last executing test programs: 23m28.209714176s ago: executing program 1 (id=151): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000100)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f00000000c0)='./file1\x00') mkdirat(0xffffffffffffff9c, 0x0, 0x220) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x40000, 0x120) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x888000, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) 23m27.215320139s ago: executing program 1 (id=152): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) syz_clone(0x126400, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1032025, 0x0) 23m24.808997262s ago: executing program 0 (id=153): close(0xffffffffffffffff) r0 = socket$kcm(0x29, 0x2, 0x0) write$cgroup_pressure(r0, &(0x7f0000000140)={'full'}, 0xfffffdef) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0xfffffffffffffc76, &(0x7f00000000c0)={0x0}, 0x1, 0x0, 0x0, 0x4800}, 0x24044000) 23m24.299402594s ago: executing program 1 (id=154): r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000000)=@mangle={'mangle\x00', 0x2, 0x6, 0x678, 0x248, 0x3e8, 0x0, 0x4d8, 0x4d8, 0x5a8, 0x5a8, 0x5a8, 0x5a8, 0x5a8, 0x6, 0x0, {[{{@ipv6={@mcast1, @private1, [], [0xffffffff, 0xff000000], 'pimreg0\x00', 'macvtap0\x00', {}, {}, 0x21, 0x0, 0x6}, 0x0, 0x120, 0x168, 0x0, {0x7a00000010000000}, [@inet=@rpfilter={{0x28}, {0x1}}, @common=@inet=@multiport={{0x50}, {0x0, 0x0, [0x4e22, 0x4e22, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4e22], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@private=0xa000000, @ipv4=@empty, 0xa, 0x30, 0x1}}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38}}, {{@ipv6={@ipv4={'\x00', '\xff\xff', @loopback}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [0x0, 0x0, 0x0, 0xffffff00], [], '\x00', 'bond_slave_0\x00', {}, {}, 0x2f, 0x9}, 0x0, 0x168, 0x1a0, 0x48000000, {}, [@common=@ah={{0x30}, {[0x4d2, 0x4d3], 0xa000000, 0x4, 0x3}}, @common=@srh1={{0x90}, {0xc, 0x3, 0x4, 0x8, 0x8, @ipv4={'\x00', '\xff\xff', @loopback}, @private1, @private0, [0xff, 0xff000000, 0x0, 0xff000000], [0xffffffff, 0xffffff00, 0x0, 0xff], [0xff000000, 0x0, 0x0, 0x80], 0x804, 0x400}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x0, 0x6, 0x5}, {0xffffffffffffffff, 0x6, 0x1}, {0x0, 0x4, 0x2}, 0xfffffffe}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4, @ipv4=@loopback, 0x0, 0xfe}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@inet=@TCPMSS={0x28, 'TCPMSS\x00', 0x0, {0x9}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6d8) 23m23.139539168s ago: executing program 1 (id=155): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000440)={0x38, 0x3, 0x8, 0x201, 0x0, 0x0, {0x7}, [@CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x6}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0xffffff90}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x4}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x10}, 0x2000d0a0) 23m22.571133894s ago: executing program 1 (id=156): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000100)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f00000000c0)='./file1\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x220) r0 = openat(0xffffffffffffff9c, 0x0, 0x40000, 0x120) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x888000, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) 23m21.414344487s ago: executing program 1 (id=157): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x75}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000380)='GPL\x00', 0x1, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 23m20.90616522s ago: executing program 0 (id=158): mount$bpf(0x0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000100), 0x10000, 0x0) syz_clone(0x126400, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x1032025, 0x0) 23m18.793571794s ago: executing program 0 (id=159): r0 = socket$kcm(0x11, 0x3, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = socket$unix(0x1, 0x1, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000440)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x0, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xb}, {0xffff, 0xffff}, {0xb}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0xa, 0x7f61, 0xfffffffd, 0xc5, 0xe23, 0x1, 0x1, 0x7fff, 0x1}}}}]}, 0x58}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000940)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x870b926, 0x25dfdc01, {0x0, 0x0, 0x0, r8, {0x0, 0xd}, {0xffff, 0xb}, {0xffff, 0xffe0}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x2c, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0xc, 0x1, 0x5, 0xdb, 0x6, 0x8}, {0x7, 0x0, 0x9, 0x2, 0x1, 0xfffffffd}, 0x5, 0x2000000, 0x8a6}}]}}]}, 0x58}, 0x1, 0x0, 0x0, 0x240040e0}, 0x4890) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$kcm(r0, &(0x7f00000000c0)={&(0x7f0000000580)=@xdp={0x2c, 0x0, r9, 0x3e}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000180)="27030200590214000600002fb96d", 0xe}], 0x1}, 0x0) 23m17.660435136s ago: executing program 0 (id=160): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000080)) r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'ip6gretap0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x3, r1, 0x1, 0x1, 0x6, @broadcast}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xe9, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000080)=ANY=[@ANYRES8=r1, @ANYRES8=r0], 0xdd12}], 0x1, 0x0, 0x0, 0x20040800}, 0x20040051) 23m16.97471529s ago: executing program 0 (id=161): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000100)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f00000000c0)='./file1\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x220) r0 = openat(0xffffffffffffff9c, 0x0, 0x40000, 0x120) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x888000, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) 23m16.486653311s ago: executing program 0 (id=162): r0 = gettid() socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) timer_create(0x0, &(0x7f00000014c0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000000200)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) setrlimit(0x6, &(0x7f0000000000)={0x3, 0x5}) 22m35.454735829s ago: executing program 32 (id=157): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x75}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000380)='GPL\x00', 0x1, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r1, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 22m30.623434426s ago: executing program 33 (id=162): r0 = gettid() socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) timer_create(0x0, &(0x7f00000014c0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000000200)) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x5}) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x77359400}}, 0x0) setrlimit(0x6, &(0x7f0000000000)={0x3, 0x5}) 21m11.760769379s ago: executing program 2 (id=163): prlimit64(0x0, 0x7, &(0x7f0000000300), 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x800) 21m9.767887075s ago: executing program 2 (id=165): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1400000010000100000000000000000000fc000a20000000000a03000000000000000000070000000900010073797a30000000004c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a3000000000080005400000001c08000640ffffff000800034000000028580000000c0a01010000000000000000070000000900020073797a31000000000900010073797a30000000002c0003"], 0xec}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFQNL_MSG_CONFIG(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8001}, 0x80) 21m8.199869385s ago: executing program 2 (id=166): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000100)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f00000000c0)='./file1\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x220) r0 = openat(0xffffffffffffff9c, 0x0, 0x40000, 0x120) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x888000, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r2, 0xc018937c, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) 21m6.781961505s ago: executing program 2 (id=167): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x800, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x770, 0x0, 0xbabd}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000cc0)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, {@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x33}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', {}, {}, {}, 0x0, 0x3502, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 20m57.958263086s ago: executing program 3 (id=171): r0 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r0, r2, 0x25, 0x4, @void}, 0xd) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="18020000fcfff1ff00000000000000008500000036000000850000005000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000280)={r3, r5, 0x25, 0x4, @void}, 0x10) 20m56.603814002s ago: executing program 3 (id=172): socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x9d, 0x11e41e7a, 0x20000000, 0x0, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = fsopen(&(0x7f0000000280)='ceph\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r4, 0x1, &(0x7f0000000b40)='source', &(0x7f0000000040)='c:::\x00', 0x0) gettid() bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r1, 0xffffffffffffffff, 0x1e, 0x0, @val=@netkit={@void, @value=r1}}, 0x1c) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f00000003c0)='.\x00', 0x0, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) sysfs$2(0x2, 0x817fff, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000240)=@newlink={0x34, 0x10, 0xff05, 0x0, 0x0, {0x0, 0x0, 0x4a00, 0x0, 0x8001}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @batadv={{0xb}, {0x4}}}]}, 0x34}}, 0x0) 20m44.678490331s ago: executing program 3 (id=173): syz_open_dev$usbmon(0x0, 0x0, 0x301880) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x22, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xe4b, 0x11e41e7a, 0x20000000, 0x3, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xfffffffffffffea1, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x9}, 0x80}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x10000000000002) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000280)={@multicast2, @local, @broadcast}, 0xc) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000400)={0x0, 0x2000}, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000002180)='net/mcfilter\x00') preadv(r4, &(0x7f0000000380)=[{0x0}], 0x1, 0x6, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="3000000010000100"/20, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\b\x00\n\x00', @ANYRES32=0x0, @ANYBLOB="08001b"], 0x30}, 0x1, 0x0, 0x0, 0x24000890}, 0x0) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$alg(0xffffffffffffffff, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb-twofish-3way\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c", 0x15) r7 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x800) sendmmsg$alg(r7, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="f78d9ca38fff48f3be52163448412ba8", 0x10}, {&(0x7f0000000140)="ebe3a0e9796cfd1647e299f4e376fdba128280b372219d205e81f4a7f71c1926aae1efd7e0054a863f3d5cfe6cb55b5bb9fa6935849e6098ed884e7cb51726b360fbb37b4fe035bbb09587", 0x4b}, {&(0x7f00000003c0)="e8700e444d", 0x5}], 0x3, &(0x7f0000000380)=[@op={0x10, 0x117, 0x3, 0x1}], 0x10}], 0x1, 0x40800) recvmsg(r7, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x7ffff000}, {&(0x7f0000000200)=""/83, 0x20000253}], 0x2}, 0x0) connect$inet(r6, &(0x7f00000000c0)={0x2, 0x1020, @remote}, 0x10) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) sendfile(r6, r8, 0x0, 0x4000000000010046) 20m23.353972006s ago: executing program 3 (id=174): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) write$evdev(r2, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000300)=""/50) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_buf(r3, 0x6, 0x3, 0x0, 0x300) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000007c0)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x1, 0x25dfdbfd, {0x0, 0x0, 0x0, r5, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x3, 0x3, 0x6361, 0x7, 0xffffffff, 0x3}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40088c1}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001040)=@newqdisc={0x3c, 0x24, 0x4ee4e6a52ff56541, 0x70b926, 0x25dfdc01, {0x0, 0x0, 0x0, r5, {0x8, 0xd}, {0xffff, 0xb}, {0xffff, 0xffe0}}, [@qdisc_kind_options=@q_codel={{0xa}, {0xc, 0x2, [@TCA_CODEL_CE_THRESHOLD={0x8, 0x5, 0x4}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x240040e0}, 0x4890) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r6) sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) 20m21.637158935s ago: executing program 3 (id=175): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc3c0000000c0a010100000000000000000a0000070900020073797a31000000000900010073797a3100000000100003800c000080080003400000000214000000110001"], 0xa0}, 0x1, 0x0, 0x0, 0x24000850}, 0xc0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002f40)=ANY=[@ANYBLOB="40000000210a010900000000000000000a0000010900020073797a31000000000900010073797a31"], 0x40}, 0x1, 0x0, 0x0, 0x24000801}, 0x8040) 20m21.460150046s ago: executing program 34 (id=167): ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f00000000c0)=0x800, 0x4) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x770, 0x0, 0xbabd}, 0x1c) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000cc0)=@newsa={0x138, 0x1a, 0x713, 0x0, 0x0, {{@in=@empty, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, {@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x33}, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', {}, {}, {}, 0x0, 0x3502, 0x2}, [@algo_auth_trunc={0x4c, 0x14, {{'sha1\x00'}}}]}, 0x138}}, 0x0) 20m18.960840965s ago: executing program 3 (id=177): socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xba, &(0x7f0000000140)=""/186, 0x40f00, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee4, 0x0, 0x2, 0xbfdffffc}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x40, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x8001}}) io_uring_enter(r3, 0x2b93, 0xf9d0, 0x22, 0x0, 0x0) 19m33.131364939s ago: executing program 35 (id=177): socket$netlink(0x10, 0x3, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xba, &(0x7f0000000140)=""/186, 0x40f00, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee4, 