last executing test programs: 1.947836064s ago: executing program 3 (id=1719): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e80)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='kfree\x00', r1}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='workqueue_queue_work\x00', r2}, 0x10) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f00000035c0)={0x0, 0x0, &(0x7f0000003580)={&(0x7f00000019c0)=@newsa={0xf0, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in6=@mcast1, 0x0, 0x0, 0x2000, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@mcast1, 0x15, 0x6c}, @in=@empty=0x14, {0x8000, 0x0, 0x0, 0xfffffff7ffffffff, 0x0, 0x0, 0x1000000000000000}, {0x0, 0x4}, {}, 0x0, 0x0, 0x2, 0x1, 0x6}}, 0xf0}, 0x1, 0x0, 0x0, 0x10004090}, 0x0) 1.876485749s ago: executing program 3 (id=1721): bpf$ENABLE_STATS(0x20, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/74, 0x328000, 0x1000}, 0x1c) setsockopt$XDP_UMEM_COMPLETION_RING(r0, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socket$inet(0x2, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) ppoll(&(0x7f0000000500)=[{r2}], 0x1, 0x0, 0x0, 0x0) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x3, 0x9}, 0x0, &(0x7f00000002c0)={0x3fe, 0x0, 0x0, 0x9, 0x0, 0x0, 0x7ffffffe}, 0x0, 0x0) setsockopt$XDP_UMEM_FILL_RING(r0, 0x11b, 0x5, &(0x7f0000000340)=0x8000, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000100)={0x2c, 0x0, r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffb, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r5}, 0x18) r6 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r6, 0x8992, &(0x7f0000000600)={'ip6_vti0\x00', 0x0}) socket$vsock_stream(0x28, 0x1, 0x0) 1.83618161s ago: executing program 4 (id=1723): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000a00)=ANY=[@ANYBLOB="120100007856bb40da0b53813de2010203010902"], 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) syz_usb_control_io$uac1(r0, 0x0, &(0x7f0000000840)={0x44, &(0x7f0000000540)=ANY=[@ANYBLOB="0000ff00000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) 1.465154144s ago: executing program 2 (id=1724): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) syz_usb_connect$printer(0x6, 0x36, &(0x7f0000000300)={{0x12, 0x1, 0x201, 0x0, 0x0, 0x0, 0x8, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x9, 0xa0, 0x81, [{{0x9, 0x4, 0x0, 0x6, 0x1, 0x7, 0x1, 0x2, 0x80, "", {{{0x9, 0x5, 0x1, 0x2, 0x3ff, 0x7, 0x6, 0x5}}, [{{0x9, 0x5, 0x82, 0x2, 0x400, 0x80, 0x0, 0x37}}]}}}]}}]}}, &(0x7f0000000d40)={0x0, 0x0, 0x10, &(0x7f00000004c0)={0x5, 0xf, 0x10, 0x1, [@wireless={0xb, 0x10, 0x1, 0x2, 0xa8, 0x2, 0x2, 0x4}]}}) close_range(r0, 0xffffffffffffffff, 0x0) 1.264995578s ago: executing program 4 (id=1727): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_to_hsr\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x8, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r3}, 0x18) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) sendto$packet(r0, &(0x7f00000000c0)="3f031c000302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r1, 0x1, 0x0, 0x6, @multicast}, 0x14) 1.264534669s ago: executing program 4 (id=1728): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000540)={0xac, 0x0, 0x1, 0x505, 0x0, 0x0, {0xa, 0x0, 0x1}, [@CTA_TUPLE_ORIG={0x3c, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}, @CTA_TUPLE_ORIG={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @local}}}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x1}, @CTA_NAT_SRC={0x18, 0x6, 0x0, 0x1, [@CTA_NAT_PROTO={0x14, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}]}]}]}, 0xac}}, 0x0) 1.259981504s ago: executing program 4 (id=1729): syz_socket_connect_nvme_tcp() bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x4}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) 1.016571512s ago: executing program 3 (id=1732): r0 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000000c0)={0xdb, 0x1ff, 0xb}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000000)={0x7fff, 0x8, 0x100}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000080)={0x2, 0x5, 0x3}) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000340)={0xda2, 0x8166, 0x6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000200)={0x200, 0x1fb, 0xc38}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000340)={0x8, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x49, 0x7fff, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x86, 0xfff, 0x800}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000380)={0xff, 0x3, 0xd83c}) dup(r2) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000002c0)={0x8, 0xd4, 0x35}) close_range(r0, 0xffffffffffffffff, 0x0) 956.401731ms ago: executing program 0 (id=1733): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000880)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001400)={&(0x7f00000000c0)=ANY=[@ANYBLOB="280000001e000100000000000000000007000000", @ANYRES32=r2, @ANYBLOB="000000000a0002"], 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x0) 951.033838ms ago: executing program 2 (id=1734): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x7fffffff}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getitimer(0x0, 0x0) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000060000000500"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000800007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000640)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x34, 0x34, 0x2, [@const={0x0, 0x0, 0x0, 0x2}, @int={0x0, 0x0, 0x0, 0x1, 0x5, 0x10}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x2, 0xffffffff}}]}}, 0x0, 0x4e, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) 892.98202ms ago: executing program 4 (id=1735): mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x8) r0 = gettid() r1 = socket$netlink(0x10, 0x3, 0xc) writev(r1, &(0x7f0000000300)=[{&(0x7f0000000000)="580000001400192340834b80040d8c560a11820f00ff5bab4e210000000058000b4824ca945f6400940f6a03", 0x2c}], 0x1) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x3938700}}, 0x0) mkdir(&(0x7f0000000300)='./bus\x00', 0x54) pipe(&(0x7f0000000200)={0xffffffffffffffff}) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f0000000380)={'\x00', 0x2c, 0x3, 0x2, 0x5, 0x9, r0}) mount$overlay(0x0, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000340), 0x0, &(0x7f0000000180)={[{@workdir={'workdir', 0x3d, './bus'}}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@upperdir={'upperdir', 0x3d, './file1'}}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="9feb0100180000000000000018000000180000000600000003000000010000080000000000000000000000850100000000005f612e00cdcc7d97d0ab8d1af5b045db74b1f150f751c4d7db5b5d87e6179b414bde4dad3097027c3a3651017831bb7938dfb1df312a8d526f867714da1284a7c019736944f9bcb860dae120cd62de9ef30ddb2d9d6355a9ce0a10c331"], 0x0, 0x39, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) chdir(&(0x7f0000000140)='./bus\x00') pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) r4 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f00000000c0)=0x9) splice(r3, 0x0, r4, 0x0, 0x10000000000016, 0x0) 892.525422ms ago: executing program 3 (id=1736): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x3a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) getrusage(0x1, &(0x7f0000000040)) 859.997103ms ago: executing program 0 (id=1737): bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r1}, 0x10) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f00000000c0)={0x9}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b00)=@gettaction={0x18, 0x5a, 0xc6b747b6bf1c6b95, 0x70bd29, 0x1, {}, [@action_gd=@TCA_ACT_TAB={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x8080}, 0x0) 748.906181ms ago: executing program 3 (id=1739): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001c40)={0x8, 0x3, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000001200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000003c0)={r0, r2, 0x1, 0x0, @val=@iter={0x0}}, 0x20) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r5}, 0x10) listen(r3, 0x3) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000040)='syz_tun\x00', 0x10) syz_emit_ethernet(0x36, &(0x7f0000000340)={@local, @broadcast, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x2}}}}}}, 0x0) syz_emit_ethernet(0x38, &(0x7f0000000580)={@local, @link_local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x6, 0x0, @rand_addr=0x64010101, @local}, {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x6, 0x5, 0x4}, {"c516"}}}}}}, 0x0) 748.524787ms ago: executing program 0 (id=1740): r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast2}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in6=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee01}, {0x0, 0x10001, 0x0, 0x0, 0x3}, {}, 0x0, 0x0, 0x1}, {{@in=@empty, 0x0, 0x33}, 0x0, @in=@private=0xa010100, 0x0, 0x0, 0x0, 0xb7, 0xffffffff}}, 0xe8) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 744.914941ms ago: executing program 1 (id=1741): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="19000000040000000800000003"], 0x48) close(0x3) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) 714.1359ms ago: executing program 3 (id=1742): socket$inet6(0xa, 0x80002, 0x88) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) keyctl$setperm(0x5, 0x0, 0x30925) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f00000bd000), 0x318, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000400000000dfffff1918120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r2}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r3 = socket(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=ANY=[@ANYBLOB="540000001400b59500000000000000000a000000", @ANYRES32=r4, @ANYBLOB="140001000040000000000000000000000000000014000200fe8000"/36], 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x80) sendmsg$TIPC_NL_LINK_SET(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)=ANY=[], 0x50}}, 0x4) sendmmsg(r3, &(0x7f0000000000), 0x4000000000001f2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 627.930296ms ago: executing program 1 (id=1743): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000480)={{r0}, &(0x7f0000000600), &(0x7f0000000800)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_emit_ethernet(0xfed7, &(0x7f0000000340)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd6002adf700383a00fe880000000000000000000000000001ff020000000000000000000000000001"], 0x0) 461.070194ms ago: executing program 1 (id=1744): r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) bind$tipc(r0, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) r3 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) sendmsg$tipc(r0, &(0x7f0000000280)={&(0x7f0000000040), 0x10, 0x0}, 0x0) 449.45899ms ago: executing program 0 (id=1745): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000000), &(0x7f0000000040)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_emit_ethernet(0xd2, &(0x7f0000000900)=ANY=[@ANYBLOB="ffffffffbfff20000000000086dd600489f1009c1100fc010000000000000025030000000000ff020000000000000000000000000001"], 0x0) 416.584911ms ago: executing program 1 (id=1746): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="16000000000000000400000002"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000bc0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r4, &(0x7f0000000180), 0x40010) 340.53734ms ago: executing program 2 (id=1747): r0 = openat$adsp1(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f00000000c0)={0xdb, 0x1ff, 0xb}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000000)={0x7fff, 0x8, 0x100}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000080)={0x2, 0x5, 0x3}) r3 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f0000000340)={0xda2, 0x8166, 0x6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000200)={0x200, 0x1fb, 0xc38}) r4 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r4, 0xc02064b2, &(0x7f0000000340)={0x8, 0x3, 0x6}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000040)={0x49, 0x7fff, 0x4}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r2, 0xc02064b2, &(0x7f0000000140)={0x86, 0xfff, 0x800}) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r1, 0xc02064b2, &(0x7f0000000380)={0xff, 0x3, 0xd83c}) dup(r2) ioctl$DRM_IOCTL_MODE_CREATE_DUMB(r3, 0xc02064b2, &(0x7f00000002c0)={0x8, 0xd4, 0x35}) close_range(r0, 0xffffffffffffffff, 0x0) 292.915882ms ago: executing program 0 (id=1748): r0 = socket$inet6(0xa, 0x2, 0x0) sendmmsg$inet(r0, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000500)=[@ip_tos_int={{0x14, 0x0, 0x1, 0x1}}, @ip_ttl={{0x14, 0x0, 0x2, 0x3}}], 0x30}}], 0x1, 0x80) 231.630661ms ago: executing program 1 (id=1749): r0 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x1, @local}, 0x4a, {0x2, 0x4e23, @dev}}) socket$inet_udplite(0x2, 0x2, 0x88) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r3, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) preadv(r3, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r2, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x64, 0x0, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r3, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x800}, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 168.773565ms ago: executing program 0 (id=1750): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) io_setup(0x281, &(0x7f0000000100)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0xfffffffffffffffe}, 0x0) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)={0x30, 0x0, 0x1, 0xffffffff, 0x0, {{}, {}, {0x14, 0x19, {0xfffffffa, 0x9}}}}, 0x30}}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x27}, 0x74) sendmmsg$unix(r0, &(0x7f0000006380)=[{{&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0x6e, 0x0}}, {{&(0x7f0000000140)=@abs, 0x6e, 0x0}}], 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) socket$tipc(0x1e, 0x2, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x8, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000001c40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x43) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socket$nl_route(0x10, 0x3, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x10, 0x4, 0x8, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) bind$802154_raw(r6, &(0x7f0000000500)={0x24, @short={0x2, 0x2, 0xfffe}}, 0x14) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6020000f8ffffffb703000008000000b70300000000000085000000330000"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r7, 0x31, 0x0, 0x0, 0x0, 0x0, 0xc90a, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$ifreq_SIOCGIFINDEX_wireguard(r4, 0x8933, &(0x7f00000001c0)={'wg0\x00'}) 168.051397ms ago: executing program 1 (id=1751): pipe(&(0x7f0000000400)) socket$inet6_udp(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) statfs(0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) sched_setaffinity(0x0, 0x0, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02020409100000000000004c9e00000002001300027f0000000000000000004105000600200000000a000000000000000005000201080f00e0001f080000000000092000000000000200010020e9ffeeffff0702000098a805000500ea0000000a"], 0x80}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socket$packet(0x11, 0x2, 0x300) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), r3) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r6}, 0x10) sendmsg$WG_CMD_SET_DEVICE(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)={0x30, r4, 0x1, 0x0, 0x0, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}, @WGDEVICE_A_FLAGS={0x8, 0x5, 0x1}]}, 0x30}}, 0x0) 153.193579ms ago: executing program 2 (id=1752): mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000400)='ramfs\x00', 0x2000000, 0x0) 72.726821ms ago: executing program 2 (id=1753): mkdir(0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r0}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ftruncate(0xffffffffffffffff, 0x2007ffc) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) getsockname$packet(r1, 0x0, &(0x7f0000000340)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r5 = syz_open_dev$evdev(&(0x7f00000000c0), 0x2, 0x862b01) ioctl$EVIOCGKEY(r5, 0x80404518, &(0x7f0000000000)=""/32) 38.400885ms ago: executing program 4 (id=1754): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0}, 0x18) syz_usb_connect$uac1(0x0, 0xa5, &(0x7f0000000400)=ANY=[@ANYBLOB="12011003000000106b1d010140000102030109029300030103f0070904000000010100000a24014000920201020d2406050603050005000700ff0c2407060300004917fcff0f0c240205ff010100010000060924030906030301f70624050100800904010000010200000904010101010200000905"], &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0}) 0s ago: executing program 2 (id=1755): clock_adjtime(0x0, &(0x7f0000000480)={0xd54, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}) kernel console output (not intermixed with test programs): t tclass=chr_file permissive=1 [ 82.480448][ T30] audit: type=1400 audit(1750696137.479:223): avc: denied { execute } for pid=6063 comm="syz.0.36" dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 82.501289][ C1] vkms_vblank_simulate: vblank timer overrun [ 82.532306][ T30] audit: type=1400 audit(1750696137.509:224): avc: denied { execute_no_trans } for pid=6063 comm="syz.0.36" path=2F6D656D66643A202864656C6574656429 dev="tmpfs" ino=1027 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 82.557431][ C1] vkms_vblank_simulate: vblank timer overrun [ 82.620721][ T5885] usb 4-1: new high-speed USB device number 4 using dummy_hcd [ 82.656473][ T30] audit: type=1400 audit(1750696137.509:225): avc: denied { mount } for pid=6060 comm="syz.1.35" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 82.802862][ T30] audit: type=1400 audit(1750696137.549:226): avc: denied { ioctl } for pid=6057 comm="syz.4.32" path="socket:[7880]" dev="sockfs" ino=7880 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 82.831083][ T30] audit: type=1400 audit(1750696137.559:227): avc: denied { create } for pid=6057 comm="syz.4.