545404][ T5863] usb 5-1: Manufacturer: syz [ 72.560457][ T5863] usb 5-1: SerialNumber: syz [ 72.580203][ T5863] usb 5-1: config 0 descriptor?? [ 72.592072][ T5863] radio-si470x 5-1:0.35: could not find interrupt in endpoint [ 72.600098][ T5863] radio-si470x 5-1:0.35: probe with driver radio-si470x failed with error -5 [ 72.712775][ T6094] netlink: 100 bytes leftover after parsing attributes in process `syz.1.62'. [ 72.729524][ T6094] netlink: 'syz.1.62': attribute type 10 has an invalid length. [ 72.737739][ T6094] syz_tun: entered promiscuous mode [ 72.747505][ T6094] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 72.860484][ T5863] radio-raremono 5-1:0.35: Thanko's Raremono connected: (10C4:818A) [ 73.705384][ T5863] radio-raremono 5-1:0.35: raremono_cmd_main failed (-71) [ 73.719391][ T5864] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 73.730560][ T5863] radio-raremono 5-1:0.35: V4L2 device registered as radio48 [ 74.424735][ T5863] usb 5-1: USB disconnect, device number 2 [ 74.431914][ T5863] radio-raremono 5-1:0.35: Thanko's Raremono disconnected [ 74.708184][ T5864] usb 4-1: Using ep0 maxpacket: 32 [ 74.718212][ T5864] usb 4-1: config index 0 descriptor too short (expected 1051, got 27) [ 74.726813][ T5864] usb 4-1: config 0 has an invalid interface number: 35 but max is 0 [ 74.735769][ T5864] usb 4-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 74.759355][ T5864] usb 4-1: config 0 has no interface number 0 [ 74.765480][ T5864] usb 4-1: config 0 interface 35 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 74.801606][ T5864] usb 4-1: New USB device found, idVendor=10c4, idProduct=818a, bcdDevice=7d.8f [ 74.948525][ T5864] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 75.238723][ T5864] usb 4-1: Product: syz [ 75.344124][ T5864] usb 4-1: Manufacturer: syz [ 75.358973][ T5864] usb 4-1: SerialNumber: syz [ 75.376039][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 75.376054][ T29] audit: type=1400 audit(1733459016.881:237): avc: denied { write } for pid=6104 comm="syz.0.66" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 75.403213][ T5864] usb 4-1: config 0 descriptor?? [ 75.417489][ T5864] radio-si470x 4-1:0.35: could not find interrupt in endpoint [ 75.425384][ T5864] radio-si470x 4-1:0.35: probe with driver radio-si470x failed with error -5 [ 76.243943][ T5864] radio-raremono 4-1:0.35: this is not Thanko's Raremono. [ 76.254301][ T5864] usbhid 4-1:0.35: couldn't find an input interrupt endpoint [ 76.580785][ T25] cfg80211: failed to load regulatory.db [ 76.724785][ T5866] usb 4-1: USB disconnect, device number 2 [ 76.732793][ T29] audit: type=1400 audit(1733459018.231:238): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 76.756925][ T29] audit: type=1400 audit(1733459018.231:239): avc: denied { open } for pid=5822 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 76.781012][ T29] audit: type=1400 audit(1733459018.231:240): avc: denied { ioctl } for pid=5822 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 76.806986][ T29] audit: type=1400 audit(1733459018.251:241): avc: denied { map_create } for pid=6127 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 76.818106][ T6133] ip_vti0: entered promiscuous mode [ 76.826208][ T29] audit: type=1400 audit(1733459018.251:242): avc: denied { map_read map_write } for pid=6127 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 76.845077][ T6133] vlan2: entered promiscuous mode [ 76.851360][ T29] audit: type=1400 audit(1733459018.261:243): avc: denied { prog_load } for pid=6127 comm="syz.1.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 76.875139][ T29] audit: type=1400 audit(1733459018.261:244): avc: denied { bpf } for pid=6127 comm="syz.1.72" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 76.895508][ T29] audit: type=1400 audit(1733459018.361:245): avc: denied { perfmon } for pid=6127 comm="syz.1.72" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 76.921704][ T6125] SELinux: selinux_ima_measure_state_locked: failed to read policy -12. [ 76.957222][ T6133] ip_vti0: left promiscuous mode [ 76.960861][ T29] audit: type=1400 audit(1733459018.461:246): avc: denied { append } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 77.551756][ T6130] wireguard0: entered promiscuous mode [ 77.623913][ T6130] wireguard0: entered allmulticast mode [ 79.088179][ T6156] ip_vti0: entered promiscuous mode [ 79.093505][ T6156] vlan2: entered promiscuous mode [ 79.103707][ T6156] ip_vti0: left promiscuous mode [ 79.737385][ T6145] kvm: emulating exchange as write [ 80.070884][ T6160] wireguard0: entered promiscuous mode [ 80.082648][ T6160] wireguard0: entered allmulticast mode [ 81.256524][ T29] kauditd_printk_skb: 32 callbacks suppressed [ 81.256539][ T29] audit: type=1400 audit(1733459022.121:279): avc: denied { create } for pid=6163 comm="syz.0.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 81.499174][ T29] audit: type=1400 audit(1733459022.131:280): avc: denied { ioctl } for pid=6163 comm="syz.0.82" path="socket:[9327]" dev="sockfs" ino=9327 ioctlcmd=0x8922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 81.595238][ T29] audit: type=1400 audit(1733459022.161:281): avc: denied { read } for pid=6170 comm="syz.3.84" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 81.619000][ T29] audit: type=1400 audit(1733459022.161:282): avc: denied { open } for pid=6170 comm="syz.3.84" path="/dev/cpu/0/msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 81.643768][ T29] audit: type=1400 audit(1733459022.571:283): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 81.699609][ T29] audit: type=1400 audit(1733459022.571:284): avc: denied { open } for pid=5817 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 81.736457][ T29] audit: type=1400 audit(1733459022.571:285): avc: denied { ioctl } for pid=5817 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 83.159912][ T29] audit: type=1400 audit(1733459022.791:286): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 83.209424][ T29] audit: type=1400 audit(1733459022.791:287): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 83.249402][ T29] audit: type=1400 audit(1733459022.791:288): avc: denied { append } for pid=5171 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 83.448727][ T6182] Zero length message leads to an empty skb [ 86.352552][ T6228] netlink: 100 bytes leftover after parsing attributes in process `syz.4.104'. [ 86.364416][ T29] kauditd_printk_skb: 48 callbacks suppressed [ 86.364430][ T29] audit: type=1400 audit(1733459027.861:337): avc: denied { create } for pid=6227 comm="syz.4.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 86.381332][ T6228] netlink: 'syz.4.104': attribute type 10 has an invalid length. [ 86.394443][ T29] audit: type=1400 audit(1733459027.861:338): avc: denied { setopt } for pid=6227 comm="syz.4.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 86.417935][ T29] audit: type=1400 audit(1733459027.861:339): avc: denied { create } for pid=6227 comm="syz.4.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 86.438031][ T29] audit: type=1400 audit(1733459027.861:340): avc: denied { write } for pid=6227 comm="syz.4.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 86.459755][ T29] audit: type=1400 audit(1733459027.861:341): avc: denied { nlmsg_write } for pid=6227 comm="syz.4.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 86.480282][ T29] audit: type=1400 audit(1733459027.881:342): avc: denied { ioctl } for pid=6227 comm="syz.4.104" path="socket:[9409]" dev="sockfs" ino=9409 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 86.505266][ T29] audit: type=1400 audit(1733459027.881:343): avc: denied { write } for pid=6227 comm="syz.4.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 86.524739][ T29] audit: type=1400 audit(1733459027.971:344): avc: denied { map_create } for pid=6222 comm="syz.0.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 86.545400][ T6224] SELinux: selinux_ima_measure_state_locked: failed to read policy -12. [ 86.589934][ T29] audit: type=1400 audit(1733459028.071:345): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 86.612226][ T29] audit: type=1400 audit(1733459028.071:346): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 86.612530][ T6228] syz_tun: entered promiscuous mode [ 86.674862][ T6228] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 87.102341][ T6247] netlink: 68 bytes leftover after parsing attributes in process `syz.0.109'. [ 87.114643][ T6247] netlink: 8 bytes leftover after parsing attributes in process `syz.0.109'. [ 87.162411][ T6247] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 87.507454][ T6268] netlink: 100 bytes leftover after parsing attributes in process `syz.0.118'. [ 87.518468][ T6268] netlink: 'syz.0.118': attribute type 10 has an invalid length. [ 88.465670][ T6268] syz_tun: entered promiscuous mode [ 88.522418][ T6268] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 89.029222][ T6274] tipc: Can't bind to reserved service type 3 [ 89.886048][ T6295] netlink: 68 bytes leftover after parsing attributes in process `syz.2.129'. [ 89.908206][ T6295] netlink: 8 bytes leftover after parsing attributes in process `syz.2.129'. [ 91.297313][ T6307] SELinux: selinux_ima_measure_state_locked: failed to read policy -12. [ 91.384537][ T29] kauditd_printk_skb: 56 callbacks suppressed [ 91.384552][ T29] audit: type=1400 audit(1733459032.891:403): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 91.511288][ T29] audit: type=1400 audit(1733459032.901:404): avc: denied { open } for pid=5817 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 91.563446][ T29] audit: type=1400 audit(1733459032.901:405): avc: denied { ioctl } for pid=5817 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=647 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 91.679816][ T6317] netlink: 100 bytes leftover after parsing attributes in process `syz.0.137'. [ 91.735478][ T6320] netlink: 'syz.0.137': attribute type 10 has an invalid length. [ 91.740167][ T29] audit: type=1400 audit(1733459032.971:406): avc: denied { bind } for pid=6309 comm="syz.3.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 91.763573][ T29] audit: type=1400 audit(1733459032.971:407): avc: denied { prog_load } for pid=6292 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 91.782825][ T29] audit: type=1400 audit(1733459032.971:408): avc: denied { bpf } for pid=6292 comm="syz.1.128" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 91.803480][ T29] audit: type=1400 audit(1733459032.971:409): avc: denied { perfmon } for pid=6292 comm="syz.1.128" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 91.824241][ T29] audit: type=1400 audit(1733459032.971:410): avc: denied { prog_run } for pid=6292 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 91.843089][ T29] audit: type=1400 audit(1733459032.981:411): avc: denied { map_create } for pid=6292 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 91.862091][ T29] audit: type=1400 audit(1733459032.981:412): avc: denied { create } for pid=6292 comm="syz.1.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 93.471283][ T6342] netlink: 68 bytes leftover after parsing attributes in process `syz.1.143'. [ 93.484644][ T6342] netlink: 8 bytes leftover after parsing attributes in process `syz.1.143'. [ 97.499384][ T29] kauditd_printk_skb: 51 callbacks suppressed [ 97.499401][ T29] audit: type=1400 audit(1733459037.891:464): avc: denied { create } for pid=6360 comm="syz.1.