last executing test programs: 18m0.976424577s ago: executing program 0 (id=149): mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000880)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[], 0x27) 18m0.698889082s ago: executing program 0 (id=150): rt_tgsigqueueinfo(0x0, 0x0, 0xb, &(0x7f0000000280)={0x8, 0x0, 0x4}) 18m0.607040276s ago: executing program 0 (id=151): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = openat$selinux_policy(0xffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x2000) 18m0.447888674s ago: executing program 0 (id=152): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000640)={0x34, 0x0, 0x8, 0x401, 0x0, 0x0, {0x2}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88f8}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x21}, @CTA_TIMEOUT_DATA={0x4, 0x4, 0x0, 0x1, @gre}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4080) 18m0.308239631s ago: executing program 0 (id=153): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r0}, &(0x7f00000008c0), &(0x7f0000000880)=r1}, 0x20) r2 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffb, r2, 0x1) 18m0.032039525s ago: executing program 0 (id=154): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x18000000000002a0, 0x7, 0x0, &(0x7f0000000780)="b9ff0500000000", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffc1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) unshare(0x40020200) socket(0x1, 0x1, 0x0) setreuid(0xee00, 0x0) setns(0xffffffffffffffff, 0x24020000) syz_clone3(&(0x7f00000008c0)={0x95340580, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)={0xa4, 0x0, 0x1, 0x0, 0x2, {}, [@WGDEVICE_A_PEERS={0x58, 0x8, 0x0, 0x1, [{0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x2c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4004840}, 0x40804) 17m15.03357081s ago: executing program 32 (id=154): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000680)={0xffffffffffffffff, 0x18000000000002a0, 0x7, 0x0, &(0x7f0000000780)="b9ff0500000000", 0x0, 0xfe6, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffffc1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) unshare(0x40020200) socket(0x1, 0x1, 0x0) setreuid(0xee00, 0x0) setns(0xffffffffffffffff, 0x24020000) syz_clone3(&(0x7f00000008c0)={0x95340580, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)={0xa4, 0x0, 0x1, 0x0, 0x2, {}, [@WGDEVICE_A_PEERS={0x58, 0x8, 0x0, 0x1, [{0x54, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x2c, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @a_g}]}]}, @WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg0\x00'}]}, 0xa4}, 0x1, 0x0, 0x0, 0x4004840}, 0x40804) 16m41.652602585s ago: executing program 2 (id=245): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, 0x0, 0x36) 16m41.039272265s ago: executing program 2 (id=247): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fdf, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = dup2(r1, r0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x10) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) 16m40.672854374s ago: executing program 2 (id=249): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) socket$kcm(0x10, 0x2, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000001340)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) rt_tgsigqueueinfo(0x0, 0x0, 0x1a, 0x0) 16m40.36384398s ago: executing program 2 (id=251): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) io_cancel(0x0, 0x0, 0x0) 16m40.228122536s ago: executing program 2 (id=252): r0 = socket$netlink(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xe}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7030000ec000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x28, 0x18, 0x1, 0x0, 0x0, {0x2}, [@typed={0x8, 0x800, 0x0, 0x0, @u32=0x4}, @nested={0xc, 0x8, 0x0, 0x1, [@typed={0x8, 0xc, 0x0, 0x0, @uid=r3}]}]}, 0x28}}, 0x0) 16m39.96415374s ago: executing program 2 (id=253): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="1c0000003e000701fcfffffffedbdf25017c0000060004"], 0x1c}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) 16m2.074590294s ago: executing program 1 (id=359): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$inet(r1, &(0x7f0000003a80)={&(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000003c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0xb}, @multicast1}}}, @ip_retopts={{0x10}}], 0x30}, 0x4008804) 16m1.915980942s ago: executing program 1 (id=360): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0xff, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0xa, 0x4, 0x4, 0x5, 0x2}, 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) pread64(0xffffffffffffffff, 0x0, 0x0, 0x1000000000) 16m1.703894122s ago: executing program 1 (id=361): mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0xf4) write$P9_RWALK(r0, 0x0, 0x57) 16m1.534966261s ago: executing program 1 (id=362): openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x161200, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) close(r2) ioctl$TUNSETTXFILTER(r1, 0x400454d1, &(0x7f0000000340)=ANY=[@ANYRES16=r0, @ANYRES32=r0]) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r3) sendmsg$TIPC_CMD_ENABLE_BEARER(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$SIOCSIFHWADDR(r5, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 16m0.877081234s ago: executing program 1 (id=363): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000002e40), 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000002ec0)={0x0, {'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000002e80)=""/53, 0x35, 0x8, 0x6, 0x7, 0xb, 0x3}}, 0x120) read(r0, &(0x7f00000076c0)=""/252, 0xfc) 16m0.587364209s ago: executing program 1 (id=364): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x54}, 0x1, 0xba01, 0x0, 0x4010}, 0x4000000) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000340)={r3, 0x3, 0x4, 0x4}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000020007fafb72d13b2a4a2719302000000030b43026c26236925000400fe7f0000bd2dca8a9848a3c728f138d509000000000100005ae583de0dd7d8319f98af84fda542e718f94b929ade5b175c0a9b2ce9", 0x55}], 0x1}, 0x4000000) socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001940)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0xfffffffd, 0x25dfdbfc, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe56, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {0x448eade7}, {0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {}, {0x0, 0x20000000, 0x0, 0xffffffff, 0x3}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0xfffffffc, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {0x0, 0x4}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {0xfffffffd}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0xfffffffe}, {}, {0xd5}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {0x0, 0x10}, {0x80000000}, {0x8eb9, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x4, 0x0, 0x7ee}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x9}, {}, {}, {}, {}, {0x3}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, {}, {0x0, 0x9, 0xfffffffc, 0x0, 0x0, 0xfffffffd}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4, 0x2}, {}, {}, {}, {}, {}, {0x10000}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x7}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {0x2}, {0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 15m54.291786658s ago: executing program 33 (id=253): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000800)=ANY=[@ANYBLOB="1c0000003e000701fcfffffffedbdf25017c0000060004"], 0x1c}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) 15m19.899450702s ago: executing program 3 (id=409): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) 15m19.710970031s ago: executing program 3 (id=410): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x18) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r3, &(0x7f0000000140)='./file0\x00') readlinkat(r3, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000240)=""/65, 0x41) 15m19.474675753s ago: executing program 3 (id=411): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000604000000002e"], 0x0, 0x37}, 