0x0, 0x2, 0xbfdffffc}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x40, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x8001}}) io_uring_enter(r3, 0x2b93, 0xf9d0, 0x22, 0x0, 0x0) 17m5.67053811s ago: executing program 4 (id=211): r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000000)={0x3fffffffffffff69, &(0x7f0000001ac0)=[{0x0, 0x1000}]}) 17m3.669945689s ago: executing program 4 (id=213): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000340)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x1, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x3, 0x3, 0x6361, 0x7, 0xffffffff, 0x3}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40088c1}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000002c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70b926, 0x25dfdc01, {0x0, 0x0, 0x0, r3, {0x0, 0xd}, {0xffff, 0xb}, {0xd, 0xb}}, [@qdisc_kind_options=@q_skbprio={{0xc}, {0x8, 0x2, 0x4af}}]}, 0x38}, 0x1, 0x0, 0x0, 0x240040e0}, 0x4008000) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r6 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r6, &(0x7f0000000240)="800000800000210ee7decd7a0000", 0xe, 0x40, &(0x7f00000001c0)={0x11, 0x8100, r5, 0x1, 0xd8, 0x6, @broadcast}, 0x14) 17m0.892723589s ago: executing program 4 (id=215): r0 = socket$nl_route(0x10, 0x3, 0x0) capset(&(0x7f0000000000)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200003, 0x0, 0x0, 0x7}) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000500)=@newtaction={0x14, 0x30, 0x871a15abc695fb3d, 0x0, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) 16m59.200795679s ago: executing program 4 (id=217): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000007c0), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f0000000080)={0x1, 0x7f}) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)=r1) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1, r1}) ioctl$VHOST_SET_VRING_CALL(r0, 0x4008af21, &(0x7f0000000780)={0x1, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000180)=""/53, 0x0}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, &(0x7f0000000380)=""/247, &(0x7f00000000c0)=""/87, &(0x7f0000000800)=""/90}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000680)={0x1, 0x0, [{0x0, 0xfffffeac, &(0x7f00000001c0)=""/115}]}) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000340)=0x1) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r0, 0xc400941d, &(0x7f0000000380)={0x0, 0x3ff, 0x5}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) 16m57.359643518s ago: executing program 4 (id=219): r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=[{0xc, 0x84}], 0xc}, 0x41) 16m53.760990902s ago: executing program 4 (id=221): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xe4b, 0x11e41e7a, 0x20000000, 0x3, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000380)=0x34) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0xfffffffffffffefb, &(0x7f0000000400)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket(0x1d, 0x2, 0x6) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b80)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a3000000000d0000000160a01000000000000000000010000010900010073797a30000000000900020073797a3000000000a40003800800014000000000900003801400010076657468305f746f5f62617461647600140001006d6163766c616e3100000000000000002800010076657468310000000000000000000000140001006772653000000000000000000000000014000100776c616e3100000000000000000000001400010076657468315f766972745f77696669001400010076657468305f746f5f626f6e640000000800024000000006c8000000180a0101000b000000000000010000000900010073797a30000000009c0003800800014000000000900003801400010069703665727370616e300000000000001400010076657468305f6d61637674616ff7000014000100626f6e645f736c6176655f310000000014000100626f6e645f736c6176655f30000000001400010063616966300000000000000000000000140001006d616373656330000000000000000000140001007465616d5f736c6176655f30000000000900020073797a300000000014000000"], 0x1e0}}, 0x0) bind$can_j1939(r3, &(0x7f0000000040)={0x1d, 0x0, 0x8000000000000003}, 0x18) prlimit64(r0, 0x4, &(0x7f00000001c0)={0x6, 0x6400}, &(0x7f0000000280)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) socket(0x11, 0xa, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000003060101"], 0x28}, 0x1, 0x0, 0x0, 0x84}, 0x800) r6 = epoll_create(0x40) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000180)) 16m8.443753091s ago: executing program 36 (id=221): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0xa4, 0x30, 0x1, 0x0, 0x0, {}, [{0x90, 0x1, [@m_ct={0x44, 0x2, 0x0, 0x0, {{0x7}, {0x1c, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xe4b, 0x11e41e7a, 0x20000000, 0x3, 0xf}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x0, 0x1}}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x8}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000380)=0x34) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000003c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0xfffffffffffffefb, &(0x7f0000000400)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket(0x1d, 0x2, 0x6) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b80)=ANY=[@ANYBLOB="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"], 0x1e0}}, 0x0) bind$can_j1939(r3, &(0x7f0000000040)={0x1d, 0x0, 0x8000000000000003}, 0x18) prlimit64(r0, 0x4, &(0x7f00000001c0)={0x6, 0x6400}, &(0x7f0000000280)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz1\x00', 0x1ff) socket(0x11, 0xa, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000003060101"], 0x28}, 0x1, 0x0, 0x0, 0x84}, 0x800) r6 = epoll_create(0x40) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, 0xffffffffffffffff, &(0x7f0000000180)) 10m34.892750571s ago: executing program 5 (id=350): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000340), 0xffffffffffffffff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r3, &(0x7f00000002c0)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r3, 0x2) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f0000000940)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000600)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x80, r2, 0x8, 0x8, 0x25dfdbfc, {}, [@ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_HEADER={0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netdevsim0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000280)="ad56b6c5", 0x4) r5 = accept4(r4, 0x0, 0x0, 0x800) sendmmsg$alg(r5, &(0x7f0000000040)=[{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000080)="f78d9ca38fff48f3be52163448412ba8", 0xfffffe3f}, {&(0x7f0000000140)="ebe3a0e9796cfd1647e299f4e376fdba128280b372219d205e81f4a7f71c1926aae1efd7e0054a863f3d5cfe6cb55b5bb9fa6935849e6098ed884e7cb51726b360fbb37b4fe035bbb095873048"}, {&(0x7f00000003c0)="e8700e444d50a969ff67347cff6127e6ef12ee3819271482a4975a52c1ab9b8b4db3945d1032005eabe97b4dc33a47d3a158da988456d30026b433186f53cdcdb93a4722bf306a10470d50f5cb1ece9ead3459bab1cf1538cd0b157653c5e892962c80f158c443e9c6ad7d2a8103ef2f4b93766b9a21501f94c1568b13756b66f74f46cf801704d2da8b96c34070b233af0afcc436712e58ed25e721193af05a045ad3fdc928f02f3dbad19d3e66eebda2e63f3f46ef4511cee26d7b48241847bf9e343ef4674c45e2a085060f11"}], 0x1, &(0x7f0000000380)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x40800) recvmsg(r5, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/81, 0x7ffff000}, {&(0x7f0000000200)=""/83, 0x20000253}], 0x2}, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000700)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "f900f5", 0x18, 0x6, 0x1, @local, @local, {[], {{0x0, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x0, 0x0, 0x0, {[@fastopen={0x1e, 0x2}]}}}}}}}}, 0x0) 10m31.04313288s ago: executing program 5 (id=351): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) unshare(0x2040400) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0xb, 0xff, 0x5, 0x7f, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r3}, &(0x7f0000000780)=0x7d8, &(0x7f0000000180)='%pK \x00'}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000440)={{r3, 0xffffffffffffffff}, &(0x7f0000000100)=0x7d8, &(0x7f0000000140)='%pi6 \x00'}, 0x20) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000480)={0x0, &(0x7f0000000200)=""/197, &(0x7f0000000380), &(0x7f0000000300), 0x2, r4}, 0x38) 9m57.788999686s ago: executing program 5 (id=367): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143042, 0x49) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x80013, r0, 0x8000000) 9m56.029433671s ago: executing program 5 (id=369): r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0xc, &(0x7f0000000000)=0x201, 0x4) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="240000004a00030007000000800000000a"], 0x24}}, 0x400040c0) 9m54.451685793s ago: executing program 5 (id=370): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000300)=[{0x6, 0x5, 0x7, 0x7ffc0001}]}) signalfd(0xffffffffffffffff, &(0x7f0000000040)={[0x24bc]}, 0x8) 9m53.183412015s ago: executing program 5 (id=371): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) read(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) mbind(&(0x7f00001fa000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x304000, 0x800, 0x0, 0x3}, 0x20) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 9m7.601142831s ago: executing program 37 (id=371): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) read(0xffffffffffffffff, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x19) mbind(&(0x7f00001fa000/0x2000)=nil, 0x2000, 0x1, 0x0, 0x0, 0x0) setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x304000, 0x800, 0x0, 0x3}, 0x20) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x9) 1m19.380708655s ago: executing program 6 (id=503): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000180)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbee2, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000040)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x2b) sendmsg$rds(r3, &(0x7f0000000080)={&(0x7f0000000180)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0}, 0x0) 1m14.207620531s ago: executing program 7 (id=504): prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x0}, 0x68) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='environ\x00') mmap(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x1000001, 0x132, 0xffffffffffffffff, 0x6ad42000) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) read$FUSE(r0, &(0x7f00000037c0)={0x2020}, 0x2020) 1m12.962801952s ago: executing program 7 (id=505): mkdir(&(0x7f0000000300)='./bus\x00', 0x2) setxattr$trusted_overlay_opaque(&(0x7f0000000180)='./bus\x00', &(0x7f00000001c0), 0x0, 0x0, 0x1) listxattr(&(0x7f0000000200)='./bus\x00', &(0x7f0000000400)=""/4109, 0x100d) 1m12.203649791s ago: executing program 7 (id=506): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/13], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = openat$udambuf(0xffffffffffffff9c, &(0x7f0000000340), 0x2) ftruncate(0xffffffffffffffff, 0xffff) fcntl$addseals(0xffffffffffffffff, 0x409, 0x7) r4 = ioctl$UDMABUF_CREATE(r3, 0x40187542, &(0x7f0000000000)={0xffffffffffffffff, 0x0, 0x0, 0x8000}) ioctl$DMA_BUF_IOCTL_SYNC(r4, 0x40086200, 0x0) ioctl$SOUND_MIXER_READ_RECSRC(0xffffffffffffffff, 0x80044dff, 0x0) r5 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180), 0x40e02, 0x0) write$rfkill(r5, &(0x7f0000000300)={0x0, 0x2, 0x3, 0x1, 0x1}, 0x8) 1m5.971191926s ago: executing program 6 (id=507): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x80065c9}, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x8003}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x70, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x48, 0x4, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, @bitwise={{0xc}, @val={0x34, 0x2, 0x0, 0x1, [@NFTA_BITWISE_LEN={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_BITWISE_SREG={0x8, 0x1, 0x1, 0x0, 0x14}, @NFTA_BITWISE_DREG={0x8, 0x2, 0x1, 0x0, 0x12}, @NFTA_BITWISE_XOR={0xc, 0x5, 0x0, 0x1, [@NFTA_DATA_VALUE={0x8, 0x1, "88634d58"}]}, @NFTA_BITWISE_MASK={0xc, 0x4, 0x0, 0x1, [@NFTA_DATA_VALUE={0x8, 0x1, "6eee7e00"}]}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0xe4}}, 0x0) 1m4.564242808s ago: executing program 6 (id=508): r0 = syz_usb_connect$hid(0x0, 0x3f, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1b1c, 0xc10, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x2d, 0x1, 0x0, 0x0, 0x60, 0x0, [{{0x9, 0x4, 0x0, 0x80, 0x2, 0x3, 0x0, 0x0, 0x0, {0x9, 0x21, 0x406, 0x0, 0x1, {0x22, 0x5}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0x9, 0x8, 0x7}}, [{{0x9, 0x5, 0x2, 0x3, 0x40, 0x9, 0x9, 0x9}}]}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, &(0x7f00000003c0)={0x2c, &(0x7f00000000c0)=ANY=[@ANYBLOB="000008000000080482"], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_ep_write(r0, 0x81, 0x2, &(0x7f0000000040)="74b0") syz_usb_ep_write(r0, 0x81, 0x1, &(0x7f0000000180)='@') 1m3.740526901s ago: executing program 6 (id=509): r0 = syz_open_dev$usbfs(0x0, 0xb, 0x101301) ioctl$USBDEVFS_CLAIMINTERFACE(r0, 0x8004550f, &(0x7f0000000380)=0x1) 1m3.251572033s ago: executing program 6 (id=510): r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x8000, 0x0, @mcast2, 0x7}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x10, 0x0, &(0x7f00000002c0)) 1m2.739384126s ago: executing program 6 (id=511): ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)={0x5, 0x4}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sync() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0xfffffffc, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_io_uring_setup(0x4f0e, &(0x7f0000000480)={0x0, 0x0, 0x1}, &(0x7f0000000080)=0x0, &(0x7f0000000040)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sync() io_uring_enter(r1, 0x62dd, 0x0, 0x0, 0x0, 0x0) 48.211969589s ago: executing program 7 (id=512): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000b80), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000c00)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000d00)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f0000000c40)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="ffff2dbd7000fbdbdf250100000008000300", @ANYRES32=r2], 0x34}, 0x1, 0x0, 0x0, 0x40000}, 0x4084) 45.701492132s ago: executing program 7 (id=513): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=0x0]) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000000100)='autofs\x00', 0x0, &(0x7f0000000400)) chdir(&(0x7f00000000c0)='./file1\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x220) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x40000, 0x120) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000300), 0x2, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x888000, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, 0x0) 45.159957017s ago: executing program 7 (id=514): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) shmget$private(0x0, 0x800000, 0x880, &(0x7f0000173000/0x800000)=nil) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x4, @private=0xa010101}, {0x1, @broadcast}, 0x4a, {0x2, 0x102, @initdev={0xac, 0x1e, 0x2, 0x0}}, 'veth1_to_bridge\x00'}) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={0x0, 0x10}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) mmap$snddsp_control(&(0x7f0000ffc000/0x2000)=nil, 0x1000, 0x600000a, 0x82012, 0xffffffffffffffff, 0x83000000) syz_open_dev$sndctrl(&(0x7f0000000100), 0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)='gid=0,no9\xe1\x12 \x91\xfdP\x83\x0e\xb9G!8\xb0\x89\x99\x81\x02\x85\x1cE\b\x9f\x0f8-\xf6\xa4 \x99\x8d\x1d\x8a\xc7\xc5\x96\xe8Ee\xd5\xac\x18(\x9d\tIr\xdd\\\x95\x9eu}\x06ib\x88\x8c\x9d\xde\xeaT0;\xb4\x1f\x8cm\x15y\xb4[Gc\xaf\xee#\xcf>Qk\xcf\xfc\x12bY\xfc&\x93\xe0\xcc#\x93w\x84@/VV\xbc\x0eL\xeb~1\x832\xa7\xf7l\x1b\xffh\x96O\x84h\x1b\'\x15\xae\xc8\xfbrK1\x1b\x82\\kU{!