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 82.850410][ C1] vkms_vblank_simulate: vblank timer overrun [ 82.857569][ T30] audit: type=1400 audit(1750696137.599:228): avc: denied { read } for pid=6057 comm="syz.4.32" name="binder0" dev="binder" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 82.880295][ T5885] usb 4-1: Using ep0 maxpacket: 8 [ 82.886460][ T30] audit: type=1400 audit(1750696137.599:229): avc: denied { open } for pid=6057 comm="syz.4.32" path="/dev/binderfs/binder0" dev="binder" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 82.938139][ T5885] usb 4-1: New USB device found, idVendor=0c45, idProduct=613e, bcdDevice=c4.6d [ 82.971953][ T5885] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 82.987581][ T5885] usb 4-1: Product: syz [ 82.992347][ T5885] usb 4-1: Manufacturer: syz [ 83.001023][ T5853] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 83.001277][ T5885] usb 4-1: SerialNumber: syz [ 83.117639][ T5885] usb 4-1: config 0 descriptor?? [ 83.139083][ T5885] gspca_main: sonixj-2.14.0 probing 0c45:613e [ 83.724444][ T5885] gspca_sonixj: reg_w1 err -110 [ 83.731028][ T5885] sonixj 4-1:0.0: probe with driver sonixj failed with error -110 [ 83.756190][ T5853] usb 3-1: config index 0 descriptor too short (expected 36, got 9) [ 83.779216][ T5853] usb 3-1: config 0 has 0 interfaces, different from the descriptor's value: 1 [ 83.823337][ T5853] usb 3-1: New USB device found, idVendor=10c4, idProduct=ea90, bcdDevice= 0.00 [ 83.899335][ T5853] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 83.917244][ T5853] usb 3-1: config 0 descriptor?? [ 84.066662][ T6058] syz.4.32 (6058): drop_caches: 2 [ 85.067549][ T6117] netlink: 'syz.0.45': attribute type 4 has an invalid length. [ 85.397144][ T6123] FAULT_INJECTION: forcing a failure. [ 85.397144][ T6123] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 85.410455][ T6123] CPU: 1 UID: 0 PID: 6123 Comm: syz.1.46 Not tainted 6.16.0-rc3-syzkaller #0 PREEMPT(full) [ 85.410475][ T6123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 85.410483][ T6123] Call Trace: [ 85.410488][ T6123] [ 85.410493][ T6123] dump_stack_lvl+0x16c/0x1f0 [ 85.410516][ T6123] should_fail_ex+0x512/0x640 [ 85.410550][ T6123] _copy_from_user+0x2e/0xd0 [ 85.410570][ T6123] simple_attr_write_xsigned.constprop.0.isra.0+0x10e/0x310 [ 85.410594][ T6123] ? __pfx_simple_attr_write_xsigned.constprop.0.isra.0+0x10/0x10 [ 85.410615][ T6123] ? lock_acquire+0x62/0x350 [ 85.410640][ T6123] debugfs_attr_write+0x76/0xa0 [ 85.410656][ T6123] ? __pfx_debugfs_attr_write+0x10/0x10 [ 85.410671][ T6123] vfs_write+0x29d/0x1150 [ 85.410690][ T6123] ? __pfx___mutex_lock+0x10/0x10 [ 85.410710][ T6123] ? __pfx_vfs_write+0x10/0x10 [ 85.410733][ T6123] ? __fget_files+0x20e/0x3c0 [ 85.410761][ T6123] ksys_write+0x12a/0x250 [ 85.410781][ T6123] ? __pfx_ksys_write+0x10/0x10 [ 85.410815][ T6123] do_syscall_64+0xcd/0x4c0 [ 85.410843][ T6123] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 85.410860][ T6123] RIP: 0033:0x7f061d18e929 [ 85.410875][ T6123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 85.410890][ T6123] RSP: 002b:00007f061df83038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 85.410908][ T6123] RAX: ffffffffffffffda RBX: 00007f061d3b6160 RCX: 00007f061d18e929 [ 85.410919][ T6123] RDX: 0000000000000001 RSI: 0000200000000100 RDI: 0000000000000005 [ 85.410929][ T6123] RBP: 00007f061df83090 R08: 0000000000000000 R09: 0000000000000000 [ 85.410939][ T6123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 85.410948][ T6123] R13: 0000000000000000 R14: 00007f061d3b6160 R15: 00007ffcf6fb8098 [ 85.410971][ T6123] [ 85.603859][ C1] vkms_vblank_simulate: vblank timer overrun [ 85.634769][ T9] usb 4-1: USB disconnect, device number 4 [ 85.699471][ T1206] usb 3-1: USB disconnect, device number 3 [ 86.539284][ T6134] netlink: 24 bytes leftover after parsing attributes in process `syz.3.47'. [ 86.963401][ T6140] netlink: 4 bytes leftover after parsing attributes in process `syz.2.49'. [ 87.153950][ T6140] hsr_slave_1 (unregistering): left promiscuous mode [ 87.350465][ T1206] usb 5-1: new high-speed USB device number 2 using dummy_hcd [ 87.391533][ T6150] xt_CT: You must specify a L4 protocol and not use inversions on it [ 87.439181][ T6150] syz_tun: entered allmulticast mode [ 87.520446][ T1206] usb 5-1: Using ep0 maxpacket: 16 [ 87.531797][ T1206] usb 5-1: config 1 contains an unexpected descriptor of type 0x2, skipping [ 87.546903][ T1206] usb 5-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 87.568569][ T1206] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 87.589160][ T1206] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 87.602529][ T1206] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 87.619222][ T1206] usb 5-1: Product: syz [ 87.628811][ T1206] usb 5-1: Manufacturer: syz [ 87.660190][ T1206] usb 5-1: SerialNumber: syz [ 87.864527][ T6157] netlink: 'syz.3.55': attribute type 23 has an invalid length. [ 87.938169][ T6142] syz_tun: left allmulticast mode [ 88.465523][ T30] kauditd_printk_skb: 19 callbacks suppressed [ 88.465546][ T30] audit: type=1400 audit(1750696143.559:249): avc: denied { read } for pid=6163 comm="syz.3.58" name="snapshot" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 88.551409][ T5853] usb 3-1: new full-speed USB device number 4 using dummy_hcd [ 88.551882][ T30] audit: type=1400 audit(1750696143.559:250): avc: denied { open } for pid=6163 comm="syz.3.58" path="/dev/snapshot" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 88.691414][ T5885] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 88.720796][ T30] audit: type=1400 audit(1750696143.749:251): avc: denied { watch } for pid=6147 comm="syz.4.53" path="/10/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=69 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 88.764937][ C1] vkms_vblank_simulate: vblank timer overrun [ 88.944710][ T30] audit: type=1400 audit(1750696143.749:252): avc: denied { watch_sb watch_reads } for pid=6147 comm="syz.4.53" path="/10/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=69 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 88.992590][ T5885] usb 2-1: Using ep0 maxpacket: 8 [ 89.006828][ T5885] usb 2-1: New USB device found, idVendor=0c45, idProduct=613e, bcdDevice=c4.6d [ 89.017402][ T5885] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 89.026137][ T5885] usb 2-1: Product: syz [ 89.030359][ T5885] usb 2-1: Manufacturer: syz [ 89.038746][ T5885] usb 2-1: SerialNumber: syz [ 89.047245][ T5885] usb 2-1: config 0 descriptor?? [ 89.058291][ T5885] gspca_main: sonixj-2.14.0 probing 0c45:613e [ 89.067383][ T6164] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 89.101344][ T6164] Bluetooth: hci0: Opcode 0x0406 failed: -4 [ 89.112770][ T5853] usb 3-1: New USB device found, idVendor=09c0, idProduct=0203, bcdDevice=d3.43 [ 89.132336][ T5853] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 89.150941][ T6164] Bluetooth: hci0: Opcode 0x0406 failed: -4 [ 89.159083][ T5853] usb 3-1: config 0 descriptor?? [ 89.184298][ T6164] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 89.187164][ T5853] dvb-usb: found a 'Genpix SkyWalker-1 DVB-S receiver' in warm state. [ 89.198418][ T6164] Bluetooth: hci1: Opcode 0x0406 failed: -4 [ 89.210712][ T6164] Bluetooth: hci1: Opcode 0x0406 failed: -4 [ 89.228510][ T6164] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 89.253475][ T6164] Bluetooth: hci2: Opcode 0x0406 failed: -4 [ 89.289775][ T6164] Bluetooth: hci2: Opcode 0x0406 failed: -4 [ 89.315708][ T6164] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 89.322329][ T6164] Bluetooth: hci3: Opcode 0x0406 failed: -4 [ 89.372874][ T6164] Bluetooth: hci3: Opcode 0x0406 failed: -4 [ 89.421397][ T5853] gp8psk: usb in 128 operation failed. [ 89.446480][ T6177] netlink: 6 bytes leftover after parsing attributes in process `syz.0.60'. [ 89.455429][ T6177] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 89.621387][ T6164] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 89.629258][ T6164] Bluetooth: hci4: Opcode 0x0406 failed: -4 [ 89.647582][ T6164] Bluetooth: hci4: Opcode 0x0406 failed: -4 [ 89.873181][ T1206] usb 5-1: 0:2 : does not exist [ 89.884767][ T5885] gspca_sonixj: reg_w1 err -71 [ 89.894002][ T5885] sonixj 2-1:0.0: probe with driver sonixj failed with error -71 [ 89.911591][ T5885] usb 2-1: USB disconnect, device number 3 [ 89.932323][ T1206] usb 5-1: USB disconnect, device number 2 [ 90.027535][ T5945] udevd[5945]: error opening ATTR{/sys/devices/platform/dummy_hcd.4/usb5/5-1/5-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 90.088073][ T30] audit: type=1400 audit(1750696145.199:253): avc: denied { getopt } for pid=6184 comm="syz.0.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 90.459355][ T6191] netlink: 24 bytes leftover after parsing attributes in process `syz.0.62'. [ 90.615418][ T5853] gp8psk: usb in 146 operation failed. [ 90.621092][ T5853] gp8psk: failed to get FW version [ 90.628773][ T5853] gp8psk: FPGA Version = 46 [ 90.691059][ T51] Bluetooth: hci0: command 0x0c1a tx timeout [ 90.900485][ T5885] usb 5-1: new high-speed USB device number 3 using dummy_hcd [ 91.261391][ T5816] Bluetooth: hci1: command 0x0c1a tx timeout [ 91.268272][ T51] Bluetooth: hci2: command 0x0c1a tx timeout [ 91.318783][ T6189] netlink: 8 bytes leftover after parsing attributes in process `syz.0.62'. [ 91.340507][ T51] Bluetooth: hci3: command 0x0c1a tx timeout [ 91.650550][ T51] Bluetooth: hci4: command 0x0405 tx timeout [ 91.844038][ T5885] usb 5-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 91.865362][ T30] audit: type=1400 audit(1750696146.969:254): avc: denied { sqpoll } for pid=6204 comm="syz.0.67" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 91.884320][ C1] vkms_vblank_simulate: vblank timer overrun [ 91.898273][ T5885] usb 5-1: New USB device found, idVendor=0471, idProduct=0304, bcdDevice=e4.df [ 91.898702][ T5853] gp8psk: usb out operation failed. [ 91.927775][ T5885] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 91.946393][ T5853] dvb-usb: This USB2.0 device cannot be run on a USB1.1 port. (it lacks a hardware PID filter) [ 91.972142][ T5885] usb 5-1: config 0 descriptor?? [ 91.987887][ T5885] pwc: Askey VC010 type 2 USB webcam detected. [ 92.034961][ T6215] overlayfs: overlapping lowerdir path [ 92.048831][ T5853] dvb-usb: Genpix SkyWalker-1 DVB-S receiver error while loading driver (-19) [ 92.069652][ T30] audit: type=1400 audit(1750696147.179:255): avc: denied { unmount } for pid=5824 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 92.155334][ T6223] netlink: 'syz.1.68': attribute type 10 has an invalid length. [ 92.190145][ T6223] netlink: 40 bytes leftover after parsing attributes in process `syz.1.68'. [ 92.227179][ T6223] batman_adv: batadv0: Adding interface: virt_wifi0 [ 92.238647][ T5853] usb 3-1: USB disconnect, device number 4 [ 92.249938][ T6223] batman_adv: batadv0: The MTU of interface virt_wifi0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 92.340689][ T6223] batman_adv: batadv0: Interface activated: virt_wifi0 [ 92.393120][ T5885] pwc: recv_control_msg error -32 req 02 val 2b00 [ 92.724508][ T5885] pwc: recv_control_msg error -32 req 02 val 2700 [ 92.739441][ T30] audit: type=1400 audit(1750696147.849:256): avc: denied { bind } for pid=6194 comm="syz.4.63" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 92.759676][ T5885] pwc: recv_control_msg error -32 req 02 val 2c00 [ 92.772741][ T51] Bluetooth: hci0: command 0x0c1a tx timeout [ 92.779449][ T6179] Bluetooth: hci0: Opcode 0x0c1a failed: -110 [ 92.784105][ T30] audit: type=1400 audit(1750696147.849:257): avc: denied { node_bind } for pid=6194 comm="syz.4.63" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 92.862706][ T30] audit: type=1400 audit(1750696147.969:258): avc: denied { sys_module } for pid=6246 comm="syz.2.71" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 92.883503][ C1] vkms_vblank_simulate: vblank timer overrun [ 93.012062][ T5885] pwc: recv_control_msg error -71 req 04 val 1300 [ 93.020671][ T5885] pwc: recv_control_msg error -71 req 04 val 1400 [ 93.040632][ T5885] pwc: recv_control_msg error -71 req 02 val 2000 [ 93.080603][ T5885] pwc: recv_control_msg error -71 req 02 val 2100 [ 93.114923][ T5885] pwc: recv_control_msg error -71 req 04 val 1500 [ 93.208112][ T6269] netlink: 24 bytes leftover after parsing attributes in process `syz.3.74'. [ 93.294147][ T5885] pwc: recv_control_msg error -71 req 02 val 2500 [ 93.310835][ T5885] pwc: recv_control_msg error -71 req 02 val 2400 [ 93.318626][ T5885] pwc: recv_control_msg error -71 req 02 val 2600 [ 93.340776][ T51] Bluetooth: hci2: command 0x0c1a tx timeout [ 93.346956][ T51] Bluetooth: hci1: command 0x0c1a tx timeout [ 93.375991][ T5885] pwc: recv_control_msg error -71 req 02 val 2900 [ 93.376449][ T6270] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 93.390546][ T5885] pwc: recv_control_msg error -71 req 02 val 2800 [ 93.399918][ T5885] pwc: recv_control_msg error -71 req 04 val 1100 [ 93.410822][ T5885] pwc: recv_control_msg error -71 req 04 val 1200 [ 93.420572][ T51] Bluetooth: hci3: command 0x0c1a tx timeout [ 93.478871][ T5885] pwc: Registered as video103. [ 93.505791][ T5885] input: PWC snapshot button as /devices/platform/dummy_hcd.4/usb5/5-1/input/input5 [ 93.566936][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 93.566951][ T30] audit: type=1400 audit(1750696148.679:260): avc: denied { read } for pid=5169 comm="acpid" name="event4" dev="devtmpfs" ino=2810 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 93.583939][ T6276] syz.0.77 uses obsolete (PF_INET,SOCK_PACKET) [ 93.608076][ T5885] usb 5-1: USB disconnect, device number 3 [ 93.619044][ T6270] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 93.656065][ T30] audit: type=1400 audit(1750696148.679:261): avc: denied { open } for pid=5169 comm="acpid" path="/dev/input/event4" dev="devtmpfs" ino=2810 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 93.691076][ T5853] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 93.713268][ T6270] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 93.732927][ T30] audit: type=1400 audit(1750696148.679:262): avc: denied { ioctl } for pid=5169 comm="acpid" path="/dev/input/event4" dev="devtmpfs" ino=2810 ioctlcmd=0x4520 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 93.740473][ T51] Bluetooth: hci4: command 0x0405 tx timeout [ 93.764880][ T6270] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 93.851120][ T5853] usb 2-1: Using ep0 maxpacket: 32 [ 93.858662][ T5853] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 93.869818][ T5853] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 93.882296][ T5853] usb 2-1: New USB device found, idVendor=0403, idProduct=6030, bcdDevice= 0.00 [ 93.893101][ T5853] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 93.905329][ T5853] usb 2-1: config 0 descriptor?? [ 93.910527][ T10] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 94.231672][ T10] usb 1-1: descriptor type invalid, skip [ 94.238309][ T10] usb 1-1: descriptor type invalid, skip [ 94.271365][ T10] usb 1-1: descriptor type invalid, skip [ 94.370884][ T10] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 94.383381][ T10] usb 1-1: config 0 has no interfaces? [ 94.396311][ T10] usb 1-1: string descriptor 0 read error: -22 [ 94.405193][ T10] usb 1-1: New USB device found, idVendor=056a, idProduct=00b0, bcdDevice= 0.40 [ 94.414563][ T10] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 94.432211][ T10] usb 1-1: config 0 descriptor?? [ 94.543755][ T30] audit: type=1400 audit(1750696149.659:263): avc: denied { create } for pid=6292 comm="syz.2.