last executing test programs: 14m54.199261314s ago: executing program 0 (id=169): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x4e, 0x0, 0x0) bind$inet6(r1, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000240)={0xa, 0x4e22, 0x2, @empty, 0x10000000}, 0x1c) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x10) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r6, 0x29, 0x50, 0x0, &(0x7f0000000040)=0x41) 14m11.419395143s ago: executing program 0 (id=188): bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x1, 0x1, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) unshare(0x20060400) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000000c0)={0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000000)=""/10, 0x2}, 0x20) 14m11.130875439s ago: executing program 0 (id=189): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) io_setup(0x6, &(0x7f0000000680)=0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x180a, 0x30, 0x3, 0x1, 0x0, r0, 0x0}]) 14m10.69463583s ago: executing program 0 (id=190): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x33f555fdfdd407b9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r0}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x60b, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0xc8, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x4f8}}, {{{0x9, 0x5, 0x81, 0x3, 0x0, 0x0, 0x0, 0x4}}}}}]}}]}}, 0x0) syz_usb_control_io(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, 0x0, 0x0) syz_usb_control_io$hid(r2, 0x0, 0x0) syz_usb_control_io(r2, &(0x7f0000000400)={0x2c, &(0x7f0000000080)={0x0, 0x24, 0x13, {0x13, 0x1, "ad6667e44bb2cd263ca19db35b64ef7517"}}, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_disconnect(r2) socket(0x10, 0x3, 0x0) 14m8.721961243s ago: executing program 0 (id=191): rt_sigqueueinfo(0x0, 0x3a, 0x0) 14m8.11147455s ago: executing program 0 (id=192): unlink(0x0) socket$inet6(0xa, 0x80002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r3, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000002700)=@raw={'raw\x00', 0x8, 0x3, 0x2a0, 0x208, 0x8, 0xfa04, 0x0, 0x6c02, 0x208, 0x194, 0x194, 0x208, 0x194, 0x3, 0x0, {[{{@ip={@empty=0x1e00, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'veth0_virt_wifi\x00', {}, {}, 0x6}, 0x0, 0xa0, 0xc8, 0x0, {0x0, 0x74020000}, [@common=@inet=@tcp={{0x30}, {[], [], 0x0, 0x0, 0x7a}}]}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@multicast1, @rand_addr, 0x0, 0x0, 'batadv_slave_0\x00', 'pimreg\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@unspec=@helper={{0x48}, {0x0, 'amanda\x00'}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x300) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffc000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)=')\x00', 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) 13m22.130961256s ago: executing program 32 (id=192): unlink(0x0) socket$inet6(0xa, 0x80002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) pwrite64(r3, 0x0, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, 0x0) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x4000000000000, 0x40, &(0x7f0000002700)=@raw={'raw\x00', 0x8, 0x3, 0x2a0, 0x208, 0x8, 0xfa04, 0x0, 0x6c02, 0x208, 0x194, 0x194, 0x208, 0x194, 0x3, 0x0, {[{{@ip={@empty=0x1e00, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'veth0_virt_wifi\x00', {}, {}, 0x6}, 0x0, 0xa0, 0xc8, 0x0, {0x0, 0x74020000}, [@common=@inet=@tcp={{0x30}, {[], [], 0x0, 0x0, 0x7a}}]}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@multicast1, @rand_addr, 0x0, 0x0, 'batadv_slave_0\x00', 'pimreg\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@unspec=@helper={{0x48}, {0x0, 'amanda\x00'}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x300) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffc000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) keyctl$set_reqkey_keyring(0xe, 0x4) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)=')\x00', 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) 12m26.559571255s ago: executing program 1 (id=246): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x61, 0x61, 0x3, [@float={0xf, 0x0, 0x0, 0x10, 0x64d46ed7ff799014}, @type_tag={0x5, 0x0, 0x0, 0x12, 0x4}, @float={0x10, 0x0, 0x0, 0x10, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0x10}}, @ptr={0x7}, @datasec={0x2, 0x1, 0x0, 0xf, 0x1, [{0x5, 0xaaa, 0x7}], 'g'}]}, {0x0, [0x30]}}, 0x0, 0x7f, 0x0, 0x0, 0x3d, 0x10000, @value}, 0x28) r0 = socket$inet6(0xa, 0x3, 0x9) r1 = dup(r0) bind$unix(r1, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) 12m26.393033011s ago: executing program 1 (id=247): epoll_create1(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) epoll_create1(0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) mremap(&(0x7f0000000000/0x9000)=nil, 0x600600, 0x200000, 0x3, &(0x7f0000a00000/0x600000)=nil) 12m23.251228843s ago: executing program 1 (id=250): sendmsg$inet(0xffffffffffffffff, &(0x7f0000001640)={&(0x7f0000000300)={0x2, 0x0, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, 0x0, 0x38}, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r3}, &(0x7f0000000000), &(0x7f0000000080)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x59, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='page_pool_release\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f00000002c0)={r6}, 0x48) 12m22.887187697s ago: executing program 1 (id=251): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x61, 0x61, 0x3, [@float={0xf, 0x0, 0x0, 0x10, 0x64d46ed7ff799014}, @type_tag={0x5, 0x0, 0x0, 0x12, 0x4}, @float={0x10, 0x0, 0x0, 0x10, 0x2}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1, 0x10}}, @ptr={0x7}, @datasec={0x2, 0x1, 0x0, 0xf, 0x1, [{0x5, 0xaaa, 0x7}], 'g'}]}, {0x0, [0x30]}}, 0x0, 0x7f, 0x0, 0x0, 0x3d, 0x10000, @value}, 0x28) r0 = socket$inet6(0xa, 0x3, 0x9) r1 = dup(r0) bind$unix(r1, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) 12m22.667542507s ago: executing program 1 (id=253): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000040), &(0x7f00000001c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) pause() 12m19.967802838s ago: executing program 1 (id=254): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008000000182300", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0xc0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000440)={0x8, 0xffffffffffffffff}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000000, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x0, 0x1a}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xa, 0x9}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 11m34.664845422s ago: executing program 33 (id=254): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008000000182300", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0xc0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000440)={0x8, 0xffffffffffffffff}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x4c, &(0x7f00000002c0)=0x2) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/14, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40000000, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, 0x0, &(0x7f00000002c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x10, 0x1c, &(0x7f0000000040)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1c}, {}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x4}, {0x3, 0x0, 0x3, 0xa, 0x2}, {0x5, 0x0, 0xb, 0x9, 0x0, 0x0, 0x1a}, {0x3, 0x0, 0x6, 0xa, 0xa, 0xfff8, 0xf1}, {0x7, 0x1, 0xb, 0x6, 0x8}, {0x7, 0x0, 0x0, 0x8}, {}, {}, {0x4, 0x0, 0xa, 0x9}, {0x18, 0x2, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x7}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 10m56.697858343s ago: executing program 3 (id=269): r0 = socket$can_raw(0x1d, 0x3, 0x1) syncfs(r0) bind$can_raw(r0, &(0x7f0000000000), 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000a40)=ANY=[@ANYBLOB="1801000000050000000000000000ea0485000000d000000095"], &(0x7f0000000a00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8e}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0/file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) poll(0x0, 0x0, 0x5) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) sendmsg$can_raw(r0, 0x0, 0x0) syz_clone3(&(0x7f0000000b40)={0x40080000, 0x0, 0x0, 0x0, {0x1d}, &(0x7f0000000980)=""/211, 0xd3, 0x0, 0x0}, 0x58) 10m40.048115902s ago: executing program 3 (id=288): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000140)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000000100)={0x73622a85, 0x0, 0x2}) r2 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000200)='./binderfs/binder0\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000080)={0x8, 0x0, &(0x7f0000000400)=[@increfs], 0x0, 0x0, 0x0}) r3 = dup3(r2, r1, 0x0) r4 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder0\x00', 0x800, 0x0) mmap$binder(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1, 0x11, r4, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x10a}) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f00000003c0)={0x8, 0x0, &(0x7f0000000340)=[@acquire], 0x0, 0x0, 0x0}) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000001c0)={0x4c, 0x0, &(0x7f0000000800)=[@transaction_sg={0x40486311, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000}], 0x0, 0x0, 0x0}) 10m39.107037499s ago: executing program 3 (id=289): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x55, 0x55, 0x3, [@float={0xf, 0x0, 0x0, 0x10, 0x64d46ed7ff799014}, @type_tag={0x5, 0x0, 0x0, 0x12, 0x4}, @float={0x10, 0x0, 0x0, 0x10, 0x2}, @ptr={0x7}, @datasec={0x2, 0x2, 0x0, 0xf, 0x1, [{0x5, 0xaaa, 0x7}, {0x2, 0x3, 0x9}], 'g'}]}, {0x0, [0x30]}}, 0x0, 0x73, 0x0, 0x0, 0x3d, 0x10000, @value}, 0x28) r0 = socket$inet6(0xa, 0x3, 0x9) r1 = dup(r0) bind$unix(r1, &(0x7f00000001c0)=@abs={0xa, 0x2}, 0x6e) 10m38.899185508s ago: executing program 3 (id=290): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x12) sendmsg$inet(r1, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000280)='>', 0x33fe0}], 0x1}, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x1) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x11, 0x3, &(0x7f0000000080)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='contention_end\x00', r3}, 0x10) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000100)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) 10m35.400063364s ago: executing program 3 (id=292): bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000380), &(0x7f00000003c0)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x3c7) unshare(0x42000000) setitimer(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000000c0), 0x12) write$cgroup_pid(r7, &(0x7f0000000040), 0x12) 9m50.314584377s ago: executing program 34 (id=292): bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1900000004000000080000000800000000000000", @ANYRES32, @ANYBLOB], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000380), &(0x7f00000003c0)=r4}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x3c7) unshare(0x42000000) setitimer(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_procs(r6, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r9 = openat$cgroup_ro(r8, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r9, 0x0, 0x0) write$cgroup_int(r9, &(0x7f00000000c0), 0x12) write$cgroup_pid(r7, &(0x7f0000000040), 0x12) 34.497637127s ago: executing program 2 (id=705): socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x74) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0x33, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x9, 0x4}, {0xe, 0x8}, {0x10, 0xfff9}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x10000}, @TCA_RATE={0x6, 0x5, {0x5}}, @TCA_RATE={0x6, 0x5, {0xd, 0x81}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000100), 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000240)=0x2) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x3, 0x801, 0x0, &(0x7f0000000040), 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) r3 = userfaultfd(0x801) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_WRITEPROTECT(r3, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000800000/0x800000)=nil, 0x802000}, 0x2}) mincore(&(0x7f0000a5d000/0x1000)=nil, 0x1000, &(0x7f0000000080)=""/46) 23.008895707s ago: executing program 2 (id=716): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x10, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) r1 = socket$inet6(0xa, 0x1, 0x0) r2 = dup2(r1, r1) ioctl$sock_inet6_SIOCDELRT(r2, 0x890c, &(0x7f0000000640)={@remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x21}, 0x40000, 0x40, 0xd, 0x0, 0xfffffffffffffffe, 0x4080048}) 18.10603982s ago: executing program 2 (id=717): unshare(0x24060400) write$uinput_user_dev(0xffffffffffffffff, &(0x7f0000000400)={'syz1\x00', {0x3, 0x2, 0x6, 0xfffa}, 0x3a, [0x8000, 0xc95a, 0xf, 0x8, 0x80, 0x2, 0x3, 0x7f, 0x20000006, 0x4d, 0x6, 0x5f, 0x9, 0x5, 0xffff2d37, 0xffffff01, 0x6, 0x3, 0x0, 0x5, 0x4, 0x0, 0x7, 0x40, 0x1, 0x24, 0xd, 0x4000001, 0x0, 0xffffffff, 0xe661, 0x4, 0x7, 0x3, 0x8, 0x4c74, 0x80000000, 0x242, 0x3, 0xe, 0x0, 0x80008071, 0xffffb8f3, 0x17, 0x1, 0x7, 0x5, 0x3e, 0x8f, 0x6, 0x6, 0x0, 0x5, 0x4, 0x8, 0x3ff, 0x80, 0x0, 0x5, 0x6, 0x8, 0x4, 0x1, 0x40], [0x10000007, 0x9, 0x8000012f, 0x8004, 0x5, 0xfffffff3, 0x129432e6, 0xc8, 0xf9, 0xe, 0x2bf, 0x6c7, 0x9, 0xfffffffc, 0x3, 0x0, 0x0, 0x5, 0x2f, 0x1782000, 0x314, 0x78, 0xea4, 0x0, 0x4, 0x7, 0x7fff, 0x6, 0x400, 0x401, 0x6, 0x1, 0xff, 0x6, 0x1000005, 0x5f31, 0xd, 0x4e0, 0x2, 0x4, 0x1b, 0x4, 0x9, 0x8, 0x9, 0x6, 0x47, 0x8000, 0x1, 0xfe000000, 0xffff, 0x2, 0x4, 0x9, 0x3, 0x3, 0x9, 0x1, 0x3, 0xffffffff, 0xbc45, 0x48c93690, 0x80, 0x3], [0x7, 0x408, 0x4, 0x5, 0xfffffffe, 0x100, 0x8d2, 0x9, 0x5, 0x7fff, 0xfffffffc, 0x5, 0xb, 0x4, 0x5, 0x5, 0x42000, 0x1ef, 0x4, 0x8, 0x86, 0x3, 0x303c, 0x3e7, 0xb, 0x5, 0x2, 0x2, 0x3, 0x20000008, 0x4, 0x6d01, 0x6, 0x38, 0x800003, 0x200, 0x80, 0x3, 0x4, 0x2950bfaf, 0x1000, 0xa2, 0x7, 0xa9, 0x5, 0x7, 0xac8, 0xbf, 0x2, 0x3, 0x7ff, 0x12b, 0x4, 0x1, 0xa, 0x0, 0x5, 0x1c, 0x120000, 0x3, 0x2006, 0x80a2ed, 0x3, 0x25], [0x9, 0xbb33, 0x7, 0xb, 0x5, 0x938, 0x6, 0x6, 0x0, 0xb9, 0xce7, 0x1ff, 0x2, 0x57, 0x5, 0x3, 0x0, 0x10000, 0x4, 0x7fff, 0xffff, 0xa620, 0x1, 0x80000005, 0x1, 0x2, 0x14c, 0x60a7, 0x6, 0x7f, 0xffffffff, 0x80000000, 0x5, 0x4, 0xc8, 0x1, 0xfffff000, 0x10000, 0x3, 0x7e, 0x100, 0x9602, 0x47, 0xaf, 0x8, 0x6, 0x226, 0x5, 0x5, 0x8, 0x30b1d693, 0xa1f, 0xf40, 0x7, 0x1, 0x6c1b, 0x0, 0x8, 0x5, 0xb1e, 0xd7, 0x200, 0xffff3441, 0xfff]}, 0x45c) syz_usb_connect(0x0, 0x2d, &(0x7f00000003c0)=ANY=[@ANYBLOB="120100009ac0b620110f211066865578ac0109029c000100000400090400bf900b64ea00090587033b"], 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x10000) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) 17.398216425s ago: executing program 2 (id=718): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000640)=0x6) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x0) close(0xffffffffffffffff) rename(&(0x7f0000000400)='./bus\x00', &(0x7f0000000f00)='./file0\x00') 12.386405487s ago: executing program 4 (id=720): socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x74) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0x33, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x9, 0x4}, {0xe, 0x8}, {0x10, 0xfff9}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x10000}, @TCA_RATE={0x6, 0x5, {0x5}}, @TCA_RATE={0x6, 0x5, {0xd, 0x81}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000100), 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x3, 0x801, 0x0, &(0x7f0000000040), 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) r3 = userfaultfd(0x801) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_WRITEPROTECT(r3, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000800000/0x800000)=nil, 0x802000}, 0x2}) mincore(&(0x7f0000a5d000/0x1000)=nil, 0x1000, &(0x7f0000000080)=""/46) 11.258226152s ago: executing program 2 (id=721): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f00000013c0)=0x80000000001, 0x4) connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f00000002c0)="e8", 0xfffffffffffffd79, 0x2000c850, 0x0, 0x4d) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup3(r0, r1, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000001380)=0x40) 6.429257947s ago: executing program 2 (id=722): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000300)=ANY=[@ANYBLOB="78010000170001000000000000000000fc0000000000000000010000000000000000000000000000fe8000000000000000000000000000bbac22559832750056791414bb000000000000000000000000fc000000000000000800"/104, @ANYRES8=r1, @ANYRES32=0x0, @ANYBLOB="fc02000000e3ffffffffffffff000000ffffffff00b4921ecfa7ca1feb620c33f5defb00000000000000000000000000d27a5d5e2133", @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000"], 0x178}, 0x1, 0x0, 0x0, 0x90}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454da, &(0x7f0000000140)={'batadv0\x00'}) r2 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r2, &(0x7f0000000080)=[{{0x0, 0x0, 0x0}}], 0x40000000000012d, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x2e, &(0x7f0000000380)={@multicast, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @private, @broadcast}, {0x0, 0x4e20, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) r3 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r3, 0x4008af60, &(0x7f0000000280)={@my=0x1}) r4 = socket$vsock_stream(0x28, 0x1, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_GET_ADDR(r5, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000440)={0x48, r6, 0x4, 0x70bd25, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_ADDR_REMOTE={0x24, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x10}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_TOKEN={0x8, 0x4, 0x8000}]}, 0x48}, 0x1, 0x0, 0x0, 0x4000}, 0x84) connect$vsock_stream(r4, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r7 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) write$UHID_CREATE2(r7, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b00000073797a31000000dfff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a30000037b35f0a000089b4c45a10000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001"], 0x119) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x70f9a000) r8 = syz_open_dev$hidraw(&(0x7f0000000000), 0x0, 0x81) write$UHID_DESTROY(r8, &(0x7f00000000c0), 0xfdf3) close_range(r0, 0xffffffffffffffff, 0x0) 4.756660772s ago: executing program 4 (id=723): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, 0x0, 0x0) sendmsg$IPSET_CMD_FLUSH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB="2400000004060103ed000000000000000300000905000100070000000500010007"], 0x24}, 0x1, 0x0, 0x0, 0x4004885}, 0x0) 4.130577579s ago: executing program 4 (id=724): r0 = epoll_create(0x10000e9) r1 = memfd_create(&(0x7f0000000340)='y\x105\xfb\xf7u\x83%:r\xc2\xb9x\xa4q\xc1\xea_\x8cZ7\xe7a\x9b\x11x\x0e\xa1\xcf\x1a\x98S7\xc9\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x00\x00\x04\x879\xa24\xa9am\xde\xb2\xd3\xcbZJoa\xc4\x1acB\xaa\xc1\xfb Q\xd4\xf4\x01\xa52\xe2DG\xd4\xbd{\x9f\xa9\x97\x9b@\xdb\x00b\xe1br\xb6\x008\xe3\x10\xff\xc2\x9d\r2\x9e\x8e\x04sW\x1b\xb7\xb3\xa2\xc9&@\xca\xda\xdc\xe2/\x97X\xac\b\xb0\xc2<\x80E\x1a\xbc\xc7W\xda9VsA\xaf\xc6\xcf\xe1\xa1\xb5M\xa2\x85\xa6y\xc4J\xf1\xf7\xfcD\x95\xe3\xeb\xc7\xbc\x91\xb0\xa8\x9eo\xebF(\x9dL\x01vRk\xaacB\x04\xa7I\v\x86EZ\x96\xd5\x14OD\\\xe8R\xe4\xcd\xec\xcc\xd1\x0fre\xe86\xcd\xeb\xc4$\x98\x06J\xd6dD\x8d_U`ji{\xab\x97\xaf;l\x1f\xaf\xb38U\xcb\xfa\xb3j\x92\f\x81\xa0\xa2-g\b\x99\x0e\x8d\x8d\x16\xd9w\\\xf8\xce\xb0j\x9d\'\x93\xef\x1d\xa0H\xd9\xbd\xd9\xaf\x12$\x8d\x16%\x8b\x00', 0x3) ftruncate(r1, 0xffff) fcntl$addseals(r1, 0x409, 0x7) r2 = ioctl$UDMABUF_CREATE(0xffffffffffffffff, 0x40187542, &(0x7f0000000100)={r1, 0x0, 0x0, 0x1000}) r3 = fcntl$dupfd(r2, 0x0, r0) ioctl$DMA_BUF_IOCTL_SYNC(r3, 0x40086200, &(0x7f00000006c0)=0x1) 3.717417307s ago: executing program 4 (id=725): socketpair$unix(0x1, 0x2, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = socket$inet6(0xa, 0x5, 0x0) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000040)=@assoc_value={0x0, 0x800}, &(0x7f0000000080)=0x8) 3.14691736s ago: executing program 4 (id=726): r0 = socket(0x840000000002, 0x3, 0xfa) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x7c}}, 0x0) sendmmsg$inet(r0, &(0x7f0000005240), 0x4000095, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0xd9}, 0x38) 0s ago: executing program 4 (id=727): socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$inet6(0xa, 0x3, 0x7) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r0, 0x29, 0x41, 0x0, 0x74) openat$uinput(0xffffffffffffff9c, &(0x7f0000000040), 0x802, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x3c, 0x24, 0x33, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {0x9, 0x4}, {0xe, 0x8}, {0x10, 0xfff9}}, [@TCA_INGRESS_BLOCK={0x8, 0xd, 0x10000}, @TCA_RATE={0x6, 0x5, {0x5}}, @TCA_RATE={0x6, 0x5, {0xd, 0x81}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x3, 0x801, 0x0, &(0x7f0000000040), 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) r2 = userfaultfd(0x801) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_WRITEPROTECT(r2, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000800000/0x800000)=nil, 0x802000}, 0x2}) mincore(&(0x7f0000a5d000/0x1000)=nil, 0x1000, &(0x7f0000000080)=""/46) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:7217' (ED25519) to the list of known hosts. [ 126.512297][ T30] audit: type=1400 audit(126.260:58): avc: denied { name_bind } for pid=3295 comm="sshd" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 126.821876][ T30] audit: type=1400 audit(126.570:59): avc: denied { execute } for pid=3297 comm="sh" name="syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 126.826765][ T30] audit: type=1400 audit(126.570:60): avc: denied { execute_no_trans } for pid=3297 comm="sh" path="/syz-executor" dev="vda" ino=1735 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 130.510422][ T30] audit: type=1400 audit(130.260:61): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1736 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 130.520714][ T30] audit: type=1400 audit(130.270:62): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 130.559877][ T3297] cgroup: Unknown subsys name 'net' [ 130.583187][ T30] audit: type=1400 audit(130.330:63): avc: denied { unmount } for pid=3297 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 130.982725][ T3297] cgroup: Unknown subsys name 'cpuset' [ 131.019546][ T3297] cgroup: Unknown subsys name 'rlimit' [ 131.420575][ T30] audit: type=1400 audit(131.170:64): avc: denied { setattr } for pid=3297 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 131.425821][ T30] audit: type=1400 audit(131.170:65): avc: denied { mounton } for pid=3297 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 131.436331][ T30] audit: type=1400 audit(131.180:66): avc: denied { mount } for pid=3297 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 131.784780][ T3299] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 131.792247][ T30] audit: type=1400 audit(131.540:67): avc: denied { relabelto } for pid=3299 comm="mkswap" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 131.795282][ T30] audit: type=1400 audit(131.540:68): avc: denied { write } for pid=3299 comm="mkswap" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 131.868877][ T30] audit: type=1400 audit(131.610:69): avc: denied { read } for pid=3297 comm="syz-executor" name="swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 131.898650][ T30] audit: type=1400 audit(131.620:70): avc: denied { open } for pid=3297 comm="syz-executor" path="/swap-file" dev="vda" ino=1739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 131.905526][ T3297] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 137.510574][ T30] audit: type=1400 audit(137.260:71): avc: denied { execmem } for pid=3300 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 137.579519][ T30] audit: type=1400 audit(137.330:72): avc: denied { read } for pid=3302 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 137.588848][ T30] audit: type=1400 audit(137.330:73): avc: denied { open } for pid=3302 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 137.594495][ T30] audit: type=1400 audit(137.340:74): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 137.636899][ T30] audit: type=1400 audit(137.380:75): avc: denied { module_request } for pid=3303 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 137.774844][ T30] audit: type=1400 audit(137.520:76): avc: denied { sys_module } for pid=3303 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 141.957068][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 