\x8fe\xbd\xfa\xf3\xac\xdc\x9a7\xbb\xdf\xdf\n\xc4U\xfa\x15\x03e\xe2[\xa6\xd3\xce%\b#s\x05\x00\x00\xc0\x03\x84\x0e\xc3\x0e\xce\x1e\xe4\xc8\xd4s\xd8\xe4W\x8a\x18j\xc4S\xbf\xc9\xcc1\x87\xa0\f\x91/\x8b\a\xdd\x1bj\xff\xae\xfcJM\x9b\xc3\xe6q\xc1T\x19\xa9,\xef\x8ax\xbb\x18\xe7\x99\xff\x10\x15S\x19\'?\xfbt/\x86\xc6\xd3\xb2c\xc4*\x06\x05NT\xaa_\x97\xda8\xc8\xd0\x8d\x87Yk\xa1\x83\x9f\x86.[\x83\xdf&\x13\xcc\xb9\x01`D7R\xb7o\xa1\x1e\xffD#\t\x18i\xed\xa4<\x9c\x02\x00\x82\xbd\x93\x9e+\x03\xc6w?\x83\x05\x0e\xf3TB]\xc0V\x1b\xf3\xfe\xe1s1r\xcb\xbc9\x19#3k\xd4#r\x9e=C\xd6k\xf89S\xb3\xf4\x84\xd8)\x17L\xeb\xf4\xf3iW\xe6\x9b\x8a\x13\x01\x0ej\x88N\xb5\xf7e;\xdd\xe1\xfc\x9c\x8a\xae>=n\xb3\x12\x7f\x94\x19~\x93\x92xK\x9b\x9e\xa6\x9e\x16v\"e\xe80\xa3%oS\xb4\xad\xb1\xb6\xe0\xef\x1fy\xf2\x1aN\xd7\xee\\*6\xa6\x8e\x84 \xc5\xc0\xd4/\x0eVg\xc1\xd9\xcb\xdc\xc7p)1\x00u\xa5\x8c\n\x91l\xef\x17\xfc\xc2\xef\xb9\x03\b*\x1c\xc6\xe8\x9a\xe0o\xba\x1d {%\x904\xa2\x8f\xed\xca%Z\x1a#\xddA7\x1b\xdf\xd5]\xc6\x0f\x9a\xf5)g\x8c\x98\x9e\xe6\x9b\xbd\x96\xc3\xb6}3\x98r\\.o\xe0\xee\x1d\x80\x0f\x8c\xa0%>]\x9a{=\xdd\x80\x13.\x96\xf9]u\x96P\xdb+A\xaa\xce\x9dP\xde\v\x16\x1d\x05\xbe\xd3\x8c\x99\xb2\x1b\xccX\xfdy\x05\xb0Q]bB') 16.622794831s ago: executing program 38 (id=511): ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, &(0x7f0000000300)={0x5, 0x4}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) sync() socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) read$FUSE(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0xfffffffc, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = syz_io_uring_setup(0x4f0e, &(0x7f0000000480)={0x0, 0x0, 0x1}, &(0x7f0000000080)=0x0, &(0x7f0000000040)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x40, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sync() io_uring_enter(r1, 0x62dd, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 39 (id=514): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) shmget$private(0x0, 0x800000, 0x880, &(0x7f0000173000/0x800000)=nil) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x4, @private=0xa010101}, {0x1, @broadcast}, 0x4a, {0x2, 0x102, @initdev={0xac, 0x1e, 0x2, 0x0}}, 'veth1_to_bridge\x00'}) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000000ac0)={0x0, 0x0, &(0x7f0000000a80)={0x0, 0x10}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) mmap$snddsp_control(&(0x7f0000ffc000/0x2000)=nil, 0x1000, 0x600000a, 0x82012, 0xffffffffffffffff, 0x83000000) syz_open_dev$sndctrl(&(0x7f0000000100), 0x0, 0x0) prctl$PR_GET_TSC(0x19, 0x0) mount(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)='gid=0,no9\xe1\x12 \x91\xfdP\x83\x0e\xb9G!8\xb0\x89\x99\x81\x02\x85\x1cE\b\x9f\x0f8-\xf6\xa4 \x99\x8d\x1d\x8a\xc7\xc5\x96\xe8Ee\xd5\xac\x18(\x9d\tIr\xdd\\\x95\x9eu}\x06ib\x88\x8c\x9d\xde\xeaT0;\xb4\x1f\x8cm\x15y\xb4[Gc\xaf\xee#\xcf>Qk\xcf\xfc\x12bY\xfc&\x93\xe0\xcc#\x93w\x84@/VV\xbc\x0eL\xeb~1\x832\xa7\xf7l\x1b\xffh\x96O\x84h\x1b\'\x15\xae\xc8\xfbrK1\x1b\x82\\kU{!\x8fe\xbd\xfa\xf3\xac\xdc\x9a7\xbb\xdf\xdf\n\xc4U\xfa\x15\x03e\xe2[\xa6\xd3\xce%\b#s\x05\x00\x00\xc0\x03\x84\x0e\xc3\x0e\xce\x1e\xe4\xc8\xd4s\xd8\xe4W\x8a\x18j\xc4S\xbf\xc9\xcc1\x87\xa0\f\x91/\x8b\a\xdd\x1bj\xff\xae\xfcJM\x9b\xc3\xe6q\xc1T\x19\xa9,\xef\x8ax\xbb\x18\xe7\x99\xff\x10\x15S\x19\'?\xfbt/\x86\xc6\xd3\xb2c\xc4*\x06\x05NT\xaa_\x97\xda8\xc8\xd0\x8d\x87Yk\xa1\x83\x9f\x86.[\x83\xdf&\x13\xcc\xb9\x01`D7R\xb7o\xa1\x1e\xffD#\t\x18i\xed\xa4<\x9c\x02\x00\x82\xbd\x93\x9e+\x03\xc6w?\x83\x05\x0e\xf3TB]\xc0V\x1b\xf3\xfe\xe1s1r\xcb\xbc9\x19#3k\xd4#r\x9e=C\xd6k\xf89S\xb3\xf4\x84\xd8)\x17L\xeb\xf4\xf3iW\xe6\x9b\x8a\x13\x01\x0ej\x88N\xb5\xf7e;\xdd\xe1\xfc\x9c\x8a\xae>=n\xb3\x12\x7f\x94\x19~\x93\x92xK\x9b\x9e\xa6\x9e\x16v\"e\xe80\xa3%oS\xb4\xad\xb1\xb6\xe0\xef\x1fy\xf2\x1aN\xd7\xee\\*6\xa6\x8e\x84 \xc5\xc0\xd4/\x0eVg\xc1\xd9\xcb\xdc\xc7p)1\x00u\xa5\x8c\n\x91l\xef\x17\xfc\xc2\xef\xb9\x03\b*\x1c\xc6\xe8\x9a\xe0o\xba\x1d {%\x904\xa2\x8f\xed\xca%Z\x1a#\xddA7\x1b\xdf\xd5]\xc6\x0f\x9a\xf5)g\x8c\x98\x9e\xe6\x9b\xbd\x96\xc3\xb6}3\x98r\\.o\xe0\xee\x1d\x80\x0f\x8c\xa0%>]\x9a{=\xdd\x80\x13.\x96\xf9]u\x96P\xdb+A\xaa\xce\x9dP\xde\v\x16\x1d\x05\xbe\xd3\x8c\x99\xb2\x1b\xccX\xfdy\x05\xb0Q]bB') kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:57507' (ED25519) to the list of known hosts. [ 275.754735][ T30] audit: type=1400 audit(275.180:46): avc: denied { name_bind } for pid=3316 comm="sshd-session" src=30004 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 276.547504][ T30] audit: type=1400 audit(275.970:47): avc: denied { execute } for pid=3317 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 276.583505][ T30] audit: type=1400 audit(276.010:48): avc: denied { execute_no_trans } for pid=3317 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 286.095527][ T30] audit: type=1400 audit(285.520:49): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 286.163459][ T30] audit: type=1400 audit(285.590:50): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 286.232069][ T3317] cgroup: Unknown subsys name 'net' [ 286.325473][ T30] audit: type=1400 audit(285.750:51): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 286.829573][ T3317] cgroup: Unknown subsys name 'cpuset' [ 286.901117][ T3317] cgroup: Unknown subsys name 'rlimit' [ 287.317610][ T30] audit: type=1400 audit(286.740:52): avc: denied { setattr } for pid=3317 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 287.324189][ T30] audit: type=1400 audit(286.750:53): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 287.339446][ T30] audit: type=1400 audit(286.770:54): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 288.176281][ T3320] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 288.185814][ T30] audit: type=1400 audit(287.620:55): avc: denied { relabelto } for pid=3320 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 288.190125][ T30] audit: type=1400 audit(287.620:56): avc: denied { write } for pid=3320 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 288.304691][ T30] audit: type=1400 audit(287.730:57): avc: denied { read } for pid=3317 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 288.310531][ T30] audit: type=1400 audit(287.740:58): avc: denied { open } for pid=3317 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 288.341742][ T3317] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 329.395326][ T30] audit: type=1400 audit(328.820:59): avc: denied { execmem } for pid=3321 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 329.580602][ T30] audit: type=1400 audit(329.010:60): avc: denied { read } for pid=3323 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 329.596204][ T30] audit: type=1400 audit(329.010:61): avc: denied { open } for pid=3324 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 329.608025][ T30] audit: type=1400 audit(329.040:62): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 329.678860][ T30] audit: type=1400 audit(329.110:63): avc: denied { module_request } for pid=3323 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 329.923696][ T30] audit: type=1400 audit(329.350:64): avc: denied { sys_module } for pid=3324 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 337.137550][ T3324] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 337.271646][ T3324] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 339.770870][ T3323] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 339.847378][ T3323] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 341.419504][ T3324] hsr_slave_0: entered promiscuous mode [ 341.448155][ T3324] hsr_slave_1: entered promiscuous mode [ 344.970112][ T30] audit: type=1400 audit(344.400:65): avc: denied { create } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 344.987945][ T30] audit: type=1400 audit(344.420:66): avc: denied { write } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 345.006777][ T30] audit: type=1400 audit(344.440:67): avc: denied { read } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 345.165433][ T3323] hsr_slave_0: entered promiscuous mode [ 345.185637][ T3323] hsr_slave_1: entered promiscuous mode [ 345.200856][ T3323] debugfs: 'hsr0' already exists in 'hsr' [ 345.204563][ T3323] Cannot create hsr debugfs directory [ 345.228845][ T3324] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 345.336410][ T3324] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 345.516240][ T3324] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 345.595414][ T3324] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 348.366904][ T3323] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 348.449919][ T3323] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 348.498655][ T3323] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 348.554796][ T3323] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 350.738749][ T3324] 8021q: adding VLAN 0 to HW filter on device bond0 [ 354.136477][ T3323] 8021q: adding VLAN 0 to HW filter on device bond0 [ 368.689032][ T3324] veth0_vlan: entered promiscuous mode [ 368.915279][ T3324] veth1_vlan: entered promiscuous mode [ 369.942089][ T3324] veth0_macvtap: entered promiscuous mode [ 370.289012][ T3324] veth1_macvtap: entered promiscuous mode [ 371.230605][ T26] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 371.259198][ T26] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 371.300855][ T26] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 371.341595][ T26] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 372.337905][ T30] audit: type=1400 audit(371.750:68): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.4EzYso/syz-tmp" dev="vda" ino=1876 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 372.365119][ T30] audit: type=1400 audit(371.790:69): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 372.459713][ T30] audit: type=1400 audit(371.890:70): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.4EzYso/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 372.549732][ T30] audit: type=1400 audit(371.980:71): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 372.870464][ T30] audit: type=1400 audit(372.280:72): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.4EzYso/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 372.948980][ T30] audit: type=1400 audit(372.380:73): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/syzkaller.4EzYso/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3730 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 373.061536][ T30] audit: type=1400 audit(372.470:74): avc: denied { unmount } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 373.089791][ T30] audit: type=1400 audit(372.520:75): avc: denied { mounton } for pid=3324 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1546 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 373.153741][ T30] audit: type=1400 audit(372.580:76): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="gadgetfs" ino=4217 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 373.215143][ T30] audit: type=1400 audit(372.640:77): avc: denied { mount } for pid=3324 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 373.259698][ T3323] veth0_vlan: entered promiscuous mode [ 373.441913][ T3323] veth1_vlan: entered promiscuous mode [ 373.840756][ T3324] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 374.406247][ T3323] veth0_macvtap: entered promiscuous mode [ 374.561450][ T3323] veth1_macvtap: entered promiscuous mode [ 376.501991][ T12] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 376.537393][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 376.537874][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 376.539453][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 380.991417][ T3475] block nbd0: Receive control failed (result -32) [ 381.139249][ T3474] block nbd0: shutting down sockets [ 382.470043][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 382.555251][ T30] audit: type=1400 audit(381.900:83): avc: denied { create } for pid=3477 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 382.556415][ T30] audit: type=1400 audit(381.970:84): avc: denied { write } for pid=3477 comm="syz.1.2" path="socket:[4268]" dev="sockfs" ino=4268 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 382.661334][ T30] audit: type=1400 audit(382.090:85): avc: denied { prog_load } for pid=3478 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 382.699469][ T30] audit: type=1400 audit(382.100:86): avc: denied { bpf } for pid=3478 comm="syz.0.3" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 382.801176][ T30] audit: type=1400 audit(382.230:87): avc: denied { perfmon } for pid=3478 comm="syz.0.3" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 383.098855][ T30] audit: type=1400 audit(382.510:88): avc: denied { prog_run } for pid=3478 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 383.153472][ T30] audit: type=1400 audit(382.580:89): avc: denied { create } for pid=3478 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 383.190425][ T30] audit: type=1400 audit(382.610:90): avc: denied { setopt } for pid=3478 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 386.048101][ T30] audit: type=1400 audit(385.480:91): avc: denied { create } for pid=3486 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 388.085664][ T30] audit: type=1400 audit(387.510:92): avc: denied { create } for pid=3491 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 388.116573][ T30] audit: type=1400 audit(387.550:93): avc: denied { write } for pid=3491 comm="syz.1.