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 94.569649][ T5853] ft260 0003:0403:6030.0001: unknown main item tag 0x0 [ 94.791649][ T5853] ft260 0003:0403:6030.0001: chip code: 0000 0000 [ 94.858601][ T6299] netlink: 8 bytes leftover after parsing attributes in process `syz.2.82'. [ 94.860694][ T51] Bluetooth: hci0: command 0x0c1a tx timeout [ 95.076314][ T6294] IPVS: length: 71 != 1464 [ 95.091929][ T30] audit: type=1400 audit(1750696150.189:264): avc: denied { getopt } for pid=6292 comm="syz.2.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 95.423892][ T5816] Bluetooth: hci2: command 0x0c1a tx timeout [ 95.430557][ T51] Bluetooth: hci1: command 0x0c1a tx timeout [ 95.490681][ T51] Bluetooth: hci3: command 0x0c1a tx timeout [ 95.810985][ T51] Bluetooth: hci4: command 0x0405 tx timeout [ 96.567643][ T5853] ft260 0003:0403:6030.0001: failed to retrieve system status [ 96.575739][ T5853] ft260 0003:0403:6030.0001: probe with driver ft260 failed with error -71 [ 96.604641][ T5853] usb 2-1: USB disconnect, device number 4 [ 96.931497][ T51] Bluetooth: hci0: command 0x0c1a tx timeout [ 96.936672][ T6309] ip6erspan0: entered promiscuous mode [ 96.949517][ T6308] sctp_transport_update_pmtu: 106 callbacks suppressed [ 96.949537][ T6308] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 97.010141][ T10] usb 1-1: USB disconnect, device number 2 [ 97.011189][ T6308] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 97.049949][ T6314] trusted_key: encrypted_key: insufficient parameters specified [ 97.084650][ T6308] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 97.146287][ T6308] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 97.189546][ T6308] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 97.208617][ T6308] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 97.223952][ T6308] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 97.239995][ T30] audit: type=1400 audit(1750696152.329:265): avc: denied { create } for pid=6317 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 97.270333][ T6308] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 97.287185][ T6308] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 97.301674][ T6308] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 97.644549][ T30] audit: type=1400 audit(1750696152.349:266): avc: denied { getopt } for pid=6317 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 97.665361][ T30] audit: type=1400 audit(1750696152.349:267): avc: denied { execute } for pid=6317 comm="syz.0.86" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=8745 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 97.692012][ T30] audit: type=1400 audit(1750696152.649:268): avc: denied { ioctl } for pid=6317 comm="syz.0.86" path="socket:[8744]" dev="sockfs" ino=8744 ioctlcmd=0x89f0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 97.727181][ T30] audit: type=1400 audit(1750696152.839:269): avc: denied { create } for pid=6317 comm="syz.0.86" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 98.198820][ T6329] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 98.365189][ T6317] delete_channel: no stack [ 98.590531][ T5885] usb 4-1: new high-speed USB device number 5 using dummy_hcd [ 98.790004][ T5885] usb 4-1: device descriptor read/64, error -71 [ 100.701306][ T5885] usb 4-1: new high-speed USB device number 6 using dummy_hcd [ 100.769168][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 100.769184][ T30] audit: type=1400 audit(1750696155.879:271): avc: denied { create } for pid=6353 comm="syz.2.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 101.384780][ T30] audit: type=1800 audit(1750696156.039:272): pid=6356 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t op=collect_data cause=failed(directio) comm="syz.3.96" name="file0" dev="overlay" ino=74 res=0 errno=0 [ 101.387424][ T5873] usb 2-1: new high-speed USB device number 5 using dummy_hcd [ 101.444112][ T30] audit: type=1400 audit(1750696156.549:273): avc: denied { map } for pid=6354 comm="syz.3.96" path="/9/file0" dev="tmpfs" ino=66 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 101.469429][ T6361] netlink: 32 bytes leftover after parsing attributes in process `syz.2.94'. [ 101.597299][ T5873] usb 2-1: device descriptor read/64, error -71 [ 101.890645][ T5873] usb 2-1: new high-speed USB device number 6 using dummy_hcd [ 102.091213][ T5873] usb 2-1: device descriptor read/64, error -71 [ 102.115409][ T30] audit: type=1400 audit(1750696157.209:274): avc: denied { mounton } for pid=6367 comm="syz.4.97" path="/15/file0" dev="tmpfs" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 102.321754][ T5873] usb usb2-port1: attempt power cycle [ 102.402324][ T30] audit: type=1400 audit(1750696157.229:275): avc: denied { create } for pid=6373 comm="syz.3.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 102.670562][ T6388] netlink: 16 bytes leftover after parsing attributes in process `syz.2.101'. [ 102.686009][ T6390] FAULT_INJECTION: forcing a failure. [ 102.686009][ T6390] name failslab, interval 1, probability 0, space 0, times 0 [ 102.690452][ T30] audit: type=1400 audit(1750696157.799:276): avc: denied { create } for pid=6389 comm="syz.0.103" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 102.699639][ T6390] CPU: 0 UID: 0 PID: 6390 Comm: syz.0.103 Not tainted 6.16.0-rc3-syzkaller #0 PREEMPT(full) [ 102.699664][ T6390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 102.699674][ T6390] Call Trace: [ 102.699679][ T6390] [ 102.699685][ T6390] dump_stack_lvl+0x16c/0x1f0 [ 102.699711][ T6390] should_fail_ex+0x512/0x640 [ 102.699733][ T6390] should_failslab+0xc2/0x120 [ 102.699755][ T6390] __kmalloc_node_track_caller_noprof+0xd6/0x510 [ 102.699777][ T6390] ? sidtab_sid2str_get+0x17a/0x680 [ 102.699803][ T6390] kmemdup_noprof+0x29/0x60 [ 102.699822][ T6390] sidtab_sid2str_get+0x17a/0x680 [ 102.699845][ T6390] sidtab_entry_to_string+0x33/0x110 [ 102.699867][ T6390] security_sid_to_context_core+0x35c/0x640 [ 102.699889][ T6390] avc_audit_post_callback+0x109/0x8f0 [ 102.699913][ T6390] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 102.699933][ T6390] ? skb_put+0x138/0x1b0 [ 102.699950][ T6390] ? audit_log_n_string+0x253/0x540 [ 102.699972][ T6390] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 102.699992][ T6390] common_lsm_audit+0x24b/0x300 [ 102.700013][ T6390] ? __pfx_common_lsm_audit+0x10/0x10 [ 102.700032][ T6390] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 102.700052][ T6390] ? avc_update_node.isra.0+0x4c0/0xb60 [ 102.700077][ T6390] slow_avc_audit+0x186/0x210 [ 102.700100][ T6390] ? __pfx_slow_avc_audit+0x10/0x10 [ 102.700124][ T6390] ? avc_denied+0x14a/0x190 [ 102.700148][ T6390] ? avc_has_perm_noaudit+0x306/0x3b0 [ 102.700173][ T6390] avc_has_perm+0x18b/0x1c0 [ 102.700197][ T6390] ? __pfx_avc_has_perm+0x10/0x10 [ 102.700227][ T6390] sock_has_perm+0x252/0x2f0 [ 102.700244][ T6390] ? __pfx_sock_has_perm+0x10/0x10 [ 102.700262][ T6390] ? proc_fail_nth_write+0x9f/0x250 [ 102.700285][ T6390] ? __lock_acquire+0x622/0x1c90 [ 102.700312][ T6390] selinux_socket_setsockopt+0x41/0x80 [ 102.700330][ T6390] security_socket_setsockopt+0x211/0x240 [ 102.700349][ T6390] do_sock_setsockopt+0xef/0x470 [ 102.700364][ T6390] ? __pfx_do_sock_setsockopt+0x10/0x10 [ 102.700395][ T6390] __sys_setsockopt+0x1a0/0x230 [ 102.700418][ T6390] __x64_sys_setsockopt+0xbd/0x160 [ 102.700435][ T6390] ? do_syscall_64+0x91/0x4c0 [ 102.700455][ T6390] ? lockdep_hardirqs_on+0x7c/0x110 [ 102.700474][ T6390] do_syscall_64+0xcd/0x4c0 [ 102.700496][ T6390] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.700511][ T6390] RIP: 0033:0x7fd8c9d8e929 [ 102.700524][ T6390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.700537][ T6390] RSP: 002b:00007fd8cab61038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 102.700552][ T6390] RAX: ffffffffffffffda RBX: 00007fd8c9fb5fa0 RCX: 00007fd8c9d8e929 [ 102.700561][ T6390] RDX: 0000000000000007 RSI: 0000000000000101 RDI: 0000000000000004 [ 102.700569][ T6390] RBP: 00007fd8cab61090 R08: 0000000000000004 R09: 0000000000000000 [ 102.700578][ T6390] R10: 0000200000000080 R11: 0000000000000246 R12: 0000000000000001 [ 102.700586][ T6390] R13: 0000000000000000 R14: 00007fd8c9fb5fa0 R15: 00007fff35a5cdc8 [ 102.700607][ T6390] [ 102.891083][ T6396] netlink: 44 bytes leftover after parsing attributes in process `syz.0.104'. [ 102.893051][ T5873] usb 2-1: new high-speed USB device number 7 using dummy_hcd [ 102.903946][ T6396] netlink: 44 bytes leftover after parsing attributes in process `syz.0.104'. [ 102.917820][ T30] audit: type=1400 audit(1750696157.799:277): avc: denied { setopt } for pid=6389 comm="syz.0.103" ssid=148 tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 103.066592][ T6403] 9pnet_fd: p9_fd_create_tcp (6403): problem connecting socket to 127.0.0.1 [ 103.084241][ T30] audit: type=1326 audit(1750696157.929:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6393 comm="syz.0.104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd8c9d8e929 code=0x7ffc0000 [ 103.112058][ T30] audit: type=1326 audit(1750696157.929:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6393 comm="syz.0.104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd8c9d8e929 code=0x7ffc0000 [ 103.137789][ T30] audit: type=1326 audit(1750696157.929:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6393 comm="syz.0.104" exe="/root/syz-executor" sig=0 arch=c000003e syscall=437 compat=0 ip=0x7fd8c9d8e929 code=0x7ffc0000 [ 103.171729][ T5873] usb 2-1: device descriptor read/8, error -71 [ 103.801150][ T6411] netlink: 32 bytes leftover after parsing attributes in process `syz.3.105'. [ 103.820522][ T5873] usb 2-1: new high-speed USB device number 8 using dummy_hcd [ 104.040778][ T5873] usb 2-1: device not accepting address 8, error -71 [ 104.061314][ T5873] usb usb2-port1: unable to enumerate USB device [ 104.230895][ T6422] netlink: 84 bytes leftover after parsing attributes in process `syz.3.107'. [ 104.274744][ T6430] overlay: ./file1 is not a directory [ 104.283335][ T6422] netlink: 84 bytes leftover after parsing attributes in process `syz.3.107'. [ 104.313269][ T6432] random: crng reseeded on system resumption [ 104.370022][ T6432] Restarting kernel threads ... [ 104.397851][ T6432] Done restarting kernel threads. [ 104.495098][ T6435] delete_channel: no stack [ 104.646915][ T6442] xt_hashlimit: size too large, truncated to 1048576 [ 104.804692][ T10] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 104.845260][ T6444] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(6) [ 104.851919][ T6444] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 104.916359][ T6444] vhci_hcd vhci_hcd.0: Device attached [ 104.964092][ T6446] vhci_hcd: connection closed [ 104.970949][ T10] usb 1-1: Using ep0 maxpacket: 8 [ 104.982530][ T13] vhci_hcd: stop threads [ 104.987310][ T13] vhci_hcd: release socket [ 105.002224][ T10] usb 1-1: config index 0 descriptor too short (expected 301, got 45) [ 105.011073][ T13] vhci_hcd: disconnect device [ 105.057284][ T10] usb 1-1: config 16 interface 0 altsetting 0 endpoint 0x5 has invalid wMaxPacketSize 0 [ 105.096685][ T6452] sctp_transport_update_pmtu: 48 callbacks suppressed [ 105.096703][ T6452] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 105.120909][ T6452] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 105.132365][ T6452] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 105.143910][ T10] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x5 has invalid maxpacket 0 [ 105.160450][ T10] usb 1-1: config 16 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 32 [ 105.170995][ T6456] trusted_key: encrypted_key: insufficient parameters specified [ 105.171397][ T6452] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 105.220662][ T6452] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 105.235684][ T6452] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 105.252467][ T6452] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 105.264596][ T6452] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 105.276205][ T6452] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 105.287980][ T6452] sctp: sctp_transport_update_pmtu: Reported pmtu 68 too low, using default minimum of 512 [ 105.366008][ T10] usb 1-1: config 16 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 3 [ 105.581382][ T10] usb 1-1: New USB device found, idVendor=ee8d, idProduct=db1e, bcdDevice=61.23 [ 105.591470][ T10] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 106.211145][ T6466] netlink: 'syz.3.116': attribute type 11 has an invalid length. [ 106.357621][ T10] usb 1-1: usb_control_msg returned -32 [ 106.377835][ T10] usbtmc 1-1:16.0: can't read capabilities [ 107.156371][ T6480] netlink: 8 bytes leftover after parsing attributes in process `syz.1.119'. [ 107.487072][ T30] kauditd_printk_skb: 51 callbacks suppressed [ 107.487088][ T30] audit: type=1400 audit(1750696162.599:332): avc: denied { read write } for pid=6484 comm="syz.4.121" name="uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 107.487231][ T10] usb 1-1: USB disconnect, device number 3 [ 107.495623][ T30] audit: type=1400 audit(1750696162.599:333): avc: denied { open } for pid=6484 comm="syz.4.121" path="/dev/uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 107.547512][ C0] vkms_vblank_simulate: vblank timer overrun [ 107.568392][ T6485] netlink: 332 bytes leftover after parsing attributes in process `syz.4.121'. [ 107.596008][ T6490] netlink: 8 bytes leftover after parsing attributes in process `syz.3.123'. [ 107.804429][ T6493] netlink: 24 bytes leftover after parsing attributes in process `syz.2.122'. [ 108.002256][ T30] audit: type=1400 audit(1750696162.659:334): avc: denied { ioctl } for pid=6484 comm="syz.4.121" path="/dev/uinput" dev="devtmpfs" ino=920 ioctlcmd=0x5564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 108.076717][ T30] audit: type=1400 audit(1750696163.189:335): avc: denied { write } for pid=6494 comm="syz.0.124" lport=43726 faddr=::ffff:100.1.1.0 fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 108.100650][ C0] vkms_vblank_simulate: vblank timer overrun [ 109.070483][ T30] audit: type=1400 audit(1750696163.189:336): avc: denied { setopt } for pid=6494 comm="syz.0.124" lport=43726 faddr=::ffff:100.1.1.0 fport=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 109.094472][ C0] vkms_vblank_simulate: vblank timer overrun [ 109.262116][ T30] audit: type=1400 audit(1750696163.699:337): avc: denied { create } for pid=6502 comm="syz.3.