0x20) 15m19.134271391s ago: executing program 3 (id=412): pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = socket(0x2c, 0x3, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x11, 0x4, 0x4, 0xff}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r3, &(0x7f0000000140), &(0x7f0000000080)=@udp6=r2}, 0x20) close_range(r0, 0xffffffffffffffff, 0x0) 15m18.833054876s ago: executing program 3 (id=413): mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x57) 15m18.596465378s ago: executing program 3 (id=414): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2}, 0x94) 15m15.532841065s ago: executing program 34 (id=364): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x54}, 0x1, 0xba01, 0x0, 0x4010}, 0x4000000) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000240)={0xb, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r4 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f00000006c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000340)={r3, 0x3, 0x4, 0x4}) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000100)="5500000020007fafb72d13b2a4a2719302000000030b43026c26236925000400fe7f0000bd2dca8a9848a3c728f138d509000000000100005ae583de0dd7d8319f98af84fda542e718f94b929ade5b175c0a9b2ce9", 0x55}], 0x1}, 0x4000000) socket$nl_generic(0x10, 0x3, 0x10) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001940)=@newtaction={0xe98, 0x30, 0x871a15abc695fa3d, 0xfffffffd, 0x25dfdbfc, {}, [{0xe84, 0x1, [@m_pedit={0xe80, 0x1, 0x0, 0x0, {{0xa}, {0xe56, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe50, 0x2, {{{}, 0x97, 0x0, [{}, {}]}, [{}, {}, {}, {}, {}, {0x448eade7}, {0x0, 0x0, 0x80000000}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {}, {0x0, 0x20000000, 0x0, 0xffffffff, 0x3}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {0xfffffffc, 0x0, 0x0, 0x0, 0x2}, {}, {}, {}, {0x0, 0x4}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, {0xfffffffd}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0xfffffffe}, {}, {0xd5}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {0x0, 0x10}, {0x80000000}, {0x8eb9, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x4, 0x0, 0x7ee}, {}, {}, {}, {0x0, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x9}, {}, {}, {}, {}, {0x3}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb}, {}, {0x0, 0x9, 0xfffffffc, 0x0, 0x0, 0xfffffffd}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {0x0, 0x0, 0x0, 0x4, 0x2}, {}, {}, {}, {}, {}, {0x10000}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb}], [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x7}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {0x2}, {0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe98}}, 0x0) 14m45.287999656s ago: executing program 4 (id=435): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000002c0)=[{0x200000000006, 0x4, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) rename(0x0, 0x0) 14m44.954976573s ago: executing program 4 (id=436): r0 = openat$selinux_relabel(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$selinux_access(r0, &(0x7f00000002c0)={'system_u:object_r:sshd_var_run_t:s0', 0x20, 'unconfined_u:system_r:insmod_t:s0-s0:c0.c1023', 0x20, 0x4}, 0x67) 14m44.737010295s ago: executing program 4 (id=437): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) socket(0x10, 0x3, 0x6) r1 = socket(0x10, 0x3, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x161842, 0x0) socket$netlink(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet(0x2b, 0x801, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) unshare(0x6a040000) mmap(&(0x7f00002ad000/0xc00000)=nil, 0xc00000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = gettid() socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000005f00)=ANY=[@ANYBLOB="2800000010000100"/20, @ANYRES32=r2, @ANYBLOB="6d3082610000000008001300", @ANYRES32=r4], 0x28}, 0x1, 0x0, 0x0, 0x20000880}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x20000000) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r5, 0x0, 0x40814) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 14m39.629148574s ago: executing program 4 (id=438): mknodat$loop(0xffffffffffffff9c, 0x0, 0x6004, 0x1) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0xf4) write$P9_RWALK(r0, 0x0, 0x57) 14m39.554206709s ago: executing program 4 (id=439): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102000028"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) 14m39.167047269s ago: executing program 4 (id=440): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0xc1e) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x4, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) unshare(0x2040400) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000740)={[0x8000000000000001]}, 0x8, 0x80000) poll(&(0x7f0000000800)=[{r5, 0x200}], 0x1, 0x1ad) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x1c, r7, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4008084}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000013c0)) 14m32.984251503s ago: executing program 35 (id=414): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1a00fe00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0x2}, 0x94) 13m54.02158599s ago: executing program 36 (id=440): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfff}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0xc1e) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setaffinity(0x0, 0x4, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) unshare(0x2040400) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000740)={[0x8000000000000001]}, 0x8, 0x80000) poll(&(0x7f0000000800)=[{r5, 0x200}], 0x1, 0x1ad) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00'}, 0x10) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r6, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x1c, r7, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4008084}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f00000013c0)) 12m7.796257416s ago: executing program 5 (id=613): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, 0x0, 0x82}], 0x1, 0x0, &(0x7f0000001100)={0x77359400}, 0x1) ptrace(0x10, r0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 12m7.69489751s ago: executing program 5 (id=614): openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000300)={0x40, 0x154, 0x21}, 0xffffffffffffff50) 12m7.581857336s ago: executing program 5 (id=615): r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000540)={0x26, 'hash\x00', 0x0, 0x0, 'md5-generic\x00'}, 0x58) r1 = accept(r0, 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="f8183343d994bc", 0x7}, {&(0x7f0000000340)="02c8e538277721a06c7e98b267a486b1ed7eaf5424f58990ecb518aee61f963da139157f3da6c19f04d4b4db4c454256ef48f3fb4857e9ca075dcf6b771d75b54794a6c04f202f9139a793cd", 0x4c}, {&(0x7f00000001c0)="cbe3d5306930a5aec0065e555a67c446eeecb8c50b3f468621e461e0b34f240e7c7d4207ee37af95ac9aab942b", 0x2d}], 0x3, 0x0, 0x0, 0x20048001}, 0x4080) 12m7.457046093s ago: executing program 5 (id=616): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(0x0, 0x0, 0x0, 0x2125099, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f0000000280)='./file0/file0\x00', 0x0) 12m7.299218341s ago: executing program 5 (id=617): r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) write(r0, &(0x7f0000000a40)="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", 0x166) 12m6.569185328s ago: executing program 5 (id=618): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, 0x0, 0x82}], 0x1, 0x0, &(0x7f0000001100)={0x77359400}, 0x1) ptrace(0x10, r0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 12m6.569005728s ago: executing program 37 (id=618): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) futex_waitv(&(0x7f0000001080)=[{0x3, 0x0, 0x82}], 0x1, 0x0, &(0x7f0000001100)={0x77359400}, 0x1) ptrace(0x10, r0) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) 11m26.784864346s ago: executing program 6 (id=726): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) mount$fuse(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000002100), 