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 389.014859][ T30] audit: type=1400 audit(388.450:94): avc: denied { create } for pid=3493 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 391.085806][ T30] audit: type=1400 audit(390.500:95): avc: denied { write } for pid=3500 comm="syz.0.10" lport=262 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 394.123601][ T30] audit: type=1400 audit(393.550:96): avc: denied { map_create } for pid=3511 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 394.160266][ T30] audit: type=1400 audit(393.590:97): avc: denied { map_read map_write } for pid=3511 comm="syz.1.16" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 396.383576][ T30] audit: type=1400 audit(395.810:98): avc: denied { create } for pid=3516 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 396.403325][ T30] audit: type=1400 audit(395.830:99): avc: denied { write } for pid=3516 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 396.404827][ T30] audit: type=1400 audit(395.830:100): avc: denied { nlmsg_write } for pid=3516 comm="syz.0.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 398.113266][ C0] hrtimer: interrupt took 1386704 ns [ 399.935546][ T3531] capability: warning: `syz.0.24' uses deprecated v2 capabilities in a way that may be insecure [ 400.035970][ T30] audit: type=1400 audit(399.460:101): avc: denied { unmount } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 402.319173][ T30] audit: type=1400 audit(401.750:102): avc: denied { setopt } for pid=3538 comm="syz.1.26" lport=17 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 403.741379][ T3545] autofs: Unknown parameter '0x0000000000000000' [ 403.835787][ T30] audit: type=1400 audit(403.260:103): avc: denied { read write } for pid=3543 comm="syz.0.28" name="fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 403.854356][ T30] audit: type=1400 audit(403.270:104): avc: denied { open } for pid=3543 comm="syz.0.28" path="/dev/fuse" dev="devtmpfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 404.226537][ T30] audit: type=1400 audit(403.650:105): avc: denied { read } for pid=3543 comm="syz.0.28" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 404.249356][ T30] audit: type=1400 audit(403.660:106): avc: denied { open } for pid=3543 comm="syz.0.28" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 404.298651][ T30] audit: type=1400 audit(403.720:107): avc: denied { ioctl } for pid=3543 comm="syz.0.28" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 404.830611][ T30] audit: type=1400 audit(404.230:108): avc: denied { unmount } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 408.519840][ T3558] autofs: Unknown parameter '0x0000000000000000' [ 409.926432][ T3563] netlink: 17 bytes leftover after parsing attributes in process `syz.0.37'. [ 411.136555][ T30] audit: type=1400 audit(410.560:109): avc: denied { create } for pid=3564 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 411.198495][ T30] audit: type=1400 audit(410.630:110): avc: denied { create } for pid=3565 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 411.269869][ T30] audit: type=1400 audit(410.700:111): avc: denied { write } for pid=3565 comm="syz.0.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 417.896508][ T3587] netlink: 60 bytes leftover after parsing attributes in process `syz.0.47'. [ 417.927602][ T3587] netlink: 60 bytes leftover after parsing attributes in process `syz.0.47'. [ 418.005738][ T3587] netlink: 60 bytes leftover after parsing attributes in process `syz.0.47'. [ 420.706172][ T3592] Zero length message leads to an empty skb [ 423.901224][ T3603] autofs: Unknown parameter 'fd0x0000000000000000' [ 424.588476][ T30] audit: type=1400 audit(424.020:112): avc: denied { remount } for pid=3606 comm="syz.0.56" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 425.320512][ T30] audit: type=1400 audit(424.750:113): avc: denied { create } for pid=3612 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 426.587052][ T3618] autofs: Unknown parameter 'fd0x0000000000000000' [ 430.330220][ T3633] autofs: Unknown parameter 'fd0x0000000000000000' [ 431.198281][ T30] audit: type=1400 audit(430.630:114): avc: denied { mount } for pid=3629 comm="syz.1.67" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 431.339124][ T30] audit: type=1400 audit(430.770:115): avc: denied { remount } for pid=3629 comm="syz.1.67" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 432.614923][ T30] audit: type=1400 audit(432.040:116): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 439.276580][ T3665] netlink: 'syz.1.79': attribute type 1 has an invalid length. [ 439.296026][ T3665] netlink: 'syz.1.79': attribute type 2 has an invalid length. [ 439.757461][ T3666] netlink: 8 bytes leftover after parsing attributes in process `syz.0.80'. [ 439.759478][ T3666] netlink: 8 bytes leftover after parsing attributes in process `syz.0.80'. [ 444.030512][ T30] audit: type=1400 audit(443.460:117): avc: denied { read } for pid=3678 comm="syz.1.87" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 446.064688][ T3687] netlink: 36 bytes leftover after parsing attributes in process `syz.0.91'. [ 446.654364][ T30] audit: type=1400 audit(446.080:118): avc: denied { create } for pid=3690 comm="syz.0.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 446.678781][ T30] audit: type=1400 audit(446.110:119): avc: denied { write } for pid=3690 comm="syz.0.92" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 447.054754][ T30] audit: type=1400 audit(446.480:120): avc: denied { read write } for pid=3324 comm="syz-executor" name="loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 447.097941][ T30] audit: type=1400 audit(446.500:121): avc: denied { open } for pid=3324 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 447.101794][ T30] audit: type=1400 audit(446.500:122): avc: denied { ioctl } for pid=3324 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=638 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 450.636619][ T30] audit: type=1400 audit(450.060:123): avc: denied { name_bind } for pid=3702 comm="syz.0.97" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 450.679549][ T30] audit: type=1400 audit(450.090:124): avc: denied { node_bind } for pid=3702 comm="syz.0.97" saddr=::1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 452.196151][ T3708] capability: warning: `syz.0.99' uses 32-bit capabilities (legacy support in use) [ 457.027287][ T30] audit: type=1400 audit(456.460:125): avc: denied { read write } for pid=3723 comm="syz.1.106" name="rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 457.031349][ T30] audit: type=1400 audit(456.460:126): avc: denied { open } for pid=3723 comm="syz.1.106" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=713 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 458.779834][ T30] audit: type=1400 audit(458.210:127): avc: denied { read } for pid=3730 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 459.353933][ T30] audit: type=1400 audit(458.780:128): avc: denied { setopt } for pid=3730 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 459.859396][ T30] audit: type=1400 audit(459.290:129): avc: denied { append } for pid=3735 comm="syz.0.111" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 461.255204][ T3741] syz_tun: entered allmulticast mode [ 461.473934][ T3740] syz_tun: left allmulticast mode [ 474.485095][ T30] audit: type=1400 audit(473.910:130): avc: denied { allowed } for pid=3759 comm="syz.1.121" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 474.578144][ T30] audit: type=1400 audit(474.000:131): avc: denied { create } for pid=3759 comm="syz.1.121" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 474.611625][ T30] audit: type=1400 audit(474.040:132): avc: denied { map } for pid=3759 comm="syz.1.121" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 474.630224][ T30] audit: type=1400 audit(474.060:133): avc: denied { read write } for pid=3759 comm="syz.1.121" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5207 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 476.160910][ T30] audit: type=1400 audit(475.590:134): avc: denied { load_policy } for pid=3764 comm="syz.0.122" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 476.246665][ T3765] SELinux: failed to load policy [ 481.978537][ T30] audit: type=1400 audit(481.410:135): avc: denied { create } for pid=3773 comm="syz.0.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 482.095660][ T30] audit: type=1400 audit(481.530:136): avc: denied { connect } for pid=3773 comm="syz.0.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 482.209751][ T30] audit: type=1400 audit(481.640:137): avc: denied { setopt } for pid=3773 comm="syz.0.126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 482.241552][ T30] audit: type=1400 audit(481.670:138): avc: denied { ioctl } for pid=3773 comm="syz.0.126" path="socket:[5221]" dev="sockfs" ino=5221 ioctlcmd=0x894b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 482.459051][ T30] audit: type=1400 audit(481.890:139): avc: denied { map } for pid=3775 comm="syz.1.127" path="socket:[5225]" dev="sockfs" ino=5225 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 483.459124][ T30] audit: type=1400 audit(482.890:140): avc: denied { create } for pid=3778 comm="syz.1.129" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=nfc_socket permissive=1 [ 484.317183][ T30] audit: type=1400 audit(483.750:141): avc: denied { mount } for pid=3777 comm="syz.0.128" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 484.489807][ T30] audit: type=1400 audit(483.920:142): avc: denied { remount } for pid=3777 comm="syz.0.128" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 485.939260][ T30] audit: type=1400 audit(485.330:143): avc: denied { unmount } for pid=3324 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 487.614589][ T30] audit: type=1400 audit(487.040:144): avc: denied { ioctl } for pid=3792 comm="syz.0.134" path="socket:[4812]" dev="sockfs" ino=4812 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 493.019820][ T30] audit: type=1400 audit(492.450:145): avc: denied { name_bind } for pid=3811 comm="syz.0.139" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 493.958420][ T30] audit: type=1400 audit(493.390:146): avc: denied { connect } for pid=3813 comm="syz.1.140" lport=4 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 494.010173][ T3814] syz.1.140 uses obsolete (PF_INET,SOCK_PACKET) [ 494.116406][ T30] audit: type=1400 audit(493.550:147): avc: denied { ioctl } for pid=3813 comm="syz.1.140" path="socket:[5269]" dev="sockfs" ino=5269 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 497.674925][ T30] audit: type=1400 audit(497.080:148): avc: denied { create } for pid=3820 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 497.694710][ T30] audit: type=1400 audit(497.120:150): avc: denied { mount } for pid=3828 comm="syz.1.146" name="/" dev="autofs" ino=4857 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 497.705303][ T30] audit: type=1400 audit(497.100:149): avc: denied { write open } for pid=3820 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf.eth0.ra" dev="tmpfs" ino=1363 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 497.719946][ T30] audit: type=1400 audit(497.140:151): avc: denied { append } for pid=3820 comm="dhcpcd-run-hook" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1363 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 497.769612][ T30] audit: type=1400 audit(497.200:152): avc: denied { getattr } for pid=3820 comm="dhcpcd-run-hook" path="/tmp/resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 497.918736][ T30] audit: type=1400 audit(497.350:153): avc: denied { unmount } for pid=3323 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=filesystem permissive=1 [ 498.667894][ T30] audit: type=1400 audit(498.080:154): avc: denied { read } for pid=3831 comm="cmp" name="resolv.conf" dev="tmpfs" ino=2 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 499.510541][ T30] audit: type=1400 audit(498.940:155): avc: denied { read } for pid=3835 comm="syz.0.148" name="rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 499.558524][ T30] audit: type=1400 audit(498.990:156): avc: denied { open } for pid=3835 comm="syz.0.148" path="/dev/rtc0" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 499.615474][ T30] audit: type=1400 audit(499.050:157): avc: denied { ioctl } for pid=3835 comm="syz.0.148" path="/dev/rtc0" dev="devtmpfs" ino=709 ioctlcmd=0x700f scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 499.637690][ T30] audit: type=1400 audit(499.070:158): avc: denied { unlink } for pid=3834 comm="rm" name="resolv.conf.eth0.ra" dev="tmpfs" ino=1363 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 507.644692][ T30] audit: type=1400 audit(507.060:159): avc: denied { mounton } for pid=3856 comm="syz.1.156" path="/80/file1/file0" dev="autofs" ino=5334 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_t tclass=dir permissive=1 [ 511.230571][ T3863] syzkaller0: entered promiscuous mode [ 511.231155][ T3863] syzkaller0: entered allmulticast mode [ 511.324937][ T3863] sch_tbf: burst 12 is lower than device syzkaller0 mtu (1514) ! [ 511.345433][ T30] audit: type=1400 audit(510.780:160): avc: denied { write } for pid=3862 comm="syz.0.