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 97.635584][ T6370] SELinux: selinux_ima_measure_state_locked: failed to read policy -12. [ 97.782553][ T29] audit: type=1400 audit(1733459037.901:465): avc: denied { ioctl } for pid=6360 comm="syz.1.151" path="socket:[9730]" dev="sockfs" ino=9730 ioctlcmd=0x8922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 97.807750][ T29] audit: type=1400 audit(1733459038.641:466): avc: denied { mounton } for pid=6362 comm="syz.2.152" path="/28/bus" dev="tmpfs" ino=180 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 97.998734][ T29] audit: type=1400 audit(1733459038.651:467): avc: denied { unlink } for pid=6362 comm="syz.2.152" name="#7" dev="tmpfs" ino=184 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 98.026787][ T29] audit: type=1400 audit(1733459038.661:468): avc: denied { mount } for pid=6362 comm="syz.2.152" name="/" dev="overlay" ino=179 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 98.056509][ T29] audit: type=1400 audit(1733459039.141:469): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 98.080955][ T29] audit: type=1400 audit(1733459039.141:470): avc: denied { open } for pid=5812 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 98.105326][ T29] audit: type=1400 audit(1733459039.141:471): avc: denied { ioctl } for pid=5812 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 98.131316][ T29] audit: type=1400 audit(1733459039.161:472): avc: denied { append } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 98.154318][ T29] audit: type=1400 audit(1733459039.231:473): avc: denied { map_create } for pid=6374 comm="syz.1.153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 98.314370][ T6387] netlink: 100 bytes leftover after parsing attributes in process `syz.2.157'. [ 98.343801][ T6387] netlink: 'syz.2.157': attribute type 10 has an invalid length. [ 100.076519][ T6407] netlink: 'syz.3.163': attribute type 1 has an invalid length. [ 100.084559][ T6407] netlink: 224 bytes leftover after parsing attributes in process `syz.3.163'. [ 100.102379][ T6402] netlink: 'syz.4.162': attribute type 21 has an invalid length. [ 100.964067][ T6423] netlink: 8 bytes leftover after parsing attributes in process `syz.1.170'. [ 100.985224][ T6423] xt_CONNSECMARK: invalid mode: 0 [ 102.056978][ T6438] netlink: 'syz.3.174': attribute type 10 has an invalid length. [ 102.820428][ T29] kauditd_printk_skb: 57 callbacks suppressed [ 102.820444][ T29] audit: type=1400 audit(1733459044.331:531): avc: denied { ioctl } for pid=6443 comm="syz.1.177" path="socket:[10255]" dev="sockfs" ino=10255 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 103.462803][ T29] audit: type=1400 audit(1733459044.961:532): avc: denied { create } for pid=6448 comm="syz.3.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 103.562229][ T29] audit: type=1400 audit(1733459044.991:533): avc: denied { bind } for pid=6448 comm="syz.3.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 103.621569][ T29] audit: type=1400 audit(1733459045.111:534): avc: denied { write } for pid=6448 comm="syz.3.179" path="socket:[10260]" dev="sockfs" ino=10260 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 104.248681][ T29] audit: type=1400 audit(1733459045.441:535): avc: denied { mounton } for pid=6450 comm="syz.4.181" path="/48/bus" dev="tmpfs" ino=270 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 104.327719][ T29] audit: type=1400 audit(1733459045.441:536): avc: denied { unlink } for pid=6450 comm="syz.4.181" name="#b" dev="tmpfs" ino=274 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 104.349932][ T29] audit: type=1400 audit(1733459045.451:537): avc: denied { mount } for pid=6450 comm="syz.4.181" name="/" dev="overlay" ino=269 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 104.372380][ T29] audit: type=1400 audit(1733459045.511:538): avc: denied { read } for pid=6448 comm="syz.3.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 104.416622][ T29] audit: type=1400 audit(1733459045.651:539): avc: denied { write } for pid=6448 comm="syz.3.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 104.435835][ T29] audit: type=1400 audit(1733459045.801:540): avc: denied { create } for pid=6460 comm="syz.2.183" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 106.568935][ T6490] netlink: 'syz.2.197': attribute type 21 has an invalid length. [ 106.700732][ T6497] netlink: 8 bytes leftover after parsing attributes in process `syz.3.194'. [ 108.034411][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 108.034430][ T29] audit: type=1400 audit(1733459049.471:595): avc: denied { create } for pid=6502 comm="syz.4.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 109.216789][ T29] audit: type=1400 audit(1733459049.471:596): avc: denied { write } for pid=6502 comm="syz.4.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 109.422619][ T29] audit: type=1400 audit(1733459049.471:597): avc: denied { nlmsg_read } for pid=6502 comm="syz.4.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 109.882251][ T29] audit: type=1400 audit(1733459051.291:598): avc: denied { read } for pid=6525 comm="syz.4.206" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 109.925894][ T29] audit: type=1400 audit(1733459051.291:599): avc: denied { open } for pid=6525 comm="syz.4.206" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 110.002343][ T29] audit: type=1400 audit(1733459051.311:600): avc: denied { ioctl } for pid=6525 comm="syz.4.206" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 110.111798][ T29] audit: type=1400 audit(1733459051.471:601): avc: denied { create } for pid=6531 comm="syz.2.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 110.768424][ T29] audit: type=1400 audit(1733459051.471:602): avc: denied { bind } for pid=6531 comm="syz.2.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 110.830915][ T5862] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 111.009430][ T5862] usb 3-1: Using ep0 maxpacket: 8 [ 111.031659][ T5862] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 32 [ 111.049823][ T29] audit: type=1400 audit(1733459051.471:603): avc: denied { listen } for pid=6531 comm="syz.2.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 111.364765][ T5862] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 111.374053][ T5862] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 111.386484][ T5862] usb 3-1: Product: syz [ 111.393088][ T5862] usb 3-1: Manufacturer: syz [ 111.418018][ T5862] usb 3-1: SerialNumber: syz [ 111.476238][ T29] audit: type=1400 audit(1733459051.471:604): avc: denied { connect } for pid=6531 comm="syz.2.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 111.659137][ T5862] cdc_ncm 3-1:1.0: bind() failure [ 111.680485][ T5862] cdc_ncm 3-1:1.1: CDC Union missing and no IAD found [ 111.697536][ T5862] cdc_ncm 3-1:1.1: bind() failure [ 111.720038][ T5862] usb 3-1: USB disconnect, device number 2 [ 113.019430][ T6578] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6578 comm=syz.1.223 [ 113.077313][ T6578] netlink: 'syz.1.223': attribute type 1 has an invalid length. [ 113.328933][ T6578] 8021q: adding VLAN 0 to HW filter on device bond1 [ 114.130954][ T6582] 8021q: adding VLAN 0 to HW filter on device bond1 [ 114.138047][ T6582] bond1: (slave vti0): The slave device specified does not support setting the MAC address [ 114.167019][ T6582] bond1: (slave vti0): Error -95 calling set_mac_address [ 115.678555][ T6617] netlink: 4 bytes leftover after parsing attributes in process `syz.3.235'. [ 117.533554][ T5865] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 117.629835][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 117.629850][ T29] audit: type=1400 audit(1733459059.121:625): avc: denied { create } for pid=6628 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 117.869424][ T29] audit: type=1400 audit(1733459059.121:626): avc: denied { ioctl } for pid=6628 comm="syz.1.238" path="socket:[10661]" dev="sockfs" ino=10661 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 117.894336][ T29] audit: type=1400 audit(1733459059.121:627): avc: denied { connect } for pid=6628 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 117.914061][ T29] audit: type=1400 audit(1733459059.131:628): avc: denied { write } for pid=6628 comm="syz.1.238" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 118.884217][ T5865] usb 1-1: Using ep0 maxpacket: 32 [ 119.262038][ T6632] pim6reg1: entered promiscuous mode [ 119.267358][ T6632] pim6reg1: entered allmulticast mode [ 119.314721][ T5865] usb 1-1: device descriptor read/all, error -71 [ 119.746873][ T29] audit: type=1400 audit(1733459061.251:629): avc: denied { getopt } for pid=6648 comm="syz.1.246" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 120.531879][ T29] audit: type=1400 audit(1733459062.031:630): avc: denied { write } for pid=6657 comm="syz.4.249" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 120.623911][ T29] audit: type=1400 audit(1733459062.031:631): avc: denied { read } for pid=6657 comm="syz.4.249" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 120.699168][ T29] audit: type=1400 audit(1733459062.131:632): avc: denied { setopt } for pid=6655 comm="syz.1.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 120.699739][ T6656] netlink: 'syz.1.247': attribute type 10 has an invalid length. [ 121.129467][ T29] audit: type=1400 audit(1733459062.131:633): avc: denied { create } for pid=6655 comm="syz.1.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 121.173014][ T29] audit: type=1400 audit(1733459062.161:634): avc: denied { write } for pid=6655 comm="syz.1.247" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 123.479481][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 123.479498][ T29] audit: type=1400 audit(1733459064.971:660): avc: denied { read } for pid=6677 comm="syz.1.255" dev="nsfs" ino=4026532802 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 123.507167][ T29] audit: type=1400 audit(1733459064.971:661): avc: denied { open } for pid=6677 comm="syz.1.255" path="net:[4026532802]" dev="nsfs" ino=4026532802 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 123.829473][ T29] audit: type=1400 audit(1733459064.971:662): avc: denied { create } for pid=6677 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 123.849835][ T29] audit: type=1400 audit(1733459064.981:663): avc: denied { shutdown } for pid=6677 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 123.870001][ T29] audit: type=1400 audit(1733459064.981:664): avc: denied { read } for pid=6677 comm="syz.1.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 124.006141][ T29] audit: type=1400 audit(1733459065.081:665): avc: denied { create } for pid=6679 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 124.025585][ T29] audit: type=1400 audit(1733459065.081:666): avc: denied { bind } for pid=6679 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 124.045027][ T29] audit: type=1400 audit(1733459065.081:667): avc: denied { create } for pid=6679 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 124.065660][ T29] audit: type=1400 audit(1733459065.081:668): avc: denied { write } for pid=6679 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 124.085907][ T29] audit: type=1400 audit(1733459065.081:669): avc: denied { nlmsg_read } for pid=6679 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 124.686476][ T6701] bond0: (slave syz_tun): Releasing backup interface [ 125.286304][ T6716] netlink: 8 bytes leftover after parsing attributes in process `syz.1.267'. [ 125.329423][ T6716] xt_CONNSECMARK: invalid mode: 0 [ 125.665834][ T6698] pim6reg1: entered promiscuous mode [ 125.725175][ T6698] pim6reg1: entered allmulticast mode [ 128.482872][ T6750] ip_vti0: entered promiscuous mode [ 128.488140][ T6750] vlan2: entered promiscuous mode [ 128.494370][ T29] kauditd_printk_skb: 52 callbacks suppressed [ 128.494382][ T29] audit: type=1400 audit(1733459070.011:722): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 128.659498][ T29] audit: type=1400 audit(1733459070.011:723): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 128.723590][ T29] audit: type=1400 audit(1733459070.011:724): avc: denied { append } for pid=5171 comm="syslogd" name="messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 128.775613][ T29] audit: type=1400 audit(1733459070.011:725): avc: denied { open } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 128.832015][ T6760] netlink: 16 bytes leftover after parsing attributes in process `syz.4.283'. [ 128.854638][ T29] audit: type=1400 audit(1733459070.011:726): avc: denied { getattr } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=3 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 128.927676][ T29] audit: type=1400 audit(1733459070.011:727): avc: denied { create } for pid=6751 comm="syz.0.280" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 128.987801][ T29] audit: type=1400 audit(1733459070.071:728): avc: denied { ioctl } for pid=6753 comm="syz.4.281" path="socket:[11539]" dev="sockfs" ino=11539 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 129.058435][ T29] audit: type=1400 audit(1733459070.071:729): avc: denied { connect } for pid=6753 comm="syz.4.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 129.165609][ T29] audit: type=1400 audit(1733459070.071:730): avc: denied { write } for pid=6753 comm="syz.4.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 129.260735][ T29] audit: type=1400 audit(1733459070.221:731): avc: denied { read } for pid=6755 comm="syz.3.282" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 129.975403][ T6767] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 130.318159][ T6775] netlink: 'syz.1.287': attribute type 10 has an invalid length. [ 132.823196][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 133.695215][ T6816] netlink: 8 bytes leftover after parsing attributes in process `syz.0.302'. [ 133.712170][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 133.712183][ T29] audit: type=1400 audit(1733459075.221:749): avc: denied { setopt } for pid=6814 comm="syz.0.