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 109.290284][ T6511] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 109.308854][ T6489] netlink: 8 bytes leftover after parsing attributes in process `syz.2.122'. [ 109.390720][ T30] audit: type=1400 audit(1750696163.699:338): avc: denied { connect } for pid=6502 comm="syz.3.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 109.419598][ T30] audit: type=1400 audit(1750696163.699:339): avc: denied { write } for pid=6502 comm="syz.3.125" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 109.758136][ T30] audit: type=1400 audit(1750696164.599:340): avc: denied { bind } for pid=6514 comm="syz.3.128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 109.778495][ C0] vkms_vblank_simulate: vblank timer overrun [ 112.084419][ T30] audit: type=1400 audit(1750696167.199:341): avc: denied { write } for pid=6545 comm="syz.2.137" name="vlan0" dev="proc" ino=4026533844 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 112.257387][ T6548] @: renamed from vlan0 (while UP) [ 113.000495][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 113.000512][ T30] audit: type=1400 audit(1750696168.099:343): avc: denied { ioctl } for pid=6559 comm="syz.0.139" path="socket:[9676]" dev="sockfs" ino=9676 ioctlcmd=0x89e3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 113.140554][ T6567] netlink: 12 bytes leftover after parsing attributes in process `syz.4.141'. [ 113.167809][ T30] audit: type=1400 audit(1750696168.259:344): avc: denied { ioctl } for pid=6560 comm="syz.2.138" path="socket:[9688]" dev="sockfs" ino=9688 ioctlcmd=0x8983 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 113.229672][ T51] Bluetooth: hci2: connection err: -111 [ 113.242301][ T30] audit: type=1400 audit(1750696168.329:345): avc: denied { listen } for pid=6572 comm="syz.0.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 113.374386][ T6578] netlink: 'syz.4.146': attribute type 3 has an invalid length. [ 113.536386][ T30] audit: type=1400 audit(1750696168.649:346): avc: denied { bind } for pid=6577 comm="syz.4.146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 114.099962][ T30] audit: type=1400 audit(1750696169.209:347): avc: denied { bind } for pid=6584 comm="syz.1.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 114.162553][ T30] audit: type=1400 audit(1750696169.239:348): avc: denied { read write } for pid=6584 comm="syz.1.148" name="ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 114.187558][ T30] audit: type=1400 audit(1750696169.249:349): avc: denied { open } for pid=6584 comm="syz.1.148" path="/dev/ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 114.275660][ T30] audit: type=1400 audit(1750696169.249:350): avc: denied { ioctl } for pid=6584 comm="syz.1.148" path="/dev/ppp" dev="devtmpfs" ino=709 ioctlcmd=0x7438 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 114.426496][ T30] audit: type=1400 audit(1750696169.419:351): avc: denied { create } for pid=6587 comm="syz.4.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 114.534301][ T30] audit: type=1400 audit(1750696169.449:352): avc: denied { write } for pid=6587 comm="syz.4.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 116.236129][ T6621] sp0: Synchronizing with TNC [ 117.284211][ T6622] Falling back ldisc for ttyS3. [ 118.094466][ T6654] netlink: 4 bytes leftover after parsing attributes in process `syz.2.167'. [ 118.126175][ T6654] netlink: 12 bytes leftover after parsing attributes in process `syz.2.167'. [ 118.187383][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 118.187398][ T30] audit: type=1400 audit(1750696173.299:362): avc: denied { setopt } for pid=6655 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 118.287630][ T30] audit: type=1400 audit(1750696173.399:363): avc: denied { connect } for pid=6655 comm="syz.0.168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 118.436179][ T30] audit: type=1400 audit(1750696173.539:364): avc: denied { name_bind } for pid=6663 comm="syz.4.172" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 118.740697][ T5853] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 118.814915][ T30] audit: type=1400 audit(1750696173.839:365): avc: denied { connect } for pid=6666 comm="syz.3.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 118.967088][ T5853] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 118.998498][ T6676] capability: warning: `syz.2.174' uses deprecated v2 capabilities in a way that may be insecure [ 119.068133][ T5853] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 119.080909][ T30] audit: type=1400 audit(1750696173.839:366): avc: denied { write } for pid=6666 comm="syz.3.170" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 119.116245][ T5853] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 119.129360][ T30] audit: type=1400 audit(1750696174.069:367): avc: denied { setcurrent } for pid=6675 comm="syz.2.174" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 119.158966][ T5853] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 119.180459][ T5853] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 119.201562][ T5853] usb 1-1: config 0 descriptor?? [ 119.569434][ T6690] input: syz0 as /devices/virtual/input/input7 [ 119.625023][ T5853] plantronics 0003:047F:FFFF.0002: reserved main item tag 0xe [ 119.645161][ T5853] plantronics 0003:047F:FFFF.0002: unknown main item tag 0x0 [ 119.657300][ T5853] plantronics 0003:047F:FFFF.0002: No inputs registered, leaving [ 119.695814][ T5853] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 119.840987][ T5853] usb 1-1: USB disconnect, device number 4 [ 119.939827][ T6697] fido_id[6697]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/1-1/report_descriptor': No such file or directory [ 120.107848][ C0] Unknown status report in ack skb [ 120.754476][ T6715] netlink: 64 bytes leftover after parsing attributes in process `syz.2.189'. [ 120.991609][ T6723] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 121.171815][ T6723] iommufd_mock iommufd_mock1: Adding to iommu group 1 [ 122.792434][ T5816] Bluetooth: hci5: Received unexpected HCI Event 0x00 [ 123.072080][ T30] audit: type=1400 audit(1750696178.189:368): avc: denied { create } for pid=6754 comm="syz.4.204" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 124.391101][ T30] audit: type=1400 audit(1750696179.309:369): avc: denied { bind } for pid=6768 comm="syz.2.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 124.431835][ T30] audit: type=1400 audit(1750696179.399:370): avc: denied { connect } for pid=6768 comm="syz.2.210" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 124.772182][ T51] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 125.962719][ T30] audit: type=1400 audit(1750696180.369:371): avc: denied { map } for pid=6775 comm="syz.3.211" path="socket:[9963]" dev="sockfs" ino=9963 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 126.140584][ T10] usb 5-1: new high-speed USB device number 4 using dummy_hcd [ 126.152247][ T6788] block nbd3: shutting down sockets [ 126.183200][ T30] audit: type=1400 audit(1750696180.369:372): avc: denied { read accept } for pid=6775 comm="syz.3.211" path="socket:[9963]" dev="sockfs" ino=9963 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 126.542197][ T10] usb 5-1: config index 0 descriptor too short (expected 23569, got 27) [ 126.560580][ T10] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 127.060584][ T6807] TCP: TCP_TX_DELAY enabled [ 127.528311][ T10] usb 5-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 127.537468][ T10] usb 5-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 127.545568][ T10] usb 5-1: Manufacturer: syz [ 127.555515][ T10] usb 5-1: config 0 descriptor?? [ 127.567883][ T10] igorplugusb 5-1:0.0: endpoint incorrect [ 127.885796][ T30] audit: type=1400 audit(1750696182.989:373): avc: denied { setopt } for pid=6812 comm="syz.3.224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 128.247053][ T30] audit: type=1400 audit(1750696182.989:374): avc: denied { ioctl } for pid=6812 comm="syz.3.224" path="socket:[10009]" dev="sockfs" ino=10009 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 128.366520][ T5873] usb 5-1: USB disconnect, device number 4 [ 128.873545][ T30] audit: type=1400 audit(1750696183.969:375): avc: denied { connect } for pid=6831 comm="syz.0.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 128.963037][ T30] audit: type=1400 audit(1750696184.019:376): avc: denied { write } for pid=6831 comm="syz.0.227" path="socket:[10581]" dev="sockfs" ino=10581 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 129.029503][ T30] audit: type=1400 audit(1750696184.139:377): avc: denied { name_connect } for pid=6837 comm="syz.0.233" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 129.111446][ T6839] tap0: tun_chr_ioctl cmd 1074025677 [ 129.119803][ T6839] tap0: linktype set to 0 [ 129.364538][ T30] audit: type=1400 audit(1750696184.479:378): avc: denied { ioctl } for pid=6846 comm="syz.2.236" path="socket:[10047]" dev="sockfs" ino=10047 ioctlcmd=0x8910 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 130.170338][ T30] audit: type=1400 audit(1750696185.279:379): avc: denied { create } for pid=6855 comm="syz.4.241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 130.194772][ T6858] netlink: 68 bytes leftover after parsing attributes in process `syz.1.240'. [ 131.666336][ T30] audit: type=1400 audit(1750696186.779:380): avc: denied { ioctl } for pid=6886 comm="syz.4.253" path="/dev/binderfs/binder0" dev="binder" ino=16 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 131.725241][ T6891] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 131.796080][ T6891] iommufd_mock iommufd_mock1: Adding to iommu group 1 [ 131.837206][ T30] audit: type=1400 audit(1750696186.779:381): avc: denied { set_context_mgr } for pid=6886 comm="syz.4.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 132.717693][ T30] audit: type=1400 audit(1750696186.819:382): avc: denied { write } for pid=6886 comm="syz.4.253" name="binder0" dev="binder" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 132.721790][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.740514][ T30] audit: type=1400 audit(1750696186.829:383): avc: denied { map } for pid=6886 comm="syz.4.253" path="/dev/binderfs/binder0" dev="binder" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 132.750753][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 132.819254][ T30] audit: type=1400 audit(1750696186.849:384): avc: denied { call } for pid=6886 comm="syz.4.253" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 133.885174][ T30] audit: type=1400 audit(1750696187.009:385): avc: denied { ioctl } for pid=6894 comm="syz.4.255" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=10682 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 134.828746][ T30] audit: type=1400 audit(1750696189.939:386): avc: denied { create } for pid=6909 comm="syz.3.261" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 135.070074][ T6921] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 135.339505][ T30] audit: type=1400 audit(1750696190.449:387): avc: denied { connect } for pid=6922 comm="syz.2.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 135.560549][ T92] usb 2-1: new high-speed USB device number 9 using dummy_hcd [ 135.743670][ T92] usb 2-1: config 220 has an invalid interface number: 76 but max is 2 [ 135.759757][ T92] usb 2-1: config 220 contains an unexpected descriptor of type 0x2, skipping [ 135.783654][ T92] usb 2-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config [ 135.797669][ T92] usb 2-1: config 220 has no interface number 2 [ 135.806047][ T92] usb 2-1: config 220 interface 1 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 12 [ 135.824125][ T92] usb 2-1: config 220 interface 0 has no altsetting 0 [ 135.832506][ T92] usb 2-1: config 220 interface 76 has no altsetting 0 [ 135.839664][ T92] usb 2-1: config 220 interface 1 has no altsetting 0 [ 135.890567][ T51] Bluetooth: hci0: Opcode 0x1407 failed: -110 [ 135.899808][ T51] Bluetooth: hci0: command 0x0c1a tx timeout [ 135.920481][ T92] usb 2-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9 [ 136.136868][ T92] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 136.743591][ T6948] ip6t_REJECT: ECHOREPLY is not supported [ 137.153001][ T92] usb 2-1: Product: syz [ 137.157202][ T92] usb 2-1: Manufacturer: syz [ 137.171547][ T92] usb 2-1: SerialNumber: syz [ 137.340934][ T30] audit: type=1400 audit(1750696192.449:388): avc: denied { setopt } for pid=6954 comm="syz.3.279" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 137.522070][ T92] usb 2-1: selecting invalid altsetting 0 [ 137.529135][ T92] usb 2-1: Found UVC 7.01 device syz (8086:0b07) [ 137.543638][ T92] usb 2-1: No valid video chain found. [ 137.557996][ T92] usb 2-1: selecting invalid altsetting 0 [ 137.563821][ T92] usbtest 2-1:220.1: probe with driver usbtest failed with error -22 [ 137.672423][ T92] usb 2-1: USB disconnect, device number 9 [ 138.292407][ T6967] kvm: emulating exchange as write [ 140.649663][ T30] audit: type=1400 audit(1750696195.759:389): avc: denied { read } for pid=6980 comm="syz.1.288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 140.913020][ T6993] Bluetooth: hci0: unsupported parameter 513 [ 140.919064][ T6993] Bluetooth: hci0: unsupported parameter 513 [ 141.479944][ T51] Bluetooth: hci3: unexpected event for opcode 0x100c [ 143.612089][ T30] audit: type=1400 audit(1750696198.729:390): avc: denied { getopt } for pid=7012 comm="syz.4.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 146.049322][ T7048] @: renamed from vlan0 (while UP) [ 146.072763][ T30] audit: type=1400 audit(1750696201.159:391): avc: denied { ioctl } for pid=7046 comm="syz.4.310" path="socket:[10896]" dev="sockfs" ino=10896 ioctlcmd=0x8923 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 146.097370][ C1] vkms_vblank_simulate: vblank timer overrun [ 146.594626][ T30] audit: type=1400 audit(1750696201.279:392): avc: denied { map } for pid=7043 comm="syz.3.307" path="socket:[11426]" dev="sockfs" ino=11426 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 146.988186][ T30] audit: type=1400 audit(1750696201.279:393): avc: denied { read } for pid=7043 comm="syz.3.307" path="socket:[11426]" dev="sockfs" ino=11426 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 147.159683][ T30] audit: type=1326 audit(1750696202.259:394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7047 comm="syz.1.308" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f061d18e929 code=0x0 [ 148.696823][ T30] audit: type=1400 audit(1750696203.809:395): avc: denied { append } for pid=7076 comm="syz.1.317" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 149.031621][ T30] audit: type=1400 audit(1750696204.099:396): avc: denied { accept } for pid=7073 comm="syz.2.318" lport=57702 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 149.364031][ T7085] netlink: 8 bytes leftover after parsing attributes in process `syz.0.321'. [ 150.583739][ T51] Bluetooth: hci2: ACL packet for unknown connection handle 200 [ 151.679212][ T7115] netlink: 60 bytes leftover after parsing attributes in process `syz.0.334'. [ 152.755292][ T30] audit: type=1400 audit(1750696207.869:397): avc: denied { watch_mount } for pid=7122 comm="syz.0.338" path="/83" dev="tmpfs" ino=449 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 152.851414][ T51] Bluetooth: hci2: unexpected event for opcode 0x2029 [ 153.297947][ T7128] usb usb1: usbfs: interface 0 claimed by hub while 'syz.4.341' sets config #0 [ 153.930224][ T30] audit: type=1400 audit(1750696208.369:398): avc: denied { write } for pid=7126 comm="syz.4.341" name="001" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 153.952840][ C1] vkms_vblank_simulate: vblank timer overrun [ 154.050516][ T30] audit: type=1400 audit(1750696209.149:399): avc: denied { wake_alarm } for pid=7132 comm="syz.0.342" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 154.406980][ T30] audit: type=1400 audit(1750696209.519:400): avc: denied { getopt } for pid=7141 comm="syz.2.