0x280449c, &(0x7f0000002140)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}}) read$FUSE(r0, &(0x7f00000083c0)={0x2020, 0x0, 0x0}, 0x49e8648f) write$FUSE_INIT(r0, &(0x7f0000004200)={0x50, 0x0, r1, {0x7, 0x1f, 0x0, 0x2066012}}, 0x50) syz_fuse_handle_req(r0, &(0x7f00000042c0)="000000000000000000000000000000000000000000000000000000000000000090c400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000542d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ea8286a2fba523440000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000633956a1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007d6ab715107fa1820000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffffffffffff0000000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000286071480000000000b13bc1e6d970884f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f3ffffffffffffff00", 0x2000, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000006340)={0x20}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r2 = openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x40) ioctl$SNDRV_TIMER_IOCTL_CREATE(r2, 0xc02054a5, &(0x7f0000000240)={0x90, 0xffffffffffffffff, 'id0\x00'}) 11m24.235236667s ago: executing program 6 (id=743): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x3, 0x0, 0x3, 0xe, 0x0, 0x70bd2c, 0x25dfdbfc, [@sadb_key={0x2, 0x9, 0x8, 0x0, "1c"}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x2}}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @loopback, 0x7}}]}, 0x70}, 0x1, 0x7}, 0x0) 11m24.125691082s ago: executing program 6 (id=744): r0 = openat$rtc(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x201016c2) 11m24.125423572s ago: executing program 6 (id=745): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) symlink(0x0, 0x0) mount(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='debugfs\x00', 0x0, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x1c0) mount$bind(&(0x7f0000000300)='./file0\x00', &(0x7f0000000140)='./file0/file0\x00', 0x0, 0x1805406, 0x0) mount$fuse(0x0, &(0x7f00000005c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2125099, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000340)='./file0/file0\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000080), 0x0, 0x0) 11m23.97231752s ago: executing program 6 (id=746): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0x9, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'ip6_vti0\x00', 0x0}) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000100)={0x2, 0x2}, 0x4) sendto$packet(r0, &(0x7f0000000180)="10031400e0ff020002004788aa96a13bb100001100007fca1a00", 0x1000a, 0x0, &(0x7f0000000140)={0x11, 0x0, r2}, 0x14) 11m23.598271789s ago: executing program 6 (id=747): r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x80082, 0x0) write$vga_arbiter(r0, &(0x7f00000015c0)=ANY=[@ANYBLOB='trylock io'], 0xf) 11m23.598026689s ago: executing program 38 (id=747): r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x80082, 0x0) write$vga_arbiter(r0, &(0x7f00000015c0)=ANY=[@ANYBLOB='trylock io'], 0xf) 2m5.685871062s ago: executing program 7 (id=1392): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000000900010000000000000000000000000a44000000060a0b040000000000000000021453b718000480140001800b00010065787468647200000400028009"], 0x6c}}, 0x0) 1m59.008750412s ago: executing program 8 (id=1393): openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x41, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000000c0)='syzkaller\x00'}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='contention_end\x00', r0}, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r1, &(0x7f0000000240), 0xfffffecc) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000000)) 1m53.907883052s ago: executing program 7 (id=1394): syz_usb_connect(0x5, 0x24, &(0x7f0000000280)={{0x12, 0x1, 0x200, 0x4a, 0xa9, 0x27, 0x8, 0x5ac, 0x230, 0xd04, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x2, 0x7, 0x20, 0x6, [{{0x9, 0x4, 0xf, 0x40, 0x0, 0x3, 0x18, 0x2, 0x7}}]}}]}}, 0x0) syz_usb_connect$hid(0x2, 0x0, 0x0, 0x0) syz_usb_connect$printer(0x6, 0x0, 0x0, 0x0) 1m42.250628176s ago: executing program 8 (id=1395): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0x10012, r0, 0x0) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0xc) 1m38.348237666s ago: executing program 7 (id=1396): r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg$unix(r0, &(0x7f0000008280)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="14"], 0x18, 0x8800}}], 0x1, 0x20040804) 1m32.108003604s ago: executing program 8 (id=1397): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000b40), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000b80)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_DEV(r0, &(0x7f0000000c80)={0x0, 0x0, &(0x7f0000000c40)={&(0x7f0000000bc0)={0x2c, r1, 0x109, 0x70bd2a, 0x25dfdbfc, {}, [@NL802154_ATTR_SEC_DEVICE={0x10, 0x2e, 0x0, 0x1, {0xc, 0x4, {0xaaaaaaaaaaaa0102}}}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r2}]}, 0x2c}, 0x1, 0x0, 0x0, 0x4000}, 0x44) 1m26.734478458s ago: executing program 7 (id=1398): unshare(0x2c020400) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x1, &(0x7f00000001c0)={0xffffffffffffffff}, 0x106, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000002c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000180), r1, r0}}, 0x18) 1m13.035369876s ago: executing program 8 (id=1399): r0 = syz_io_uring_setup(0x7f, &(0x7f0000000380)={0x0, 0x1040, 0x10, 0x1003, 0x101}, &(0x7f0000000240)=0x0, &(0x7f0000000340)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000004c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x51, 0x0, 0x880, 0x2, 0x0, 0x127, 0x0, 0x0, {0x2}}) io_uring_enter(r0, 0x6efc, 0x3900, 0xb, 0x0, 0x0) r3 = io_uring_setup(0x385, &(0x7f0000000180)={0x0, 0x6549, 0x800, 0x1, 0x8d, 0x0, r0}) io_uring_register$IORING_REGISTER_SYNC_CANCEL(r3, 0x18, &(0x7f00000000c0)={0x2008000, r0, 0x12, {0x6, 0x1}, 0x5}, 0x1) 1m7.765171625s ago: executing program 7 (id=1400): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000840), 0xffffffffffffffff) sendmsg$TIPC_NL_BEARER_DISABLE(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000880)={0x14, r1, 0x1, 0x70bd2d, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4028805}, 0x0) 57.729222337s ago: executing program 8 (id=1401): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWRULE={0x50, 0x6, 0xa, 0x401, 0x0, 0x1000000, {0xa, 0x0, 0x1}, [@NFTA_RULE_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_RULE_EXPRESSIONS={0x24, 0x4, 0x0, 0x1, [{0x20, 0x1, 0x0, 0x1, @log={{0x8}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_LOG_QTHRESHOLD={0x6, 0x4, 0x1, 0x0, 0xa}, @NFTA_LOG_GROUP={0x6}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x78}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) 53.241744035s ago: executing program 7 (id=1402): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = fsopen(&(0x7f0000000140)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x1, 0x0) fchdir(r4) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x3cad6cc7aa7fed97) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) preadv(r5, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) 46.808070283s ago: executing program 8 (id=1403): socketpair$unix(0x1, 0x3, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$ttynull(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @remote, 0x4e21, 0x4, 'lc\x00', 0x8, 0x8001, 0x6d}, {@loopback, 0x4e22, 0x2, 0x6, 0x44a, 0x3ff}}, 0x44) sendmsg(r1, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000040)=0x9, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x503, 0xfffffffc, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1a010}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_INC_SCI={0x5, 0x9, 0x1}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8090}, 0x44000) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty, 0x1000}, 0x1c) recvmmsg(r2, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}, 0x4}], 0x65942126f3d7b6a8, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1, 0x2c}, 0x1c) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000200)=""/162, &(0x7f00000000c0)=0xa2) mremap(&(0x7f0000064000/0x3000)=nil, 