142.040584][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 142.071595][ T3303] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 142.158795][ T3303] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 143.972609][ T3302] hsr_slave_0: entered promiscuous mode [ 143.982455][ T3302] hsr_slave_1: entered promiscuous mode [ 144.407902][ T3303] hsr_slave_0: entered promiscuous mode [ 144.412902][ T3303] hsr_slave_1: entered promiscuous mode [ 144.416663][ T3303] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 144.418889][ T3303] Cannot create hsr debugfs directory [ 145.684241][ T30] audit: type=1400 audit(145.430:77): avc: denied { create } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 145.699777][ T30] audit: type=1400 audit(145.440:78): avc: denied { write } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 145.700612][ T30] audit: type=1400 audit(145.440:79): avc: denied { read } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 145.710371][ T3302] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 145.748748][ T3302] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 145.803324][ T3302] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 145.850923][ T3302] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 146.158356][ T3303] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 146.192771][ T3303] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 146.232197][ T3303] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 146.252835][ T3303] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 148.272108][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 148.600185][ T3303] 8021q: adding VLAN 0 to HW filter on device bond0 [ 154.502418][ T3302] veth0_vlan: entered promiscuous mode [ 154.562623][ T3302] veth1_vlan: entered promiscuous mode [ 154.776616][ T3303] veth0_vlan: entered promiscuous mode [ 154.875554][ T3303] veth1_vlan: entered promiscuous mode [ 154.925935][ T3302] veth0_macvtap: entered promiscuous mode [ 154.966725][ T3302] veth1_macvtap: entered promiscuous mode [ 155.155445][ T3303] veth0_macvtap: entered promiscuous mode [ 155.245418][ T3303] veth1_macvtap: entered promiscuous mode [ 155.262766][ T3302] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.263743][ T3302] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.263932][ T3302] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.264145][ T3302] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.521705][ T30] audit: type=1400 audit(155.270:80): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 155.537144][ T30] audit: type=1400 audit(155.280:81): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzkaller.2xxvrC/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 155.593908][ T30] audit: type=1400 audit(155.340:82): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 155.634443][ T30] audit: type=1400 audit(155.380:83): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzkaller.2xxvrC/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 155.662724][ T30] audit: type=1400 audit(155.410:84): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/syzkaller.2xxvrC/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 155.700521][ T30] audit: type=1400 audit(155.450:85): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 155.734667][ T30] audit: type=1400 audit(155.470:86): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 155.744960][ T30] audit: type=1400 audit(155.490:87): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="gadgetfs" ino=4164 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 155.763115][ T3303] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.764581][ T3303] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.765605][ T3303] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.766618][ T3303] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 155.939086][ T30] audit: type=1400 audit(155.680:88): avc: denied { mounton } for pid=3302 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 155.939694][ T30] audit: type=1400 audit(155.680:89): avc: denied { mount } for pid=3302 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 156.182498][ T3302] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 161.588343][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 161.589696][ T30] audit: type=1400 audit(161.330:109): avc: denied { mount } for pid=3460 comm="syz.0.10" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 161.700790][ T30] audit: type=1400 audit(161.450:110): avc: denied { unmount } for pid=3302 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 163.141749][ T30] audit: type=1400 audit(162.890:111): avc: denied { create } for pid=3456 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 163.151448][ T30] audit: type=1400 audit(162.900:112): avc: denied { write } for pid=3456 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 163.154633][ T30] audit: type=1400 audit(162.900:113): avc: denied { nlmsg_read } for pid=3456 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_tcpdiag_socket permissive=1 [ 166.026693][ T30] audit: type=1400 audit(165.770:114): avc: denied { allowed } for pid=3471 comm="syz.0.14" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 166.045802][ T30] audit: type=1400 audit(165.790:115): avc: denied { create } for pid=3471 comm="syz.0.14" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 169.956455][ T30] audit: type=1400 audit(169.700:116): avc: denied { connect } for pid=3480 comm="syz.1.18" lport=256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 169.964474][ T30] audit: type=1400 audit(169.710:117): avc: denied { setopt } for pid=3480 comm="syz.1.18" laddr=172.20.20.10 lport=256 faddr=172.20.20.0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 169.996717][ T30] audit: type=1400 audit(169.740:118): avc: denied { write } for pid=3480 comm="syz.1.18" laddr=172.20.20.10 lport=256 faddr=172.20.20.0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 174.325257][ T30] audit: type=1400 audit(174.070:119): avc: denied { create } for pid=3490 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 174.343069][ T30] audit: type=1400 audit(174.090:120): avc: denied { bind } for pid=3490 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 174.353945][ T30] audit: type=1400 audit(174.100:121): avc: denied { accept } for pid=3490 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 174.364623][ T30] audit: type=1400 audit(174.110:122): avc: denied { write } for pid=3490 comm="syz.1.22" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 174.692295][ T30] audit: type=1400 audit(174.440:123): avc: denied { read write } for pid=3492 comm="syz.1.23" name="raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 174.698579][ T30] audit: type=1400 audit(174.440:124): avc: denied { open } for pid=3492 comm="syz.1.23" path="/dev/raw-gadget" dev="devtmpfs" ino=701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 174.703387][ T30] audit: type=1400 audit(174.440:125): avc: denied { ioctl } for pid=3492 comm="syz.1.23" path="/dev/raw-gadget" dev="devtmpfs" ino=701 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 174.750742][ T3493] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 174.753942][ T3493] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 175.250115][ T30] audit: type=1400 audit(174.980:126): avc: denied { create } for pid=3495 comm="syz.1.24" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 175.278523][ T30] audit: type=1400 audit(175.000:127): avc: denied { create } for pid=3495 comm="syz.1.24" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 175.324636][ T3496] netlink: 36 bytes leftover after parsing attributes in process `syz.1.24'. [ 175.486559][ T30] audit: type=1400 audit(175.230:128): avc: denied { read } for pid=3495 comm="syz.1.24" name="file0" dev="tmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 175.489687][ T30] audit: type=1400 audit(175.230:129): avc: denied { open } for pid=3495 comm="syz.1.24" path="/13/file0" dev="tmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 175.556826][ T30] audit: type=1400 audit(175.290:130): avc: denied { unlink } for pid=3303 comm="syz-executor" name="file0" dev="tmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 175.902608][ T30] audit: type=1400 audit(175.650:131): avc: denied { create } for pid=3498 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 175.914543][ T30] audit: type=1400 audit(175.660:132): avc: denied { setopt } for pid=3498 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 175.918509][ T30] audit: type=1400 audit(175.660:133): avc: denied { ioctl } for pid=3498 comm="syz.1.25" path="socket:[3472]" dev="sockfs" ino=3472 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 175.928573][ T30] audit: type=1400 audit(175.670:134): avc: denied { write } for pid=3498 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 177.543226][ T30] audit: type=1400 audit(177.290:135): avc: denied { ioctl } for pid=3506 comm="syz.1.29" path="socket:[3486]" dev="sockfs" ino=3486 ioctlcmd=0x89a1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 179.494198][ T3518] netlink: 8 bytes leftover after parsing attributes in process `syz.0.33'. [ 185.629593][ T3379] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 185.892962][ T3379] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 185.894645][ T3379] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 185.912129][ T3379] usb 1-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 185.913898][ T3379] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=67 [ 185.915004][ T3379] usb 1-1: SerialNumber: syz [ 186.240717][ T3379] usb 1-1: 0:2 : does not exist [ 186.560943][ T3379] usb 1-1: USB disconnect, device number 2 [ 187.585016][ T3543] udevd[3543]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 188.600973][ T3557] syz.0.49 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 201.598801][ T3574] netlink: 48 bytes leftover after parsing attributes in process `syz.1.54'. [ 201.599633][ T3574] netlink: 8 bytes leftover after parsing attributes in process `syz.1.54'. [ 214.944163][ T3590] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 216.058378][ T3595] SELinux: syz.1.61 (3595) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 225.494819][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 225.501025][ T30] audit: type=1400 audit(225.240:139): avc: denied { create } for pid=3603 comm="syz.1.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 245.668621][ T3379] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 245.851792][ T3379] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 245.852347][ T3379] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 245.853107][ T3379] usb 1-1: New USB device found, idVendor=0fc5, idProduct=b080, bcdDevice= 0.00 [ 245.853335][ T3379] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 245.882803][ T3379] usb 1-1: config 0 descriptor?? [ 246.376777][ T3379] hid-generic 0003:0FC5:B080.0001: unbalanced collection at end of report description [ 246.384821][ T3379] hid-generic 0003:0FC5:B080.0001: probe with driver hid-generic failed with error -22 [ 246.538478][ T3378] usb 1-1: USB disconnect, device number 3 [ 246.771985][ T3642] ip6gretap0: entered promiscuous mode [ 246.774724][ T3642] ip6gretap0: entered allmulticast mode [ 247.031625][ T30] audit: type=1400 audit(246.780:140): avc: denied { create } for pid=3644 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 248.195186][ T3649] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 248.202441][ T30] audit: type=1400 audit(247.950:141): avc: denied { read } for pid=3108 comm="syslogd" name="log" dev="vda" ino=1726 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 248.220719][ T3649] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 248.224950][ T30] audit: type=1400 audit(247.960:142): avc: denied { append } for pid=3108 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 248.225699][ T30] audit: type=1400 audit(247.970:143): avc: denied { open } for pid=3108 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 248.225983][ T30] audit: type=1400 audit(247.970:144): avc: denied { getattr } for pid=3108 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 248.388502][ T43] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 