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 512.218439][ T30] audit: type=1400 audit(511.650:161): avc: denied { bind } for pid=3864 comm="syz.0.160" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 554.630590][ T100] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 555.020107][ T100] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 555.325996][ T100] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 555.677563][ T100] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 557.540021][ T30] audit: type=1400 audit(556.950:162): avc: denied { read } for pid=3167 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 560.185772][ T100] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 560.310999][ T100] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 560.374008][ T100] bond0 (unregistering): Released all slaves [ 561.223724][ T100] hsr_slave_0: left promiscuous mode [ 561.238388][ T100] hsr_slave_1: left promiscuous mode [ 561.463673][ T100] veth1_macvtap: left promiscuous mode [ 561.477127][ T100] veth0_macvtap: left promiscuous mode [ 561.479423][ T100] veth1_vlan: left promiscuous mode [ 561.481181][ T100] veth0_vlan: left promiscuous mode [ 571.044973][ T12] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 571.461889][ T12] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 571.958995][ T12] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 572.471725][ T12] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 577.359863][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 577.478639][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 577.538523][ T12] bond0 (unregistering): Released all slaves [ 577.925554][ T12] hsr_slave_0: left promiscuous mode [ 577.931567][ T12] hsr_slave_1: left promiscuous mode [ 578.026207][ T12] veth1_macvtap: left promiscuous mode [ 578.027859][ T12] veth0_macvtap: left promiscuous mode [ 578.031803][ T12] veth1_vlan: left promiscuous mode [ 578.037402][ T12] veth0_vlan: left promiscuous mode [ 589.655648][ T3869] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 589.750279][ T3869] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 594.119844][ T3882] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 594.227800][ T3882] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 597.873919][ T3869] hsr_slave_0: entered promiscuous mode [ 597.901450][ T3869] hsr_slave_1: entered promiscuous mode [ 602.828473][ T3882] hsr_slave_0: entered promiscuous mode [ 602.838335][ T3882] hsr_slave_1: entered promiscuous mode [ 602.845151][ T3882] debugfs: 'hsr0' already exists in 'hsr' [ 602.846275][ T3882] Cannot create hsr debugfs directory [ 603.034877][ T3869] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 603.101413][ T3869] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 603.147736][ T3869] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 603.198005][ T3869] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 607.629699][ T3882] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 607.686167][ T3882] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 607.736290][ T3882] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 607.881436][ T3882] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 608.787229][ T3869] 8021q: adding VLAN 0 to HW filter on device bond0 [ 614.699475][ T3882] 8021q: adding VLAN 0 to HW filter on device bond0 [ 632.813676][ T3869] veth0_vlan: entered promiscuous mode [ 633.161780][ T3869] veth1_vlan: entered promiscuous mode [ 634.673192][ T3869] veth0_macvtap: entered promiscuous mode [ 634.889129][ T3869] veth1_macvtap: entered promiscuous mode [ 635.636955][ T12] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 635.650673][ T100] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 635.659519][ T100] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 635.660853][ T100] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 636.473258][ T30] audit: type=1400 audit(635.890:163): avc: denied { mounton } for pid=3869 comm="syz-executor" path="/syzkaller.ynX7yC/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=6012 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 638.506963][ T3882] veth0_vlan: entered promiscuous mode [ 638.859160][ T3882] veth1_vlan: entered promiscuous mode [ 640.809611][ T3882] veth0_macvtap: entered promiscuous mode [ 640.929721][ T3882] veth1_macvtap: entered promiscuous mode [ 641.607337][ T4078] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 641.611745][ T4078] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 641.619310][ T4078] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 641.644655][ T4078] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 653.529169][ T4123] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 673.860808][ T30] audit: type=1400 audit(673.270:164): avc: denied { write } for pid=4134 comm="syz.3.173" name="mcfilter" dev="proc" ino=4026532742 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 674.559038][ T4149] bond0: (slave bond_slave_0): Releasing backup interface [ 674.793485][ T4149] bond0: (slave bond_slave_1): Releasing backup interface [ 675.080793][ T4149] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 686.641815][ T30] audit: type=1400 audit(686.070:165): avc: denied { read write } for pid=4172 comm="syz.3.174" name="event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 686.669677][ T30] audit: type=1400 audit(686.090:166): avc: denied { open } for pid=4172 comm="syz.3.174" path="/dev/input/event0" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 686.799502][ T30] audit: type=1400 audit(686.230:167): avc: denied { ioctl } for pid=4172 comm="syz.3.174" path="/dev/input/event0" dev="devtmpfs" ino=749 ioctlcmd=0x4518 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 689.957539][ T4184] netlink: 20 bytes leftover after parsing attributes in process `syz.3.175'. [ 690.152409][ T4004] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 691.474737][ T4004] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 692.288986][ T4188] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 692.641021][ T4004] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 693.388103][ T4004] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 698.583918][ T4004] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 698.695282][ T4004] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 698.764034][ T4004] bond0 (unregistering): Released all slaves [ 699.213882][ T4004] hsr_slave_0: left promiscuous mode [ 699.221131][ T4004] hsr_slave_1: left promiscuous mode [ 699.358411][ T4004] veth1_macvtap: left promiscuous mode [ 699.362138][ T4004] veth0_macvtap: left promiscuous mode [ 699.374661][ T4004] veth1_vlan: left promiscuous mode [ 699.376272][ T4004] veth0_vlan: left promiscuous mode [ 723.831396][ T4181] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 724.006466][ T4181] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 732.746006][ T4181] hsr_slave_0: entered promiscuous mode [ 732.755330][ T4181] hsr_slave_1: entered promiscuous mode [ 736.856571][ T4181] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 737.079522][ T4181] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 737.379225][ T4181] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 737.687802][ T4181] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 746.838780][ T4181] 8021q: adding VLAN 0 to HW filter on device bond0 [ 766.689465][ T4248] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 766.787798][ T4248] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 777.571107][ T4248] hsr_slave_0: entered promiscuous mode [ 777.597880][ T4248] hsr_slave_1: entered promiscuous mode [ 777.603377][ T4248] debugfs: 'hsr0' already exists in 'hsr' [ 777.604586][ T4248] Cannot create hsr debugfs directory [ 785.689243][ T4248] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 786.051530][ T4248] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 786.301433][ T4248] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 786.630826][ T4248] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 795.091001][ T4181] veth0_vlan: entered promiscuous mode [ 795.811899][ T4181] veth1_vlan: entered promiscuous mode [ 797.465449][ T4181] veth0_macvtap: entered promiscuous mode [ 798.158906][ T4181] veth1_macvtap: entered promiscuous mode [ 800.570095][ T1191] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 800.570762][ T1191] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 800.598333][ T1191] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 800.598790][ T1191] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 801.847627][ T4248] 8021q: adding VLAN 0 to HW filter on device bond0 [ 807.744771][ T30] audit: type=1400 audit(807.160:168): avc: denied { create } for pid=4387 comm="syz.4.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 808.019609][ T30] audit: type=1400 audit(807.450:169): avc: denied { write } for pid=4387 comm="syz.4.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 808.078983][ T30] audit: type=1400 audit(807.460:170): avc: denied { nlmsg_write } for pid=4387 comm="syz.4.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 823.165764][ T30] audit: type=1400 audit(822.560:171): avc: denied { read write } for pid=4413 comm="syz.4.184" name="raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 823.239149][ T30] audit: type=1400 audit(822.600:172): avc: denied { open } for pid=4413 comm="syz.4.184" path="/dev/raw-gadget" dev="devtmpfs" ino=703 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 823.319643][ T30] audit: type=1400 audit(822.750:173): avc: denied { ioctl } for pid=4413 comm="syz.4.184" path="/dev/raw-gadget" dev="devtmpfs" ino=703 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 823.549748][ T4415] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 823.646176][ T4415] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 826.450228][ T30] audit: type=1400 audit(825.820:174): avc: denied { read write } for pid=4419 comm="syz.4.185" name="vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 826.530637][ T30] audit: type=1400 audit(825.960:175): avc: denied { open } for pid=4419 comm="syz.4.185" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 826.636421][ T30] audit: type=1400 audit(826.060:176): avc: denied { ioctl } for pid=4419 comm="syz.4.185" path="/dev/vhost-vsock" dev="devtmpfs" ino=716 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 843.655782][ T4452] netlink: 9 bytes leftover after parsing attributes in process `syz.4.190'. [ 853.629414][ T4248] veth0_vlan: entered promiscuous mode [ 853.812216][ T4248] veth1_vlan: entered promiscuous mode [ 854.341236][ T4248] veth0_macvtap: entered promiscuous mode [ 854.621324][ T4248] veth1_macvtap: entered promiscuous mode [ 856.280563][ T41] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.282219][ T41] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.285476][ T41] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.286920][ T41] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 858.856889][ T4466] netlink: 12 bytes leftover after parsing attributes in process `syz.4.192'. [ 858.945823][ T4466] netlink: 12 bytes leftover after parsing attributes in process `syz.4.192'. [ 859.586255][ T30] audit: type=1400 audit(859.020:177): avc: denied { create } for pid=4467 comm="syz.5.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 860.290872][ T30] audit: type=1400 audit(859.720:178): avc: denied { name_bind } for pid=4469 comm="syz.4.193" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 864.190608][ T30] audit: type=1400 audit(863.620:179): avc: denied { lock } for pid=4478 comm="syz.5.195" path="socket:[8380]" dev="sockfs" ino=8380 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 865.121629][ T4483] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 865.140263][ T4483] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 865.565581][ T4483] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 865.629991][ T4483] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 867.485888][ T4486] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 867.519817][ T4486] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 868.521364][ T30] audit: type=1400 audit(867.950:180): avc: denied { ioctl } for pid=4487 comm="syz.5.198" path="socket:[8395]" dev="sockfs" ino=8395 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 872.950011][ T30] audit: type=1400 audit(872.380:181): avc: denied { setopt } for pid=4497 comm="syz.5.201" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 874.900873][ T4501] erspan0: entered promiscuous mode [ 875.050611][ T4501] netlink: 8 bytes leftover after parsing attributes in process `syz.5.201'. [ 882.359888][ T4519] can0: slcan on ttynull. [ 883.040375][ T30] audit: type=1400 audit(882.470:182): avc: denied { ioctl } for pid=4520 comm="syz.5.210" path="socket:[8443]" dev="sockfs" ino=8443 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 883.236207][ T4518] can0 (unregistered): slcan off ttynull. [ 885.884718][ T30] audit: type=1400 audit(885.310:183): avc: denied { bind } for pid=4530 comm="syz.5.212" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 885.886499][ T30] audit: type=1400 audit(885.310:184): avc: denied { name_bind } for pid=4530 comm="syz.5.212" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 885.888171][ T30] audit: type=1400 audit(885.310:185): avc: denied { node_bind } for pid=4530 comm="syz.5.212" saddr=127.0.0.1 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 886.396224][ T4533] syzkaller0: entered promiscuous mode [ 886.399770][ T4533] syzkaller0: entered allmulticast mode [ 888.119808][ T30] audit: type=1400 audit(887.550:186): avc: denied { bind } for pid=4534 comm="syz.5.214" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 888.125571][ T30] audit: type=1400 audit(887.550:187): avc: denied { name_bind } for pid=4534 comm="syz.5.214" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 888.225892][ T30] audit: type=1400 audit(887.650:188): avc: denied { node_bind } for pid=4534 comm="syz.5.214" saddr=::ffff:0.0.0.0 src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 888.504673][ T30] audit: type=1400 audit(887.930:189): avc: denied { read } for pid=4534 comm="syz.5.214" path="socket:[8467]" dev="sockfs" ino=8467 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 889.878840][ T30] audit: type=1400 audit(889.290:190): avc: denied { read } for pid=4537 comm="syz.5.216" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 889.950084][ T30] audit: type=1400 audit(889.380:191): avc: denied { open } for pid=4537 comm="syz.5.216" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 890.097826][ T30] audit: type=1400 audit(889.530:192): avc: denied { ioctl } for pid=4537 comm="syz.5.216" path="/dev/binderfs/binder0" dev="binder" ino=10 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 890.121658][ T30] audit: type=1400 audit(889.540:193): avc: denied { set_context_mgr } for pid=4537 comm="syz.5.