0x3000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) 6.570357314s ago: executing program 39 (id=1402): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000300)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, 0x0, 0x0) timer_create(0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = fsopen(&(0x7f0000000140)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x1, 0x0) fchdir(r4) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, 0x0, 0x3cad6cc7aa7fed97) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='memory.swap.current\x00', 0x275a, 0x0) write$binfmt_script(r5, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r5, 0x0) preadv(r5, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffffff000}], 0x5, 0x0, 0x0) 0s ago: executing program 40 (id=1403): socketpair$unix(0x1, 0x3, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) openat$ttynull(0xffffffffffffff9c, 0x0, 0x400, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000340)={{0x0, @remote, 0x4e21, 0x4, 'lc\x00', 0x8, 0x8001, 0x6d}, {@loopback, 0x4e22, 0x2, 0x6, 0x44a, 0x3ff}}, 0x44) sendmsg(r1, 0x0, 0x0) sched_setattr(0x0, 0x0, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0xb, &(0x7f0000000040)=0x9, 0x4) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000280)=@newlink={0x3c, 0x10, 0x503, 0xfffffffc, 0x3, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1a010}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @macsec={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_MACSEC_INC_SCI={0x5, 0x9, 0x1}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8090}, 0x44000) bind$inet6(r2, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty, 0x1000}, 0x1c) recvmmsg(r2, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0}, 0x4}], 0x65942126f3d7b6a8, 0x2, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1, 0x2c}, 0x1c) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000200)=""/162, &(0x7f00000000c0)=0xa2) mremap(&(0x7f0000064000/0x3000)=nil, 0x3000, 0x600000, 0x3, &(0x7f0000a00000/0x600000)=nil) kernel console output (not intermixed with test programs): xt=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 69.842851][ T3120] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 69.847050][ T31] audit: type=1400 audit(69.760:67): avc: denied { relabelto } for pid=3120 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.851610][ T31] audit: type=1400 audit(69.760:68): avc: denied { write } for pid=3120 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 69.893149][ T31] audit: type=1400 audit(69.800:69): avc: denied { read } for pid=3118 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 69.894585][ T31] audit: type=1400 audit(69.800:70): avc: denied { open } for pid=3118 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 77.820665][ T3118] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 79.860939][ T31] audit: type=1400 audit(79.770:71): avc: denied { execmem } for pid=3121 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 79.931073][ T31] audit: type=1400 audit(79.840:72): avc: denied { read } for pid=3123 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.932735][ T31] audit: type=1400 audit(79.840:73): avc: denied { open } for pid=3123 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 79.943846][ T31] audit: type=1400 audit(79.850:74): avc: denied { mounton } for pid=3123 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 79.973342][ T31] audit: type=1400 audit(79.880:75): avc: denied { module_request } for pid=3123 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 79.973688][ T31] audit: type=1400 audit(79.880:76): avc: denied { module_request } for pid=3124 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 80.053813][ T31] audit: type=1400 audit(79.960:77): avc: denied { sys_module } for pid=3124 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 80.661782][ T31] audit: type=1400 audit(80.570:78): avc: denied { ioctl } for pid=3123 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=676 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 81.722630][ T3123] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.729715][ T3123] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 81.850450][ T3124] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 81.859062][ T3124] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 82.574182][ T3123] hsr_slave_0: entered promiscuous mode [ 82.578181][ T3123] hsr_slave_1: entered promiscuous mode [ 82.747787][ T3124] hsr_slave_0: entered promiscuous mode [ 82.749866][ T3124] hsr_slave_1: entered promiscuous mode [ 82.752124][ T3124] debugfs: 'hsr0' already exists in 'hsr' [ 82.753802][ T3124] Cannot create hsr debugfs directory [ 83.004340][ T31] audit: type=1400 audit(82.910:79): avc: denied { create } for pid=3123 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.008472][ T31] audit: type=1400 audit(82.920:80): avc: denied { write } for pid=3123 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 83.047951][ T3123] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 83.064315][ T3123] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 83.083546][ T3123] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 83.095951][ T3123] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 83.238422][ T3124] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 83.252765][ T3124] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 83.262480][ T3124] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 83.270467][ T3124] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 83.787535][ T3123] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.897599][ T3124] 8021q: adding VLAN 0 to HW filter on device bond0 [ 86.265782][ T3123] veth0_vlan: entered promiscuous mode [ 86.282325][ T3123] veth1_vlan: entered promiscuous mode [ 86.341310][ T3123] veth0_macvtap: entered promiscuous mode [ 86.351417][ T3123] veth1_macvtap: entered promiscuous mode [ 86.412440][ T3061] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.413705][ T3061] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.413865][ T3061] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.414038][ T3061] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.522828][ T3124] veth0_vlan: entered promiscuous mode [ 86.541897][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 86.542125][ T31] audit: type=1400 audit(86.450:82): avc: denied { mount } for pid=3123 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 86.547676][ T31] audit: type=1400 audit(86.460:83): avc: denied { mounton } for pid=3123 comm="syz-executor" path="/syzkaller.eLylhK/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 86.551654][ T31] audit: type=1400 audit(86.460:84): avc: denied { mount } for pid=3123 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 86.558679][ T31] audit: type=1400 audit(86.470:85): avc: denied { mounton } for pid=3123 comm="syz-executor" path="/syzkaller.eLylhK/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 86.564181][ T31] audit: type=1400 audit(86.470:86): avc: denied { mounton } for pid=3123 comm="syz-executor" path="/syzkaller.eLylhK/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 86.573913][ T3124] veth1_vlan: entered promiscuous mode [ 86.603167][ T31] audit: type=1400 audit(86.510:87): avc: denied { unmount } for pid=3123 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 86.616069][ T31] audit: type=1400 audit(86.520:88): avc: denied { mounton } for pid=3123 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 86.619945][ T31] audit: type=1400 audit(86.530:89): avc: denied { mount } for pid=3123 comm="syz-executor" name="/" dev="gadgetfs" ino=918 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 86.633412][ T31] audit: type=1400 audit(86.540:90): avc: denied { mount } for pid=3123 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 86.639617][ T3124] veth0_macvtap: entered promiscuous mode [ 86.641451][ T31] audit: type=1400 audit(86.550:91): avc: denied { mounton } for pid=3123 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 