248.463985][ T30] audit: type=1400 audit(248.210:145): avc: denied { write } for pid=3650 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 248.603331][ T43] usb 1-1: New USB device found, idVendor=1c9e, idProduct=9801, bcdDevice=25.d8 [ 248.604896][ T43] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 248.606333][ T43] usb 1-1: Product: syz [ 248.607343][ T43] usb 1-1: Manufacturer: syz [ 248.609594][ T43] usb 1-1: SerialNumber: syz [ 248.663920][ T43] usb 1-1: config 0 descriptor?? [ 248.680346][ T43] rndis_host 1-1:0.0: skipping garbage [ 248.682137][ T43] usb 1-1: bad CDC descriptors [ 248.901940][ T43] usb 1-1: USB disconnect, device number 4 [ 252.508363][ T3669] netlink: 'syz.1.83': attribute type 3 has an invalid length. [ 252.510216][ T3669] netlink: 'syz.1.83': attribute type 3 has an invalid length. [ 258.940523][ T30] audit: type=1400 audit(258.690:146): avc: denied { name_bind } for pid=3677 comm="syz.1.87" src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 259.262970][ T30] audit: type=1400 audit(258.990:147): avc: denied { mount } for pid=3679 comm="syz.1.88" name="/" dev="ramfs" ino=4516 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 262.769461][ T3436] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 262.970243][ T3436] usb 1-1: Using ep0 maxpacket: 16 [ 263.030283][ T3436] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 75, changing to 10 [ 263.031443][ T3436] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 263.031843][ T3436] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 0 [ 263.032328][ T3436] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid maxpacket 1431, setting to 1024 [ 263.032812][ T3436] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 1024 [ 263.046860][ T3436] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 263.047340][ T3436] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 263.048138][ T3436] usb 1-1: SerialNumber: syz [ 263.172386][ T3687] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 263.201920][ T3436] cdc_acm 1-1:1.0: Control and data interfaces are not separated! [ 263.234416][ T3436] cdc_acm 1-1:1.0: probe with driver cdc_acm failed with error -12 [ 263.434086][ T3379] usb 1-1: USB disconnect, device number 5 [ 263.882112][ T3693] netlink: 96 bytes leftover after parsing attributes in process `syz.0.93'. [ 264.153062][ T30] audit: type=1400 audit(263.900:148): avc: denied { ioctl } for pid=3694 comm="syz.0.94" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4543 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 264.679425][ T30] audit: type=1400 audit(264.420:149): avc: denied { read } for pid=3694 comm="syz.0.94" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4543 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 265.039685][ T30] audit: type=1400 audit(264.780:150): avc: denied { mounton } for pid=3689 comm="syz.1.92" path="/50/file0" dev="tmpfs" ino=272 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 265.062331][ T30] audit: type=1400 audit(264.810:151): avc: denied { mount } for pid=3689 comm="syz.1.92" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 265.742070][ T30] audit: type=1400 audit(265.490:152): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 267.754211][ T3708] netlink: 'syz.1.99': attribute type 4 has an invalid length. [ 268.190539][ T3706] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 274.803111][ T43] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 274.969345][ T43] usb 1-1: Using ep0 maxpacket: 16 [ 275.088440][ T43] usb 1-1: New USB device found, idVendor=09e8, idProduct=0062, bcdDevice=80.f2 [ 275.089651][ T43] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 275.090712][ T43] usb 1-1: Product: syz [ 275.091476][ T43] usb 1-1: Manufacturer: syz [ 275.092268][ T43] usb 1-1: SerialNumber: syz [ 275.153596][ T43] usb 1-1: config 0 descriptor?? [ 275.201586][ T43] usb 1-1: Quirk or no altset; falling back to MIDI 1.0 [ 275.324996][ T43] snd-usb-audio 1-1:0.0: probe with driver snd-usb-audio failed with error -2 [ 275.785964][ T3718] udevd[3718]: error opening ATTR{/sys/devices/platform/dummy_hcd.0/usb1/1-1/1-1:0.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 289.364750][ T3379] usb 1-1: USB disconnect, device number 6 [ 291.553198][ T3730] netlink: 4 bytes leftover after parsing attributes in process `syz.1.104'. [ 293.721080][ T3743] netlink: 8 bytes leftover after parsing attributes in process `syz.1.107'. [ 295.336151][ T30] audit: type=1400 audit(295.080:153): avc: denied { create } for pid=3750 comm="syz.1.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 295.346160][ T30] audit: type=1400 audit(295.090:154): avc: denied { setopt } for pid=3750 comm="syz.1.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 295.356510][ T30] audit: type=1400 audit(295.100:155): avc: denied { bind } for pid=3750 comm="syz.1.111" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 295.885353][ T3755] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=6928 sclass=netlink_route_socket pid=3755 comm=syz.1.113 [ 300.652934][ T3762] capability: warning: `syz.0.115' uses deprecated v2 capabilities in a way that may be insecure [ 301.443784][ T30] audit: type=1400 audit(301.190:156): avc: denied { ioctl } for pid=3765 comm="syz.0.117" path="socket:[4627]" dev="sockfs" ino=4627 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 301.449763][ T30] audit: type=1400 audit(301.200:157): avc: denied { connect } for pid=3765 comm="syz.0.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 301.456639][ T30] audit: type=1400 audit(301.200:158): avc: denied { write } for pid=3765 comm="syz.0.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 302.027300][ T30] audit: type=1400 audit(301.770:159): avc: denied { name_bind } for pid=3769 comm="syz.0.119" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 306.660202][ T30] audit: type=1400 audit(306.410:160): avc: denied { mounton } for pid=3779 comm="syz.1.123" path="/66/file0" dev="tmpfs" ino=354 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 306.754579][ T30] audit: type=1400 audit(306.500:161): avc: denied { create } for pid=3779 comm="syz.1.123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 307.309812][ T30] audit: type=1400 audit(307.050:162): avc: denied { read write } for pid=3779 comm="syz.1.123" name="uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 307.312662][ T30] audit: type=1400 audit(307.060:163): avc: denied { open } for pid=3779 comm="syz.1.123" path="/dev/uhid" dev="devtmpfs" ino=712 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 307.372235][ T3379] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 307.459140][ T3379] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 307.845512][ T30] audit: type=1400 audit(307.590:164): avc: denied { write } for pid=3779 comm="syz.1.123" name="hidraw0" dev="devtmpfs" ino=1542 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 307.931904][ T3783] Zero length message leads to an empty skb [ 313.799633][ T3792] SELinux: Context system_u:object_r:man_t:s0 is not valid (left unmapped). [ 313.809761][ T30] audit: type=1400 audit(313.560:165): avc: denied { relabelto } for pid=3791 comm="syz.0.127" name="59" dev="tmpfs" ino=312 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:man_t:s0" [ 313.814063][ T30] audit: type=1400 audit(313.560:166): avc: denied { associate } for pid=3791 comm="syz.0.127" name="59" dev="tmpfs" ino=312 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:man_t:s0" [ 313.863625][ T30] audit: type=1400 audit(313.610:167): avc: denied { write } for pid=3302 comm="syz-executor" name="59" dev="tmpfs" ino=312 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:man_t:s0" [ 313.868744][ T30] audit: type=1400 audit(313.610:168): avc: denied { remove_name } for pid=3302 comm="syz-executor" name="binderfs" dev="tmpfs" ino=316 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:man_t:s0" [ 313.894377][ T30] audit: type=1400 audit(313.640:169): avc: denied { rmdir } for pid=3302 comm="syz-executor" name="59" dev="tmpfs" ino=312 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:man_t:s0" [ 314.289094][ T23] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 314.438677][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 314.457751][ T23] usb 1-1: config 4 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 314.461376][ T23] usb 1-1: config 4 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 314.491799][ T23] usb 1-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 314.496749][ T23] usb 1-1: New USB device strings: Mfr=255, Product=255, SerialNumber=0 [ 314.501292][ T23] usb 1-1: Product: syz [ 314.506525][ T23] usb 1-1: Manufacturer: syz [ 314.588239][ T23] hub 1-1:4.0: USB hub found [ 314.771533][ T23] hub 1-1:4.0: 2 ports detected [ 315.011893][ T23] hub 1-1:4.0: hub_hub_status failed (err = -71) [ 315.013518][ T23] hub 1-1:4.0: config failed, can't get hub status (err -71) [ 315.225600][ T23] usb 1-1: USB disconnect, device number 7 [ 315.987286][ T30] audit: type=1400 audit(315.730:170): avc: denied { mount } for pid=3801 comm="syz.0.131" name="/" dev="configfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 315.992774][ T30] audit: type=1400 audit(315.740:171): avc: denied { search } for pid=3801 comm="syz.0.131" name="/" dev="configfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 315.996408][ T30] audit: type=1400 audit(315.740:172): avc: denied { read } for pid=3801 comm="syz.0.131" name="/" dev="configfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 315.999239][ T30] audit: type=1400 audit(315.740:173): avc: denied { open } for pid=3801 comm="syz.0.131" path="/" dev="configfs" ino=137 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 319.991905][ T30] audit: type=1400 audit(319.740:174): avc: denied { unmount } for pid=3303 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 320.556910][ T30] audit: type=1400 audit(320.300:175): avc: denied { ioctl } for pid=3810 comm="syz.1.134" path="socket:[4082]" dev="sockfs" ino=4082 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 335.344421][ T30] audit: type=1400 audit(335.090:176): avc: denied { setopt } for pid=3816 comm="syz.1.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 335.965499][ T30] audit: type=1400 audit(335.710:177): avc: denied { sqpoll } for pid=3821 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 336.388922][ T30] audit: type=1400 audit(336.130:178): avc: denied { read } for pid=3824 comm="syz.1.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 339.684518][ T30] audit: type=1400 audit(339.430:179): avc: denied { unmount } for pid=3829 comm="syz.1.141" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 342.133817][ T30] audit: type=1400 audit(341.880:180): avc: denied { create } for pid=3831 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 342.163766][ T30] audit: type=1400 audit(341.900:181): avc: denied { connect } for pid=3831 comm="syz.1.142" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 357.664417][ T30] audit: type=1400 audit(357.410:182): avc: denied { create } for pid=3859 comm="syz.0.