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 890.633797][ T30] audit: type=1400 audit(890.040:194): avc: denied { map } for pid=4537 comm="syz.5.216" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 890.812036][ T4539] binder: 4537:4539 tried to acquire reference to desc 0, got 1 instead [ 890.925415][ T30] audit: type=1400 audit(890.350:195): avc: denied { call } for pid=4537 comm="syz.5.216" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 891.020594][ T4539] binder: tried to use weak ref as strong ref [ 891.021349][ T4539] binder: 4537:4539 got transaction to invalid handle, 1 [ 891.047226][ T4539] binder: 4537:4539 cannot find target node [ 891.065669][ T4539] binder: 4537:4539 transaction call to 0:0 failed 12/29201/-22, code 0 size 0-0 line 3232 [ 891.164651][ T3383] binder: release 4537:4539 transaction 5 out, still active [ 891.205512][ T3383] binder: undelivered TRANSACTION_COMPLETE [ 891.326137][ T3319] binder: undelivered TRANSACTION_ERROR: 29201 [ 891.338559][ T3319] binder: send failed reply for transaction 5, target dead [ 898.171490][ T30] kauditd_printk_skb: 1 callbacks suppressed [ 898.178591][ T30] audit: type=1400 audit(897.600:197): avc: denied { node_bind } for pid=4555 comm="syz.5.222" saddr=172.20.20.170 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 901.922148][ T30] audit: type=1400 audit(901.350:198): avc: denied { bind } for pid=4553 comm="syz.4.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 902.514924][ T30] audit: type=1400 audit(901.940:199): avc: denied { create } for pid=4553 comm="syz.4.221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 911.609156][ T4566] input: syz0 as /devices/virtual/input/input1 [ 915.380678][ T2113] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 917.770750][ T2113] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 919.320708][ T2113] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 920.366138][ T2113] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 933.122294][ T2113] bond0 (unregistering): Released all slaves [ 933.800156][ T2113] hsr_slave_0: left promiscuous mode [ 933.815762][ T2113] hsr_slave_1: left promiscuous mode [ 933.995933][ T2113] veth1_macvtap: left promiscuous mode [ 934.000354][ T2113] veth0_macvtap: left promiscuous mode [ 934.005266][ T2113] veth1_vlan: left promiscuous mode [ 934.009079][ T2113] veth0_vlan: left promiscuous mode [ 935.526744][ T4584] mmap: syz.5.227 (4584) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 936.334439][ T30] audit: type=1400 audit(935.760:200): avc: denied { create } for pid=4581 comm="syz.5.227" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 941.357077][ T30] audit: type=1400 audit(940.790:201): avc: denied { execute } for pid=4588 comm="syz-executor" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 941.399992][ T30] audit: type=1400 audit(940.800:202): avc: denied { execute_no_trans } for pid=4588 comm="syz-executor" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 950.567179][ T2113] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 951.351224][ T2113] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 952.310149][ T2113] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 953.157833][ T2113] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 962.473682][ T2113] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 962.625310][ T2113] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 962.710775][ T2113] bond0 (unregistering): Released all slaves [ 963.601538][ T2113] hsr_slave_0: left promiscuous mode [ 963.666598][ T2113] hsr_slave_1: left promiscuous mode [ 963.958406][ T2113] veth1_macvtap: left promiscuous mode [ 963.959137][ T2113] veth0_macvtap: left promiscuous mode [ 963.967166][ T2113] veth1_vlan: left promiscuous mode [ 963.968550][ T2113] veth0_vlan: left promiscuous mode [ 964.168703][ T4615] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 964.171582][ T4615] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 964.207787][ T30] audit: type=1400 audit(963.640:203): avc: denied { write } for pid=4614 comm="syz.5.231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 964.350050][ T30] audit: type=1400 audit(963.780:204): avc: denied { open } for pid=4614 comm="syz.5.231" path="/dev/ptyqe" dev="devtmpfs" ino=126 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 964.465375][ T30] audit: type=1400 audit(963.870:205): avc: denied { read write } for pid=4614 comm="syz.5.231" name="nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 964.488802][ T30] audit: type=1400 audit(963.910:206): avc: denied { open } for pid=4614 comm="syz.5.231" path="/dev/nullb0" dev="devtmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 965.107882][ T30] audit: type=1400 audit(964.540:207): avc: denied { ioctl } for pid=4614 comm="syz.5.231" path="/dev/ptyqe" dev="devtmpfs" ino=126 ioctlcmd=0x5423 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bsdpty_device_t tclass=chr_file permissive=1 [ 977.837228][ T30] audit: type=1400 audit(977.260:208): avc: denied { mounton } for pid=4619 comm="syz.5.232" path="/23/file0" dev="tmpfs" ino=134 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 978.979828][ T30] audit: type=1400 audit(978.410:209): avc: denied { mounton } for pid=4619 comm="syz.5.232" path="/23/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=file permissive=1 [ 979.036650][ T30] audit: type=1400 audit(978.440:210): avc: denied { mount } for pid=4619 comm="syz.5.232" name="/" dev="configfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 982.352170][ T4638] fuse: Unknown parameter 'group_id00000000000000000000' [ 987.095385][ T4655] fuse: Bad value for 'user_id' [ 987.096346][ T4655] fuse: Bad value for 'user_id' [ 988.654441][ T4589] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 988.657531][ T4660] syzkaller1: entered promiscuous mode [ 988.657689][ T4660] syzkaller1: entered allmulticast mode [ 988.785204][ T4589] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 993.591829][ T4675] fuse: Bad value for 'user_id' [ 993.600918][ T4675] fuse: Bad value for 'user_id' [ 997.878287][ T4689] fuse: Bad value for 'user_id' [ 997.887389][ T4689] fuse: Bad value for 'user_id' [ 1000.015129][ T4589] hsr_slave_0: entered promiscuous mode [ 1000.020008][ T4589] hsr_slave_1: entered promiscuous mode [ 1000.306886][ T4697] netlink: 24 bytes leftover after parsing attributes in process `syz.5.248'. [ 1002.889339][ T4705] fuse: Bad value for 'fd' [ 1004.076177][ T4589] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1004.170239][ T4589] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1004.255475][ T30] audit: type=1400 audit(1003.670:211): avc: denied { block_suspend } for pid=4706 comm="syz.5.251" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 1004.360844][ T4589] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1004.537845][ T4589] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1015.566189][ T4734] fuse: Bad value for 'fd' [ 1018.845745][ T4589] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1023.016957][ T30] audit: type=1400 audit(1022.430:212): avc: denied { bind } for pid=4749 comm="syz.5.257" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 1023.150119][ T4751] netlink: 'syz.5.257': attribute type 10 has an invalid length. [ 1025.169617][ T4756] fuse: Bad value for 'fd' [ 1033.515663][ T4774] syzkaller0: entered promiscuous mode [ 1033.516642][ T4774] syzkaller0: entered allmulticast mode [ 1060.898205][ T4589] veth0_vlan: entered promiscuous mode [ 1061.346681][ T4589] veth1_vlan: entered promiscuous mode [ 1062.571495][ T4589] veth0_macvtap: entered promiscuous mode [ 1063.020367][ T4589] veth1_macvtap: entered promiscuous mode [ 1064.053830][ T4004] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1064.054379][ T4004] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1064.057750][ T4004] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1064.071358][ T4004] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1069.701848][ T30] audit: type=1400 audit(1069.130:213): avc: denied { read } for pid=4842 comm="syz.6.266" name="fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1069.705058][ T30] audit: type=1400 audit(1069.130:214): avc: denied { open } for pid=4842 comm="syz.6.266" path="/dev/fb0" dev="devtmpfs" ino=620 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:framebuf_device_t tclass=chr_file permissive=1 [ 1070.495374][ T4848] syzkaller0: entered promiscuous mode [ 1070.506051][ T4848] syzkaller0: entered allmulticast mode [ 1070.575073][ T30] audit: type=1400 audit(1070.010:215): avc: denied { write } for pid=4846 comm="syz.6.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1071.959070][ T30] audit: type=1400 audit(1071.390:216): avc: denied { ioctl } for pid=4850 comm="syz.6.268" path="socket:[9585]" dev="sockfs" ino=9585 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1075.328928][ T4861] binder: 4859:4861 ioctl c0306201 0 returned -14 [ 1075.356853][ T4861] binder: 4859:4861 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 1075.357405][ T4861] binder: 4861 RLIMIT_NICE not set [ 1077.101462][ T4865] netlink: 56 bytes leftover after parsing attributes in process `syz.5.272'. [ 1080.619370][ T4871] netlink: 'syz.6.274': attribute type 39 has an invalid length. [ 1099.501320][ T4923] fuse: Bad value for 'rootmode' [ 1130.221217][ T4960] fuse: Bad value for 'rootmode' [ 1133.021441][ T4965] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1133.032288][ T4965] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1143.128505][ T30] audit: type=1326 audit(1142.560:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4995 comm="syz.5.305" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 1143.146870][ T30] audit: type=1326 audit(1142.580:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4995 comm="syz.5.305" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 1143.177147][ T30] audit: type=1326 audit(1142.610:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4995 comm="syz.5.305" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 1143.187837][ T30] audit: type=1326 audit(1142.620:220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4995 comm="syz.5.305" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=1 ip=0x132360 code=0x7ffc0000 [ 1154.454885][ T5008] pim6reg: entered allmulticast mode [ 1167.009743][ T5024] netlink: 4 bytes leftover after parsing attributes in process `syz.5.312'. [ 1168.127764][ T5024] nbd: socks must be embedded in a SOCK_ITEM attr [ 1168.216641][ T5026] netlink: 4 bytes leftover after parsing attributes in process `syz.5.312'. [ 1168.237188][ T5026] nbd: device at index 64 is going down [ 1170.518489][ T5028] udevd[5028]: inotify_add_watch(7, /dev/nbd64, 10) failed: No such file or directory [ 1170.809125][ T5022] udevd[5022]: inotify_add_watch(7, /dev/nbd64, 10) failed: No such file or directory [ 1171.728834][ T30] audit: type=1400 audit(1171.160:221): avc: denied { bind } for pid=5032 comm="syz.5.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1174.626255][ T30] audit: type=1400 audit(1174.060:222): avc: denied { read } for pid=5038 comm="syz.6.317" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1174.629624][ T30] audit: type=1400 audit(1174.060:223): avc: denied { open } for pid=5038 comm="syz.6.317" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1177.013734][ T30] audit: type=1400 audit(1176.430:224): avc: denied { allowed } for pid=5046 comm="syz.5.320" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 1182.617276][ T30] audit: type=1400 audit(1182.050:225): avc: denied { create } for pid=5057 comm="syz.5.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1182.715104][ T30] audit: type=1400 audit(1182.120:226): avc: denied { create } for pid=5057 comm="syz.5.323" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1182.760929][ T30] audit: type=1400 audit(1182.190:227): avc: denied { map } for pid=5057 comm="syz.5.323" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10614 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1182.786106][ T30] audit: type=1400 audit(1182.220:228): avc: denied { read write } for pid=5057 comm="syz.5.323" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=10614 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 1183.107101][ T30] audit: type=1400 audit(1182.530:229): avc: denied { write } for pid=5057 comm="syz.5.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1185.937415][ T30] audit: type=1400 audit(1185.350:230): avc: denied { create } for pid=5063 comm="syz.6.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1186.034118][ T30] audit: type=1400 audit(1185.450:231): avc: denied { bind } for pid=5063 comm="syz.6.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1186.627797][ T30] audit: type=1400 audit(1186.060:232): avc: denied { setopt } for pid=5063 comm="syz.6.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1186.708448][ T30] audit: type=1400 audit(1186.140:233): avc: denied { accept } for pid=5063 comm="syz.6.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 1187.567102][ T30] audit: type=1400 audit(1186.990:234): avc: denied { write } for pid=5063 comm="syz.6.325" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 1207.521491][ T30] audit: type=1400 audit(1206.940:235): avc: denied { connect } for pid=5081 comm="syz.5.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1211.997208][ T30] audit: type=1400 audit(1211.430:236): avc: denied { read } for pid=5081 comm="syz.5.327" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 1212.725112][ T30] audit: type=1400 audit(1212.140:237): avc: denied { read } for pid=5081 comm="syz.5.327" name="card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1212.763462][ T30] audit: type=1400 audit(1212.160:238): avc: denied { open } for pid=5081 comm="syz.5.327" path="/dev/dri/card1" dev="devtmpfs" ino=619 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1212.911404][ T30] audit: type=1400 audit(1212.300:239): avc: denied { ioctl } for pid=5081 comm="syz.5.327" path="/dev/dri/card1" dev="devtmpfs" ino=619 ioctlcmd=0x64a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 1213.848688][ T30] audit: type=1400 audit(1213.280:240): avc: denied { map_create } for pid=5091 comm="syz.6.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1213.923152][ T30] audit: type=1400 audit(1213.330:241): avc: denied { map_read map_write } for pid=5091 comm="syz.6.