86.649591][ T3124] veth1_macvtap: entered promiscuous mode [ 86.694399][ T3813] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.695818][ T1055] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.696028][ T1055] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.696104][ T1055] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 86.757370][ T3123] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 87.991753][ T3825] SELinux: failed to load policy [ 92.299575][ C1] vcan0: j1939_tp_rxtimer: 0x85c20700: rx timeout, send abort [ 92.300934][ C1] vcan0: j1939_tp_rxtimer: 0x85c20900: rx timeout, send abort [ 92.304144][ C1] vcan0: j1939_xtp_rx_abort_one: 0x85c20700: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 92.306082][ C1] vcan0: j1939_xtp_rx_abort_one: 0x85c20900: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 92.310183][ T31] kauditd_printk_skb: 18 callbacks suppressed [ 92.310264][ T31] audit: type=1400 audit(92.220:110): avc: denied { read } for pid=2931 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 92.311047][ T31] audit: type=1400 audit(92.220:111): avc: denied { search } for pid=2931 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 92.311918][ T31] audit: type=1400 audit(92.220:112): avc: denied { search } for pid=2931 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 92.316082][ T31] audit: type=1400 audit(92.220:113): avc: denied { add_name } for pid=2931 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 92.316660][ T31] audit: type=1400 audit(92.230:114): avc: denied { create } for pid=2931 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 92.322158][ T31] audit: type=1400 audit(92.230:115): avc: denied { append open } for pid=2931 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 92.323945][ T31] audit: type=1400 audit(92.230:116): avc: denied { getattr } for pid=2931 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 92.360331][ T3854] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 92.361303][ T3854] SELinux: failed to load policy [ 93.268273][ T31] audit: type=1400 audit(93.180:117): avc: denied { append } for pid=3856 comm="syz.0.13" name="tun" dev="devtmpfs" ino=676 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 93.297440][ T31] audit: type=1400 audit(93.210:118): avc: denied { create } for pid=3856 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 93.315544][ T31] audit: type=1400 audit(93.220:119): avc: denied { write } for pid=3856 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 94.448496][ T3877] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 94.469282][ T3877] SELinux: failed to load policy [ 96.623736][ T3888] netlink: 16 bytes leftover after parsing attributes in process `syz.1.23'. [ 96.770094][ T3892] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 96.772554][ T3892] SELinux: failed to load policy [ 97.448216][ T31] kauditd_printk_skb: 25 callbacks suppressed [ 97.448527][ T31] audit: type=1400 audit(97.360:145): avc: denied { map_create } for pid=3901 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.448777][ T31] audit: type=1400 audit(97.360:146): avc: denied { map_read map_write } for pid=3901 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 97.584408][ T3905] SELinux: ebitmap: truncated map [ 97.590748][ T3905] SELinux: failed to load policy [ 97.828625][ T31] audit: type=1400 audit(97.740:147): avc: denied { create } for pid=3910 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 97.831850][ T31] audit: type=1400 audit(97.740:148): avc: denied { bind } for pid=3910 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 97.833844][ T31] audit: type=1400 audit(97.740:149): avc: denied { write } for pid=3910 comm="syz.0.32" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 98.090493][ T3914] netlink: 4 bytes leftover after parsing attributes in process `syz.0.32'. [ 100.551266][ T31] audit: type=1326 audit(100.460:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.0.34" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 100.559192][ T31] audit: type=1326 audit(100.470:151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.0.34" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 100.570227][ T31] audit: type=1326 audit(100.480:152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.0.34" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 100.574080][ T31] audit: type=1326 audit(100.480:153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.0.34" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 100.601859][ T31] audit: type=1326 audit(100.510:154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3922 comm="syz.0.34" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 100.757100][ T3925] SELinux: ebitmap: truncated map [ 100.765833][ T3925] SELinux: failed to load policy [ 102.012247][ T3947] SELinux: ebitmap: truncated map [ 102.032137][ T3947] SELinux: failed to load policy [ 102.119079][ T3951] netlink: 8 bytes leftover after parsing attributes in process `syz.1.43'. [ 102.709404][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 102.709894][ T31] audit: type=1400 audit(102.620:168): avc: denied { read } for pid=3954 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 102.710144][ T31] audit: type=1400 audit(102.620:169): avc: denied { create } for pid=3958 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 102.728952][ T3960] netlink: 12 bytes leftover after parsing attributes in process `syz.0.46'. [ 102.729708][ T3960] netlink: 16 bytes leftover after parsing attributes in process `syz.0.46'. [ 102.731229][ T31] audit: type=1400 audit(102.640:170): avc: denied { write } for pid=3958 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 103.018410][ T31] audit: type=1400 audit(102.930:171): avc: denied { create } for pid=3966 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 103.037702][ T31] audit: type=1400 audit(102.950:172): avc: denied { bind } for pid=3966 comm="syz.1.49" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 103.057763][ T3965] SELinux: ebitmap: truncated map [ 103.072530][ T3965] SELinux: failed to load policy [ 104.348600][ T3989] SELinux: ebitmap: truncated map [ 104.426638][ T3989] SELinux: failed to load policy [ 104.755331][ T31] audit: type=1326 audit(104.650:173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3992 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 104.756472][ T31] audit: type=1326 audit(104.660:174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3992 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 104.773822][ T31] audit: type=1326 audit(104.680:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3992 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 104.801214][ T31] audit: type=1326 audit(104.710:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3992 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 104.803538][ T31] audit: type=1326 audit(104.710:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3992 comm="syz.1.59" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 105.478174][ T4006] SELinux: ebitmap: truncated map [ 105.501179][ T4006] SELinux: failed to load policy [ 106.796243][ T4029] netlink: 132 bytes leftover after parsing attributes in process `syz.0.68'. [ 107.214350][ T4035] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 107.216467][ T4035] SELinux: failed to load policy [ 107.730268][ T4042] netlink: 'syz.1.72': attribute type 1 has an invalid length. [ 107.818226][ T4042] 8021q: adding VLAN 0 to HW filter on device bond1 [ 108.391260][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 108.391537][ T31] audit: type=1400 audit(108.300:195): avc: denied { ioctl } for pid=4084 comm="syz.1.74" path="socket:[3194]" dev="sockfs" ino=3194 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 108.724398][ T4089] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 108.726361][ T4089] SELinux: failed to load policy [ 109.162595][ T31] audit: type=1400 audit(109.070:196): avc: denied { allowed } for pid=4094 comm="syz.1.