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 358.370351][ T30] audit: type=1400 audit(358.120:183): avc: denied { map } for pid=3863 comm="syz.0.155" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5176 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 358.376108][ T30] audit: type=1400 audit(358.120:184): avc: denied { write } for pid=3863 comm="syz.0.155" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5176 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 365.139830][ T3436] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 365.308315][ T3436] usb 1-1: Using ep0 maxpacket: 16 [ 365.334174][ T3436] usb 1-1: config 0 has an invalid interface number: 17 but max is 0 [ 365.334657][ T3436] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 365.335064][ T3436] usb 1-1: config 0 has no interface number 0 [ 365.383986][ T3436] usb 1-1: New USB device found, idVendor=0408, idProduct=4034, bcdDevice=dd.cd [ 365.384763][ T3436] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 365.387074][ T3436] usb 1-1: Product: syz [ 365.398176][ T3436] usb 1-1: Manufacturer: syz [ 365.398589][ T3436] usb 1-1: SerialNumber: syz [ 365.433722][ T3436] usb 1-1: config 0 descriptor?? [ 375.848675][ T3378] usb 1-1: USB disconnect, device number 8 [ 376.361086][ T30] audit: type=1400 audit(376.100:185): avc: denied { write } for pid=3897 comm="syz.0.167" name="vlan0" dev="proc" ino=4026532890 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 376.697167][ T30] audit: type=1400 audit(376.440:186): avc: denied { map } for pid=3897 comm="syz.0.167" path="/proc/183/net/vlan/vlan0" dev="proc" ino=4026532890 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 379.131470][ T3906] netlink: 96 bytes leftover after parsing attributes in process `syz.1.171'. [ 388.003292][ T3917] netlink: 8 bytes leftover after parsing attributes in process `syz.1.174'. [ 388.004738][ T3917] netlink: 8 bytes leftover after parsing attributes in process `syz.1.174'. [ 394.638551][ T30] audit: type=1400 audit(394.380:187): avc: denied { getopt } for pid=3921 comm="syz.1.176" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 400.522608][ T30] audit: type=1400 audit(400.270:188): avc: denied { watch } for pid=3925 comm="syz.1.177" path="/97/control" dev="tmpfs" ino=514 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 420.988649][ T3379] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 421.180278][ T3379] usb 1-1: Using ep0 maxpacket: 16 [ 421.238507][ T3379] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 421.239020][ T3379] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 421.239252][ T3379] usb 1-1: New USB device found, idVendor=060b, idProduct=0001, bcdDevice= 0.00 [ 421.239427][ T3379] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 421.290197][ T3379] usb 1-1: config 0 descriptor?? [ 421.779181][ T3379] hid (null): unknown global tag 0xe [ 421.911426][ T3379] hid-generic 0003:060B:0001.0003: unknown main item tag 0x1 [ 421.912954][ T3379] hid-generic 0003:060B:0001.0003: unknown global tag 0xe [ 421.914099][ T3379] hid-generic 0003:060B:0001.0003: item 0 0 1 14 parsing failed [ 421.919050][ T3379] hid-generic 0003:060B:0001.0003: probe with driver hid-generic failed with error -22 [ 421.993702][ T3438] usb 1-1: USB disconnect, device number 9 [ 429.265568][ T30] audit: type=1400 audit(429.010:189): avc: denied { write } for pid=3971 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 432.477202][ T3982] netlink: 'syz.1.194': attribute type 16 has an invalid length. [ 432.484557][ T3982] netlink: 64138 bytes leftover after parsing attributes in process `syz.1.194'. [ 439.194500][ T30] audit: type=1400 audit(438.940:190): avc: denied { create } for pid=3991 comm="syz.1.199" name="file1" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 439.203768][ T30] audit: type=1400 audit(438.950:191): avc: denied { link } for pid=3991 comm="syz.1.199" name="file1" dev="tmpfs" ino=601 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 439.253427][ T30] audit: type=1400 audit(439.000:192): avc: denied { unlink } for pid=3303 comm="syz-executor" name="file0" dev="tmpfs" ino=601 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 448.590211][ T30] audit: type=1400 audit(448.340:193): avc: denied { nlmsg_read } for pid=3997 comm="syz.1.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 448.808782][ T30] audit: type=1400 audit(448.550:194): avc: denied { watch watch_reads } for pid=3999 comm="syz.1.202" path="/117/file1" dev="tmpfs" ino=617 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 458.946251][ T30] audit: type=1400 audit(458.690:195): avc: denied { read } for pid=4011 comm="syz.1.207" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 459.182921][ T4014] Illegal XDP return value 3668744544 on prog (id 11) dev syz_tun, expect packet loss! [ 470.662683][ T1586] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 470.974987][ T1586] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.220707][ T1586] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.506096][ T1586] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 472.175512][ T30] audit: type=1400 audit(471.920:196): avc: denied { read } for pid=3153 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 473.124775][ T30] audit: type=1400 audit(472.870:197): avc: denied { create } for pid=4065 comm="syz.1.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 473.141109][ T30] audit: type=1400 audit(472.890:198): avc: denied { write } for pid=4065 comm="syz.1.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 473.142998][ T30] audit: type=1400 audit(472.890:199): avc: denied { read } for pid=4065 comm="syz.1.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 473.165168][ T30] audit: type=1400 audit(472.910:200): avc: denied { ioctl } for pid=4065 comm="syz.1.224" path="socket:[5506]" dev="sockfs" ino=5506 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 475.802833][ T1586] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 475.904003][ T1586] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 475.969754][ T1586] bond0 (unregistering): Released all slaves [ 476.414083][ T1586] hsr_slave_0: left promiscuous mode [ 476.422829][ T1586] hsr_slave_1: left promiscuous mode [ 476.544193][ T1586] veth1_macvtap: left promiscuous mode [ 476.549809][ T1586] veth0_macvtap: left promiscuous mode [ 476.553310][ T1586] veth1_vlan: left promiscuous mode [ 476.556433][ T1586] veth0_vlan: left promiscuous mode [ 491.267449][ T4029] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 491.331150][ T4029] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 494.222484][ T4029] hsr_slave_0: entered promiscuous mode [ 494.226774][ T4029] hsr_slave_1: entered promiscuous mode [ 496.232794][ T4029] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 496.315799][ T4029] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 496.383541][ T4029] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 496.444908][ T4029] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 498.580249][ T4029] 8021q: adding VLAN 0 to HW filter on device bond0 [ 505.602771][ T4029] veth0_vlan: entered promiscuous mode [ 505.713544][ T4029] veth1_vlan: entered promiscuous mode [ 506.045312][ T4029] veth0_macvtap: entered promiscuous mode [ 506.083889][ T4029] veth1_macvtap: entered promiscuous mode [ 506.415774][ T4029] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 506.419222][ T4029] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 506.426049][ T4029] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 506.438560][ T4029] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 506.816175][ T30] audit: type=1400 audit(506.560:201): avc: denied { mounton } for pid=4029 comm="syz-executor" path="/syzkaller.aWQXGW/syz-tmp" dev="vda" ino=1746 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 506.856440][ T30] audit: type=1400 audit(506.600:202): avc: denied { mount } for pid=4029 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 506.912629][ T30] audit: type=1400 audit(506.650:203): avc: denied { mounton } for pid=4029 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1516 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 507.935075][ T30] audit: type=1400 audit(507.680:204): avc: denied { read } for pid=4268 comm="syz.2.212" name="uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 507.935778][ T30] audit: type=1400 audit(507.680:205): avc: denied { open } for pid=4268 comm="syz.2.212" path="/dev/uinput" dev="devtmpfs" ino=706 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 507.950773][ T30] audit: type=1400 audit(507.700:206): avc: denied { ioctl } for pid=4268 comm="syz.2.212" path="/dev/uinput" dev="devtmpfs" ino=706 ioctlcmd=0x5569 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 508.323218][ T30] audit: type=1400 audit(508.070:207): avc: denied { ioctl } for pid=4268 comm="syz.2.212" path="socket:[5642]" dev="sockfs" ino=5642 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 511.853187][ T4269] input: syz0 as /devices/virtual/input/input1 [ 520.946461][ T4305] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 520.959943][ T4305] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 521.331595][ T30] audit: type=1400 audit(521.080:208): avc: denied { create } for pid=4308 comm="syz.2.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 521.384328][ T30] audit: type=1400 audit(521.130:209): avc: denied { bind } for pid=4308 comm="syz.2.235" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 521.385072][ T30] audit: type=1400 audit(521.130:210): avc: denied { name_bind } for pid=4308 comm="syz.2.235" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 521.385389][ T30] audit: type=1400 audit(521.130:211): avc: denied { node_bind } for pid=4308 comm="syz.2.235" saddr=fe80::e src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 522.450378][ T4317] raw_sendmsg: syz.2.239 forgot to set AF_INET. Fix it! [ 531.026722][ T30] audit: type=1400 audit(530.770:212): avc: denied { create } for pid=4345 comm="syz.2.252" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 567.855616][ T30] audit: type=1400 audit(567.590:213): avc: denied { write } for pid=4378 comm="syz.2.261" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 568.523085][ T30] audit: type=1400 audit(568.270:214): avc: denied { read } for pid=4378 comm="syz.2.261" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 570.860986][ T4389] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 570.871932][ T4389] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 582.794840][ T4133] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 583.070461][ T4133] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 583.298703][ T4133] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 583.560137][ T4133] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.433109][ T4133] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 588.515791][ T4133] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 588.615406][ T4133] bond0 (unregistering): Released all slaves [ 588.903065][ T4133] hsr_slave_0: left promiscuous mode [ 588.921605][ T4133] hsr_slave_1: left promiscuous mode [ 589.033730][ T4133] veth1_macvtap: left promiscuous mode [ 589.034563][ T4133] veth0_macvtap: left promiscuous mode [ 589.043180][ T4133] veth1_vlan: left promiscuous mode [ 589.045204][ T4133] veth0_vlan: left promiscuous mode [ 596.564621][ T4405] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 596.615660][ T4405] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 599.525323][ T4405] hsr_slave_0: entered promiscuous mode [ 599.533663][ T4405] hsr_slave_1: entered promiscuous mode [ 599.538061][ T4405] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 599.539100][ T4405] Cannot create hsr debugfs directory [ 601.310781][ T4405] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 601.376204][ T4405] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 601.477406][ T4405] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 601.544209][ T4405] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 604.182457][ T4405] 8021q: adding VLAN 0 to HW filter on device bond0 [ 604.674404][ T30] audit: type=1400 audit(604.420:215): avc: denied { block_suspend } for pid=4492 comm="syz.2.278" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 604.740919][ T30] audit: type=1400 audit(604.480:216): avc: denied { module_load } for pid=4492 comm="syz.2.278" path="/sys/power/wakeup_count" dev="sysfs" ino=871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 613.274802][ T4405] veth0_vlan: entered promiscuous mode [ 613.329045][ T4405] veth1_vlan: entered promiscuous mode [ 613.556483][ T4405] veth0_macvtap: entered promiscuous mode [ 613.596059][ T4405] veth1_macvtap: entered promiscuous mode [ 613.837295][ T4405] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 613.844541][ T4405] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 613.844784][ T4405] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 613.845001][ T4405] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 655.201372][ T30] audit: type=1400 audit(654.950:217): avc: denied { name_bind } for pid=4634 comm="syz.2.301" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 658.066832][ T4638] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 658.071195][ T4638] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 662.370545][ T4649] input: syz0 as /devices/virtual/input/input2 [ 670.000259][ T4664] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 670.003828][ T4664] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 673.392478][ T4669] fuse: Unknown parameter 'user_i00000000000000000000' [ 683.476778][ T1910] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 683.491468][ T1910] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz0] on syz0 [ 683.913878][ T1586] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 684.099589][ T4696] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 684.106749][ T4696] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 684.213154][ T1586] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 684.450299][ T1586] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 684.682389][ T1586] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 688.675216][ T1586] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 688.740458][ T1586] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 688.800499][ T1586] bond0 (unregistering): Released all slaves [ 689.320701][ T1586] hsr_slave_0: left promiscuous mode [ 689.327258][ T1586] hsr_slave_1: left promiscuous mode [ 689.510951][ T1586] veth1_macvtap: left promiscuous mode [ 689.511807][ T1586] veth0_macvtap: left promiscuous mode [ 689.512742][ T1586] veth1_vlan: left promiscuous mode [ 689.513809][ T1586] veth0_vlan: left promiscuous mode [ 699.838347][ T4681] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 699.883845][ T4681] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 703.925939][ T4681] hsr_slave_0: entered promiscuous mode [ 703.951429][ T4681] hsr_slave_1: entered promiscuous mode [ 703.954337][ T4681] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 703.963323][ T4681] Cannot create hsr debugfs directory [ 705.991752][ T4681] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 706.076174][ T4681] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 706.115784][ T4681] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 706.157255][ T4681] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 708.784511][ T4681] 8021q: adding VLAN 0 to HW filter on device bond0 [ 710.783117][ T30] audit: type=1400 audit(710.530:218): avc: denied { bind } for pid=4777 comm="syz.2.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 717.519505][ T4681] veth0_vlan: entered promiscuous mode [ 717.631567][ T4681] veth1_vlan: entered promiscuous mode [ 717.976853][ T4681] veth0_macvtap: entered promiscuous mode [ 718.041257][ T4681] veth1_macvtap: entered promiscuous mode [ 718.281033][ T4681] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 718.284572][ T4681] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 718.285874][ T4681] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 718.286910][ T4681] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 718.529726][ T4843] input: syz1 as /devices/virtual/input/input3 [ 719.396759][ T4851] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 719.405293][ T4851] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 720.073076][ T30] audit: type=1326 audit(719.810:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4856 comm="syz.4.341" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 720.082644][ T30] audit: type=1326 audit(719.820:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4856 comm="syz.4.341" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 720.086522][ T30] audit: type=1326 audit(719.830:221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4856 comm="syz.4.341" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 720.106651][ T30] audit: type=1326 audit(719.850:222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4856 comm="syz.4.341" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=1 ip=0x131f30 code=0x7ffc0000 [ 720.109384][ T30] audit: type=1326 audit(719.850:223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4856 comm="syz.4.341" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 720.111464][ T30] audit: type=1326 audit(719.850:224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4856 comm="syz.4.341" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 720.113180][ T30] audit: type=1326 audit(719.860:225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4856 comm="syz.4.341" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 720.114797][ T30] audit: type=1326 audit(719.860:226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4856 comm="syz.4.341" exe="/syz-executor" sig=0 arch=40000028 syscall=100 compat=1 ip=0x131f30 code=0x7ffc0000 [ 720.116419][ T30] audit: type=1326 audit(719.860:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4856 comm="syz.4.341" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x1258d4 code=0x7ffc0000 [ 720.118940][ T30] audit: type=1326 audit(719.860:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4856 comm="syz.4.341" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x131f30 code=0x7ffc0000 [ 721.222590][ T4863] process 'syz.4.341' launched './file0' with NULL argv: empty string added [ 721.245269][ T4857] capability: warning: `syz.4.341' uses 32-bit capabilities (legacy support in use) [ 722.735737][ T4879] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 722.761895][ T4879] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 730.039044][ T4926] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 730.052197][ T4926] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 730.878903][ T4934] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 730.884861][ T4934] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 731.130092][ T30] kauditd_printk_skb: 77 callbacks suppressed [ 731.130610][ T30] audit: type=1400 audit(730.880:306): avc: denied { read } for pid=4935 comm="syz.2.364" path="socket:[8703]" dev="sockfs" ino=8703 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 732.129774][ T4939] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 732.132821][ T4939] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 737.270009][ T4950] netlink: 'syz.4.368': attribute type 16 has an invalid length. [ 737.270932][ T4950] netlink: 64138 bytes leftover after parsing attributes in process `syz.4.368'. [ 747.028708][ T4970] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 747.030921][ T4970] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 755.069921][ T4993] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 755.073993][ T4993] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 756.274475][ T30] audit: type=1326 audit(756.020:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4999 comm="syz.2.386" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=1 ip=0xef168 code=0x7ffc0000 [ 756.282855][ T30] audit: type=1326 audit(756.030:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4999 comm="syz.2.386" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=1 ip=0xef168 code=0x7ffc0000 [ 756.283553][ T30] audit: type=1326 audit(756.030:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4999 comm="syz.2.386" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=1 ip=0xef168 code=0x7ffc0000 [ 756.283881][ T30] audit: type=1326 audit(756.030:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4999 comm="syz.2.386" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=1 ip=0xef168 code=0x7ffc0000 [ 756.295437][ T30] audit: type=1326 audit(756.040:311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4999 comm="syz.2.386" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=1 ip=0xef168 code=0x7ffc0000 [ 756.296142][ T30] audit: type=1326 audit(756.040:312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4999 comm="syz.2.386" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=1 ip=0xef168 code=0x7ffc0000 [ 756.296430][ T30] audit: type=1326 audit(756.040:313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4999 comm="syz.2.386" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=1 ip=0xef168 code=0x7ffc0000 [ 756.296706][ T30] audit: type=1326 audit(756.040:314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4999 comm="syz.2.386" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=1 ip=0xef168 code=0x7ffc0000 [ 756.303970][ T30] audit: type=1326 audit(756.040:315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4999 comm="syz.2.386" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=1 ip=0xef168 code=0x7ffc0000 [ 756.306571][ T30] audit: type=1326 audit(756.050:316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4999 comm="syz.2.386" exe="/syz-executor" sig=0 arch=40000028 syscall=119 compat=1 ip=0xef168 code=0x7ffc0000 [ 757.537222][ T5008] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 757.551227][ T5008] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 764.182414][ T5042] netlink: 8 bytes leftover after parsing attributes in process `syz.4.402'. [ 764.604669][ T30] kauditd_printk_skb: 288 callbacks suppressed [ 764.605254][ T30] audit: type=1400 audit(764.350:605): avc: denied { bind } for pid=5043 comm="syz.4.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 764.619608][ T30] audit: type=1400 audit(764.370:606): avc: denied { listen } for pid=5043 comm="syz.4.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 764.673747][ T30] audit: type=1400 audit(764.420:607): avc: denied { accept } for pid=5043 comm="syz.4.403" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 765.033634][ T30] audit: type=1400 audit(764.780:608): avc: denied { getopt } for pid=5045 comm="syz.4.404" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 767.264434][ T5059] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 767.270228][ T5059] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 768.291147][ T5066] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 768.293756][ T5066] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 774.042288][ T5087] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 774.044697][ T5087] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 778.929715][ T30] audit: type=1400 audit(778.680:609): avc: denied { create } for pid=5100 comm="syz.4.427" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 778.958410][ T30] audit: type=1400 audit(778.690:610): avc: denied { sys_admin } for pid=5100 comm="syz.4.427" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 786.167185][ T5133] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 786.184337][ T5133] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 802.040443][ T30] audit: type=1400 audit(801.790:611): avc: denied { setopt } for pid=5163 comm="syz.4.450" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 820.238343][ T30] audit: type=1400 audit(819.980:612): avc: denied { create } for pid=5231 comm="syz.2.474" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 838.471325][ T30] audit: type=1400 audit(838.220:613): avc: denied { read } for pid=5253 comm="syz.2.480" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 838.473398][ T30] audit: type=1400 audit(838.220:614): avc: denied { open } for pid=5253 comm="syz.2.480" path="/161/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 838.630417][ T5256] block device autoloading is deprecated and will be removed. [ 838.677257][ T30] audit: type=1400 audit(838.420:615): avc: denied { ioctl } for pid=5253 comm="syz.2.480" path="/161/file0/file0" dev="fuse" ino=64 ioctlcmd=0x92b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 838.713643][ T5254] md2: using deprecated bitmap file support [ 838.714596][ T5254] md2: error: bitmap file must be a regular file [ 840.476442][ T30] audit: type=1400 audit(840.220:616): avc: denied { read } for pid=5267 comm="syz.2.484" name="fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 840.483756][ T30] audit: type=1400 audit(840.230:617): avc: denied { open } for pid=5267 comm="syz.2.484" path="/dev/fb0" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 840.491713][ T30] audit: type=1400 audit(840.240:618): avc: denied { ioctl } for pid=5267 comm="syz.2.484" path="/dev/fb0" dev="devtmpfs" ino=619 ioctlcmd=0x4610 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 840.509111][ T30] audit: type=1400 audit(840.250:619): avc: denied { remove_name } for pid=3108 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 840.534105][ T30] audit: type=1400 audit(840.270:620): avc: denied { rename } for pid=3108 comm="syslogd" name="messages" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 840.534769][ T30] audit: type=1400 audit(840.280:621): avc: denied { create } for pid=3108 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 841.225210][ T30] audit: type=1400 audit(840.970:622): avc: denied { module_load } for pid=5272 comm="syz.2.486" path="/sys/power/wakeup_count" dev="sysfs" ino=871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 845.853341][ T5281] fuse: Bad value for 'fd' [ 848.449793][ T30] audit: type=1400 audit(848.200:623): avc: denied { create } for pid=5282 comm="syz.4.