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1225.174259][ T30] audit: type=1400 audit(1224.580:242): avc: denied { prog_load } for pid=5091 comm="syz.6.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1225.357345][ T30] audit: type=1400 audit(1224.790:243): avc: denied { ioctl } for pid=5091 comm="syz.6.330" path="socket:[9912]" dev="sockfs" ino=9912 ioctlcmd=0x894c scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 1235.033755][ T30] audit: type=1400 audit(1234.430:244): avc: denied { prog_run } for pid=5098 comm="syz.5.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 1235.117801][ T30] audit: type=1400 audit(1234.550:245): avc: denied { setopt } for pid=5098 comm="syz.5.331" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1239.560852][ T30] audit: type=1400 audit(1238.990:246): avc: denied { create } for pid=5108 comm="syz.5.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1239.601015][ T30] audit: type=1400 audit(1239.030:247): avc: denied { write } for pid=5108 comm="syz.5.335" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 1243.362156][ T30] audit: type=1400 audit(1242.790:248): avc: denied { write } for pid=5112 comm="syz.5.337" name="snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1243.406762][ T5115] random: crng reseeded on system resumption [ 1243.409491][ T30] audit: type=1400 audit(1242.840:249): avc: denied { ioctl } for pid=5112 comm="syz.5.337" path="/dev/snapshot" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 1252.898946][ T30] audit: type=1400 audit(1252.330:250): avc: denied { create } for pid=5132 comm="syz.6.344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 1254.994875][ T30] audit: type=1400 audit(1254.420:251): avc: denied { create } for pid=5132 comm="syz.6.344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 1261.011664][ T30] audit: type=1400 audit(1260.440:252): avc: denied { ioctl } for pid=5140 comm="syz.6.345" path="socket:[9970]" dev="sockfs" ino=9970 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1261.131380][ T30] audit: type=1400 audit(1260.560:253): avc: denied { connect } for pid=5140 comm="syz.6.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1261.156038][ T30] audit: type=1400 audit(1260.570:254): avc: denied { write } for pid=5140 comm="syz.6.345" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 1266.642253][ T30] audit: type=1400 audit(1266.070:255): avc: denied { append } for pid=5143 comm="syz.6.346" name="loop7" dev="devtmpfs" ino=645 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 1273.609021][ T5152] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1273.718890][ T5152] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1273.907653][ T5152] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1273.949683][ T5152] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1274.294552][ T5152] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1274.298830][ T5152] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1276.498290][ T5157] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=23 sclass=netlink_route_socket pid=5157 comm=syz.5.350 [ 1287.959723][ T5172] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1287.974669][ T5172] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1290.300374][ T30] audit: type=1400 audit(1289.730:256): avc: denied { create } for pid=5175 comm="syz.6.357" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1291.366861][ T5177] nbd0: detected capacity change from 0 to 127 [ 1291.404069][ T5177] netlink: 64 bytes leftover after parsing attributes in process `syz.6.357'. [ 1292.135778][ T5177] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 1292.267624][ T5177] infiniband syz1: RDMA CMA: cma_listen_on_dev, error -98 [ 1293.318538][ T3475] block nbd0: Receive control failed (result -104) [ 1314.788401][ T5205] netlink: 8 bytes leftover after parsing attributes in process `syz.5.369'. [ 1314.998037][ T5203] vlan2: entered promiscuous mode [ 1315.016611][ T5203] vlan2: entered allmulticast mode [ 1315.034706][ T5203] veth1_vlan: entered allmulticast mode [ 1315.488735][ T5203] netlink: 4 bytes leftover after parsing attributes in process `syz.6.368'. [ 1315.866777][ T30] audit: type=1326 audit(1315.300:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5206 comm="syz.5.370" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 1315.875946][ T30] audit: type=1326 audit(1315.300:258): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5206 comm="syz.5.370" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 1315.887164][ T30] audit: type=1326 audit(1315.310:259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5206 comm="syz.5.370" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 1315.919085][ T30] audit: type=1326 audit(1315.350:260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5206 comm="syz.5.370" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 1315.935057][ T30] audit: type=1326 audit(1315.360:261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5206 comm="syz.5.370" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 1315.965714][ T30] audit: type=1326 audit(1315.400:262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5206 comm="syz.5.370" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 1315.974318][ T30] audit: type=1326 audit(1315.400:263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5206 comm="syz.5.370" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 1316.026774][ T30] audit: type=1326 audit(1315.430:264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5206 comm="syz.5.370" exe="/syz-executor" sig=0 arch=40000028 syscall=349 compat=1 ip=0x132360 code=0x7ffc0000 [ 1316.058178][ T30] audit: type=1326 audit(1315.470:265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5206 comm="syz.5.370" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 1316.064376][ T30] audit: type=1326 audit(1315.490:266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5206 comm="syz.5.370" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 1316.068674][ T5203] hsr_slave_1 (unregistering): left promiscuous mode [ 1317.341342][ T5211] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1317.366024][ T5211] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1318.712230][ T5213] ======================================================= [ 1318.712230][ T5213] WARNING: The mand mount option has been deprecated and [ 1318.712230][ T5213] and is ignored by this kernel. Remove the mand [ 1318.712230][ T5213] option from the mount to silence this warning. [ 1318.712230][ T5213] ======================================================= [ 1322.039825][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 30 seconds [ 1322.062078][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 30 seconds [ 1322.063592][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 30 seconds [ 1322.063892][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 30 seconds [ 1328.787398][ T5232] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1328.804232][ T5232] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1337.409480][ T5237] netlink: 16402 bytes leftover after parsing attributes in process `syz.6.379'. [ 1337.504465][ T5236] netlink: 16402 bytes leftover after parsing attributes in process `syz.6.379'. [ 1352.066808][ T3137] udevd[3137]: worker [5145] /devices/virtual/block/nbd0 is taking a long time [ 1352.098233][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 60 seconds [ 1352.099208][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 60 seconds [ 1352.099585][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 60 seconds [ 1352.099899][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 60 seconds [ 1382.238698][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 90 seconds [ 1382.239742][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 90 seconds [ 1382.240687][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 90 seconds [ 1382.240875][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 90 seconds [ 1387.863665][ T5337] netlink: 'syz.6.384': attribute type 30 has an invalid length. [ 1395.093706][ T5312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1395.260726][ T5312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1409.096709][ T5312] hsr_slave_0: entered promiscuous mode [ 1409.109081][ T5312] hsr_slave_1: entered promiscuous mode [ 1409.151939][ T5312] debugfs: 'hsr0' already exists in 'hsr' [ 1409.183028][ T5312] Cannot create hsr debugfs directory [ 1412.276607][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 120 seconds [ 1412.277477][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 120 seconds [ 1412.278109][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 120 seconds [ 1412.278431][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 120 seconds [ 1416.537340][ T5312] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 1416.637957][ T5312] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 1416.795531][ T5312] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 1416.932230][ T5312] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 1430.130362][ T5312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1442.357554][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 150 seconds [ 1442.358401][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 150 seconds [ 1442.358584][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 150 seconds [ 1442.358762][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 150 seconds [ 1465.455625][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 1465.458829][ T30] audit: type=1400 audit(1464.890:272): avc: denied { setopt } for pid=5419 comm="syz.6.396" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1465.605124][ T30] audit: type=1400 audit(1465.040:273): avc: denied { read } for pid=5419 comm="syz.6.396" lport=45720 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 1472.454302][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 180 seconds [ 1472.455325][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 180 seconds [ 1472.455930][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 180 seconds [ 1472.456238][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 180 seconds [ 1473.656701][ T5312] veth0_vlan: entered promiscuous mode [ 1474.075498][ T5312] veth1_vlan: entered promiscuous mode [ 1475.576932][ T5312] veth0_macvtap: entered promiscuous mode [ 1475.648191][ T5312] veth1_macvtap: entered promiscuous mode [ 1476.910653][ T5291] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1476.996976][ T1191] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1477.000979][ T1191] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1477.030977][ T1191] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1478.107140][ T30] audit: type=1400 audit(1477.530:274): avc: denied { mount } for pid=5312 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1483.396976][ T5437] random: crng reseeded on system resumption [ 1483.648374][ T3137] udevd[3137]: worker [5145] /devices/virtual/block/nbd0 timeout; kill it [ 1483.677289][ T3137] udevd[3137]: seq 8519 '/devices/virtual/block/nbd0' killed [ 1502.526479][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 210 seconds [ 1502.527141][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 210 seconds [ 1502.527490][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 210 seconds [ 1502.527578][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 210 seconds [ 1532.578183][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 240 seconds [ 1532.579372][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 240 seconds [ 1532.586262][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 240 seconds [ 1532.587340][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 240 seconds [ 1535.368388][ T30] audit: type=1400 audit(1534.780:275): avc: denied { name_bind } for pid=5457 comm="syz.6.406" src=65530 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=rawip_socket permissive=1 [ 1542.966369][ T5468] netlink: 4 bytes leftover after parsing attributes in process `syz.7.411'. [ 1544.729657][ T5468] hsr_slave_1 (unregistering): left promiscuous mode [ 1549.276825][ T5284] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1550.431572][ T5284] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1551.729290][ T5284] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1552.689162][ T5284] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1555.888854][ T5484] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1556.015571][ T5484] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1562.666008][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 270 seconds [ 1562.667069][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 270 seconds [ 1562.667749][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 270 seconds [ 1562.668185][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 270 seconds [ 1564.879443][ T5284] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1565.166414][ T5284] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1565.315949][ T5284] bond0 (unregistering): Released all slaves [ 1566.529357][ T5487] hsr0: entered promiscuous mode [ 1566.545899][ T5487] macsec1: entered promiscuous mode [ 1566.548645][ T5487] macsec1: entered allmulticast mode [ 1566.549744][ T5487] hsr0: entered allmulticast mode [ 1566.551434][ T5487] hsr_slave_0: entered allmulticast mode [ 1566.623205][ T30] audit: type=1400 audit(1566.050:276): avc: denied { accept } for pid=5499 comm="syz.6.424" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1566.768416][ T5487] hsr0: left allmulticast mode [ 1566.769240][ T5487] hsr_slave_0: left allmulticast mode [ 1567.984907][ T5284] hsr_slave_0: left promiscuous mode [ 1568.038320][ T5284] hsr_slave_1: left promiscuous mode [ 1568.111026][ T5502] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1568.227027][ T5502] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1568.346154][ T5284] veth1_macvtap: left promiscuous mode [ 1568.348356][ T5284] veth0_macvtap: left promiscuous mode [ 1568.352955][ T5284] veth1_vlan: left promiscuous mode [ 1568.364628][ T5284] veth0_vlan: left promiscuous mode [ 1571.276259][ T5284] pim6reg (unregistering): left allmulticast mode [ 1584.617886][ T30] audit: type=1400 audit(1584.050:277): avc: denied { mounton } for pid=5512 comm="syz.7.429" path="/syzcgroup/unified/syz7" dev="cgroup2" ino=283 