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 109.200537][ T31] audit: type=1400 audit(109.110:197): avc: denied { create } for pid=4094 comm="syz.1.76" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 109.575859][ T31] audit: type=1326 audit(109.430:198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4096 comm="syz.0.77" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 109.586248][ T31] audit: type=1326 audit(109.490:199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4096 comm="syz.0.77" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 109.586585][ T31] audit: type=1326 audit(109.500:200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4096 comm="syz.0.77" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1300b8 code=0x7ffc0000 [ 109.597916][ T31] audit: type=1326 audit(109.510:201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4096 comm="syz.0.77" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1300b8 code=0x7ffc0000 [ 109.598517][ T31] audit: type=1326 audit(109.510:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4096 comm="syz.0.77" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 109.617562][ T31] audit: type=1326 audit(109.530:203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4096 comm="syz.0.77" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 109.635116][ T31] audit: type=1326 audit(109.530:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4096 comm="syz.0.77" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 110.195555][ T4102] netlink: 12 bytes leftover after parsing attributes in process `syz.0.78'. [ 110.387313][ T4102] 8021q: adding VLAN 0 to HW filter on device bond1 [ 110.437614][ T4102] vlan2: entered allmulticast mode [ 110.438093][ T4102] bond1: entered allmulticast mode [ 111.608050][ T4144] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 111.608517][ T4144] SELinux: failed to load policy [ 112.936767][ T4160] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 112.937269][ T4160] SELinux: failed to load policy [ 113.199300][ T4163] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 113.237561][ T4163] : renamed from vlan1 (while UP) [ 113.577091][ T31] kauditd_printk_skb: 43 callbacks suppressed [ 113.577596][ T31] audit: type=1400 audit(113.480:248): avc: denied { ioctl } for pid=4154 comm="syz.0.85" path="socket:[2793]" dev="sockfs" ino=2793 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 114.191684][ T31] audit: type=1400 audit(114.100:249): avc: denied { create } for pid=4173 comm="syz.1.89" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 114.711581][ T31] audit: type=1400 audit(114.620:250): avc: denied { map } for pid=4173 comm="syz.1.89" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2807 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 114.712101][ T31] audit: type=1400 audit(114.620:251): avc: denied { read write } for pid=4173 comm="syz.1.89" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2807 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 114.760878][ T31] audit: type=1400 audit(114.670:252): avc: denied { execute } for pid=4173 comm="syz.1.89" dev="tmpfs" ino=1024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 114.843707][ T4174] process 'syz.1.89' launched '/dev/fd/7' with NULL argv: empty string added [ 114.862234][ T31] audit: type=1400 audit(114.770:253): avc: denied { execute_no_trans } for pid=4173 comm="syz.1.89" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1024 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 115.155980][ T4183] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 115.156528][ T4183] SELinux: failed to load policy [ 115.552062][ T4188] mmap: syz.1.93 (4188) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 115.642121][ T31] audit: type=1326 audit(115.550:254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4189 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 115.642493][ T31] audit: type=1326 audit(115.550:255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4189 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 115.650078][ T31] audit: type=1326 audit(115.560:256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4189 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=337 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 115.657096][ T31] audit: type=1326 audit(115.570:257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4189 comm="syz.0.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 115.858948][ T4194] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 115.859403][ T4194] SELinux: failed to load policy [ 116.507156][ T4205] netlink: 24 bytes leftover after parsing attributes in process `syz.1.99'. [ 116.673746][ T4207] vxcan1: entered allmulticast mode [ 121.710790][ T31] kauditd_printk_skb: 29 callbacks suppressed [ 121.712565][ T31] audit: type=1400 audit(121.620:287): avc: denied { execmem } for pid=4228 comm="syz.1.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 126.517591][ T4221] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 126.518097][ T4221] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 126.518433][ T4221] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 126.518724][ T4221] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 126.518863][ T4221] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 126.518962][ T4221] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 126.519055][ T4221] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 126.519164][ T4221] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 126.519260][ T4221] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 126.519352][ T4221] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 126.536380][ T4221] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 [ 126.722206][ C0] vxcan1: j1939_tp_rxtimer: 0x84903900: Timeout. Failed to send simple message. [ 126.760626][ T31] audit: type=1400 audit(126.670:288): avc: denied { read } for pid=2931 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 126.760960][ T31] audit: type=1400 audit(126.670:289): avc: denied { search } for pid=2931 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 126.761264][ T31] audit: type=1400 audit(126.670:290): avc: denied { append } for pid=2931 comm="syslogd" name="messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 126.761475][ T31] audit: type=1400 audit(126.670:291): avc: denied { open } for pid=2931 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 126.761669][ T31] audit: type=1400 audit(126.670:292): avc: denied { getattr } for pid=2931 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 127.249090][ T4257] SELinux: ebitmap: truncated map [ 127.299251][ T4257] SELinux: failed to load policy [ 129.034778][ C0] hrtimer: interrupt took 5273168 ns [ 129.380752][ T31] audit: type=1400 audit(129.290:293): avc: denied { create } for pid=4264 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 129.408767][ T4265] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=4265 comm=syz.0.114 [ 129.424207][ T31] audit: type=1400 audit(129.330:294): avc: denied { write } for pid=4264 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 129.445158][ T31] audit: type=1400 audit(129.350:295): avc: denied { nlmsg_write } for pid=4264 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 132.446601][ T4290] netlink: 332 bytes leftover after parsing attributes in process `syz.0.121'. [ 135.257365][ T4309] netlink: 12 bytes leftover after parsing attributes in process `syz.0.130'. [ 135.259453][ T4309] netlink: 28 bytes leftover after parsing attributes in process `syz.0.130'. [ 136.228393][ T31] audit: type=1400 audit(136.120:296): avc: denied { setopt } for pid=4320 comm="syz.0.136" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 138.464077][ T31] audit: type=1400 audit(138.370:297): avc: denied { bind } for pid=4326 comm="syz.0.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 138.621798][ T31] audit: type=1400 audit(138.510:298): avc: denied { create } for pid=4326 comm="syz.0.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 138.631585][ T31] audit: type=1400 audit(138.540:299): avc: denied { write } for pid=4326 comm="syz.0.