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 154.821143][ T5885] usb 4-1: new high-speed USB device number 7 using dummy_hcd [ 155.662899][ T5885] usb 4-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 155.680438][ T5885] usb 4-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 155.693420][ T5885] usb 4-1: New USB device found, idVendor=08b7, idProduct=0000, bcdDevice= 0.00 [ 155.704265][ T5885] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=3 [ 155.718631][ T5885] usb 4-1: SerialNumber: syz [ 155.730649][ T7172] binder: 7171:7172 ioctl c0306201 0 returned -14 [ 155.870606][ T5853] psmouse serio2: Failed to reset mouse on : -5 [ 155.966799][ T5885] usb 4-1: 0:2 : does not exist [ 155.983850][ T5885] usb 4-1: unit 1 not found! [ 156.030180][ T5885] usb 4-1: USB disconnect, device number 7 [ 156.106054][ T5945] udevd[5945]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 156.264967][ T7191] netlink: 64 bytes leftover after parsing attributes in process `syz.0.365'. [ 156.307468][ T7193] netlink: 8 bytes leftover after parsing attributes in process `syz.1.366'. [ 156.370539][ T30] audit: type=1400 audit(1750696211.479:401): avc: denied { read write } for pid=7196 comm="syz.2.357" name="uhid" dev="devtmpfs" ino=1273 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 156.398559][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.412761][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.420238][ T30] audit: type=1400 audit(1750696211.479:402): avc: denied { open } for pid=7196 comm="syz.2.357" path="/dev/uhid" dev="devtmpfs" ino=1273 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 [ 156.421447][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.496450][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.506615][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.516001][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.525032][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.533182][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.542035][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.549928][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.558167][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.566274][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.574245][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.582433][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.636283][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.670244][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.679235][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.712598][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.730585][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.759477][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.779551][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.797890][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.814292][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.822476][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.830246][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.843251][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.860549][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.870697][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.889186][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.919358][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.944477][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.961590][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.971435][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.979299][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.988710][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 156.996839][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 157.005082][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 157.040802][ T30] audit: type=1400 audit(1750696212.159:403): avc: denied { watch watch_reads } for pid=7222 comm="syz.3.380" path="/proc/199/task/200/net/netstat" dev="proc" ino=4026533147 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=file permissive=1 [ 157.120467][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 157.128274][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 157.140773][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 157.149280][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 157.172777][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 157.194817][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: unknown main item tag 0x0 [ 157.231593][ T5885] hid-generic 0000:007F:FFFFFFFE.0003: hidraw0: HID v0.00 Device [syz1] on syz0 [ 157.352679][ T30] audit: type=1400 audit(1750696212.369:404): avc: denied { write } for pid=7226 comm="syz.0.381" name="loop-control" dev="devtmpfs" ino=646 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 157.702751][ T7234] fido_id[7234]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 160.145489][ T30] audit: type=1400 audit(1750696214.859:405): avc: denied { block_suspend } for pid=7260 comm="syz.3.394" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 160.930614][ T5853] misc userio: Buffer overflowed, userio client isn't keeping up [ 161.008184][ T7297] ptrace attach of "./syz-executor exec"[5807] was attempted by ""[7297] [ 161.040594][ T5885] usb 3-1: new high-speed USB device number 5 using dummy_hcd [ 161.248262][ T5885] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x8B has invalid wMaxPacketSize 0 [ 161.297876][ T5885] usb 3-1: config 0 interface 0 altsetting 0 bulk endpoint 0x8B has invalid maxpacket 0 [ 161.346764][ T5885] usb 3-1: New USB device found, idVendor=07fd, idProduct=0001, bcdDevice=48.99 [ 161.360454][ T5885] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 161.368653][ T5885] usb 3-1: Product: syz [ 161.376184][ T5885] usb 3-1: Manufacturer: syz [ 161.406607][ T5885] usb 3-1: SerialNumber: syz [ 161.449961][ T5885] usb 3-1: config 0 descriptor?? [ 161.502187][ T5885] usb 3-1: Quirk or no altset; falling back to MIDI 1.0 [ 161.822791][ T5885] snd-usb-audio 3-1:0.0: probe with driver snd-usb-audio failed with error -12 [ 162.355093][ T5853] input: PS/2 Generic Mouse as /devices/serio2/input/input9 [ 162.420837][ T92] usb 3-1: USB disconnect, device number 5 [ 162.450013][ T7317] udevd[7317]: error opening ATTR{/sys/devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 162.631078][ T5853] psmouse serio2: Failed to enable mouse on [ 163.884399][ T7345] netlink: 277 bytes leftover after parsing attributes in process `syz.2.424'. [ 164.490073][ T30] audit: type=1400 audit(1750696219.599:406): avc: denied { bind } for pid=7361 comm="syz.1.432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 165.138149][ T30] audit: type=1400 audit(1750696220.249:407): avc: denied { getopt } for pid=7348 comm="syz.0.426" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 165.307954][ T7382] netlink: 64 bytes leftover after parsing attributes in process `syz.4.437'. [ 166.193192][ T7400] futex_wake_op: syz.3.444 tries to shift op by 32; fix this program [ 169.222726][ T92] usb 2-1: new high-speed USB device number 10 using dummy_hcd [ 169.661774][ T92] usb 2-1: Using ep0 maxpacket: 32 [ 169.683000][ T92] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 169.712664][ T30] audit: type=1400 audit(1750696224.809:408): avc: denied { read write } for pid=7439 comm="syz.3.455" name="rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 169.854217][ T92] usb 2-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 1 [ 170.115850][ T7414] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium [ 170.158128][ T30] audit: type=1400 audit(1750696224.809:409): avc: denied { open } for pid=7439 comm="syz.3.455" path="/dev/rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 170.184734][ T7442] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 170.187590][ T30] audit: type=1400 audit(1750696224.809:410): avc: denied { ioctl } for pid=7439 comm="syz.3.455" path="/dev/rtc0" dev="devtmpfs" ino=921 ioctlcmd=0x700b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 170.219628][ T92] usb 2-1: string descriptor 0 read error: -71 [ 170.241627][ T92] usb 2-1: New USB device found, idVendor=0499, idProduct=1010, bcdDevice= 5.f5 [ 170.278210][ T92] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 170.414656][ T92] usb 2-1: config 0 descriptor?? [ 170.431562][ T92] usb 2-1: can't set config #0, error -71 [ 170.502969][ T92] usb 2-1: USB disconnect, device number 10 [ 170.788724][ T7453] netlink: 64 bytes leftover after parsing attributes in process `syz.2.460'. [ 173.369849][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.382727][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.393415][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.401517][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.421568][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.458571][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.472724][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.497876][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.656217][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.664886][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.669331][ T7475] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 173.673018][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.673043][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.673062][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.673082][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.673101][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.673120][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.673139][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 173.673158][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.194876][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.202734][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.210707][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.218940][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.226794][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.234611][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.260516][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.268315][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.308531][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.311763][ T30] audit: type=1400 audit(1750696229.419:411): avc: denied { write } for pid=7481 comm="syz.0.469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 174.326588][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.422372][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.430174][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.438016][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.446132][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.454072][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.463593][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.471434][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.479194][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.513450][ T30] audit: type=1326 audit(1750696229.629:412): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7483 comm="syz.0.471" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fd8c9d8e929 code=0x0 [ 174.536229][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.536255][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.536274][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.536293][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.536312][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.588435][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.596476][ T92] hid-generic 0000:007F:FFFFFFFE.0004: unknown main item tag 0x0 [ 174.607934][ T92] hid-generic 0000:007F:FFFFFFFE.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 174.628300][ T7489] netlink: 12 bytes leftover after parsing attributes in process `syz.1.472'. [ 174.749594][ T7490] fido_id[7490]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 175.040652][ T30] audit: type=1404 audit(1750696230.149:413): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 175.101694][ T30] audit: type=1400 audit(1750696230.209:414): avc: denied { ioctl } for pid=7504 comm="syz.3.475" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 175.131159][ T30] audit: type=1400 audit(1750696230.209:415): avc: denied { read } for pid=7508 comm="syz.1.478" path="socket:[12832]" dev="sockfs" ino=12832 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 175.473756][ T30] audit: type=1400 audit(1750696230.219:416): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 175.617864][ T30] audit: type=1400 audit(1750696230.299:417): avc: denied { read } for pid=7512 comm="syz.2.479" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 175.640479][ T30] audit: type=1400 audit(1750696230.309:418): avc: denied { prog_load } for pid=7512 comm="syz.2.479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 175.659417][ T30] audit: type=1400 audit(1750696230.319:419): avc: denied { create } for pid=7506 comm="syz.4.