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 1592.754568][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 300 seconds [ 1592.755577][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 300 seconds [ 1592.761402][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 300 seconds [ 1592.764369][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 300 seconds [ 1595.060581][ T5525] binder: Bad value for 'stats' [ 1622.826264][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 330 seconds [ 1622.827149][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 330 seconds [ 1622.827316][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 330 seconds [ 1622.827471][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 330 seconds [ 1652.908296][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 360 seconds [ 1652.908873][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 360 seconds [ 1652.909258][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 360 seconds [ 1652.909382][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 360 seconds [ 1656.084480][ T5600] bond0: Unable to set down delay as MII monitoring is disabled [ 1682.988891][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 390 seconds [ 1682.990576][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 390 seconds [ 1682.991611][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 390 seconds [ 1682.991931][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 390 seconds [ 1701.459059][ T30] audit: type=1326 audit(1700.880:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.7.462" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 1701.504625][ T30] audit: type=1326 audit(1700.890:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.7.462" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 1701.524398][ T30] audit: type=1326 audit(1700.950:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.7.462" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 1701.567652][ T30] audit: type=1326 audit(1700.970:281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.7.462" exe="/syz-executor" sig=0 arch=40000028 syscall=269 compat=1 ip=0x132360 code=0x7ffc0000 [ 1701.635024][ T30] audit: type=1326 audit(1701.020:282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.7.462" exe="/syz-executor" sig=0 arch=40000028 syscall=403 compat=1 ip=0x125b94 code=0x7ffc0000 [ 1701.647691][ T30] audit: type=1326 audit(1701.070:283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5664 comm="syz.7.462" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=1 ip=0x132360 code=0x7ffc0000 [ 1713.055201][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 420 seconds [ 1713.055701][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 420 seconds [ 1713.057489][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 420 seconds [ 1713.057599][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 420 seconds [ 1743.131195][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 450 seconds [ 1743.144763][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 450 seconds [ 1743.145508][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 450 seconds [ 1743.145811][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 450 seconds [ 1750.818042][ T30] audit: type=1400 audit(1750.250:284): avc: denied { create } for pid=5689 comm="syz.7.471" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 1773.213509][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 480 seconds [ 1773.213983][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 480 seconds [ 1773.224413][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 480 seconds [ 1773.224792][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 480 seconds [ 1786.726390][ T30] audit: type=1400 audit(1786.160:285): avc: denied { write } for pid=5705 comm="syz.6.476" name="001" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 1788.099179][ T5708] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1788.122226][ T5708] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1797.566178][ T5726] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 1803.319624][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 510 seconds [ 1803.320533][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 510 seconds [ 1803.321195][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 510 seconds [ 1803.321346][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 510 seconds [ 1810.889428][ T5734] bond1 (unregistering): Released all slaves [ 1815.278584][ T5742] Failed to initialize the IGMP autojoin socket (err -2) [ 1833.406631][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 540 seconds [ 1833.409689][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 540 seconds [ 1833.410161][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 540 seconds [ 1833.410403][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 540 seconds [ 1844.203964][ T30] audit: type=1400 audit(1843.620:286): avc: denied { bind } for pid=5778 comm="syz.6.507" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 1845.471500][ T5781] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1845.486622][ T5781] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1863.498854][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 570 seconds [ 1863.499955][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 570 seconds [ 1863.501587][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 570 seconds [ 1863.502162][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 570 seconds [ 1893.544946][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 600 seconds [ 1893.545737][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 600 seconds [ 1893.545920][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 600 seconds [ 1893.546101][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 600 seconds [ 1896.550251][ T5801] Failed to initialize the IGMP autojoin socket (err -2) [ 1912.884068][ T5265] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1914.181318][ T5265] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1915.510217][ T5801] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1915.767953][ T5265] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1916.072150][ T5801] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1916.979020][ T5265] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1923.010494][ T5265] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1923.090801][ T5265] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1923.179800][ T5265] bond0 (unregistering): Released all slaves [ 1923.649688][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 630 seconds [ 1923.650535][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 630 seconds [ 1923.650715][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 630 seconds [ 1923.650887][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 630 seconds [ 1924.016997][ T5265] hsr_slave_0: left promiscuous mode [ 1924.274956][ T33] INFO: task udevd:5145 blocked for more than 430 seconds. [ 1924.275957][ T33] Not tainted syzkaller #0 [ 1924.276094][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1924.276673][ T33] task:udevd state:D stack:0 pid:5145 tgid:5145 ppid:3137 task_flags:0x400140 flags:0x00000011 [ 1924.277631][ T33] Call trace: [ 1924.277901][ T33] __switch_to+0x208/0x4f0 (T) [ 1924.279161][ T33] __schedule+0xcfc/0x2fec [ 1924.279269][ T33] schedule+0xd0/0x344 [ 1924.279366][ T33] io_schedule+0xac/0x114 [ 1924.279467][ T33] folio_wait_bit_common+0x2a4/0x630 [ 1924.279578][ T33] do_read_cache_folio+0x240/0x3f4 [ 1924.279670][ T33] read_cache_folio+0x44/0x6c [ 1924.279766][ T33] read_part_sector+0xac/0x5f4 [ 1924.279867][ T33] msdos_partition+0xe4/0x1f3c [ 1924.279960][ T33] bdev_disk_changed+0x504/0xf08 [ 1924.280056][ T33] blkdev_get_whole+0x144/0x1e4 [ 1924.280153][ T33] bdev_open+0x1dc/0xa84 [ 1924.280244][ T33] blkdev_open+0x270/0x3dc [ 1924.280459][ T33] do_dentry_open+0x3f4/0x10e4 [ 1924.280587][ T33] vfs_open+0x5c/0x2fc [ 1924.280684][ T33] path_openat+0x17f0/0x28cc [ 1924.280786][ T33] do_filp_open+0x184/0x360 [ 1924.280878][ T33] do_sys_openat2+0xe0/0x188 [ 1924.280970][ T33] __arm64_sys_openat+0x12c/0x1bc [ 1924.281069][ T33] invoke_syscall+0x6c/0x258 [ 1924.281164][ T33] el0_svc_common.constprop.0+0xac/0x230 [ 1924.281255][ T33] do_el0_svc+0x40/0x58 [ 1924.281350][ T33] el0_svc+0x54/0x2b0 [ 1924.281441][ T33] el0t_64_sync_handler+0xa0/0xe4 [ 1924.281533][ T33] el0t_64_sync+0x198/0x19c [ 1924.282102][ T33] [ 1924.282102][ T33] Showing all locks held in the system: [ 1924.333379][ T33] 1 lock held by khungtaskd/33: [ 1924.333909][ T33] #0: ffff800087552ae0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 1924.335749][ T33] 1 lock held by klogd/3126: [ 1924.335959][ T33] 2 locks held by dhcpcd/3166: [ 1924.336090][ T33] #0: ffff800088b7e8a8 (vlan_ioctl_mutex){+.+.}-{4:4}, at: sock_ioctl+0x418/0x5d4 [ 1924.336549][ T33] #1: ffff800088ba83c8 (rtnl_mutex){+.+.}-{4:4}, at: rtnl_lock+0x1c/0x28 [ 1924.336937][ T33] 2 locks held by getty/3263: [ 1924.337015][ T33] #0: ffff00001893a0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 1924.337397][ T33] #1: ffff80008d8eb2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e8/0xdd0 [ 1924.337774][ T33] 1 lock held by sshd-session/3316: [ 1924.337860][ T33] 2 locks held by kworker/u8:4/4004: [ 1924.337924][ T33] #0: ffff00000dc31148 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 1924.338345][ T33] #1: ffff8000a0367c90 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 1924.338765][ T33] 1 lock held by udevd/5145: [ 1924.338836][ T33] #0: ffff000014fff358 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x2c4/0xa84 [ 1924.339188][ T33] 4 locks held by kworker/u8:17/5265: [ 1924.339260][ T33] 3 locks held by kworker/u8:22/5278: [ 1924.339327][ T33] 3 locks held by kworker/u8:25/5287: [ 1924.339461][ T33] 1 lock held by syz.6.511/5787: [ 1924.339533][ T33] #0: ffff000014fff358 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0x110/0x338 [ 1924.339913][ T33] 1 lock held by syz.6.511/5789: [ 1924.339986][ T33] #0: ffff000014fff358 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0x110/0x338 [ 1924.340381][ T33] 1 lock held by modprobe/5853: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1924.390208][ T33] [ 1924.390946][ T33] ============================================= [ 1924.390946][ T33] [ 1924.421675][ T5265] veth1_macvtap: left promiscuous mode [ 1924.425536][ T5265] veth0_macvtap: left promiscuous mode [ 1924.427236][ T5265] veth1_vlan: left promiscuous mode [ 1924.429271][ T5265] veth0_vlan: left promiscuous mode [ 1938.980855][ T1415] aoe: packet could not be sent on bond0. consider increasing tx_queue_len [ 1944.725638][ T33] INFO: task udevd:5145 blocked for more than 450 seconds. [ 1944.726331][ T33] Not tainted syzkaller #0 [ 1944.727949][ T33] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1944.728059][ T33] task:udevd state:D stack:0 pid:5145 tgid:5145 ppid:3137 task_flags:0x400140 flags:0x00000011 [ 1944.728339][ T33] Call trace: [ 1944.728565][ T33] __switch_to+0x208/0x4f0 (T) [ 1944.728991][ T33] __schedule+0xcfc/0x2fec [ 1944.729253][ T33] schedule+0xd0/0x344 [ 1944.729527][ T33] io_schedule+0xac/0x114 [ 1944.729821][ T33] folio_wait_bit_common+0x2a4/0x630 [ 1944.729990][ T33] do_read_cache_folio+0x240/0x3f4 [ 1944.730105][ T33] read_cache_folio+0x44/0x6c [ 1944.730204][ T33] read_part_sector+0xac/0x5f4 [ 1944.730328][ T33] msdos_partition+0xe4/0x1f3c [ 1944.730451][ T33] bdev_disk_changed+0x504/0xf08 [ 1944.730571][ T33] blkdev_get_whole+0x144/0x1e4 [ 1944.730697][ T33] bdev_open+0x1dc/0xa84 [ 1944.730820][ T33] blkdev_open+0x270/0x3dc [ 1944.730953][ T33] do_dentry_open+0x3f4/0x10e4 [ 1944.731072][ T33] vfs_open+0x5c/0x2fc [ 1944.731194][ T33] path_openat+0x17f0/0x28cc [ 1944.731314][ T33] do_filp_open+0x184/0x360 [ 1944.731431][ T33] do_sys_openat2+0xe0/0x188 [ 1944.731550][ T33] __arm64_sys_openat+0x12c/0x1bc [ 1944.731675][ T33] invoke_syscall+0x6c/0x258 [ 1944.731829][ T33] el0_svc_common.constprop.0+0xac/0x230 [ 1944.732083][ T33] do_el0_svc+0x40/0x58 [ 1944.732211][ T33] el0_svc+0x54/0x2b0 [ 1944.745753][ T33] el0t_64_sync_handler+0xa0/0xe4 [ 1944.746071][ T33] el0t_64_sync+0x198/0x19c [ 1944.746449][ T33] [ 1944.746449][ T33] Showing all locks held in the system: [ 1944.746580][ T33] 1 lock held by pr/ttyAMA-1/32: [ 1944.746707][ T33] 1 lock held by khungtaskd/33: [ 1944.746795][ T33] #0: ffff800087552ae0 (rcu_read_lock){....}-{1:3}, at: debug_show_all_locks+0x18/0x1c4 [ 1944.747570][ T33] 2 locks held by kworker/u8:7/1191: [ 1944.747746][ T33] 1 lock held by klogd/3126: [ 1944.747873][ T33] 2 locks held by getty/3263: [ 1944.747963][ T33] #0: ffff00001893a0a0 (&tty->ldisc_sem){++++}-{0:0}, at: ldsem_down_read+0x3c/0x4c [ 1944.748588][ T33] #1: ffff80008d8eb2f0 (&ldata->atomic_read_lock){+.+.}-{4:4}, at: n_tty_read+0x3e8/0xdd0 [ 1944.749266][ T33] 1 lock held by udevd/5145: [ 1944.749359][ T33] #0: ffff000014fff358 (&disk->open_mutex){+.+.}-{4:4}, at: bdev_open+0x2c4/0xa84 [ 1944.749872][ T33] 2 locks held by kworker/u8:13/5251: [ 1944.749969][ T33] #0: ffff00000dc31148 ((wq_completion)events_unbound#2){+.+.}-{0:0}, at: process_one_work+0x6f8/0x18d4 [ 1944.750714][ T33] #1: ffff80008f907c90 ((work_completion)(&sub_info->work)){+.+.}-{0:0}, at: process_one_work+0x71c/0x18d4 [ 1944.751323][ T33] 1 lock held by syz.6.511/5787: [ 1944.751412][ T33] #0: ffff000014fff358 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0x110/0x338 [ 1944.751833][ T33] 1 lock held by syz.6.511/5789: [ 1944.751936][ T33] #0: ffff000014fff358 (&disk->open_mutex){+.+.}-{4:4}, at: sync_bdevs+0x110/0x338 [ 1944.784994][ T33] 3 locks held by kworker/u8:1/5857: [ 1944.787266][ T33] 2 locks held by modprobe/5872: [ 1944.790510][ T33] [ 1944.792225][ T33] ============================================= [ 1944.792225][ T33] [ 1953.704746][ T24] block nbd0: Possible stuck request 0000000099528d3e: control (read@0,1024B). Runtime 660 seconds [ 1953.705699][ T24] block nbd0: Possible stuck request 0000000000f9e526: control (read@1024,1024B). Runtime 660 seconds [ 1953.705886][ T24] block nbd0: Possible stuck request 00000000c8fcd474: control (read@2048,1024B). Runtime 660 seconds [ 1953.706096][ T24] block nbd0: Possible stuck request 0000000040c52f58: control (read@3072,1024B). Runtime 660 seconds