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 133.772435][ T29] audit: type=1400 audit(1733459075.281:750): avc: denied { getopt } for pid=6814 comm="syz.0.302" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 133.839110][ T29] audit: type=1400 audit(1733459075.341:751): avc: denied { read } for pid=6810 comm="syz.1.300" name="ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 133.895377][ T29] audit: type=1400 audit(1733459075.371:752): avc: denied { open } for pid=6810 comm="syz.1.300" path="/dev/ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 134.183562][ T29] audit: type=1400 audit(1733459075.691:753): avc: denied { name_bind } for pid=6824 comm="syz.0.304" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 134.410124][ T29] audit: type=1400 audit(1733459075.721:754): avc: denied { node_bind } for pid=6824 comm="syz.0.304" saddr=255.255.255.255 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 134.838322][ T6822] wireguard0: entered promiscuous mode [ 134.843869][ T6822] wireguard0: entered allmulticast mode [ 134.924409][ T6830] syz_tun: left promiscuous mode [ 135.027612][ T6830] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 136.331922][ T6844] netlink: 8 bytes leftover after parsing attributes in process `syz.3.309'. [ 136.344936][ T6844] xt_CONNSECMARK: invalid mode: 0 [ 136.550252][ T29] audit: type=1400 audit(1733459078.041:755): avc: denied { module_request } for pid=6831 comm="syz.1.306" kmod="netdev-pim6reg1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 137.368129][ T29] audit: type=1400 audit(1733459078.771:756): avc: denied { ioctl } for pid=6837 comm="syz.4.308" path="socket:[11054]" dev="sockfs" ino=11054 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 137.449468][ T29] audit: type=1400 audit(1733459078.911:757): avc: denied { sys_module } for pid=6831 comm="syz.1.306" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 137.686830][ T29] audit: type=1400 audit(1733459079.051:758): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 138.687495][ T6864] netlink: 'syz.4.315': attribute type 10 has an invalid length. [ 138.738730][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 138.738745][ T29] audit: type=1400 audit(1733459080.241:786): avc: denied { create } for pid=6868 comm="syz.3.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 138.778599][ T29] audit: type=1400 audit(1733459080.281:787): avc: denied { write } for pid=6868 comm="syz.3.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 138.843920][ T29] audit: type=1400 audit(1733459080.281:788): avc: denied { create } for pid=6868 comm="syz.3.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 138.876199][ T6864] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 138.892713][ T29] audit: type=1400 audit(1733459080.281:789): avc: denied { write } for pid=6868 comm="syz.3.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 138.947003][ T29] audit: type=1400 audit(1733459080.281:790): avc: denied { write } for pid=6868 comm="syz.3.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 138.974102][ T29] audit: type=1400 audit(1733459080.281:791): avc: denied { read } for pid=6868 comm="syz.3.316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 139.069908][ T29] audit: type=1400 audit(1733459080.311:792): avc: denied { write } for pid=6865 comm="syz.2.317" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 139.097815][ T29] audit: type=1400 audit(1733459080.311:793): avc: denied { read } for pid=6865 comm="syz.2.317" name="ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 139.148719][ T29] audit: type=1400 audit(1733459080.311:794): avc: denied { open } for pid=6865 comm="syz.2.317" path="/dev/ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 139.208317][ T29] audit: type=1400 audit(1733459080.331:795): avc: denied { read } for pid=6868 comm="syz.3.316" dev="nsfs" ino=4026533254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 140.037177][ T6887] netlink: 20 bytes leftover after parsing attributes in process `syz.3.323'. [ 140.147770][ T6887] netlink: 20 bytes leftover after parsing attributes in process `syz.3.323'. [ 140.174141][ T6891] mac80211_hwsim hwsim7 wlan1: entered allmulticast mode [ 140.299096][ T6887] netlink: 20 bytes leftover after parsing attributes in process `syz.3.323'. [ 140.417303][ T6887] netlink: 20 bytes leftover after parsing attributes in process `syz.3.323'. [ 141.206801][ T6887] netlink: 20 bytes leftover after parsing attributes in process `syz.3.323'. [ 141.309319][ T6887] netlink: 20 bytes leftover after parsing attributes in process `syz.3.323'. [ 141.906687][ T6905] wireguard0: entered promiscuous mode [ 141.913916][ T6905] wireguard0: entered allmulticast mode [ 142.165150][ T6919] netlink: 'syz.4.332': attribute type 10 has an invalid length. [ 142.217811][ T6919] bond0: (slave netdevsim0): Releasing backup interface [ 142.266294][ T6923] netlink: 'syz.4.332': attribute type 10 has an invalid length. [ 142.797867][ T6919] team0: Port device netdevsim0 added [ 143.870163][ T6925] wireguard0: entered promiscuous mode [ 143.875679][ T6925] wireguard0: entered allmulticast mode [ 143.896903][ T6923] team0: Port device netdevsim0 removed [ 143.918165][ T6923] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 144.157214][ T29] kauditd_printk_skb: 70 callbacks suppressed [ 144.157228][ T29] audit: type=1400 audit(1733459085.641:866): avc: denied { read write } for pid=6940 comm="syz.3.339" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 144.194753][ T29] audit: type=1400 audit(1733459085.641:867): avc: denied { open } for pid=6940 comm="syz.3.339" path="/dev/raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 144.578306][ T2144] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 144.764687][ T29] audit: type=1400 audit(1733459085.641:868): avc: denied { ioctl } for pid=6940 comm="syz.3.339" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 144.769923][ T2144] usb 4-1: device descriptor read/64, error -71 [ 144.803757][ T29] audit: type=1400 audit(1733459085.661:869): avc: denied { setopt } for pid=6941 comm="syz.4.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 144.967181][ T29] audit: type=1400 audit(1733459085.661:870): avc: denied { write } for pid=6941 comm="syz.4.340" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 145.010406][ T29] audit: type=1400 audit(1733459085.891:871): avc: denied { ioctl } for pid=6940 comm="syz.3.339" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 145.038118][ T29] audit: type=1400 audit(1733459086.161:872): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 145.107015][ T29] audit: type=1400 audit(1733459086.161:873): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 145.141148][ T2144] usb 4-1: new high-speed USB device number 4 using dummy_hcd [ 145.168589][ T29] audit: type=1400 audit(1733459086.161:874): avc: denied { append } for pid=5171 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 145.242903][ T29] audit: type=1400 audit(1733459086.161:875): avc: denied { open } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 145.282076][ T2144] usb 4-1: device descriptor read/64, error -71 [ 145.378001][ T6966] warning: `syz.4.346' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 145.403128][ T2144] usb usb4-port1: attempt power cycle [ 146.149379][ T2144] usb 4-1: new high-speed USB device number 5 using dummy_hcd [ 146.209834][ T2144] usb 4-1: device descriptor read/8, error -71 [ 146.451288][ T2144] usb 4-1: new high-speed USB device number 6 using dummy_hcd [ 146.515665][ T2144] usb 4-1: device descriptor read/8, error -71 [ 146.540407][ T6996] netlink: 24 bytes leftover after parsing attributes in process `syz.4.352'. [ 146.629913][ T2144] usb usb4-port1: unable to enumerate USB device [ 147.116797][ T7010] wireguard1: entered promiscuous mode [ 147.122415][ T7010] wireguard1: entered allmulticast mode [ 148.418185][ T7035] netlink: 20 bytes leftover after parsing attributes in process `syz.3.359'. [ 148.481612][ T7035] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 148.489079][ T7035] IPv6: NLM_F_CREATE should be set when creating new route [ 149.542255][ T29] kauditd_printk_skb: 105 callbacks suppressed [ 149.542270][ T29] audit: type=1400 audit(1733459091.051:981): avc: denied { read } for pid=7060 comm="syz.0.363" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 149.607186][ T29] audit: type=1400 audit(1733459091.051:982): avc: denied { open } for pid=7060 comm="syz.0.363" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 149.615753][ T7065] netlink: 'syz.2.364': attribute type 10 has an invalid length. [ 149.639604][ T29] audit: type=1400 audit(1733459091.051:983): avc: denied { ioctl } for pid=7060 comm="syz.0.363" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 149.664056][ T29] audit: type=1400 audit(1733459091.081:984): avc: denied { write } for pid=7045 comm="syz.4.361" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 149.716542][ T29] audit: type=1400 audit(1733459091.101:985): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 149.738820][ T29] audit: type=1400 audit(1733459091.101:986): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 149.761008][ T29] audit: type=1400 audit(1733459091.101:987): avc: denied { append } for pid=5171 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 149.783760][ T29] audit: type=1400 audit(1733459091.101:988): avc: denied { open } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 149.807800][ T29] audit: type=1400 audit(1733459091.101:989): avc: denied { getattr } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 149.830981][ T29] audit: type=1400 audit(1733459091.111:990): avc: denied { search } for pid=7054 comm="sed" name="resolv.conf" dev="tmpfs" ino=1706 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 149.887936][ T7065] syz_tun: entered promiscuous mode [ 151.192783][ T7102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7102 comm=syz.3.370 [ 151.241734][ T7102] netlink: 'syz.3.370': attribute type 1 has an invalid length. [ 151.310019][ T7102] 8021q: adding VLAN 0 to HW filter on device bond1 [ 151.437344][ T7114] 8021q: adding VLAN 0 to HW filter on device bond1 [ 151.452617][ T7114] bond1: (slave vti0): The slave device specified does not support setting the MAC address [ 151.465630][ T7114] bond1: (slave vti0): Error -95 calling set_mac_address [ 151.482339][ T7124] netlink: 'syz.0.376': attribute type 10 has an invalid length. [ 151.499159][ T7117] syz_tun: left promiscuous mode [ 151.507108][ T7117] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 151.544296][ T7124] bond0: (slave netdevsim0): Enslaving as an active interface with an up link [ 152.516551][ T7145] pim6reg1: entered promiscuous mode [ 152.521919][ T7145] pim6reg1: entered allmulticast mode [ 153.481785][ T7151] netlink: 'syz.0.386': attribute type 21 has an invalid length. [ 153.524281][ T7151] netlink: 8 bytes leftover after parsing attributes in process `syz.0.386'. [ 155.354837][ T7161] pim6reg1: entered promiscuous mode [ 155.360221][ T7161] pim6reg1: entered allmulticast mode [ 156.411410][ T7167] netlink: 8 bytes leftover after parsing attributes in process `syz.4.392'. [ 156.543007][ T29] kauditd_printk_skb: 58 callbacks suppressed [ 156.549587][ T29] audit: type=1400 audit(1733459098.011:1049): avc: denied { create } for pid=7162 comm="syz.0.390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 156.554431][ T7167] xt_CONNSECMARK: invalid mode: 0 [ 157.126794][ T29] audit: type=1400 audit(1733459098.051:1050): avc: denied { ioctl } for pid=7162 comm="syz.0.390" path="socket:[12490]" dev="sockfs" ino=12490 ioctlcmd=0x8922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 157.151557][ T29] audit: type=1400 audit(1733459098.061:1051): avc: denied { create } for pid=7163 comm="syz.4.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 157.171173][ T29] audit: type=1400 audit(1733459098.061:1052): avc: denied { setopt } for pid=7163 comm="syz.4.392" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 157.319392][ T29] audit: type=1400 audit(1733459098.801:1053): avc: denied { getopt } for pid=7163 comm="syz.4.392" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 157.610527][ T29] audit: type=1400 audit(1733459099.121:1054): avc: denied { create } for pid=7175 comm="syz.2.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 157.676728][ T29] audit: type=1400 audit(1733459099.181:1055): avc: denied { shutdown } for pid=7175 comm="syz.2.