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 175.678815][ T30] audit: type=1400 audit(1750696230.729:420): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 175.707793][ T30] audit: type=1400 audit(1750696230.749:421): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 175.732105][ T30] audit: type=1400 audit(1750696230.779:422): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 176.311233][ T7556] xt_TPROXY: Can be used only with -p tcp or -p udp [ 180.063317][ T30] kauditd_printk_skb: 166 callbacks suppressed [ 180.063333][ T30] audit: type=1400 audit(1750696235.179:589): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 180.137965][ T30] audit: type=1400 audit(1750696235.179:590): avc: denied { prog_load } for pid=7631 comm="syz.1.528" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 180.177818][ T30] audit: type=1400 audit(1750696235.239:591): avc: denied { read } for pid=7632 comm="syz.2.529" dev="nsfs" ino=4026533414 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 180.242924][ T30] audit: type=1400 audit(1750696235.319:592): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 180.328723][ T30] audit: type=1400 audit(1750696235.379:593): avc: denied { read } for pid=7637 comm="syz.0.531" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 180.407491][ T30] audit: type=1400 audit(1750696235.389:594): avc: denied { read } for pid=7637 comm="syz.0.531" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 180.471757][ T30] audit: type=1400 audit(1750696235.389:595): avc: denied { prog_load } for pid=7637 comm="syz.0.531" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 180.471804][ T30] audit: type=1400 audit(1750696235.409:596): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 180.471842][ T30] audit: type=1400 audit(1750696235.419:597): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 180.471879][ T30] audit: type=1400 audit(1750696235.429:598): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 183.232732][ T7724] mmap: syz.1.569 (7724) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 183.646462][ T7730] netlink: 8 bytes leftover after parsing attributes in process `syz.3.571'. [ 184.121343][ T7742] netlink: 'syz.3.574': attribute type 3 has an invalid length. [ 184.176235][ T7742] netlink: 'syz.3.574': attribute type 3 has an invalid length. [ 185.095675][ T30] kauditd_printk_skb: 151 callbacks suppressed [ 185.095692][ T30] audit: type=1400 audit(1750696240.209:750): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 185.256261][ T30] audit: type=1400 audit(1750696240.319:751): avc: denied { prog_load } for pid=7752 comm="syz.0.581" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 185.316807][ T30] audit: type=1400 audit(1750696240.399:752): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 185.490669][ T30] audit: type=1400 audit(1750696240.479:753): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 185.544238][ T30] audit: type=1400 audit(1750696240.509:754): avc: denied { create } for pid=7755 comm="syz.1.582" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 185.660128][ T30] audit: type=1400 audit(1750696240.519:755): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 185.757089][ T30] audit: type=1400 audit(1750696240.689:756): avc: denied { name_bind } for pid=7758 comm="syz.0.583" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 185.840535][ T30] audit: type=1400 audit(1750696240.709:757): avc: denied { execmem } for pid=7757 comm="syz.1.584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 185.917582][ T30] audit: type=1400 audit(1750696240.769:758): avc: denied { read } for pid=7757 comm="syz.1.584" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 186.021508][ T30] audit: type=1400 audit(1750696240.799:759): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 187.822502][ T7809] ALSA: seq fatal error: cannot create timer (-22) [ 188.653211][ T7834] bridge: RTM_NEWNEIGH with invalid ether address [ 189.729796][ T7840] netlink: 4 bytes leftover after parsing attributes in process `syz.1.618'. [ 189.831910][ T7861] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=19 sclass=netlink_tcpdiag_socket pid=7861 comm=syz.4.628 [ 189.914905][ T7840] bridge0: port 1(bridge_slave_0) entered disabled state [ 190.148162][ T30] kauditd_printk_skb: 224 callbacks suppressed [ 190.148173][ T30] audit: type=1400 audit(1750696245.259:984): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 190.256143][ T30] audit: type=1400 audit(1750696245.369:985): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 190.412398][ T30] audit: type=1400 audit(1750696245.529:986): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 190.512324][ T30] audit: type=1400 audit(1750696245.569:987): avc: denied { read } for pid=7868 comm="syz.2.630" name="iommu" dev="devtmpfs" ino=624 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 190.631959][ T30] audit: type=1400 audit(1750696245.599:988): avc: denied { prog_load } for pid=7868 comm="syz.2.630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 190.700752][ T30] audit: type=1400 audit(1750696245.619:989): avc: denied { read } for pid=7867 comm="syz.3.631" dev="nsfs" ino=4026533115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 190.813166][ T30] audit: type=1400 audit(1750696245.629:990): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 190.912308][ T30] audit: type=1400 audit(1750696245.629:991): avc: denied { map_create } for pid=7870 comm="syz.0.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 191.019401][ T30] audit: type=1400 audit(1750696245.629:992): avc: denied { prog_load } for pid=7870 comm="syz.0.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 191.060811][ T30] audit: type=1400 audit(1750696245.659:993): avc: denied { read } for pid=7867 comm="syz.3.631" dev="nsfs" ino=4026533115 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 191.081012][ T7840] bridge_slave_0 (unregistering): left allmulticast mode [ 191.219783][ T7840] bridge_slave_0 (unregistering): left promiscuous mode [ 191.317861][ T7840] bridge0: port 1(bridge_slave_0) entered disabled state [ 193.942467][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.948757][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 193.967686][ T7969] ip6tnl1: entered promiscuous mode [ 195.160787][ T30] kauditd_printk_skb: 207 callbacks suppressed [ 195.160804][ T30] audit: type=1400 audit(1750696250.269:1201): avc: denied { mount } for pid=8012 comm="syz.4.697" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=0 [ 195.250429][ T30] audit: type=1400 audit(1750696250.309:1202): avc: denied { name_bind } for pid=8014 comm="syz.3.696" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 195.310426][ T30] audit: type=1400 audit(1750696250.329:1203): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 195.532901][ T30] audit: type=1400 audit(1750696250.339:1204): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 195.649048][ T30] audit: type=1400 audit(1750696250.379:1205): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 195.797006][ T30] audit: type=1400 audit(1750696250.399:1206): avc: denied { execmem } for pid=8016 comm="syz.3.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 195.938999][ T30] audit: type=1400 audit(1750696250.459:1207): avc: denied { map_create } for pid=8016 comm="syz.3.698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 196.005569][ T30] audit: type=1400 audit(1750696250.559:1208): avc: denied { read } for pid=8019 comm="syz.4.699" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 196.051246][ T30] audit: type=1400 audit(1750696250.559:1209): avc: denied { read } for pid=8019 comm="syz.4.699" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 196.062723][ T8050] wg2: entered promiscuous mode [ 196.128099][ T8050] wg2: entered allmulticast mode [ 196.128241][ T30] audit: type=1400 audit(1750696250.579:1210): avc: denied { read } for pid=8020 comm="syz.0.700" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 200.172716][ T30] kauditd_printk_skb: 242 callbacks suppressed [ 200.172733][ T30] audit: type=1400 audit(1750696255.289:1453): avc: denied { create } for pid=8176 comm="syz.3.771" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 200.222193][ T30] audit: type=1400 audit(1750696255.289:1454): avc: denied { read } for pid=8178 comm="syz.1.770" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 200.233771][ T8181] netlink: 96 bytes leftover after parsing attributes in process `syz.4.772'. [ 200.288386][ T30] audit: type=1400 audit(1750696255.289:1455): avc: denied { read } for pid=8178 comm="syz.1.770" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 200.337655][ T30] audit: type=1400 audit(1750696255.289:1456): avc: denied { read write } for pid=8178 comm="syz.1.770" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 200.369669][ T30] audit: type=1400 audit(1750696255.329:1457): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 200.399319][ T30] audit: type=1400 audit(1750696255.339:1458): avc: denied { map_create } for pid=8180 comm="syz.4.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 200.457104][ T30] audit: type=1400 audit(1750696255.339:1459): avc: denied { prog_load } for pid=8180 comm="syz.4.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 200.497570][ T30] audit: type=1400 audit(1750696255.339:1460): avc: denied { prog_load } for pid=8180 comm="syz.4.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 200.571639][ T30] audit: type=1400 audit(1750696255.339:1461): avc: denied { execmem } for pid=8180 comm="syz.4.772" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 200.639544][ T30] audit: type=1400 audit(1750696255.339:1462): avc: denied { bpf } for pid=8180 comm="syz.4.772" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 200.662966][ T8200] netlink: 96 bytes leftover after parsing attributes in process `syz.1.780'. [ 205.285267][ T30] kauditd_printk_skb: 224 callbacks suppressed [ 205.285285][ T30] audit: type=1400 audit(1750696260.399:1687): avc: denied { prog_load } for pid=8328 comm="syz.2.839" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 205.330296][ T8333] netlink: 4 bytes leftover after parsing attributes in process `syz.2.839'. [ 205.355220][ T8333] netlink: 12 bytes leftover after parsing attributes in process `syz.2.839'. [ 205.689005][ T30] audit: type=1400 audit(1750696260.739:1688): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 205.955345][ T30] audit: type=1400 audit(1750696260.899:1689): avc: denied { execmem } for pid=8336 comm="syz.4.840" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 206.020544][ T30] audit: type=1400 audit(1750696260.909:1690): avc: denied { map_create } for pid=8320 comm="syz.3.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.086396][ T30] audit: type=1400 audit(1750696260.909:1691): avc: denied { prog_load } for pid=8320 comm="syz.3.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.291413][ T30] audit: type=1400 audit(1750696260.909:1692): avc: denied { create } for pid=8320 comm="syz.3.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 206.346097][ T30] audit: type=1400 audit(1750696260.909:1693): avc: denied { create } for pid=8320 comm="syz.3.834" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 206.398440][ T30] audit: type=1400 audit(1750696261.409:1694): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.470589][ T30] audit: type=1400 audit(1750696261.449:1695): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.544071][ T30] audit: type=1400 audit(1750696261.489:1696): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 207.900158][ T8383] netlink: 'syz.1.857': attribute type 27 has an invalid length. [ 207.992142][ T8383] bridge0: port 2(bridge_slave_1) entered disabled state [ 208.168440][ T8383] team0: Failed to send port change of device team_slave_0 via netlink (err -105) [ 208.214887][ T8383] team0: Failed to send port change of device team_slave_1 via netlink (err -105) [ 208.255903][ T8383] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 208.271146][ T8383] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 208.367077][ T8383] batman_adv: batadv0: Interface deactivated: virt_wifi0 [ 208.467138][ T8383] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 208.495146][ T8383] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 208.506604][ T8383] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 208.538896][ T8383] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 210.309719][ T30] kauditd_printk_skb: 246 callbacks suppressed [ 210.309739][ T30] audit: type=1400 audit(1750696265.379:1943): avc: denied { prog_load } for pid=8489 comm="syz.4.906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 210.384744][ T30] audit: type=1400 audit(1750696265.379:1944): avc: denied { create } for pid=8489 comm="syz.4.906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 210.459166][ T30] audit: type=1400 audit(1750696265.379:1945): avc: denied { create } for pid=8489 comm="syz.4.906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 210.531453][ T30] audit: type=1400 audit(1750696265.379:1946): avc: denied { create } for pid=8489 comm="syz.4.906" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 210.556104][ T30] audit: type=1400 audit(1750696265.389:1947): avc: denied { create } for pid=8494 comm="syz.3.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 210.595317][ T30] audit: type=1400 audit(1750696265.389:1948): avc: denied { create } for pid=8494 comm="syz.3.909" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 210.682525][ T30] audit: type=1400 audit(1750696265.389:1949): avc: denied { read } for pid=8494 comm="syz.3.909" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 210.728564][ T30] audit: type=1400 audit(1750696265.409:1950): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 210.774070][ T30] audit: type=1400 audit(1750696265.459:1951): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 210.881812][ T30] audit: type=1400 audit(1750696265.479:1952): avc: denied { create } for pid=8500 comm="syz.0.911" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 210.946507][ T8521] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8521 comm=syz.1.918 [ 214.702647][ T8612] bridge: RTM_NEWNEIGH with invalid ether address [ 214.832901][ T8620] wg2: entered promiscuous mode [ 214.837973][ T8620] wg2: entered allmulticast mode [ 215.311180][ T30] kauditd_printk_skb: 216 callbacks suppressed [ 215.311198][ T30] audit: type=1400 audit(1750696270.429:2169): avc: denied { prog_load } for pid=8634 comm="syz.1.967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 215.346509][ T30] audit: type=1400 audit(1750696270.459:2170): avc: denied { create } for pid=8634 comm="syz.1.967" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 215.400848][ T30] audit: type=1400 audit(1750696270.459:2171): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 215.448262][ T30] audit: type=1326 audit(1750696270.499:2172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8644 comm="syz.3.971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefaa98e929 code=0x7ffc0000 [ 215.500431][ T30] audit: type=1326 audit(1750696270.499:2173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8644 comm="syz.3.971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefaa98e929 code=0x7ffc0000 [ 215.527918][ T30] audit: type=1326 audit(1750696270.499:2174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8644 comm="syz.3.971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7fefaa98e929 code=0x7ffc0000 [ 215.567754][ T30] audit: type=1326 audit(1750696270.499:2175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8644 comm="syz.3.971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefaa98e929 code=0x7ffc0000 [ 215.594054][ T8651] netlink: 8 bytes leftover after parsing attributes in process `syz.0.973'. [ 215.632559][ T30] audit: type=1326 audit(1750696270.499:2176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8644 comm="syz.3.971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefaa98e929 code=0x7ffc0000 [ 215.677388][ T30] audit: type=1326 audit(1750696270.499:2177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8644 comm="syz.3.971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fefaa98e929 code=0x7ffc0000 [ 215.705041][ T30] audit: type=1326 audit(1750696270.499:2178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8644 comm="syz.3.971" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefaa98e929 code=0x7ffc0000 [ 216.868992][ T8719] IPv6: NLM_F_CREATE should be specified when creating new route [ 217.827134][ T8781] bridge: RTM_NEWNEIGH with invalid ether address [ 218.457076][ T8806] netlink: 'syz.1.1045': attribute type 13 has an invalid length. [ 218.930687][ T51] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 218.937315][ T5816] Bluetooth: hci5: command 0x1003 tx timeout [ 220.364054][ T30] kauditd_printk_skb: 495 callbacks suppressed [ 220.364070][ T30] audit: type=1400 audit(1750696275.479:2674): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 220.440551][ T30] audit: type=1400 audit(1750696275.529:2675): avc: denied { create } for pid=8903 comm="syz.3.1089" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 220.495335][ T30] audit: type=1400 audit(1750696275.589:2676): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 220.520939][ T30] audit: type=1400 audit(1750696275.629:2677): avc: denied { create } for pid=8905 comm="syz.3.1090" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 220.543778][ T30] audit: type=1400 audit(1750696275.639:2678): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 220.580455][ T30] audit: type=1400 