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 848.455313][ T30] audit: type=1400 audit(848.200:624): avc: denied { getopt } for pid=5282 comm="syz.4.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 871.220527][ T30] audit: type=1400 audit(870.970:625): avc: denied { setopt } for pid=5327 comm="syz.2.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 873.333738][ T30] audit: type=1400 audit(873.080:626): avc: denied { shutdown } for pid=5333 comm="syz.4.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 873.359244][ T30] audit: type=1400 audit(873.100:627): avc: denied { connect } for pid=5333 comm="syz.4.508" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 873.359860][ T30] audit: type=1400 audit(873.100:628): avc: denied { name_connect } for pid=5333 comm="syz.4.508" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 893.338816][ T30] audit: type=1400 audit(893.080:629): avc: denied { read } for pid=5352 comm="syz.2.513" name="nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 893.339555][ T30] audit: type=1400 audit(893.080:630): avc: denied { open } for pid=5352 comm="syz.2.513" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 893.339852][ T30] audit: type=1400 audit(893.080:631): avc: denied { map } for pid=5352 comm="syz.2.513" path="/dev/nullb0" dev="devtmpfs" ino=671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 895.635646][ T30] audit: type=1400 audit(895.380:632): avc: denied { read } for pid=5360 comm="syz.2.517" dev="nsfs" ino=4026532621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 895.651122][ T30] audit: type=1400 audit(895.400:633): avc: denied { open } for pid=5360 comm="syz.2.517" path="net:[4026532621]" dev="nsfs" ino=4026532621 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 898.965994][ T5370] netlink: 24 bytes leftover after parsing attributes in process `syz.4.520'. [ 899.998314][ T3123] udevd[3123]: worker [5257] /devices/virtual/block/md2 is taking a long time [ 912.506270][ T5381] netlink: 3416 bytes leftover after parsing attributes in process `syz.4.523'. [ 912.513510][ T5381] netlink: 3416 bytes leftover after parsing attributes in process `syz.4.523'. [ 912.515614][ T5381] netlink: 242 bytes leftover after parsing attributes in process `syz.4.523'. [ 920.000873][ T5402] Injecting memory failure for pfn 0x64f09 at process virtual address 0x80000000 [ 920.010839][ T5402] Memory failure: 0x64f09: keeping poisoned page in swap cache [ 920.012582][ T5402] Memory failure: 0x64f09: Sending SIGBUS to syz.4.530:5402 due to hardware memory corruption [ 920.014638][ T5402] Memory failure: 0x64f09: recovery action for dirty swapcache page: Delayed [ 920.015439][ T5402] Injecting memory failure for pfn 0x62f0a at process virtual address 0x80001000 [ 920.016280][ T5402] Memory failure: 0x62f0a: keeping poisoned page in swap cache [ 920.016744][ T5402] Memory failure: 0x62f0a: Sending SIGBUS to syz.4.530:5402 due to hardware memory corruption [ 920.017138][ T5402] Memory failure: 0x62f0a: recovery action for dirty swapcache page: Delayed [ 920.019565][ T5402] Injecting memory failure for pfn 0x48dd0 at process virtual address 0x80002000 [ 920.020306][ T5402] Memory failure: 0x48dd0: recovery action for reserved kernel page: Ignored [ 929.611821][ T5408] netlink: 12 bytes leftover after parsing attributes in process `syz.2.532'. [ 937.899526][ T30] audit: type=1400 audit(937.640:634): avc: denied { listen } for pid=5427 comm="syz.4.539" lport=37870 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 937.907985][ T30] audit: type=1400 audit(937.650:635): avc: denied { accept } for pid=5427 comm="syz.4.539" lport=37870 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 937.924886][ T30] audit: type=1400 audit(937.670:636): avc: denied { setopt } for pid=5427 comm="syz.4.539" lport=37870 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 938.688638][ T30] audit: type=1400 audit(938.430:637): avc: denied { getopt } for pid=5433 comm="syz.4.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 939.566417][ T30] audit: type=1400 audit(939.310:638): avc: denied { wake_alarm } for pid=5441 comm="syz.2.546" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 939.659063][ T5444] fuse: Bad value for 'fd' [ 939.974608][ T30] audit: type=1400 audit(939.720:639): avc: denied { read write } for pid=5445 comm="syz.2.548" name="vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 939.977001][ T30] audit: type=1400 audit(939.720:640): avc: denied { open } for pid=5445 comm="syz.2.548" path="/dev/vhost-net" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 939.986678][ T30] audit: type=1400 audit(939.730:641): avc: denied { ioctl } for pid=5445 comm="syz.2.548" path="/dev/vhost-net" dev="devtmpfs" ino=713 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 944.733130][ T5471] syz.2.559 uses obsolete (PF_INET,SOCK_PACKET) [ 945.004779][ T30] audit: type=1400 audit(944.750:642): avc: denied { getopt } for pid=5474 comm="syz.4.561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 948.368190][ T5488] netlink: 12 bytes leftover after parsing attributes in process `syz.2.567'. [ 954.204616][ T30] audit: type=1400 audit(953.950:643): avc: denied { ioctl } for pid=5490 comm="syz.2.568" path="pid:[4026532889]" dev="nsfs" ino=4026532889 ioctlcmd=0xb709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 967.938424][ T30] audit: type=1400 audit(967.680:644): avc: denied { read } for pid=5506 comm="syz.4.573" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 971.478632][ T30] audit: type=1400 audit(971.140:645): avc: denied { read } for pid=5517 comm="syz.4.576" name="file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=606 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 971.479317][ T30] audit: type=1400 audit(971.140:646): avc: denied { open } for pid=5517 comm="syz.4.576" path="/113/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=606 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 973.043411][ T5529] Process accounting resumed [ 978.901457][ T30] audit: type=1400 audit(978.650:647): avc: denied { create } for pid=5549 comm="syz.2.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 978.915454][ T30] audit: type=1400 audit(978.660:648): avc: denied { setopt } for pid=5549 comm="syz.2.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 984.295631][ T30] audit: type=1400 audit(984.030:649): avc: denied { bind } for pid=5549 comm="syz.2.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 984.328419][ T30] audit: type=1400 audit(984.060:650): avc: denied { setopt } for pid=5549 comm="syz.2.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 984.387742][ T30] audit: type=1400 audit(984.120:651): avc: denied { mount } for pid=5557 comm="syz.4.593" name="/" dev="sysfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 994.046324][ T30] audit: type=1400 audit(993.790:652): avc: denied { connect } for pid=5580 comm="syz.4.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 997.616997][ T30] audit: type=1400 audit(997.360:653): avc: denied { bind } for pid=5580 comm="syz.4.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 997.669156][ T30] audit: type=1400 audit(997.410:654): avc: denied { create } for pid=5580 comm="syz.4.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 997.678635][ T30] audit: type=1400 audit(997.420:655): avc: denied { write } for pid=5580 comm="syz.4.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 997.770354][ T30] audit: type=1400 audit(997.520:656): avc: denied { read } for pid=5580 comm="syz.4.601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1017.775947][ T30] audit: type=1400 audit(1017.520:657): avc: denied { create } for pid=5602 comm="syz.4.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1017.785619][ T30] audit: type=1400 audit(1017.530:658): avc: denied { setopt } for pid=5602 comm="syz.4.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1020.858976][ T3123] udevd[3123]: worker [5257] /devices/virtual/block/md2 timeout; kill it [ 1020.860131][ T3123] udevd[3123]: seq 8234 '/devices/virtual/block/md2' killed [ 1021.857753][ T30] audit: type=1400 audit(1021.600:659): avc: denied { write } for pid=5607 comm="syz.4.610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1037.532152][ T30] audit: type=1400 audit(1037.280:660): avc: denied { execute } for pid=5623 comm="syz.4.615" path="/148/cpu.stat" dev="tmpfs" ino=788 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1056.149545][ T30] audit: type=1400 audit(1055.890:661): avc: denied { write } for pid=5646 comm="syz.2.623" path="socket:[9820]" dev="sockfs" ino=9820 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1061.921556][ T30] audit: type=1400 audit(1061.670:662): avc: denied { read } for pid=5646 comm="syz.2.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1071.929349][ T30] audit: type=1400 audit(1071.670:663): avc: denied { create } for pid=5667 comm="syz.2.630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 1077.466308][ T30] audit: type=1400 audit(1077.210:664): avc: denied { read } for pid=5678 comm="syz.2.633" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1077.480592][ T30] audit: type=1400 audit(1077.230:665): avc: denied { open } for pid=5678 comm="syz.2.633" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1077.504870][ T30] audit: type=1400 audit(1077.250:666): avc: denied { ioctl } for pid=5678 comm="syz.2.633" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1083.095896][ T30] audit: type=1400 audit(1082.840:667): avc: denied { read append } for pid=5678 comm="syz.2.633" name="rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1083.096615][ T30] audit: type=1400 audit(1082.840:668): avc: denied { open } for pid=5678 comm="syz.2.633" path="/dev/rtc0" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1083.117090][ T30] audit: type=1400 audit(1082.860:669): avc: denied { ioctl } for pid=5678 comm="syz.2.633" path="/dev/rtc0" dev="devtmpfs" ino=707 ioctlcmd=0x7001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1089.882165][ T30] audit: type=1400 audit(1089.630:670): avc: denied { ioctl } for pid=5684 comm="syz.4.634" path="socket:[10738]" dev="sockfs" ino=10738 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1094.985066][ T30] audit: type=1400 audit(1094.730:671): avc: denied { write } for pid=5688 comm="syz.2.