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 158.547246][ T29] audit: type=1400 audit(1733459099.181:1056): avc: denied { read } for pid=7175 comm="syz.2.394" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 159.099379][ T29] audit: type=1400 audit(1733459100.581:1057): avc: denied { ioctl } for pid=7198 comm="syz.2.401" path="socket:[13717]" dev="sockfs" ino=13717 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 159.158443][ T29] audit: type=1400 audit(1733459100.581:1058): avc: denied { bind } for pid=7198 comm="syz.2.401" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 160.876036][ T7217] SELinux: selinux_ima_measure_state_locked: failed to read policy -12. [ 160.953315][ T7226] xt_CONNSECMARK: invalid mode: 0 [ 161.238025][ T7235] netlink: 8 bytes leftover after parsing attributes in process `syz.3.413'. [ 162.197019][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 162.197037][ T29] audit: type=1400 audit(1733459102.991:1086): avc: denied { map_read map_write } for pid=7229 comm="syz.4.410" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 162.236275][ T7235] xt_CONNSECMARK: invalid mode: 0 [ 162.321777][ T29] audit: type=1400 audit(1733459103.521:1087): avc: denied { module_request } for pid=7229 comm="syz.4.410" kmod="net-pf-10-proto-1-type-0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 162.485661][ T29] audit: type=1400 audit(1733459103.641:1088): avc: denied { prog_run } for pid=7227 comm="syz.2.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 163.101150][ T29] audit: type=1400 audit(1733459103.671:1089): avc: denied { create } for pid=7227 comm="syz.2.411" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 163.128926][ T29] audit: type=1400 audit(1733459103.761:1090): avc: denied { sys_admin } for pid=7227 comm="syz.2.411" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 163.150070][ T29] audit: type=1400 audit(1733459104.071:1091): avc: denied { write } for pid=7231 comm="syz.0.412" name="001" dev="devtmpfs" ino=741 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 163.173009][ T29] audit: type=1400 audit(1733459104.091:1092): avc: denied { read } for pid=7231 comm="syz.0.412" name="loop-control" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 163.197568][ T29] audit: type=1400 audit(1733459104.091:1093): avc: denied { open } for pid=7231 comm="syz.0.412" path="/dev/loop-control" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 163.222477][ T29] audit: type=1400 audit(1733459104.091:1094): avc: denied { ioctl } for pid=7231 comm="syz.0.412" path="/dev/loop-control" dev="devtmpfs" ino=646 ioctlcmd=0x4c81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 163.248715][ T29] audit: type=1400 audit(1733459104.611:1095): avc: denied { read } for pid=7241 comm="syz.1.414" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 164.581251][ T7289] netlink: 16 bytes leftover after parsing attributes in process `syz.4.429'. [ 166.936779][ T7339] netlink: 48 bytes leftover after parsing attributes in process `syz.3.441'. [ 167.229387][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 167.229422][ T29] audit: type=1400 audit(1733459108.651:1143): avc: denied { create } for pid=7340 comm="syz.0.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 167.524876][ T29] audit: type=1400 audit(1733459108.661:1144): avc: denied { bind } for pid=7340 comm="syz.0.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 167.650489][ T29] audit: type=1400 audit(1733459108.661:1145): avc: denied { connect } for pid=7340 comm="syz.0.442" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 167.671200][ T29] audit: type=1400 audit(1733459108.681:1146): avc: denied { read write } for pid=7340 comm="syz.0.442" name="sg0" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 167.695241][ T29] audit: type=1400 audit(1733459108.681:1147): avc: denied { open } for pid=7340 comm="syz.0.442" path="/dev/sg0" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 167.719131][ T29] audit: type=1400 audit(1733459108.781:1148): avc: denied { create } for pid=7344 comm="syz.3.444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 167.759425][ T29] audit: type=1400 audit(1733459108.811:1149): avc: denied { connect } for pid=7344 comm="syz.3.444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 167.816612][ T29] audit: type=1400 audit(1733459108.831:1150): avc: denied { name_bind } for pid=7344 comm="syz.3.444" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 167.889352][ T29] audit: type=1400 audit(1733459108.831:1151): avc: denied { node_bind } for pid=7344 comm="syz.3.444" saddr=224.0.0.2 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 167.939333][ T29] audit: type=1400 audit(1733459109.251:1152): avc: denied { create } for pid=7344 comm="syz.3.444" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 168.140323][ T7357] netlink: 24 bytes leftover after parsing attributes in process `syz.3.447'. [ 168.273277][ T7362] syzkaller1: entered promiscuous mode [ 168.303645][ T7362] syzkaller1: entered allmulticast mode [ 170.163575][ T7386] netlink: 20 bytes leftover after parsing attributes in process `syz.3.456'. [ 170.190005][ T7386] netlink: 20 bytes leftover after parsing attributes in process `syz.3.456'. [ 170.320967][ T7386] netlink: 20 bytes leftover after parsing attributes in process `syz.3.456'. [ 170.353737][ T7386] netlink: 20 bytes leftover after parsing attributes in process `syz.3.456'. [ 170.689513][ T5864] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 170.869490][ T5864] usb 1-1: Using ep0 maxpacket: 32 [ 170.895974][ T5864] usb 1-1: config 0 has no interfaces? [ 170.997675][ T5864] usb 1-1: New USB device found, idVendor=10c4, idProduct=818a, bcdDevice=7d.8f [ 171.111051][ T5864] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 171.119674][ T5864] usb 1-1: Product: syz [ 171.123901][ T5864] usb 1-1: Manufacturer: syz [ 171.128494][ T5864] usb 1-1: SerialNumber: syz [ 171.152733][ T5864] usb 1-1: config 0 descriptor?? [ 171.719101][ T5864] usb 1-1: USB disconnect, device number 4 [ 171.969555][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 172.055857][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 172.291338][ T29] kauditd_printk_skb: 22 callbacks suppressed [ 172.291354][ T29] audit: type=1400 audit(1733459113.801:1175): avc: denied { write } for pid=7408 comm="syz.1.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 172.293905][ T7409] netlink: 8 bytes leftover after parsing attributes in process `syz.1.462'. [ 172.297504][ T29] audit: type=1400 audit(1733459113.801:1176): avc: denied { read } for pid=7408 comm="syz.1.462" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 172.621684][ T29] audit: type=1400 audit(1733459113.801:1177): avc: denied { ioctl } for pid=7408 comm="syz.1.462" path="socket:[14134]" dev="sockfs" ino=14134 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 172.647532][ T29] audit: type=1400 audit(1733459113.911:1178): avc: denied { map_create } for pid=7405 comm="syz.4.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 172.666798][ T29] audit: type=1400 audit(1733459113.911:1179): avc: denied { prog_load } for pid=7405 comm="syz.4.461" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 172.687345][ T29] audit: type=1400 audit(1733459113.911:1180): avc: denied { bpf } for pid=7405 comm="syz.4.461" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 173.263895][ T7413] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 173.284669][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 173.391585][ T29] audit: type=1400 audit(1733459114.881:1181): avc: denied { create } for pid=7410 comm="syz.3.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 173.425803][ T29] audit: type=1400 audit(1733459114.931:1182): avc: denied { connect } for pid=7410 comm="syz.3.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 173.449403][ T29] audit: type=1400 audit(1733459114.931:1183): avc: denied { write } for pid=7410 comm="syz.3.463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 173.545763][ T29] audit: type=1400 audit(1733459115.051:1184): avc: denied { create } for pid=7416 comm="syz.1.464" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 173.617592][ T7417] Bluetooth: MGMT ver 1.23 [ 174.753356][ T7430] netlink: 12 bytes leftover after parsing attributes in process `syz.0.469'. [ 175.078018][ T7439] pim6reg1: entered promiscuous mode [ 175.083463][ T7439] pim6reg1: entered allmulticast mode [ 176.357250][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 177.307825][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 177.307843][ T29] audit: type=1400 audit(1733459118.431:1203): avc: denied { create } for pid=7440 comm="syz.0.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 177.337154][ T29] audit: type=1400 audit(1733459118.841:1204): avc: denied { ioctl } for pid=7440 comm="syz.0.473" path="socket:[12917]" dev="sockfs" ino=12917 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 177.373643][ T7441] netlink: 'syz.0.473': attribute type 10 has an invalid length. [ 177.388381][ T29] audit: type=1400 audit(1733459118.841:1205): avc: denied { write } for pid=7440 comm="syz.0.473" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 178.186000][ T29] audit: type=1400 audit(1733459119.301:1206): avc: denied { bind } for pid=7443 comm="syz.4.474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 178.207238][ T29] audit: type=1400 audit(1733459119.301:1207): avc: denied { create } for pid=7443 comm="syz.4.474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 178.261581][ T29] audit: type=1400 audit(1733459119.751:1208): avc: denied { ioctl } for pid=7451 comm="syz.0.475" path="socket:[14240]" dev="sockfs" ino=14240 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 178.289424][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 178.299413][ T0] NOHZ tick-stop error: local softirq work is pending, handler #202!!! [ 178.379532][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 178.399432][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 178.433068][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 178.472765][ T29] audit: type=1400 audit(1733459119.981:1209): avc: denied { create } for pid=7462 comm="syz.4.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 178.506288][ T29] audit: type=1400 audit(1733459120.001:1210): avc: denied { connect } for pid=7462 comm="syz.4.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 178.529853][ T29] audit: type=1400 audit(1733459120.001:1211): avc: denied { write } for pid=7462 comm="syz.4.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 178.698831][ T29] audit: type=1400 audit(1733459120.081:1212): avc: denied { read } for pid=7462 comm="syz.4.482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 179.189901][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 179.217639][ T7475] netlink: 12 bytes leftover after parsing attributes in process `syz.3.484'. [ 180.021472][ T7493] pim6reg1: entered promiscuous mode [ 180.026829][ T7493] pim6reg1: entered allmulticast mode [ 180.899651][ T5816] Bluetooth: hci0: command 0x0406 tx timeout [ 180.905700][ T5816] Bluetooth: hci3: command 0x0406 tx timeout [ 181.870162][ T5816] Bluetooth: hci2: command 0x0406 tx timeout [ 181.876497][ T5816] Bluetooth: hci1: command 0x0406 tx timeout [ 181.883575][ T5816] Bluetooth: hci4: command 0x0406 tx timeout [ 182.381513][ T29] kauditd_printk_skb: 30 callbacks suppressed [ 182.381524][ T29] audit: type=1400 audit(1733459123.891:1243): avc: denied { create } for pid=7483 comm="syz.4.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 182.419383][ T29] audit: type=1400 audit(1733459123.911:1244): avc: denied { write } for pid=7483 comm="syz.4.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 182.485840][ T29] audit: type=1400 audit(1733459123.911:1245): avc: denied { nlmsg_write } for pid=7483 comm="syz.4.