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 139.784382][ T31] audit: type=1400 audit(139.690:300): avc: denied { ioctl } for pid=4315 comm="syz.1.134" path="socket:[2993]" dev="sockfs" ino=2993 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 139.814152][ T4317] netlink: 4 bytes leftover after parsing attributes in process `syz.1.134'. [ 139.985324][ T4317] hsr_slave_0 (unregistering): left promiscuous mode [ 141.905407][ T31] audit: type=1400 audit(141.810:301): avc: denied { create } for pid=4343 comm="syz.1.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 141.905766][ T31] audit: type=1400 audit(141.810:302): avc: denied { write } for pid=4343 comm="syz.1.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 142.104855][ T31] audit: type=1326 audit(142.010:303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1280bc code=0x7ffc0000 [ 142.105217][ T31] audit: type=1326 audit(142.010:304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef508 code=0x7ffc0000 [ 142.142497][ T31] audit: type=1326 audit(142.050:305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1280bc code=0x7ffc0000 [ 142.149405][ T31] audit: type=1326 audit(142.060:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef508 code=0x7ffc0000 [ 142.167150][ T31] audit: type=1326 audit(142.060:307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1280bc code=0x7ffc0000 [ 142.167497][ T31] audit: type=1326 audit(142.070:308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef508 code=0x7ffc0000 [ 142.167722][ T31] audit: type=1326 audit(142.070:309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x1280bc code=0x7ffc0000 [ 142.167836][ T31] audit: type=1326 audit(142.070:310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4347 comm="syz.1.145" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef508 code=0x7ffc0000 [ 143.227424][ T4350] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 143.235386][ T4350] SELinux: failed to load policy [ 144.439959][ T4360] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 144.441467][ T4360] SELinux: failed to load policy [ 149.865789][ T4394] SELinux: policydb magic number 0x0 does not match expected magic number 0xf97cff8c [ 149.867437][ T4394] SELinux: failed to load policy [ 150.142171][ T31] kauditd_printk_skb: 257 callbacks suppressed [ 150.142386][ T31] audit: type=1400 audit(150.050:568): avc: denied { create } for pid=4397 comm="syz.1.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 150.150608][ T31] audit: type=1400 audit(150.060:569): avc: denied { setopt } for pid=4397 comm="syz.1.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 150.182130][ T31] audit: type=1400 audit(150.090:570): avc: denied { connect } for pid=4397 comm="syz.1.158" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 154.449370][ T4405] SELinux: ebitmap: truncated map [ 154.454036][ T4405] SELinux: failed to load policy [ 155.262839][ T31] audit: type=1326 audit(155.170:571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4410 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 155.279104][ T31] audit: type=1326 audit(155.190:572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4410 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 155.289605][ T31] audit: type=1326 audit(155.200:573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4410 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 155.292092][ T31] audit: type=1326 audit(155.200:574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4410 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 155.294243][ T31] audit: type=1326 audit(155.200:575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4410 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 155.301150][ T31] audit: type=1326 audit(155.210:576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4410 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 155.319013][ T31] audit: type=1326 audit(155.230:577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4410 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 155.319390][ T31] audit: type=1326 audit(155.230:578): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4410 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 155.319600][ T31] audit: type=1326 audit(155.230:579): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4410 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 155.340960][ T31] audit: type=1326 audit(155.250:580): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4410 comm="syz.1.163" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 156.486556][ T4418] SELinux: ebitmap: truncated map [ 156.498683][ T4418] SELinux: failed to load policy [ 160.518461][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 160.518884][ T31] audit: type=1400 audit(160.430:583): avc: denied { name_bind } for pid=4423 comm="syz.1.169" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 163.035924][ T31] audit: type=1400 audit(162.920:584): avc: denied { mount } for pid=4435 comm="syz.1.172" name="/" dev="ramfs" ino=4109 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 163.408970][ T31] audit: type=1326 audit(163.320:585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4437 comm="syz.1.173" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 163.411609][ T31] audit: type=1326 audit(163.320:586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4437 comm="syz.1.173" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 163.414364][ T31] audit: type=1326 audit(163.320:587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4437 comm="syz.1.173" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 163.417010][ T31] audit: type=1326 audit(163.320:588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4437 comm="syz.1.173" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 163.425675][ T31] audit: type=1326 audit(163.340:589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4437 comm="syz.1.173" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 163.436060][ T31] audit: type=1326 audit(163.350:590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4437 comm="syz.1.173" exe="/syz-executor" sig=0 arch=40000028 syscall=6 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 163.438226][ T31] audit: type=1326 audit(163.350:591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4437 comm="syz.1.173" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 163.438455][ T31] audit: type=1326 audit(163.350:592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4437 comm="syz.1.173" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 164.211557][ T4442] Zero length message leads to an empty skb [ 165.675531][ T31] kauditd_printk_skb: 73 callbacks suppressed [ 165.675869][ T31] audit: type=1326 audit(165.580:666): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 165.678801][ T31] audit: type=1326 audit(165.590:667): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 165.682408][ T31] audit: type=1326 audit(165.590:668): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 165.683840][ T31] audit: type=1326 audit(165.590:669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 165.731231][ T31] audit: type=1326 audit(165.630:670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=163 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 165.734069][ T31] audit: type=1326 audit(165.630:671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 165.734323][ T31] audit: type=1326 audit(165.640:672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4450 comm="syz.1.179" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 166.405175][ T31] audit: type=1400 audit(166.310:673): avc: denied { write } for pid=4455 comm="syz.1.181" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 167.529014][ T31] audit: type=1400 audit(167.440:674): avc: denied { write } for pid=4459 comm="syz.1.183" laddr=fe80::44c9:98ff:fe9f:a943 lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 167.532709][ T31] audit: type=1326 audit(167.440:675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4459 