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1097.729239][ T30] audit: type=1400 audit(1097.440:672): avc: denied { mount } for pid=5696 comm="syz.4.639" name="/" dev="autofs" ino=9906 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 1133.768761][ T30] audit: type=1400 audit(1133.480:673): avc: denied { bind } for pid=5746 comm="syz.4.655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 1133.769509][ T30] audit: type=1400 audit(1133.480:674): avc: denied { name_bind } for pid=5746 comm="syz.4.655" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1133.769848][ T30] audit: type=1400 audit(1133.480:675): avc: denied { node_bind } for pid=5746 comm="syz.4.655" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 1133.770133][ T30] audit: type=1400 audit(1133.490:676): avc: denied { name_connect } for pid=5746 comm="syz.4.655" dest=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1147.466924][ T30] audit: type=1400 audit(1147.210:677): avc: denied { create } for pid=5753 comm="syz.2.657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1147.510705][ T30] audit: type=1400 audit(1147.260:678): avc: denied { setopt } for pid=5753 comm="syz.2.657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1147.516863][ T30] audit: type=1400 audit(1147.260:679): avc: denied { connect } for pid=5753 comm="syz.2.657" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 1192.852892][ T5829] netlink: 8 bytes leftover after parsing attributes in process `syz.4.680'. [ 1192.853456][ T5829] netlink: 12 bytes leftover after parsing attributes in process `syz.4.680'. [ 1192.860881][ T5829] netlink: 'syz.4.680': attribute type 18 has an invalid length. [ 1213.091332][ T30] audit: type=1400 audit(1212.840:680): avc: denied { create } for pid=5858 comm="syz.4.690" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 1227.775289][ T30] audit: type=1400 audit(1227.520:681): avc: denied { execute_no_trans } for pid=5878 comm="syz.2.696" path="/262/file0" dev="tmpfs" ino=1347 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 1251.176538][ T30] audit: type=1400 audit(1250.920:682): avc: denied { connect } for pid=5926 comm="syz.4.715" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1253.680231][ T5934] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1253.682584][ T5934] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1260.111175][ T30] audit: type=1400 audit(1259.860:683): avc: denied { unmount } for pid=4029 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=filesystem permissive=1 [ 1266.417010][ T3378] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 1267.568393][ T30] audit: type=1400 audit(1267.310:684): avc: denied { create } for pid=5953 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1267.569149][ T30] audit: type=1400 audit(1267.310:685): avc: denied { write open } for pid=5953 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1910 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1267.569662][ T30] audit: type=1400 audit(1267.310:686): avc: denied { append } for pid=5953 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1910 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1267.576258][ T30] audit: type=1400 audit(1267.320:687): avc: denied { getattr } for pid=5953 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1267.879514][ T30] audit: type=1400 audit(1267.610:688): avc: denied { read } for pid=5957 comm="cmp" name="resolv.conf" dev="tmpfs" ino=3 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1268.024974][ T5959] sctp: [Deprecated]: syz.4.725 (pid 5959) Use of struct sctp_assoc_value in delayed_ack socket option. [ 1268.024974][ T5959] Use struct sctp_sack_info instead [ 1268.206242][ T30] audit: type=1400 audit(1267.950:689): avc: denied { unlink } for pid=5960 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1910 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 1276.888878][ T32] INFO: task kworker/1:1:43 blocked for more than 430 seconds. [ 1276.890832][ T32] Not tainted 6.15.0-rc3-syzkaller-00001-g9d7a0577c9db #0 [ 1276.894004][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1276.895865][ T32] task:kworker/1:1 state:D stack:0 pid:43 tgid:43 ppid:2 task_flags:0x4288060 flags:0x00000008 [ 1276.900573][ T32] Workqueue: md_misc mddev_delayed_delete [ 1276.904538][ T32] Call trace: [ 1276.906319][ T32] __switch_to+0x204/0x4bc (T) [ 1276.913018][ T32] __schedule+0xd34/0x3188 [ 1276.914773][ T32] schedule+0xd0/0x344 [ 1276.915851][ T32] schedule_timeout+0x1ec/0x224 [ 1276.918590][ T32] __wait_for_common+0x1d0/0x3f8 [ 1276.923785][ T32] wait_for_completion+0x20/0x2c [ 1276.925006][ T32] devtmpfs_submit_req+0xac/0x114 [ 1276.926151][ T32] devtmpfs_delete_node+0xd8/0x128 [ 1276.927288][ T32] device_del+0x59c/0x7b4 [ 1276.929566][ T32] del_gendisk+0x3fc/0x87c [ 1276.930671][ T32] md_kobj_release+0x84/0xd8 [ 1276.931766][ T32] kobject_put+0x17c/0x430 [ 1276.932896][ T32] mddev_delayed_delete+0x14/0x20 [ 1276.934028][ T32] process_one_work+0x7cc/0x18d4 [ 1276.935164][ T32] worker_thread+0x734/0xb84 [ 1276.936286][ T32] kthread+0x348/0x5fc [ 1276.937336][ T32] ret_from_fork+0x10/0x20 [ 1276.941174][ T32] INFO: task udevd:5257 blocked for more than 430 seconds. [ 1276.942580][ T32] Not tainted 6.15.0-rc3-syzkaller-00001-g9d7a0577c9db #0 [ 1276.943950][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1276.945453][ T32] task:udevd state:D stack:0 pid:5257 tgid:5257 ppid:3123 task_flags:0x400040 flags:0x00000005 [ 1276.948217][ T32] Call trace: [ 1276.949253][ T32] __switch_to+0x204/0x4bc (T) [ 1276.950401][ T32] __schedule+0xd34/0x3188 [ 1276.953189][ T32] schedule+0xd0/0x344 [ 1276.954266][ T32] schedule_preempt_disabled+0x18/0x2c [ 1276.955453][ T32] __mutex_lock+0x5d8/0x9d8 [ 1276.956550][ T32] mutex_lock_nested+0x24/0x30 [ 1276.957995][ T32] blk_probe_dev+0x30/0x168 [ 1276.959207][ T32] blk_request_module+0x18/0xa4 [ 1276.960524][ T32] blkdev_get_no_open+0x74/0xbc [ 1276.961653][ T32] bdev_statx+0x8c/0x498 [ 1276.963388][ T32] vfs_getattr_nosec+0x290/0x374 [ 1276.964569][ T32] vfs_statx+0x104/0x2c4 [ 1276.965627][ T32] vfs_fstatat+0x64/0xd8 [ 1276.966698][ T32] __do_sys_newfstatat+0xa8/0x108 [ 1276.968987][ T32] __arm64_sys_newfstatat+0x88/0xc8 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1276.970137][ T32] invoke_syscall+0x6c/0x258 [ 1276.971121][ T32] el0_svc_common.constprop.0+0xac/0x230 [ 1276.972063][ T32] do_el0_svc+0x40/0x58 [ 1276.972883][ T32] el0_svc+0x50/0x180 [ 1276.974409][ T32] el0t_64_sync_handler+0x10c/0x138 [ 1276.975265][ T32] el0t_64_sync+0x198/0x19c [ 1276.976406][ T32] INFO: task udevd:5257 is blocked on a mutex likely owned by task kdevtmpfs:25. [ 1276.977959][ T32] task:kdevtmpfs state:D stack:0 pid:25 tgid:25 ppid:2 task_flags:0x208140 flags:0x00000008 [ 1276.979573][ T32] Call trace: [ 1276.980314][ T32] __switch_to+0x204/0x4bc (T) [ 1276.981142][ T32] __schedule+0xd34/0x3188 [ 1276.981964][ T32] schedule+0xd0/0x344 [ 1276.983060][ T32] schedule_timeout+0x1ec/0x224 [ 1276.983955][ T32] __wait_for_common+0x1d0/0x3f8 [ 1276.985510][ T32] wait_for_completion+0x20/0x2c [ 1276.986284][ T32] __flush_workqueue+0x2d0/0xef8 [ 1276.987068][ T32] md_alloc+0x40/0xca0 [ 1276.988379][ T32] md_probe+0x30/0x54 [ 1276.989157][ T32] blk_probe_dev+0xec/0x168 [ 1276.989940][ T32] blk_request_module+0x18/0xa4 [ 1276.990746][ T32] blkdev_get_no_open+0x74/0xbc [ 1276.991527][ T32] bdev_statx+0x8c/0x498 [ 1276.992329][ T32] vfs_getattr_nosec+0x290/0x374 [ 1276.993129][ T32] vfs_getattr+0x40/0x54 [ 1276.993892][ T32] handle_remove+0xec/0x4f8 [ 1276.994661][ T32] devtmpfs_work_loop+0x264/0x634 [ 1276.996131][ T32] get_nid_for_pfn+0x0/0xd0 [ 1276.996914][ T32] kthread+0x348/0x5fc [ 1276.998051][ T32] ret_from_fork+0x10/0x20 [ 1276.999210][ T32] [ 1276.999210][ T32] Showing all locks held in the system: [ 1277.000451][ T32] 2 locks held by kdevtmpfs/25: [ 1277.001318][ T32] #0: ffff00000de30950 (&type->i_mutex_dir_key/1){+.+.}-{4:4}, at: __kern_path_locked+0xd4/0x1f8 [ 1277.004991][ T32] #1: ffff80008771a7e8 (major_names_lock){+.+.}-{4:4}, at: blk_probe_dev+0x30/0x168 [ 1277.009235][ T32] 1 lock held by khungtaskd/32: [ 1277.010026][ T32] #0: ffff80008728da60 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 1277.012980][ T32] 2 locks held by kworker/1:1/43: [ 1277.013762][ T32] #0: ffff00000ef75148 ((wq_completion)md_misc){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 1277.018781][ T32] #1: ffff80008d9c7c80 ((work_completion)(&mddev->del_work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 1277.021823][ T32] 3 locks held by kworker/u8:8/1586: [ 1277.022643][ T32] 3 locks held by syslogd/3108: [ 1277.023397][ T32] 4 locks held by udevd/3123: [ 1277.024144][ T32] #0: ffff0000180999e0 (&p->lock){+.+.}-{4:4}, at: seq_read_iter+0xb8/0xe30 [ 1277.027084][ T32] #1: ffff00001ef9f088 (&of->mutex#2){+.+.}-{4:4}, at: kernfs_seq_start+0x48/0x1d8 [ 1277.039433][ T32] #2: ffff00001d3bdd28 (kn->active#4){.+.+}-{0:0}, at: kernfs_seq_start+0x64/0x1d8 [ 1277.041994][ T32] #3: ffff000016935a20 (&dev->mutex){....}-{4:4}, at: uevent_show+0x118/0x300 [ 1277.042900][ T32] 2 locks held by getty/3243: [ 1277.043094][ T32] #0: ffff0000179b20a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 1277.043947][ T32] #1: ffff80008d50b2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e4/0xdb4 [ 1277.044849][ T32] 2 locks held by syz-executor/3297: [ 1277.045044][ T32] 4 locks held by kworker/1:3/3378: [ 1277.045233][ T32] #0: ffff00000d828d48 ((wq_completion)events){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 1277.046080][ T32] #1: ffff8000a1cc7c80 ((work_completion)(&uhid->worker)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 1277.046927][ T32] #2: ffff000016935a20 (&dev->mutex){....}-{4:4}, at: __device_attach+0x80/0x35c [ 1277.056667][ T32] #3: ffff800088484c90 (minors_rwsem){++++}-{4:4}, at: hidraw_connect+0x80/0x380 [ 1277.059855][ T32] 1 lock held by udevd/5257: [ 1277.060662][ T32] #0: ffff80008771a7e8 (major_names_lock){+.+.}-{4:4}, at: blk_probe_dev+0x30/0x168 [ 1277.064212][ T32] 2 locks held by syz.2.722/5967: [ 1277.064982][ T32] #0: ffff00000de52420 (sb_writers){.+.+}-{0:0}, at: mnt_want_write+0x3c/0xb0 [ 1277.068228][ T32] #1: ffff00000de30950 (&type->i_mutex_dir_key#2){++++}-{4:4}, at: path_openat+0xfa8/0x25e4 [ 1277.071356][ T32] 1 lock held by syz.4.727/5966: [ 1277.072144][ T32] 1 lock held by syz.4.727/5968: [ 1277.073520][ T32] #0: ffff00001684df50 (&mm->mmap_lock){++++}-{4:4}, at: userfaultfd_register+0x23c/0x864 [ 1277.076822][ T32] 1 lock held by syz.4.727/5969: [ 1277.077889][ T32] #0: ffff00001684df50 (&mm->mmap_lock){++++}-{4:4}, at: __arm64_sys_mincore+0x1bc/0x648 [ 1277.085312][ T32] [ 1277.085986][ T32] ============================================= [ 1277.085986][ T32] [ 1277.087329][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 1277.088357][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.15.0-rc3-syzkaller-00001-g9d7a0577c9db #0 PREEMPT [ 1277.088760][ T32] Hardware name: linux,dummy-virt (DT) [ 1277.088998][ T32] Call trace: [ 1277.089214][ T32] show_stack+0x18/0x24 (C) [ 1277.089427][ T32] dump_stack_lvl+0x38/0xf4 [ 1277.089607][ T32] dump_stack+0x1c/0x28 [ 1277.089781][ T32] panic+0x5b0/0x664 [ 1277.089945][ T32] watchdog+0x658/0x1140 [ 1277.090131][ T32] kthread+0x348/0x5fc [ 1277.090300][ T32] ret_from_fork+0x10/0x20 [ 1277.090893][ T32] SMP: stopping secondary CPUs [ 1277.092290][ T32] Kernel Offset: disabled [ 1277.092568][ T32] CPU features: 0x0410,00040068,01000400,0200421b [ 1277.092884][ T32] Memory Limit: none [ 1277.093859][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 21:19:26 Registers: info registers vcpu 0 CPU#0 PC=ffff800084659000 X00=ffff0000174c8000 X01=00000000ffffffff X02=0000000000000000 X03=1fffe00002532001 X04=ffff000012990010 X05=ffff800080006300 X06=ffff700010000c60 X07=0000000000000001 X08=ffff000012990000 X09=dfff800000000000 X10=ffff700010000c60 X11=0000000000000002 X12=0000000000000006 X13=0000000000000000 X14=1fffe000032e1c65 X15=185019751cd3c2aa X16=dbff000023b2ffff X17=a587f05681bb43f6 X18=ffff00001fd083c0 X19=0000000000000001 X20=ffff80008d3a3f00 X21=ffff00001666b8c0 X22=ffff00001666b8c0 X23=ffff800084469bbc X24=00000000000000e8 X25=ffff800084469bbc X26=ffff00001666b8c0 X27=dfff800000000000 X28=0000000000000000 X29=ffff800080006120 X30=ffff80008090c980 SP=ffff800080006150 PSTATE=10000005 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff800085441da8 X00=00000000000000c0 X01=ffff7fffe309e000 X02=0000000000000000 X03=1fffe00001c913c9 X04=1ffff00010e2f9d9 X05=000001294ca2a120 X06=1fffe0000d4190b6 X07=ffff00006a0ddad0 X08=1ffff00010e1211e X09=ffff8000896fc000 X10=ffff00000e48a8d8 X11=0000000000000000 X12=0000000000000001 X13=dfff800000000000 X14=ffff00006a0c85b0 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=000000000000415f X19=0000000000000001 X20=ffff00000e48a8d8 X21=ffff00006a0dcfd8 X22=0000000000000028 X23=ffff00000e48a8d8 X24=ffff80008702a648 X25=00000000ffffffff X26=00000000000000c0 X27=ffff00000e489e40 X28=1fffe0000d41bb75 X29=ffff80008d907a80 X30=ffff800085441d88 SP=ffff80008d907a80 PSTATE=100000c5 ---V EL1h FPCR=00000000 FPSR=00000000 Q00=0000000000000000:0000000000000000 Q01=0000000000000000:0000000000000000 Q02=0000000000000000:0000000000000000 Q03=0000000000000000:0000000000000000 Q04=0000000000000000:0000000000000000 Q05=0000000000000000:0000000000000000 Q06=0000000000000000:0000000000000000 Q07=0000000000000000:0000000000000000 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000000000000000:0000000000000000 Q17=0000000000000000:0000000000000000 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000