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 182.510835][ T29] audit: type=1400 audit(1733459123.911:1246): avc: denied { create } for pid=7483 comm="syz.4.489" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 182.570338][ T7483] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 182.578018][ T29] audit: type=1400 audit(1733459123.911:1247): avc: denied { setopt } for pid=7483 comm="syz.4.489" lport=7 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 182.673934][ T29] audit: type=1400 audit(1733459123.921:1248): avc: denied { read } for pid=7483 comm="syz.4.489" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 182.764620][ T29] audit: type=1400 audit(1733459123.921:1249): avc: denied { open } for pid=7483 comm="syz.4.489" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 182.814682][ T29] audit: type=1400 audit(1733459123.951:1250): avc: denied { create } for pid=7494 comm="syz.1.492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 182.842328][ T29] audit: type=1400 audit(1733459123.951:1251): avc: denied { read } for pid=7494 comm="syz.1.492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 182.867239][ T29] audit: type=1400 audit(1733459124.061:1252): avc: denied { write } for pid=7483 comm="syz.4.489" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 183.092788][ T7510] netlink: 4 bytes leftover after parsing attributes in process `syz.1.498'. [ 184.247482][ T7517] netlink: 68 bytes leftover after parsing attributes in process `syz.4.501'. [ 184.269505][ T7517] netlink: 8 bytes leftover after parsing attributes in process `syz.4.501'. [ 184.672021][ T7537] netlink: 'syz.4.509': attribute type 10 has an invalid length. [ 184.693144][ T7537] syz_tun: entered promiscuous mode [ 185.515424][ T7547] netlink: 'syz.0.513': attribute type 1 has an invalid length. [ 185.570981][ T7547] netlink: 224 bytes leftover after parsing attributes in process `syz.0.513'. [ 185.888510][ T5828] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 185.909685][ T5828] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 185.948386][ T5828] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 185.967841][ T5828] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 185.978874][ T5828] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 186.012691][ T5828] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 186.181829][ T5821] bond0: (slave syz_tun): Releasing backup interface [ 186.208166][ T1198] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 186.352321][ T7559] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 186.459329][ T1198] usb 5-1: Using ep0 maxpacket: 8 [ 186.466502][ T1198] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 32 [ 186.505141][ T2133] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 186.543922][ T1198] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 186.561210][ T1198] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 186.595916][ T1198] usb 5-1: Product: syz [ 186.597272][ T7555] chnl_net:caif_netlink_parms(): no params data found [ 186.605044][ T1198] usb 5-1: Manufacturer: syz [ 186.617616][ T1198] usb 5-1: SerialNumber: syz [ 186.673013][ T2133] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 186.818612][ T2133] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 186.831795][ T7555] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.842816][ T7555] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.850329][ T7555] bridge_slave_0: entered allmulticast mode [ 186.856631][ T1198] cdc_ncm 5-1:1.0: bind() failure [ 186.860514][ T7555] bridge_slave_0: entered promiscuous mode [ 186.871480][ T7555] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.878721][ T7555] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.882618][ T1198] cdc_ncm 5-1:1.1: CDC Union missing and no IAD found [ 186.888176][ T7555] bridge_slave_1: entered allmulticast mode [ 186.906667][ T7555] bridge_slave_1: entered promiscuous mode [ 186.912226][ T1198] cdc_ncm 5-1:1.1: bind() failure [ 186.964406][ T1198] usb 5-1: USB disconnect, device number 3 [ 186.979031][ T2133] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 187.629464][ T7555] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 187.637079][ T29] kauditd_printk_skb: 66 callbacks suppressed [ 187.637090][ T29] audit: type=1400 audit(1733459129.141:1319): avc: denied { read write } for pid=5811 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 187.645063][ T7555] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 187.680988][ T29] audit: type=1400 audit(1733459129.191:1320): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 187.724601][ T29] audit: type=1400 audit(1733459129.191:1321): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 187.746436][ T29] audit: type=1400 audit(1733459129.191:1322): avc: denied { append } for pid=5171 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 187.768763][ T29] audit: type=1400 audit(1733459129.191:1323): avc: denied { open } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 187.791424][ T29] audit: type=1400 audit(1733459129.191:1324): avc: denied { getattr } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 187.814320][ T29] audit: type=1400 audit(1733459129.211:1325): avc: denied { read } for pid=5483 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 187.835728][ T29] audit: type=1400 audit(1733459129.211:1327): avc: denied { create } for pid=7580 comm="syz.0.520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 187.856459][ T29] audit: type=1400 audit(1733459129.211:1326): avc: denied { open } for pid=5811 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 187.880763][ T29] audit: type=1400 audit(1733459129.211:1328): avc: denied { ioctl } for pid=5811 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 188.026349][ T2133] gretap0: left allmulticast mode [ 188.042443][ T2133] gretap0: left promiscuous mode [ 188.060857][ T2133] bridge0: port 3(gretap0) entered disabled state [ 188.083909][ T2133] bridge_slave_1: left allmulticast mode [ 188.093885][ T2133] bridge_slave_1: left promiscuous mode [ 188.110753][ T2133] bridge0: port 2(bridge_slave_1) entered disabled state [ 188.141036][ T2133] bridge_slave_0: left allmulticast mode [ 188.155031][ T2133] bridge_slave_0: left promiscuous mode [ 188.170279][ T2133] bridge0: port 1(bridge_slave_0) entered disabled state [ 188.329404][ T5828] Bluetooth: hci5: command tx timeout [ 188.574948][ T7614] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7614 comm=syz.0.526 [ 188.794301][ T2133] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 188.811737][ T2133] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 188.831072][ T2133] bond0 (unregistering): Released all slaves [ 188.873867][ T7614] 8021q: adding VLAN 0 to HW filter on device bond1 [ 188.928394][ T7615] 8021q: adding VLAN 0 to HW filter on device bond1 [ 189.009754][ T7615] bond1: (slave vti0): The slave device specified does not support setting the MAC address [ 189.030782][ T7615] bond1: (slave vti0): Error -95 calling set_mac_address [ 189.067489][ T7555] team0: Port device team_slave_0 added [ 189.750205][ T7555] team0: Port device team_slave_1 added [ 189.778973][ T7555] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 189.786877][ T7555] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 190.442651][ T7555] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 190.466029][ T5828] Bluetooth: hci5: command tx timeout [ 191.683193][ T7646] netlink: 'syz.0.535': attribute type 1 has an invalid length. [ 191.691732][ T7646] netlink: 224 bytes leftover after parsing attributes in process `syz.0.535'. [ 191.742063][ T7649] netlink: 16 bytes leftover after parsing attributes in process `syz.0.536'. [ 191.832715][ T7555] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 191.853396][ T7555] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 192.459081][ T7555] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 192.732447][ T5828] Bluetooth: hci5: command tx timeout [ 194.029647][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 194.280667][ T7555] hsr_slave_0: entered promiscuous mode [ 194.303427][ T7555] hsr_slave_1: entered promiscuous mode [ 194.337529][ T7555] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 194.386610][ T7555] Cannot create hsr debugfs directory [ 194.401733][ T29] kauditd_printk_skb: 82 callbacks suppressed [ 194.401746][ T29] audit: type=1400 audit(1733459135.911:1411): avc: denied { write } for pid=7638 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1705 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 194.707150][ T29] audit: type=1400 audit(1733459135.911:1412): avc: denied { add_name } for pid=7638 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 194.823390][ T5828] Bluetooth: hci5: command tx timeout [ 195.000761][ T29] audit: type=1400 audit(1733459135.911:1413): avc: denied { create } for pid=7638 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 195.069303][ T29] audit: type=1400 audit(1733459135.911:1414): avc: denied { write } for pid=7638 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth2.link" dev="tmpfs" ino=3658 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 195.127661][ T29] audit: type=1400 audit(1733459135.911:1415): avc: denied { append } for pid=7638 comm="dhcpcd-run-hook" name="resolv.conf.eth2.link" dev="tmpfs" ino=3658 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 195.179326][ T29] audit: type=1400 audit(1733459135.971:1416): avc: denied { remove_name } for pid=7680 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=3658 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 195.227443][ T29] audit: type=1400 audit(1733459135.971:1417): avc: denied { unlink } for pid=7680 comm="rm" name="resolv.conf.eth2.link" dev="tmpfs" ino=3658 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 195.273353][ T29] audit: type=1400 audit(1733459136.211:1418): avc: denied { prog_run } for pid=7671 comm="syz.0.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 195.319326][ T29] audit: type=1400 audit(1733459136.401:1419): avc: denied { name_bind } for pid=7653 comm="syz.3.537" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 195.401706][ T29] audit: type=1400 audit(1733459136.901:1420): avc: denied { create } for pid=7671 comm="syz.0.541" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 195.618830][ T7698] netlink: 16 bytes leftover after parsing attributes in process `syz.4.546'. [ 195.677049][ T7698] xt_CONNSECMARK: invalid mode: 0 [ 195.866631][ T2133] hsr_slave_0: left promiscuous mode [ 195.919827][ T2133] hsr_slave_1: left promiscuous mode [ 196.066040][ T2133] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 196.105761][ T2133] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 196.140220][ T2133] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 196.147694][ T2133] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 196.173319][ T7719] netlink: 'syz.0.550': attribute type 10 has an invalid length. [ 196.225819][ T2133] veth1_macvtap: left promiscuous mode [ 196.249826][ T2133] veth0_macvtap: left promiscuous mode [ 196.267825][ T2133] veth1_vlan: left promiscuous mode [ 196.276900][ T2133] veth0_vlan: left promiscuous mode [ 196.358207][ T7725] netlink: 'syz.4.549': attribute type 1 has an invalid length. [ 196.376250][ T7725] netlink: 224 bytes leftover after parsing attributes in process `syz.4.549'. [ 196.812883][ T2133] team0 (unregistering): Port device team_slave_1 removed [ 196.857015][ T2133] team0 (unregistering): Port device team_slave_0 removed [ 197.369057][ T7739] netlink: 68 bytes leftover after parsing attributes in process `syz.0.553'. [ 197.592490][ T7555] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 197.832278][ T7555] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 197.880415][ T7555] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 198.031181][ T7555] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 198.825184][ T7555] 8021q: adding VLAN 0 to HW filter on device bond0 [ 198.838756][ T7555] 8021q: adding VLAN 0 to HW filter on device team0 [ 198.846963][ T7775] netlink: 8 bytes leftover after parsing attributes in process `syz.0.561'. [ 198.887022][ T1320] bridge0: port 1(bridge_slave_0) entered blocking state [ 198.894136][ T1320] bridge0: port 1(bridge_slave_0) entered forwarding state [ 198.939938][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 198.947031][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 198.978338][ T7778] netlink: 'syz.1.563': attribute type 10 has an invalid length. [ 198.988463][ T7555] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 199.021535][ T7555] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 199.596911][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 199.596944][ T29] audit: type=1400 audit(1733459140.791:1446): avc: denied { create } for pid=7783 comm="syz.0.566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 199.969317][ T29] audit: type=1400 audit(1733459141.081:1447): avc: denied { connect } for pid=7783 comm="syz.0.566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 200.015383][ T29] audit: type=1400 audit(1733459141.081:1448): avc: denied { write } for pid=7783 comm="syz.0.566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 200.094285][ T29] audit: type=1400 audit(1733459141.101:1449): avc: denied { sys_module } for pid=7555 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 200.254258][ T29] audit: type=1400 audit(1733459141.631:1450): avc: denied { create } for pid=7801 comm="syz.0.569" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 200.347986][ T29] audit: type=1400 audit(1733459141.691:1451): avc: denied { ioctl } for pid=7801 comm="syz.0.569" path="socket:[14738]" dev="sockfs" ino=14738 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 200.518608][ T7555] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 201.512449][ T7801] delete_channel: no stack [ 201.775048][ T7820] pim6reg1: entered promiscuous mode [ 201.780426][ T7820] pim6reg1: entered allmulticast mode [ 202.739313][ T29] audit: type=1400 audit(1733459144.221:1452): avc: denied { create } for pid=7826 comm="syz.0.