audit(1750696275.689:2679): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 220.627211][ T30] audit: type=1400 audit(1750696275.739:2680): avc: denied { read write } for pid=8907 comm="syz.3.1092" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 220.682361][ T30] audit: type=1400 audit(1750696275.739:2681): avc: denied { prog_load } for pid=8907 comm="syz.3.1092" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 220.702144][ T30] audit: type=1400 audit(1750696275.799:2682): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 220.776503][ T30] audit: type=1400 audit(1750696275.849:2683): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 222.454184][ T8986] pim6reg1: entered promiscuous mode [ 222.470442][ T8986] pim6reg1: entered allmulticast mode [ 222.970678][ T9007] xt_TCPMSS: Only works on TCP SYN packets [ 223.328604][ T9013] netlink: 4 bytes leftover after parsing attributes in process `syz.0.1138'. [ 223.365655][ T9013] bridge0: port 1(bridge_slave_0) entered disabled state [ 223.656398][ T9013] bridge_slave_0 (unregistering): left allmulticast mode [ 223.687079][ T9013] bridge_slave_0 (unregistering): left promiscuous mode [ 223.712196][ T9013] bridge0: port 1(bridge_slave_0) entered disabled state [ 224.699914][ T9065] netlink: 20 bytes leftover after parsing attributes in process `syz.2.1159'. [ 225.371810][ T30] kauditd_printk_skb: 266 callbacks suppressed [ 225.371825][ T30] audit: type=1400 audit(1750696280.489:2950): avc: denied { write } for pid=9070 comm="syz.4.1163" name="001" dev="devtmpfs" ino=724 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=0 [ 225.460618][ T30] audit: type=1400 audit(1750696280.499:2951): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 225.527022][ T30] audit: type=1400 audit(1750696280.539:2952): avc: denied { prog_load } for pid=9070 comm="syz.4.1163" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 225.585934][ T30] audit: type=1400 audit(1750696280.539:2953): avc: denied { read write } for pid=9070 comm="syz.4.1163" name="uhid" dev="devtmpfs" ino=1273 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=0 [ 225.752815][ T30] audit: type=1400 audit(1750696280.569:2954): avc: denied { map_create } for pid=9074 comm="syz.1.1165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 225.790569][ T30] audit: type=1400 audit(1750696280.569:2955): avc: denied { prog_load } for pid=9074 comm="syz.1.1165" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 225.860414][ T30] audit: type=1400 audit(1750696280.569:2956): avc: denied { name_bind } for pid=9074 comm="syz.1.1165" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 225.942936][ T30] audit: type=1400 audit(1750696280.619:2957): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 226.064593][ T30] audit: type=1326 audit(1750696280.639:2958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9072 comm="syz.3.1164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefaa98e929 code=0x7ffc0000 [ 226.098997][ T30] audit: type=1326 audit(1750696280.639:2959): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=9072 comm="syz.3.1164" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fefaa98e929 code=0x7ffc0000 [ 226.639447][ T9117] bridge_slave_1: left allmulticast mode [ 226.648865][ T9117] bridge_slave_1: left promiscuous mode [ 226.657367][ T9117] bridge0: port 2(bridge_slave_1) entered disabled state [ 230.061841][ T9235] pim6reg1: entered promiscuous mode [ 230.080508][ T9235] pim6reg1: entered allmulticast mode [ 230.406092][ T30] kauditd_printk_skb: 360 callbacks suppressed [ 230.406110][ T30] audit: type=1400 audit(1750696285.519:3320): avc: denied { create } for pid=9251 comm="syz.2.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 230.455208][ T30] audit: type=1400 audit(1750696285.569:3321): avc: denied { map_create } for pid=9251 comm="syz.2.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.506444][ T30] audit: type=1400 audit(1750696285.589:3322): avc: denied { prog_load } for pid=9251 comm="syz.2.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.528087][ T30] audit: type=1400 audit(1750696285.589:3323): avc: denied { execmem } for pid=9251 comm="syz.2.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 230.568497][ T30] audit: type=1400 audit(1750696285.589:3324): avc: denied { map_create } for pid=9251 comm="syz.2.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.591666][ T30] audit: type=1400 audit(1750696285.589:3325): avc: denied { prog_load } for pid=9251 comm="syz.2.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.617517][ T30] audit: type=1400 audit(1750696285.589:3326): avc: denied { prog_load } for pid=9251 comm="syz.2.1240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 230.639057][ T30] audit: type=1400 audit(1750696285.609:3327): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 230.709064][ T30] audit: type=1400 audit(1750696285.819:3328): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 230.757987][ T30] audit: type=1400 audit(1750696285.849:3329): avc: denied { create } for pid=9253 comm="syz.2.1241" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 230.846226][ T9260] ipip0: entered promiscuous mode [ 235.424617][ T30] kauditd_printk_skb: 166 callbacks suppressed [ 235.424632][ T30] audit: type=1400 audit(1750696290.539:3496): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 235.505794][ T30] audit: type=1400 audit(1750696290.599:3497): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 235.585633][ T9365] xt_socket: unknown flags 0xc [ 235.587451][ T30] audit: type=1400 audit(1750696290.599:3498): avc: denied { map_create } for pid=9360 comm="syz.0.1284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.646826][ T30] audit: type=1400 audit(1750696290.599:3499): avc: denied { prog_load } for pid=9360 comm="syz.0.1284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.680908][ T30] audit: type=1400 audit(1750696290.599:3500): avc: denied { prog_load } for pid=9360 comm="syz.0.1284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.704701][ T30] audit: type=1400 audit(1750696290.599:3501): avc: denied { prog_load } for pid=9360 comm="syz.0.1284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.728081][ T30] audit: type=1400 audit(1750696290.599:3502): avc: denied { prog_load } for pid=9360 comm="syz.0.1284" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.754221][ T30] audit: type=1400 audit(1750696290.619:3503): avc: denied { map_create } for pid=9361 comm="syz.3.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.810271][ T30] audit: type=1400 audit(1750696290.619:3504): avc: denied { prog_load } for pid=9361 comm="syz.3.1285" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 235.859143][ T30] audit: type=1400 audit(1750696290.619:3505): avc: denied { create } for pid=9361 comm="syz.3.1285" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=unix_stream_socket permissive=0 [ 240.155999][ T9498] bridge: RTM_NEWNEIGH with invalid ether address [ 240.430785][ T30] kauditd_printk_skb: 290 callbacks suppressed [ 240.430801][ T30] audit: type=1400 audit(1750696295.549:3796): avc: denied { create } for pid=9513 comm="syz.0.1351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 240.480570][ T30] audit: type=1400 audit(1750696295.579:3797): avc: denied { mount } for pid=9510 comm="syz.1.1350" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=0 [ 240.503497][ T30] audit: type=1400 audit(1750696295.599:3798): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 240.685972][ T30] audit: type=1400 audit(1750696295.689:3799): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 240.710565][ T30] audit: type=1400 audit(1750696295.739:3800): avc: denied { create } for pid=9518 comm="syz.0.1353" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 240.764074][ T30] audit: type=1400 audit(1750696295.739:3801): avc: denied { read write } for pid=9518 comm="syz.0.1353" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 240.827240][ T30] audit: type=1400 audit(1750696295.739:3802): avc: denied { map_create } for pid=9518 comm="syz.0.1353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 240.855834][ T30] audit: type=1400 audit(1750696295.739:3803): avc: denied { prog_load } for pid=9518 comm="syz.0.1353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 240.956038][ T30] audit: type=1400 audit(1750696295.739:3804): avc: denied { prog_load } for pid=9518 comm="syz.0.1353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 240.980804][ T30] audit: type=1400 audit(1750696295.779:3805): avc: denied { create } for pid=9517 comm="syz.1.1352" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 242.487659][ T9579] xt_CT: You must specify a L4 protocol and not use inversions on it [ 245.443466][ T30] kauditd_printk_skb: 3252 callbacks suppressed [ 245.443482][ T30] audit: type=1400 audit(1750696300.559:7010): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 245.483961][ T9650] xt_CT: You must specify a L4 protocol and not use inversions on it [ 245.532460][ T30] audit: type=1400 audit(1750696300.589:7011): avc: denied { map_create } for pid=9648 comm="syz.4.1407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.622372][ T30] audit: type=1400 audit(1750696300.589:7012): avc: denied { prog_load } for pid=9648 comm="syz.4.1407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.675279][ T30] audit: type=1400 audit(1750696300.599:7013): avc: denied { map_create } for pid=9648 comm="syz.4.1407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.740942][ T30] audit: type=1400 audit(1750696300.599:7014): avc: denied { prog_load } for pid=9648 comm="syz.4.1407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 245.790449][ T30] audit: type=1400 audit(1750696300.729:7015): avc: denied { read write } for pid=9651 comm="syz.0.1408" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 245.884301][ T30] audit: type=1400 audit(1750696300.989:7016): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 245.945910][ T30] audit: type=1400 audit(1750696301.059:7017): avc: denied { map_create } for pid=9653 comm="syz.1.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 246.080415][ T30] audit: type=1400 audit(1750696301.179:7018): avc: denied { map_create } for pid=9653 comm="syz.1.1409" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 246.167313][ T30] audit: type=1400 audit(1750696301.279:7019): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 248.188375][ T9711] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 248.787429][ T9737] bridge: RTM_NEWNEIGH with invalid ether address [ 250.057602][ T9753] netlink: 40 bytes leftover after parsing attributes in process `syz.2.1446'. [ 251.306564][ T30] kauditd_printk_skb: 195 callbacks suppressed [ 251.306578][ T30] audit: type=1400 audit(1750696306.419:7215): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 251.344436][ T30] audit: type=1400 audit(1750696306.459:7216): avc: denied { read } for pid=9758 comm="syz.4.1447" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 251.373187][ T30] audit: type=1400 audit(1750696306.459:7217): avc: denied { read } for pid=9758 comm="syz.4.1447" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 251.396566][ T30] audit: type=1400 audit(1750696306.459:7218): avc: denied { read } for pid=9758 comm="syz.4.1447" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 251.419910][ T30] audit: type=1400 audit(1750696306.459:7219): avc: denied { read } for pid=9758 comm="syz.4.1447" name="card1" dev="devtmpfs" ino=628 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=0 [ 251.448875][ T30] audit: type=1400 audit(1750696306.509:7220): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 251.473758][ T30] audit: type=1400 audit(1750696306.559:7221): avc: denied { map_create } for pid=9760 comm="syz.4.1448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 251.495644][ T30] audit: type=1400 audit(1750696306.559:7222): avc: denied { prog_load } for pid=9760 comm="syz.4.1448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 251.515011][ T30] audit: type=1400 audit(1750696306.559:7223): avc: denied { execmem } for pid=9760 comm="syz.4.1448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 251.534375][ T30] audit: type=1400 audit(1750696306.629:7224): avc: denied { create } for pid=9760 comm="syz.4.1448" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 254.648149][ T9856] netlink: 96 bytes leftover after parsing attributes in process `syz.4.1485'. [ 255.333598][ T1298] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.340044][ T1298] ieee802154 phy1 wpan1: encryption failed: -22 [ 256.349315][ T30] kauditd_printk_skb: 245 callbacks suppressed [ 256.349330][ T30] audit: type=1400 audit(1750696311.459:7470): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 256.478089][ T30] audit: type=1400 audit(1750696311.589:7471): avc: denied { prog_load } for pid=9894 comm="syz.2.1502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 256.565203][ T30] audit: type=1400 audit(1750696311.619:7472): avc: denied { name_bind } for pid=9894 comm="syz.2.1502" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 256.660878][ T30] audit: type=1400 audit(1750696311.629:7473): avc: denied { create } for pid=9894 comm="syz.2.1502" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 256.760591][ T30] audit: type=1400 audit(1750696311.669:7474): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 256.820398][ T30] audit: type=1400 audit(1750696311.719:7475): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 256.882124][ T30] audit: type=1400 audit(1750696311.729:7476): avc: denied { execmem } for pid=9897 comm="syz.3.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 256.970759][ T30] audit: type=1400 audit(1750696311.799:7477): avc: denied { map_create } for pid=9897 comm="syz.3.