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 202.822731][ T7830] netlink: 8 bytes leftover after parsing attributes in process `syz.3.574'. [ 202.847867][ T29] audit: type=1400 audit(1733459144.231:1453): avc: denied { ioctl } for pid=7826 comm="syz.0.572" path="socket:[16011]" dev="sockfs" ino=16011 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 202.915994][ T7830] xt_CONNSECMARK: invalid mode: 0 [ 203.043063][ T29] audit: type=1400 audit(1733459144.231:1454): avc: denied { create } for pid=7826 comm="syz.0.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 203.168408][ T7555] veth0_vlan: entered promiscuous mode [ 203.208590][ T29] audit: type=1400 audit(1733459144.231:1455): avc: denied { connect } for pid=7826 comm="syz.0.572" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 203.269071][ T7555] veth1_vlan: entered promiscuous mode [ 203.436424][ T7555] veth0_macvtap: entered promiscuous mode [ 203.521860][ T7555] veth1_macvtap: entered promiscuous mode [ 203.554543][ T7555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 203.771021][ T7555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 203.781754][ T7555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 203.792547][ T7555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 204.995351][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 204.995367][ T29] audit: type=1400 audit(1733459145.801:1457): avc: denied { write } for pid=7840 comm="syz.3.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 205.019454][ T7555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 205.197696][ T7555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.207554][ T7555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 205.217985][ T7555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 205.228683][ T7555] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 206.211261][ T7555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 206.222699][ T7555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.232553][ T7555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 206.243037][ T7555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.277507][ T7555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 206.287982][ T7555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.297876][ T7555] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 206.308411][ T7555] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 206.318991][ T7555] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 206.328208][ T7555] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 206.337018][ T7555] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 206.345717][ T7555] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 206.354411][ T7555] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 206.390758][ T29] audit: type=1400 audit(1733459147.021:1458): avc: denied { create } for pid=7851 comm="syz.0.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 206.479307][ T29] audit: type=1400 audit(1733459147.061:1459): avc: denied { bind } for pid=7851 comm="syz.0.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 206.619670][ T29] audit: type=1400 audit(1733459147.071:1460): avc: denied { connect } for pid=7851 comm="syz.0.578" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 206.782887][ T11] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 206.795356][ T29] audit: type=1400 audit(1733459147.181:1461): avc: denied { read write } for pid=7851 comm="syz.0.578" name="sg0" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 206.839365][ T11] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 206.926864][ T1320] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 206.951520][ T29] audit: type=1400 audit(1733459147.191:1462): avc: denied { open } for pid=7851 comm="syz.0.578" path="/dev/sg0" dev="devtmpfs" ino=717 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 207.048848][ T1320] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 207.089925][ T29] audit: type=1400 audit(1733459148.581:1463): avc: denied { mounton } for pid=7555 comm="syz-executor" path="/root/syzkaller.JS0a4w/syz-tmp" dev="sda1" ino=1950 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 207.166749][ T29] audit: type=1400 audit(1733459148.581:1464): avc: denied { mount } for pid=7555 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 207.233937][ T29] audit: type=1400 audit(1733459148.581:1465): avc: denied { mounton } for pid=7555 comm="syz-executor" path="/root/syzkaller.JS0a4w/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 207.319553][ T29] audit: type=1400 audit(1733459148.581:1466): avc: denied { mount } for pid=7555 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 211.709418][ T7935] netlink: 12 bytes leftover after parsing attributes in process `syz.3.596'. [ 211.861803][ T7935] block nbd0: not configured, cannot reconfigure [ 212.111888][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 212.111903][ T29] audit: type=1400 audit(1733459153.601:1481): avc: denied { create } for pid=7944 comm="syz.5.600" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 212.616636][ T7943] delete_channel: no stack [ 212.676294][ T7965] netlink: 20 bytes leftover after parsing attributes in process `syz.3.606'. [ 212.971210][ T29] audit: type=1400 audit(1733459154.481:1482): avc: denied { read } for pid=7972 comm="syz.4.609" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 213.225322][ T29] audit: type=1400 audit(1733459154.721:1483): avc: denied { open } for pid=7972 comm="syz.4.609" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 214.569008][ T29] audit: type=1400 audit(1733459156.061:1484): avc: denied { setopt } for pid=7989 comm="syz.5.613" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 214.914672][ T7983] delete_channel: no stack [ 215.058297][ T8007] netlink: 24 bytes leftover after parsing attributes in process `syz.1.617'. [ 216.880421][ T8040] pim6reg1: entered promiscuous mode [ 216.885773][ T8040] pim6reg1: entered allmulticast mode [ 218.472945][ T29] audit: type=1400 audit(1733459159.971:1485): avc: denied { read } for pid=8042 comm="syz.0.627" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 218.677276][ T29] audit: type=1400 audit(1733459159.971:1486): avc: denied { open } for pid=8042 comm="syz.0.627" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 218.907904][ T29] audit: type=1400 audit(1733459159.981:1487): avc: denied { write } for pid=8042 comm="syz.0.627" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 219.089792][ T29] audit: type=1400 audit(1733459160.211:1488): avc: denied { read } for pid=8047 comm="syz.5.629" name="card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 219.112670][ T29] audit: type=1400 audit(1733459160.211:1489): avc: denied { open } for pid=8047 comm="syz.5.629" path="/dev/dri/card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 219.138321][ T29] audit: type=1400 audit(1733459160.291:1490): avc: denied { ioctl } for pid=8047 comm="syz.5.629" path="/dev/dri/card0" dev="devtmpfs" ino=627 ioctlcmd=0x6407 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 219.578463][ T8042] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 219.690550][ T8028] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 219.734731][ T8061] netlink: 'syz.4.631': attribute type 10 has an invalid length. [ 220.103441][ T8082] netlink: 8 bytes leftover after parsing attributes in process `syz.3.638'. [ 220.130782][ T8082] xt_CONNSECMARK: invalid mode: 0 [ 220.298885][ T29] audit: type=1400 audit(1733459161.801:1491): avc: denied { create } for pid=8090 comm="syz.3.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 220.327042][ T8092] netlink: 8 bytes leftover after parsing attributes in process `syz.1.641'. [ 220.337026][ T29] audit: type=1400 audit(1733459161.841:1492): avc: denied { write } for pid=8090 comm="syz.3.640" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 220.588718][ T29] audit: type=1400 audit(1733459162.091:1493): avc: denied { ioctl } for pid=8097 comm="syz.0.642" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 220.614058][ T29] audit: type=1400 audit(1733459162.111:1494): avc: denied { create } for pid=8099 comm="syz.3.643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 220.795199][ T8109] pim6reg1: entered promiscuous mode [ 220.801119][ T8109] pim6reg1: entered allmulticast mode [ 223.432551][ T8138] netlink: 'syz.3.650': attribute type 10 has an invalid length. [ 223.710727][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 223.710759][ T29] audit: type=1400 audit(1733459165.141:1498): avc: denied { create } for pid=8135 comm="syz.0.651" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 224.115885][ T29] audit: type=1400 audit(1733459165.151:1499): avc: denied { ioctl } for pid=8135 comm="syz.0.651" path="socket:[16506]" dev="sockfs" ino=16506 ioctlcmd=0x8922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 224.498443][ T8145] delete_channel: no stack [ 224.754215][ T8165] netlink: 12 bytes leftover after parsing attributes in process `syz.0.658'. [ 229.947432][ T8215] netlink: 8 bytes leftover after parsing attributes in process `syz.3.670'. [ 230.769704][ T8227] xt_CONNSECMARK: invalid mode: 0 [ 231.599519][ T29] audit: type=1400 audit(1733459172.471:1500): avc: denied { unlink } for pid=8223 comm="syz.4.672" name="#27" dev="tmpfs" ino=857 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 231.782220][ T29] audit: type=1400 audit(1733459172.471:1501): avc: denied { mount } for pid=8223 comm="syz.4.672" name="/" dev="overlay" ino=852 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 231.917730][ T8238] netlink: 36 bytes leftover after parsing attributes in process `syz.0.675'. [ 232.297932][ T8242] delete_channel: no stack [ 232.303996][ T29] audit: type=1400 audit(1733459173.801:1502): avc: denied { write } for pid=8249 comm="syz.0.679" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 232.592434][ T29] audit: type=1400 audit(1733459174.021:1503): avc: denied { read } for pid=8249 comm="syz.0.679" name="ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 232.637983][ T29] audit: type=1400 audit(1733459174.021:1504): avc: denied { open } for pid=8249 comm="syz.0.679" path="/dev/ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 233.031664][ T8261] netlink: 8 bytes leftover after parsing attributes in process `syz.3.682'. [ 233.142210][ T8266] netlink: 56 bytes leftover after parsing attributes in process `syz.3.684'. [ 233.459383][ T29] audit: type=1400 audit(1733459174.831:1505): avc: denied { read write } for pid=8269 comm="syz.1.683" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 233.541838][ T29] audit: type=1400 audit(1733459174.831:1506): avc: denied { open } for pid=8269 comm="syz.1.683" path="/dev/raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 233.728864][ T1198] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 233.782245][ T29] audit: type=1400 audit(1733459174.831:1507): avc: denied { ioctl } for pid=8269 comm="syz.1.683" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 234.061026][ T8273] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 234.082706][ T1198] usb 2-1: Using ep0 maxpacket: 32 [ 234.096605][ T29] audit: type=1400 audit(1733459175.601:1508): avc: denied { ioctl } for pid=8269 comm="syz.1.683" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 234.127846][ T1198] usb 2-1: config index 0 descriptor too short (expected 1051, got 27) [ 234.136341][ T1198] usb 2-1: config 0 has an invalid interface number: 35 but max is 0 [ 234.155736][ T1198] usb 2-1: config 0 has no interface number 0 [ 234.165132][ T1198] usb 2-1: config 0 interface 35 altsetting 0 has an invalid descriptor for endpoint zero, skipping [ 234.179154][ T29] audit: type=1400 audit(1733459175.651:1509): avc: denied { append } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 234.222391][ T1198] usb 2-1: New USB device found, idVendor=10c4, idProduct=818a, bcdDevice=7d.8f [ 234.236310][ T1198] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 234.248323][ T1198] usb 2-1: Product: syz [ 234.258769][ T1198] usb 2-1: Manufacturer: syz [ 234.273313][ T1198] usb 2-1: SerialNumber: syz [ 234.280574][ T1198] usb 2-1: config 0 descriptor?? [ 234.289034][ T1198] radio-si470x 2-1:0.35: could not find interrupt in endpoint [ 234.293740][ T8287] netlink: 12 bytes leftover after parsing attributes in process `syz.0.688'. [ 234.304669][ T1198] radio-si470x 2-1:0.35: probe with driver radio-si470x failed with error -5 [ 234.493096][ T1198] radio-raremono 2-1:0.35: this is not Thanko's Raremono. [ 234.507837][ T1198] usbhid 2-1:0.35: couldn't find an input interrupt endpoint [ 234.594630][ T1198] usb 2-1: USB disconnect, device number 2 [ 235.651568][ T8309] overlayfs: failed to resolve './file0': -2 [ 236.478481][ T8313] netlink: 8 bytes leftover after parsing attributes in process `syz.3.696'. [ 236.584433][ T8307] SELinux: selinux_ima_measure_state_locked: failed to read policy -12. [ 236.611713][ T29] kauditd_printk_skb: 59 callbacks suppressed [ 236.611727][ T29] audit: type=1400 audit(1733459178.121:1569): avc: denied { read } for pid=8318 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=1706 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 236.664097][ T8319] netlink: 56 bytes leftover after parsing attributes in process `syz.1.697'. [ 236.682273][ T29] audit: type=1400 audit(1733459178.161:1570): avc: denied { create } for pid=8317 comm="syz.1.697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 236.767100][ T29] audit: type=1400 audit(1733459178.171:1571): avc: denied { write } for pid=8317 comm="syz.1.697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 236.807440][ T29] audit: type=1400 audit(1733459178.171:1572): avc: denied { read } for pid=8317 comm="syz.1.697" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 236.827759][ T29] audit: type=1400 audit(1733459178.171:1573): avc: denied { ioctl } for pid=8317 comm="syz.1.697" path="socket:[17907]" dev="sockfs" ino=17907 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 236.853438][ T29] audit: type=1400 audit(1733459178.181:1574): avc: denied { open } for pid=8318 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1706 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 236.878612][ T29] audit: type=1400 audit(1733459178.181:1575): avc: denied { getattr } for pid=8318 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1706 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 236.904371][ T29] audit: type=1400 audit(1733459178.191:1576): avc: denied { getattr } for pid=8318 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=1744 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 236.930956][ T29] audit: type=1400 audit(1733459178.231:1577): avc: denied { read } for pid=8321 comm="syz.5.699" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 236.933491][ T8332] bridge0: port 3(gretap0) entered blocking state [ 236.953475][ T29] audit: type=1400 audit(1733459178.231:1578): avc: denied { open } for pid=8321 comm="syz.5.699" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 237.019395][ T8332] bridge0: port 3(gretap0) entered disabled state [ 237.029752][ T8332] gretap0: entered allmulticast mode [ 237.078744][ T8332] gretap0: entered promiscuous mode [ 237.094086][ T8332] bridge0: port 3(gretap0) entered blocking state [ 237.100627][ T8332] bridge0: port 3(gretap0) entered forwarding state [ 237.294155][ T8347] netlink: 16 bytes leftover after parsing attributes in process `syz.5.701'. [ 238.400469][ T8362] pim6reg1: entered promiscuous mode [ 238.405865][ T8362] pim6reg1: entered allmulticast mode [ 239.149853][ T8371] netlink: 68 bytes leftover after parsing attributes in process `syz.5.707'. [ 239.199432][ T8371] netlink: 8 bytes leftover after parsing attributes in process `syz.5.707'. [ 239.393459][ T8372] bridge0: port 3(gretap0) entered blocking state [ 239.458693][ T8363] delete_channel: no stack [ 239.481643][ T8372] bridge0: port 3(gretap0) entered disabled state [ 239.617181][ T8372] gretap0: entered allmulticast mode [ 239.663960][ T8372] gretap0: entered promiscuous mode [ 239.948003][ T8372] bridge0: port 3(gretap0) entered blocking state [ 239.954556][ T8372] bridge0: port 3(gretap0) entered forwarding state [ 241.945876][ T8408] netlink: 36 bytes leftover after parsing attributes in process `syz.1.714'. [ 242.170979][ T8414] netlink: 32 bytes leftover after parsing attributes in process `syz.5.715'. [ 242.421412][ T8426] netlink: 52 bytes leftover after parsing attributes in process `syz.3.720'. [ 242.540472][ T8420] pim6reg1: entered promiscuous mode [ 242.545802][ T8420] pim6reg1: entered allmulticast mode [ 242.648614][ T29] kauditd_printk_skb: 50 callbacks suppressed [ 242.648629][ T29] audit: type=1400 audit(1733459184.151:1629): avc: denied { read write } for pid=8419 comm="syz.4.718" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 242.740547][ T8439] netlink: 56 bytes leftover after parsing attributes in process `syz.5.721'. [ 242.744737][ T29] audit: type=1400 audit(1733459184.191:1630): avc: denied { open } for pid=8419 comm="syz.4.718" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 243.434869][ T29] audit: type=1400 audit(1733459184.201:1631): avc: denied { ioctl } for pid=8419 comm="syz.4.718" path="/dev/binderfs/binder0" dev="binder" ino=10 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 243.461565][ T29] audit: type=1400 audit(1733459184.201:1632): avc: denied { set_context_mgr } for pid=8419 comm="syz.4.718" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 243.481473][ T29] audit: type=1400 audit(1733459184.441:1633): avc: denied { mounton } for pid=8436 comm="syz.3.722" path="/161/bus" dev="tmpfs" ino=877 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 243.545806][ T29] audit: type=1400 audit(1733459184.441:1634): avc: denied { unlink } for pid=8436 comm="syz.3.722" name="#2b" dev="tmpfs" ino=881 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 243.606856][ T8447] netlink: 'syz.0.723': attribute type 10 has an invalid length. [ 243.640007][ T29] audit: type=1400 audit(1733459184.441:1635): avc: denied { mount } for pid=8436 comm="syz.3.722" name="/" dev="overlay" ino=876 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 243.662193][ T29] audit: type=1400 audit(1733459184.971:1636): avc: denied { append } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 243.685106][ T29] audit: type=1400 audit(1733459185.011:1637): avc: denied { read } for pid=5171 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 243.708728][ T29] audit: type=1400 audit(1733459185.011:1638): avc: denied { search } for pid=5171 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 243.841112][ T8453] netlink: 68 bytes leftover after parsing attributes in process `syz.3.725'. [ 243.858162][ T8453] netlink: 8 bytes leftover after parsing attributes in process `syz.3.725'. [ 245.263161][ T8477] netlink: 24 bytes leftover after parsing attributes in process `syz.3.730'. [ 247.696995][ T29] kauditd_printk_skb: 74 callbacks suppressed [ 247.697010][ T29] audit: type=1400 audit(1733459188.441:1714): avc: denied { write } for pid=8504 comm="syz.5.737" laddr=::1 lport=1 faddr=::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 247.809345][ T29] audit: type=1400 audit(1733459188.431:1713): avc: denied { read } for pid=8500 comm="syz.3.736" name="loop-control" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 247.892415][ T29] audit: type=1400 audit(1733459188.481:1715): avc: denied { open } for pid=8500 comm="syz.3.736" path="/dev/loop-control" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 247.992502][ T29] audit: type=1400 audit(1733459188.521:1716): avc: denied { ioctl } for pid=8500 comm="syz.3.736" path="/dev/loop-control" dev="devtmpfs" ino=646 ioctlcmd=0x4c81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 248.039018][ T8521] netlink: 8 bytes leftover after parsing attributes in process `syz.5.739'. [ 248.047949][ T29] audit: type=1400 audit(1733459189.541:1717): avc: denied { create } for pid=8518 comm="syz.3.740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 248.098391][ T29] audit: type=1400 audit(1733459189.551:1718): avc: denied { listen } for pid=8518 comm="syz.3.740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 248.198090][ T29] audit: type=1400 audit(1733459189.551:1719): avc: denied { accept } for pid=8518 comm="syz.3.740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 248.269571][ T29] audit: type=1400 audit(1733459189.641:1720): avc: denied { connect } for pid=8518 comm="syz.3.740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 248.356128][ T29] audit: type=1400 audit(1733459189.811:1721): avc: denied { module_request } for pid=8511 comm="syz.1.738" kmod="netdev-syztnl0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 248.445280][ T29] audit: type=1400 audit(1733459189.951:1722): avc: denied { create } for pid=8518 comm="syz.3.740" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 249.749694][ T8563] netlink: 32 bytes leftover after parsing attributes in process `syz.5.748'. [ 250.895370][ T8585] netlink: 20 bytes leftover after parsing attributes in process `syz.5.752'. [ 250.915665][ T8585] netlink: 20 bytes leftover after parsing attributes in process `syz.5.752'. [ 251.054177][ T8585] netlink: 20 bytes leftover after parsing attributes in process `syz.5.752'. [ 251.063297][ T8585] netlink: 20 bytes leftover after parsing attributes in process `syz.5.752'. [ 252.453087][ T8617] pim6reg1: entered promiscuous mode [ 252.458440][ T8617] pim6reg1: entered allmulticast mode [ 252.724176][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 252.724206][ T29] audit: type=1400 audit(1733459194.001:1729): avc: denied { write } for pid=8610 comm="syz.3.759" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 253.499535][ T8621] netlink: 20 bytes leftover after parsing attributes in process `syz.5.761'. [ 253.559444][ T8621] netlink: 20 bytes leftover after parsing attributes in process `syz.5.761'. [ 253.817192][ T29] audit: type=1400 audit(1733459195.321:1730): avc: denied { accept } for pid=8624 comm="syz.1.763" laddr=172.20.20.170 lport=59502 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 253.958097][ T29] audit: type=1400 audit(1733459195.371:1731): avc: denied { create } for pid=8624 comm="syz.1.763" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 254.005861][ T29] audit: type=1400 audit(1733459195.501:1732): avc: denied { ioctl } for pid=8624 comm="syz.1.763" path="socket:[17204]" dev="sockfs" ino=17204 ioctlcmd=0x943c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 254.454518][ T8637] netlink: 20 bytes leftover after parsing attributes in process `syz.5.768'. [ 254.497497][ T8637] netlink: 20 bytes leftover after parsing attributes in process `syz.5.768'. [ 254.562145][ T8624] delete_channel: no stack [ 254.582981][ T8637] netlink: 20 bytes leftover after parsing attributes in process `syz.5.768'. [ 254.610016][ T29] audit: type=1400 audit(1733459196.121:1733): avc: denied { read } for pid=8640 comm="syz.4.770" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 254.689911][ T8637] netlink: 20 bytes leftover after parsing attributes in process `syz.5.768'. [ 254.768691][ T29] audit: type=1400 audit(1733459196.121:1734): avc: denied { open } for pid=8640 comm="syz.4.770" path="/dev/cpu/0/msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 255.017398][ T8640] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 255.103199][ T8637] netlink: 20 bytes leftover after parsing attributes in process `syz.5.768'. [ 255.112898][ T8637] netlink: 20 bytes leftover after parsing attributes in process `syz.5.768'. [ 255.270573][ T29] audit: type=1400 audit(1733459196.781:1735): avc: denied { name_bind } for pid=8660 comm="syz.5.775" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 255.352303][ T1290] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.814581][ T29] audit: type=1400 audit(1733459197.321:1736): avc: denied { create } for pid=8670 comm="syz.4.778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 256.154108][ T8680] netlink: 20 bytes leftover after parsing attributes in process `syz.3.784'. [ 256.169461][ T8680] netlink: 20 bytes leftover after parsing attributes in process `syz.3.784'. [ 256.401994][ T29] audit: type=1400 audit(1733459197.881:1737): avc: denied { read } for pid=8676 comm="syz.1.782" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 256.566920][ T8676] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 256.585756][ T29] audit: type=1400 audit(1733459197.881:1738): avc: denied { open } for pid=8676 comm="syz.1.782" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 257.948707][ T8697] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 258.321233][ T8708] pim6reg1: entered promiscuous mode [ 258.326550][ T8708] pim6reg1: entered allmulticast mode [ 259.596011][ T8712] netlink: 'syz.1.792': attribute type 10 has an invalid length. [ 260.153986][ T8720] overlayfs: failed to resolve './file1': -2 [ 260.306869][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 260.306911][ T29] audit: type=1400 audit(1733459201.221:1745): avc: denied { mount } for pid=8715 comm="syz.5.793" name="/" dev="ramfs" ino=17325 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 260.388346][ T29] audit: type=1400 audit(1733459201.661:1746): avc: denied { mounton } for pid=8713 comm="syz.4.794" path="/175/bus" dev="tmpfs" ino=972 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 260.676666][ T29] audit: type=1400 audit(1733459202.181:1747): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 260.714300][ T8719] SELinux: selinux_ima_measure_state_locked: failed to read policy -12. [ 260.757458][ T29] audit: type=1400 audit(1733459202.181:1748): avc: denied { create } for pid=8723 comm="syz.0.796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 260.815450][ T29] audit: type=1400 audit(1733459202.181:1749): avc: denied { ioctl } for pid=8723 comm="syz.0.796" path="socket:[18717]" dev="sockfs" ino=18717 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 260.846865][ T8732] __nla_validate_parse: 3 callbacks suppressed [ 260.846880][ T8732] netlink: 8 bytes leftover after parsing attributes in process `syz.5.798'. [ 260.870639][ T29] audit: type=1400 audit(1733459202.181:1750): avc: denied { module_request } for pid=8723 comm="syz.0.796" kmod="netdev-syz_tun" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 260.919865][ T29] audit: type=1400 audit(1733459202.221:1751): avc: denied { open } for pid=5822 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 260.984676][ T29] audit: type=1400 audit(1733459202.221:1752): avc: denied { ioctl } for pid=5822 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 261.011182][ T29] audit: type=1400 audit(1733459202.261:1753): avc: denied { append } for pid=5171 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 261.352286][ T8741] netlink: 16 bytes leftover after parsing attributes in process `syz.1.801'. [ 261.417851][ T29] audit: type=1400 audit(1733459202.261:1754): avc: denied { sys_module } for pid=8723 comm="syz.0.796" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 261.644741][ T8745] netlink: 28 bytes leftover after parsing attributes in process `syz.5.803'. [ 261.799044][ T8745] netlink: 'syz.5.803': attribute type 10 has an invalid length. [ 261.820480][ T8745] syz_tun: entered promiscuous mode [ 261.888159][ T8745] bond0: (slave syz_tun): Enslaving as an active interface with an up link [ 264.255191][ T8773] overlayfs: failed to resolve './file1': -2 [ 264.705129][ T8775] netlink: 8 bytes leftover after parsing attributes in process `syz.1.811'. [ 264.721264][ T8772] SELinux: selinux_ima_measure_state_locked: failed to read policy -12. [ 264.837210][ T8782] netlink: 32 bytes leftover after parsing attributes in process `syz.3.814'. [ 265.039593][ T8786] netlink: 4 bytes leftover after parsing attributes in process `syz.1.816'. [ 265.167005][ T8791] pim6reg1: entered promiscuous mode [ 265.172430][ T8791] pim6reg1: entered allmulticast mode [ 266.115875][ T29] kauditd_printk_skb: 67 callbacks suppressed [ 266.115909][ T29] audit: type=1400 audit(1733459207.621:1822): avc: denied { perfmon } for pid=8792 comm="syz.3.818" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 266.519109][ T29] audit: type=1400 audit(1733459207.691:1823): avc: denied { prog_run } for pid=8792 comm="syz.3.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 266.814794][ T29] audit: type=1400 audit(1733459208.051:1824): avc: denied { create } for pid=8797 comm="syz.5.820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 266.828088][ T8803] netlink: 8 bytes leftover after parsing attributes in process `syz.1.821'. [ 266.849924][ T29] audit: type=1400 audit(1733459208.061:1825): avc: denied { read } for pid=8797 comm="syz.5.820" name="card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 266.941656][ T29] audit: type=1400 audit(1733459208.061:1826): avc: denied { open } for pid=8797 comm="syz.5.820" path="/dev/dri/card0" dev="devtmpfs" ino=627 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 266.995463][ T29] audit: type=1400 audit(1733459208.081:1827): avc: denied { ioctl } for pid=8797 comm="syz.5.820" path="/dev/dri/card0" dev="devtmpfs" ino=627 ioctlcmd=0x6407 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 267.047360][ T29] audit: type=1400 audit(1733459208.321:1828): avc: denied { ioctl } for pid=8801 comm="syz.1.821" path="socket:[18838]" dev="sockfs" ino=18838 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 267.104078][ T7683] wlan1: Selected IBSS BSSID 50:50:50:50:50:50 based on configured SSID [ 267.125580][ T8806] netlink: 20 bytes leftover after parsing attributes in process `syz.4.824'. [ 267.146008][ T29] audit: type=1400 audit(1733459208.651:1829): avc: denied { create } for pid=8807 comm="syz.1.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 267.148696][ T8806] netlink: 20 bytes leftover after parsing attributes in process `syz.4.824'. [ 267.210593][ T5926] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 267.226894][ T29] audit: type=1400 audit(1733459208.651:1830): avc: denied { write } for pid=8807 comm="syz.1.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 267.252353][ T5926] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 267.294054][ T29] audit: type=1400 audit(1733459208.731:1831): avc: denied { module_request } for pid=8805 comm="syz.4.824" kmod="nft-expr-1-m" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 267.300616][ T8806] netlink: 20 bytes leftover after parsing attributes in process `syz.4.824'. [ 267.340265][ T8814] netlink: 8 bytes leftover after parsing attributes in process `syz.1.826'. [ 267.360789][ T8806] netlink: 20 bytes leftover after parsing attributes in process `syz.4.824'. [ 267.377164][ T5926] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 267.399982][ T5926] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 267.485661][ T8817] netlink: 8 bytes leftover after parsing attributes in process `syz.5.827'. [ 267.495355][ T11] wlan1: Selected IBSS BSSID 50:50:50:50:50:50 based on configured SSID [ 267.529057][ T11] ------------[ cut here ]------------ [ 267.534930][ T11] WARNING: CPU: 0 PID: 11 at net/wireless/ibss.c:37 __cfg80211_ibss_joined+0x4bb/0x560 [ 267.544624][ T11] Modules linked in: [ 267.548523][ T11] CPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.13.0-rc1-syzkaller-00036-g5076001689e4 #0 [ 267.559364][ T11] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 267.569462][ T11] Workqueue: cfg80211 cfg80211_event_work [ 267.575189][ T11] RIP: 0010:__cfg80211_ibss_joined+0x4bb/0x560 [ 267.581494][ T11] Code: ff ff e8 68 70 0e f7 90 0f 0b 90 e9 66 fe ff ff e8 6a 58 71 f7 e9 3d fc ff ff e8 00 58 71 f7 e9 81 fc ff ff e8 46 70 0e f7 90 <0f> 0b 90 e9 8a fc ff ff e8 38 70 0e f7 90 0f 0b e8 70 58 71 f7 e9 [ 267.601413][ T11] RSP: 0018:ffffc90000107b50 EFLAGS: 00010293 [ 267.607485][ T11] RAX: 0000000000000000 RBX: ffff888079178d90 RCX: 1ffffffff2dd056c [ 267.615696][ T11] RDX: ffff88801d6aa440 RSI: ffffffff8a8b95ca RDI: ffffffff8bd1b4a0 [ 267.623713][ T11] RBP: ffffc90000107c00 R08: 0000000000000001 R09: fffffbfff2dca3a7 [ 267.631864][ T11] R10: ffffffff96e51d3f R11: 0000000000000003 R12: ffff888079178000 [ 267.639858][ T11] R13: 1ffff92000020f6e R14: 0000000000000000 R15: ffffc90000107b90 [ 267.647828][ T11] FS: 0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000 [ 267.656784][ T11] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 267.663384][ T11] CR2: 0000001b3391bff8 CR3: 0000000062202000 CR4: 00000000003526f0 [ 267.671392][ T11] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 267.679390][ T11] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 267.687353][ T11] Call Trace: [ 267.690736][ T11] [ 267.693671][ T11] ? __warn+0xea/0x3c0 [ 267.697989][ T11] ? __cfg80211_ibss_joined+0x4bb/0x560 [ 267.703794][ T11] ? report_bug+0x3c0/0x580 [ 267.708311][ T11] ? handle_bug+0x54/0xa0 [ 267.712678][ T11] ? exc_invalid_op+0x17/0x50 [ 267.717364][ T11] ? asm_exc_invalid_op+0x1a/0x20 [ 267.722421][ T11] ? __cfg80211_ibss_joined+0x4ba/0x560 [ 267.727975][ T11] ? __cfg80211_ibss_joined+0x4bb/0x560 [ 267.733562][ T11] ? __pfx_lock_release+0x10/0x10 [ 267.738593][ T11] ? __pfx___cfg80211_ibss_joined+0x10/0x10 [ 267.744548][ T11] ? mark_held_locks+0x9f/0xe0 [ 267.749351][ T11] ? cfg80211_process_wdev_events+0x3e6/0x5d0 [ 267.755431][ T11] cfg80211_process_wdev_events+0x3e6/0x5d0 [ 267.761381][ T11] cfg80211_process_rdev_events+0x9f/0x130 [ 267.767207][ T11] cfg80211_event_work+0x2b/0x40 [ 267.772171][ T11] process_one_work+0x9c5/0x1ba0 [ 267.777125][ T11] ? __pfx_cfg80211_wiphy_work+0x10/0x10 [ 267.782784][ T11] ? __pfx_process_one_work+0x10/0x10 [ 267.788159][ T11] ? rcu_is_watching+0x12/0xc0 [ 267.792966][ T11] ? assign_work+0x1a0/0x250 [ 267.797561][ T11] worker_thread+0x6c8/0xf00 [ 267.802427][ T11] ? __pfx_worker_thread+0x10/0x10 [ 267.807549][ T11] kthread+0x2c1/0x3a0 [ 267.811918][ T11] ? _raw_spin_unlock_irq+0x23/0x50 [ 267.817128][ T11] ? __pfx_kthread+0x10/0x10 [ 267.821748][ T11] ret_from_fork+0x45/0x80 [ 267.826169][ T11] ? __pfx_kthread+0x10/0x10 [ 267.830800][ T11] ret_from_fork_asm+0x1a/0x30 [ 267.835590][ T11] [ 267.838611][ T11] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 267.845879][ T11] CPU: 0 UID: 0 PID: 11 Comm: kworker/u8:0 Not tainted 6.13.0-rc1-syzkaller-00036-g5076001689e4 #0 [ 267.856532][ T11] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 267.866569][ T11] Workqueue: cfg80211 cfg80211_event_work [ 267.872277][ T11] Call Trace: [ 267.875535][ T11] [ 267.878450][ T11] dump_stack_lvl+0x3d/0x1f0 [ 267.883030][ T11] panic+0x71d/0x800 [ 267.886915][ T11] ? __pfx_panic+0x10/0x10 [ 267.891320][ T11] ? show_trace_log_lvl+0x29d/0x3d0 [ 267.896507][ T11] ? check_panic_on_warn+0x1f/0xb0 [ 267.901602][ T11] ? __cfg80211_ibss_joined+0x4bb/0x560 [ 267.907133][ T11] check_panic_on_warn+0xab/0xb0 [ 267.912054][ T11] __warn+0xf6/0x3c0 [ 267.915931][ T11] ? __cfg80211_ibss_joined+0x4bb/0x560 [ 267.921464][ T11] report_bug+0x3c0/0x580 [ 267.925780][ T11] handle_bug+0x54/0xa0 [ 267.929924][ T11] exc_invalid_op+0x17/0x50 [ 267.934413][ T11] asm_exc_invalid_op+0x1a/0x20 [ 267.939252][ T11] RIP: 0010:__cfg80211_ibss_joined+0x4bb/0x560 [ 267.945391][ T11] Code: ff ff e8 68 70 0e f7 90 0f 0b 90 e9 66 fe ff ff e8 6a 58 71 f7 e9 3d fc ff ff e8 00 58 71 f7 e9 81 fc ff ff e8 46 70 0e f7 90 <0f> 0b 90 e9 8a fc ff ff e8 38 70 0e f7 90 0f 0b e8 70 58 71 f7 e9 [ 267.964980][ T11] RSP: 0018:ffffc90000107b50 EFLAGS: 00010293 [ 267.971031][ T11] RAX: 0000000000000000 RBX: ffff888079178d90 RCX: 1ffffffff2dd056c [ 267.978985][ T11] RDX: ffff88801d6aa440 RSI: ffffffff8a8b95ca RDI: ffffffff8bd1b4a0 [ 267.986936][ T11] RBP: ffffc90000107c00 R08: 0000000000000001 R09: fffffbfff2dca3a7 [ 267.994889][ T11] R10: ffffffff96e51d3f R11: 0000000000000003 R12: ffff888079178000 [ 268.002843][ T11] R13: 1ffff92000020f6e R14: 0000000000000000 R15: ffffc90000107b90 [ 268.010811][ T11] ? __cfg80211_ibss_joined+0x4ba/0x560 [ 268.016353][ T11] ? __pfx_lock_release+0x10/0x10 [ 268.021371][ T11] ? __pfx___cfg80211_ibss_joined+0x10/0x10 [ 268.027261][ T11] ? mark_held_locks+0x9f/0xe0 [ 268.032021][ T11] ? cfg80211_process_wdev_events+0x3e6/0x5d0 [ 268.038082][ T11] cfg80211_process_wdev_events+0x3e6/0x5d0 [ 268.043976][ T11] cfg80211_process_rdev_events+0x9f/0x130 [ 268.049773][ T11] cfg80211_event_work+0x2b/0x40 [ 268.054695][ T11] process_one_work+0x9c5/0x1ba0 [ 268.059622][ T11] ? __pfx_cfg80211_wiphy_work+0x10/0x10 [ 268.065238][ T11] ? __pfx_process_one_work+0x10/0x10 [ 268.070592][ T11] ? rcu_is_watching+0x12/0xc0 [ 268.075346][ T11] ? assign_work+0x1a0/0x250 [ 268.079919][ T11] worker_thread+0x6c8/0xf00 [ 268.084503][ T11] ? __pfx_worker_thread+0x10/0x10 [ 268.089600][ T11] kthread+0x2c1/0x3a0 [ 268.093658][ T11] ? _raw_spin_unlock_irq+0x23/0x50 [ 268.098837][ T11] ? __pfx_kthread+0x10/0x10 [ 268.103416][ T11] ret_from_fork+0x45/0x80 [ 268.107817][ T11] ? __pfx_kthread+0x10/0x10 [ 268.112394][ T11] ret_from_fork_asm+0x1a/0x30 [ 268.117155][ T11] [ 268.120373][ T11] Kernel Offset: disabled [ 268.124721][ T11] Rebooting in 86400 seconds..