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.030390][ T30] audit: type=1400 audit(1750696311.799:7478): avc: denied { prog_load } for pid=9897 comm="syz.3.1503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 257.100534][ T30] audit: type=1400 audit(1750696311.829:7479): avc: denied { create } for pid=9900 comm="syz.2.1504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 257.591370][ T6210] Bluetooth: hci5: Frame reassembly failed (-84) [ 257.997835][ T9946] dummy0: entered promiscuous mode [ 258.860856][ T9957] pim6reg1: entered promiscuous mode [ 258.868421][ T9957] pim6reg1: entered allmulticast mode [ 259.650659][ T5816] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 261.460852][ T30] kauditd_printk_skb: 284 callbacks suppressed [ 261.460869][ T30] audit: type=1400 audit(1750696316.579:7764): avc: denied { read write } for pid=5824 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 261.541814][ T30] audit: type=1400 audit(1750696316.639:7765): avc: denied { prog_load } for pid=10035 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.646843][T10040] skbuff: bad partial csum: csum=65489/0 headroom=64 headlen=65491 [ 261.663162][ T30] audit: type=1400 audit(1750696316.659:7766): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 261.769465][ T30] audit: type=1400 audit(1750696316.659:7767): avc: denied { prog_load } for pid=10029 comm="syz.3.1558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.826513][ T30] audit: type=1400 audit(1750696316.659:7768): avc: denied { prog_load } for pid=10029 comm="syz.3.1558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 261.877170][ T30] audit: type=1400 audit(1750696316.689:7769): avc: denied { execmem } for pid=10035 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 261.967502][ T30] audit: type=1400 audit(1750696316.719:7770): avc: denied { prog_load } for pid=10038 comm="syz.1.1561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.007097][ T30] audit: type=1400 audit(1750696316.719:7771): avc: denied { create } for pid=10038 comm="syz.1.1561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 262.054661][ T30] audit: type=1400 audit(1750696316.719:7772): avc: denied { execmem } for pid=10038 comm="syz.1.1561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 262.079145][ T30] audit: type=1400 audit(1750696316.739:7773): avc: denied { map_create } for pid=10035 comm="syz.2.1560" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 262.601950][T10060] syzkaller0: entered promiscuous mode [ 262.607622][T10060] syzkaller0: entered allmulticast mode [ 263.653635][ T51] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 266.502566][ T30] kauditd_printk_skb: 196 callbacks suppressed [ 266.502582][ T30] audit: type=1400 audit(1750696321.619:7970): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 266.606596][ T30] audit: type=1400 audit(1750696321.649:7971): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 266.673053][ T30] audit: type=1400 audit(1750696321.709:7972): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 266.730832][ T30] audit: type=1400 audit(1750696321.709:7973): avc: denied { prog_load } for pid=10156 comm="syz.1.1610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.793329][ T30] audit: type=1400 audit(1750696321.719:7974): avc: denied { prog_load } for pid=10156 comm="syz.1.1610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.860466][ T30] audit: type=1400 audit(1750696321.719:7975): avc: denied { prog_load } for pid=10156 comm="syz.1.1610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.899758][ T30] audit: type=1400 audit(1750696321.719:7976): avc: denied { prog_load } for pid=10156 comm="syz.1.1610" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 266.949008][ T30] audit: type=1400 audit(1750696321.779:7977): avc: denied { read write } for pid=5807 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 267.019379][ T30] audit: type=1400 audit(1750696321.789:7978): avc: denied { prog_load } for pid=10158 comm="syz.0.1611" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.071991][ T30] audit: type=1400 audit(1750696321.829:7979): avc: denied { prog_load } for pid=10148 comm="syz.3.1606" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 267.134921][T10170] veth1_macvtap: left promiscuous mode [ 267.144195][T10170] macsec0: entered promiscuous mode [ 268.187445][T10191] macsec0: entered promiscuous mode [ 269.548072][T10222] bridge: RTM_NEWNEIGH with invalid ether address [ 269.860035][T10244] hsr0: A HSR master's MTU cannot be greater than the smallest MTU of its slaves minus the HSR Tag length (6 octets). [ 271.517867][ T30] kauditd_printk_skb: 247 callbacks suppressed [ 271.517883][ T30] audit: type=1400 audit(1750696326.629:8227): avc: denied { read write } for pid=5812 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 271.580703][ T30] audit: type=1400 audit(1750696326.639:8228): avc: denied { read write } for pid=5822 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 271.671450][ T30] audit: type=1400 audit(1750696326.679:8229): avc: denied { prog_load } for pid=10292 comm="syz.1.1665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.725224][ T30] audit: type=1400 audit(1750696326.679:8230): avc: denied { prog_load } for pid=10292 comm="syz.1.1665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.794492][ T30] audit: type=1400 audit(1750696326.699:8231): avc: denied { map_create } for pid=10292 comm="syz.1.1665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.877222][ T30] audit: type=1400 audit(1750696326.699:8232): avc: denied { map_create } for pid=10293 comm="syz.3.1666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 271.930541][ T30] audit: type=1400 audit(1750696326.699:8233): avc: denied { prog_load } for pid=10293 comm="syz.3.1666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.000424][ T30] audit: type=1400 audit(1750696326.699:8234): avc: denied { prog_load } for pid=10293 comm="syz.3.1666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.064892][ T30] audit: type=1400 audit(1750696326.699:8235): avc: denied { prog_load } for pid=10293 comm="syz.3.1666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 272.100494][ T30] audit: type=1400 audit(1750696326.699:8236): avc: denied { create } for pid=10293 comm="syz.3.1666" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=0 [ 275.855570][T10442] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.870688][T10442] bridge0: entered allmulticast mode [ 276.078221][T10455] netlink: 'syz.0.1737': attribute type 1 has an invalid length. [ 276.307021][T10466] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=10466 comm=syz.3.1742 [ 276.531984][ T30] kauditd_printk_skb: 1934 callbacks suppressed [ 276.532001][ T30] audit: type=1400 audit(1750696331.649:10171): avc: denied { map_create } for pid=10473 comm="syz.1.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.565259][ T30] audit: type=1400 audit(1750696331.669:10172): avc: denied { map_create } for pid=10472 comm="syz.0.1745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.586354][ T30] audit: type=1400 audit(1750696331.679:10173): avc: denied { prog_load } for pid=10472 comm="syz.0.1745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.607443][ T30] audit: type=1400 audit(1750696331.679:10174): avc: denied { prog_load } for pid=10472 comm="syz.0.1745" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.627788][ T30] audit: type=1400 audit(1750696331.699:10175): avc: denied { prog_load } for pid=10473 comm="syz.1.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.647663][ T30] audit: type=1400 audit(1750696331.699:10176): avc: denied { prog_load } for pid=10473 comm="syz.1.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.683859][ T30] audit: type=1400 audit(1750696331.699:10177): avc: denied { prog_load } for pid=10473 comm="syz.1.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.703770][ T30] audit: type=1400 audit(1750696331.709:10178): avc: denied { read write } for pid=5813 comm="syz-executor" name="loop0" dev="devtmpfs" ino=647 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 276.770066][ T30] audit: type=1400 audit(1750696331.719:10179): avc: denied { prog_load } for pid=10473 comm="syz.1.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 276.795636][ T30] audit: type=1400 audit(1750696331.719:10180): avc: denied { prog_load } for pid=10473 comm="syz.1.1746" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 381.950290][ C1] rcu: INFO: rcu_preempt self-detected stall on CPU [ 381.956922][ C1] rcu: 1-...!: (10500 ticks this GP) idle=e24c/1/0x4000000000000000 softirq=35336/45518 fqs=0 [ 381.967931][ C1] rcu: (t=10501 jiffies g=28641 q=119 ncpus=2) [ 381.974172][ C1] rcu: rcu_preempt kthread timer wakeup didn't happen for 10500 jiffies! g28641 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 381.986502][ C1] rcu: Possible timer handling issue on cpu=0 timer-softirq=20034 [ 381.994398][ C1] rcu: rcu_preempt kthread starved for 10501 jiffies! g28641 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=0 [ 382.005755][ C1] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 382.015712][ C1] rcu: RCU grace-period kthread stack dump: [ 382.021587][ C1] task:rcu_preempt state:I stack:27928 pid:16 tgid:16 ppid:2 task_flags:0x208040 flags:0x00004000 [ 382.033503][ C1] Call Trace: [ 382.036776][ C1] [ 382.039716][ C1] __schedule+0x116a/0x5de0 [ 382.044244][ C1] ? __lock_acquire+0x622/0x1c90 [ 382.049197][ C1] ? __pfx___schedule+0x10/0x10 [ 382.054052][ C1] ? find_held_lock+0x2b/0x80 [ 382.058729][ C1] ? schedule+0x2d7/0x3a0 [ 382.063063][ C1] schedule+0xe7/0x3a0 [ 382.067132][ C1] schedule_timeout+0x123/0x290 [ 382.071984][ C1] ? __pfx_schedule_timeout+0x10/0x10 [ 382.077358][ C1] ? __pfx_process_timeout+0x10/0x10 [ 382.082650][ C1] ? _raw_spin_unlock_irqrestore+0x3b/0x80 [ 382.088456][ C1] ? prepare_to_swait_event+0xf5/0x480 [ 382.093921][ C1] rcu_gp_fqs_loop+0x1ea/0xb00 [ 382.098691][ C1] ? __pfx_rcu_gp_fqs_loop+0x10/0x10 [ 382.104068][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 382.109266][ C1] ? __pfx_rcu_gp_init+0x10/0x10 [ 382.114206][ C1] ? rcu_gp_cleanup+0x7c1/0xd90 [ 382.119079][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 382.124889][ C1] rcu_gp_kthread+0x270/0x380 [ 382.129570][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 382.134777][ C1] ? rcu_is_watching+0x12/0xc0 [ 382.139540][ C1] ? lockdep_hardirqs_on+0x7c/0x110 [ 382.144742][ C1] ? __kthread_parkme+0x19e/0x250 [ 382.149769][ C1] ? __pfx_rcu_gp_kthread+0x10/0x10 [ 382.154996][ C1] kthread+0x3c2/0x780 [ 382.159064][ C1] ? __pfx_kthread+0x10/0x10 [ 382.163651][ C1] ? rcu_is_watching+0x12/0xc0 [ 382.168415][ C1] ? __pfx_kthread+0x10/0x10 [ 382.172999][ C1] ret_from_fork+0x5d4/0x6f0 [ 382.177591][ C1] ? __pfx_kthread+0x10/0x10 [ 382.182174][ C1] ret_from_fork_asm+0x1a/0x30 [ 382.186953][ C1] [ 382.189991][ C1] Sending NMI from CPU 1 to CPUs 0: [ 382.190015][ C0] NMI backtrace for cpu 0 [ 382.190025][ C0] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.16.0-rc3-syzkaller #0 PREEMPT(full) [ 382.190041][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 382.190048][ C0] RIP: 0010:rcu_is_watching+0x41/0xc0 [ 382.190065][ C0] Code: ce 93 89 c5 83 f8 07 0f 87 82 00 00 00 48 8d 3c ed a0 6d f2 8d 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 <75> 5c 48 03 1c ed a0 6d f2 8d 48 b8 00 00 00 00 00 fc ff df 48 89 [ 382.190078][ C0] RSP: 0018:ffffc90000007ca8 EFLAGS: 00000046 [ 382.190089][ C0] RAX: dffffc0000000000 RBX: ffffffff93ce0228 RCX: 0000000000000000 [ 382.190098][ C0] RDX: 1ffffffff1be4db4 RSI: ffffffff8c1579a0 RDI: ffffffff8df26da0 [ 382.190107][ C0] RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000 [ 382.190115][ C0] R10: 0000000000000001 R11: ffffffff9aff4550 R12: 0000000000000001 [ 382.190123][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 382.190132][ C0] FS: 0000000000000000(0000) GS:ffff888124753000(0000) knlGS:0000000000000000 [ 382.190145][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 382.190154][ C0] CR2: 00007fd4d25b7bac CR3: 000000005efd7000 CR4: 00000000003526f0 [ 382.190163][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 382.190170][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 382.190178][ C0] Call Trace: [ 382.190183][ C0] [ 382.190188][ C0] lock_acquire+0x2cd/0x350 [ 382.190208][ C0] ? do_raw_spin_unlock+0x172/0x230 [ 382.190223][ C0] _raw_spin_lock_irqsave+0x3a/0x60 [ 382.190239][ C0] ? debug_object_deactivate+0x135/0x3a0 [ 382.190260][ C0] debug_object_deactivate+0x135/0x3a0 [ 382.190279][ C0] ? __pfx_debug_object_activate+0x10/0x10 [ 382.190299][ C0] ? __pfx_debug_object_deactivate+0x10/0x10 [ 382.190320][ C0] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 382.190336][ C0] __hrtimer_run_queues+0x46f/0xad0 [ 382.190353][ C0] ? __pfx___hrtimer_run_queues+0x10/0x10 [ 382.190367][ C0] ? read_tsc+0x9/0x20 [ 382.190384][ C0] hrtimer_interrupt+0x397/0x8e0 [ 382.190403][ C0] __sysvec_apic_timer_interrupt+0x108/0x3f0 [ 382.190423][ C0] sysvec_apic_timer_interrupt+0x9f/0xc0 [ 382.190440][ C0] [ 382.190445][ C0] [ 382.190449][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 382.190464][ C0] RIP: 0010:pv_native_safe_halt+0xf/0x20 [ 382.190481][ C0] Code: 6b 72 02 e9 03 fb 02 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 0f 00 2d 63 f0 29 00 fb f4 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 66 90 90 90 90 90 90 [ 382.190493][ C0] RSP: 0018:ffffffff8e207e08 EFLAGS: 000002c2 [ 382.190503][ C0] RAX: 00000000005ddd33 RBX: 0000000000000000 RCX: ffffffff8b801c19 [ 382.190511][ C0] RDX: 0000000000000000 RSI: ffffffff8de19d38 RDI: ffffffff8c157a20 [ 382.190519][ C0] RBP: fffffbfff1c52ef0 R08: 0000000000000001 R09: ffffed1017086645 [ 382.190527][ C0] R10: ffff8880b843322b R11: 0000000000000001 R12: 0000000000000000 [ 382.190535][ C0] R13: ffffffff8e297780 R14: ffffffff90a81150 R15: 0000000000000000 [ 382.190546][ C0] ? ct_kernel_exit+0x139/0x190 [ 382.190566][ C0] default_idle+0x13/0x20 [ 382.190578][ C0] default_idle_call+0x6d/0xb0 [ 382.190589][ C0] do_idle+0x391/0x510 [ 382.190605][ C0] ? __pfx_do_idle+0x10/0x10 [ 382.190621][ C0] ? trace_sched_exit_tp+0x31/0x130 [ 382.190641][ C0] cpu_startup_entry+0x4f/0x60 [ 382.190656][ C0] rest_init+0x16b/0x2b0 [ 382.190669][ C0] ? acpi_subsystem_init+0x133/0x180 [ 382.190685][ C0] ? __pfx_x86_late_time_init+0x10/0x10 [ 382.190704][ C0] start_kernel+0x3ee/0x4d0 [ 382.190721][ C0] x86_64_start_reservations+0x18/0x30 [ 382.190738][ C0] x86_64_start_kernel+0x130/0x190 [ 382.190755][ C0] common_startup_64+0x13e/0x148 [ 382.190772][ C0] [ 382.191011][ C1] CPU: 1 UID: 0 PID: 10495 Comm: syz.2.1755 Not tainted 6.16.0-rc3-syzkaller #0 PREEMPT(full) [ 382.191030][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 382.191039][ C1] RIP: 0010:smp_call_function_many_cond+0xd98/0x1510 [ 382.191060][ C1] Code: 01 e6 41 83 c5 03 e8 f7 1b 0c 00 f3 90 41 0f b6 06 41 38 c5 7c 08 84 c0 0f 85 6f 05 00 00 8b 43 08 31 ff 83 e0 01 89 c5 89 c6 13 17 0c 00 85 ed 75 d3 e8 ca 1b 0c 00 e8 c5 1b 0c 00 8b 6c 24 [ 382.191074][ C1] RSP: 0018:ffffc90004ed7928 EFLAGS: 00000202 [ 382.191087][ C1] RAX: 0000000000000001 RBX: ffff8880b84421e0 RCX: ffffc9000c0da000 [ 382.191097][ C1] RDX: 0000000000080000 RSI: 0000000000000001 RDI: 0000000000000000 [ 382.191106][ C1] RBP: 0000000000000001 R08: 0000000000000005 R09: 0000000000000000 [ 382.191115][ C1] R10: 0000000000000001 R11: 0000000000000001 R12: dffffc0000000000 [ 382.191125][ C1] R13: 0000000000000003 R14: ffffed101708843d R15: ffff8880b853b580 [ 382.191135][ C1] FS: 00007fd4d31d06c0(0000) GS:ffff888124853000(0000) knlGS:0000000000000000 [ 382.191150][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 382.191160][ C1] CR2: 00007fd4d31cff98 CR3: 0000000078c31000 CR4: 00000000003526f0 [ 382.191170][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 382.191179][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 382.191189][ C1] Call Trace: [ 382.191198][ C1] [ 382.191205][ C1] ? __pfx_retrigger_next_event+0x10/0x10 [ 382.191230][ C1] ? find_held_lock+0x2b/0x80 [ 382.191250][ C1] ? __pfx_smp_call_function_many_cond+0x10/0x10 [ 382.191269][ C1] ? do_raw_spin_lock+0x12c/0x2b0 [ 382.191292][ C1] ? mark_held_locks+0x49/0x80 [ 382.191314][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 382.191339][ C1] clock_was_set+0x642/0x870 [ 382.191363][ C1] ? __pfx_clock_was_set+0x10/0x10 [ 382.191383][ C1] ? rcu_is_watching+0x12/0xc0 [ 382.191401][ C1] ? _raw_spin_unlock_irqrestore+0x52/0x80 [ 382.191426][ C1] timekeeping_inject_offset+0x2e3/0x3f0 [ 382.191451][ C1] ? __pfx_timekeeping_inject_offset+0x10/0x10 [ 382.191476][ C1] ? bpf_lsm_capable+0x9/0x10 [ 382.191493][ C1] ? security_capable+0x7e/0x260 [ 382.191515][ C1] do_adjtimex+0x36f/0xaa0 [ 382.191541][ C1] ? __pfx_do_adjtimex+0x10/0x10 [ 382.191589][ C1] ? __pfx_posix_clock_realtime_adj+0x10/0x10 [ 382.191613][ C1] __do_sys_clock_adjtime+0x172/0x290 [ 382.191637][ C1] ? __pfx___do_sys_clock_adjtime+0x10/0x10 [ 382.191683][ C1] ? do_user_addr_fault+0x843/0x1370 [ 382.191709][ C1] ? rcu_is_watching+0x12/0xc0 [ 382.191731][ C1] do_syscall_64+0xcd/0x4c0 [ 382.191757][ C1] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 382.191772][ C1] RIP: 0033:0x7fd4d238e929 [ 382.191786][ C1] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 382.191800][ C1] RSP: 002b:00007fd4d31d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000131 [ 382.191814][ C1] RAX: ffffffffffffffda RBX: 00007fd4d25b5fa0 RCX: 00007fd4d238e929 [ 382.191824][ C1] RDX: 0000000000000000 RSI: 0000200000000480 RDI: 0000000000000000 [ 382.191834][ C1] RBP: 00007fd4d2410b39 R08: 0000000000000000 R09: 0000000000000000 [ 382.191844][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 382.191853][ C1] R13: 0000000000000001 R14: 00007fd4d25b5fa0 R15: 00007ffddeb0edc8 [ 382.191879][ C1]