comm="syz.1.183" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 171.112207][ T4485] pim6reg1: entered allmulticast mode [ 172.195543][ T4495] macvlan0: entered promiscuous mode [ 172.196447][ T4495] macvlan0: entered allmulticast mode [ 172.196520][ T4495] veth1_vlan: entered allmulticast mode [ 172.872178][ T31] kauditd_printk_skb: 57 callbacks suppressed [ 172.872530][ T31] audit: type=1326 audit(172.780:733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4496 comm="syz.1.195" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 172.886313][ T31] audit: type=1326 audit(172.790:734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4496 comm="syz.1.195" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 172.887751][ T31] audit: type=1326 audit(172.800:735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4496 comm="syz.1.195" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 172.890162][ T31] audit: type=1326 audit(172.800:736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4496 comm="syz.1.195" exe="/syz-executor" sig=0 arch=40000028 syscall=105 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 172.891696][ T31] audit: type=1326 audit(172.800:737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4496 comm="syz.1.195" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 173.223270][ T4504] netlink: 'syz.1.197': attribute type 10 has an invalid length. [ 173.224525][ T4504] macvtap0: entered allmulticast mode [ 173.263583][ T4504] veth0_macvtap: entered allmulticast mode [ 173.667851][ T4504] bond2: entered promiscuous mode [ 173.668249][ T4504] bond2: entered allmulticast mode [ 173.669143][ T4504] 8021q: adding VLAN 0 to HW filter on device bond2 [ 174.605701][ T4544] RDS: rds_bind could not find a transport for 0:0:100::, load rds_tcp or rds_rdma? [ 175.621918][ T31] audit: type=1400 audit(175.530:738): avc: denied { watch } for pid=4552 comm="syz.1.203" path="/131/file0" dev="tmpfs" ino=678 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 189.998686][ T31] audit: type=1400 audit(189.910:739): avc: denied { execute } for pid=4566 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 189.999000][ T31] audit: type=1400 audit(189.910:740): avc: denied { execute_no_trans } for pid=4566 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 190.056121][ T31] audit: type=1400 audit(189.960:741): avc: denied { mounton } for pid=4567 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 194.905457][ T31] audit: type=1400 audit(194.760:742): avc: denied { mount } for pid=4571 comm="syz.1.210" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 195.686627][ T4567] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 195.709249][ T4567] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 198.035637][ T4567] hsr_slave_0: entered promiscuous mode [ 198.039591][ T4567] hsr_slave_1: entered promiscuous mode [ 198.041548][ T4567] debugfs: 'hsr0' already exists in 'hsr' [ 198.042441][ T4567] Cannot create hsr debugfs directory [ 199.381003][ T4567] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 199.414155][ T4567] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 199.456593][ T4567] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 199.479641][ T4567] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 201.749618][ T4567] 8021q: adding VLAN 0 to HW filter on device bond0 [ 208.799201][ T4567] veth0_vlan: entered promiscuous mode [ 208.814241][ T4567] veth1_vlan: entered promiscuous mode [ 208.869451][ T4567] veth0_macvtap: entered promiscuous mode [ 208.878454][ T4567] veth1_macvtap: entered promiscuous mode [ 208.937488][ T1055] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 208.937848][ T1055] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 208.938113][ T1055] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 208.938245][ T1055] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 209.023652][ T31] audit: type=1400 audit(208.930:743): avc: denied { mounton } for pid=4567 comm="syz-executor" path="/syzkaller.CzqBsU/syz-tmp" dev="vda" ino=816 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 209.036073][ T31] audit: type=1400 audit(208.950:744): avc: denied { mount } for pid=4567 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 209.041626][ T31] audit: type=1400 audit(208.950:745): avc: denied { mounton } for pid=4567 comm="syz-executor" path="/syzkaller.CzqBsU/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 209.057938][ T31] audit: type=1400 audit(208.970:746): avc: denied { mount } for pid=4567 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 209.064369][ T31] audit: type=1400 audit(208.970:747): avc: denied { mounton } for pid=4567 comm="syz-executor" path="/syzkaller.CzqBsU/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 209.079900][ T31] audit: type=1400 audit(208.990:748): avc: denied { mounton } for pid=4567 comm="syz-executor" path="/syzkaller.CzqBsU/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=5140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 209.091640][ T31] audit: type=1400 audit(209.000:749): avc: denied { unmount } for pid=4567 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 209.096616][ T31] audit: type=1400 audit(209.010:750): avc: denied { mounton } for pid=4567 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=771 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 209.098411][ T31] audit: type=1400 audit(209.010:751): avc: denied { mount } for pid=4567 comm="syz-executor" name="/" dev="gadgetfs" ino=918 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 209.101416][ T31] audit: type=1400 audit(209.010:752): avc: denied { mount } for pid=4567 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 209.225784][ T4921] netlink: 'syz.2.211': attribute type 4 has an invalid length. [ 209.233342][ T4921] netlink: 'syz.2.211': attribute type 4 has an invalid length. [ 214.335975][ T4950] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 214.346575][ T31] kauditd_printk_skb: 17 callbacks suppressed [ 214.346835][ T31] audit: type=1400 audit(214.250:770): avc: denied { setopt } for pid=4948 comm="syz.1.218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 214.609371][ T31] audit: type=1326 audit(214.520:771): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.2.221" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 214.618062][ T31] audit: type=1326 audit(214.520:772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.2.221" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 214.625486][ T31] audit: type=1326 audit(214.530:773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.2.221" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 214.636873][ T31] audit: type=1326 audit(214.550:774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.2.221" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 214.639269][ T31] audit: type=1326 audit(214.550:775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.2.221" exe="/syz-executor" sig=0 arch=40000028 syscall=182 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 214.642667][ T31] audit: type=1326 audit(214.550:776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.2.221" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 214.656496][ T31] audit: type=1326 audit(214.560:777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.2.221" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 214.659235][ T31] audit: type=1326 audit(214.570:778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.2.221" exe="/syz-executor" sig=0 arch=40000028 syscall=235 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 214.661837][ T31] audit: type=1326 audit(214.570:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4953 comm="syz.2.221" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 215.903915][ T4961] netlink: 60 bytes leftover after parsing attributes in process `syz.2.224'. [ 219.559486][ T5001] netlink: 36 bytes leftover after parsing attributes in process `syz.2.231'. [ 223.447815][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 223.448761][ T31] audit: type=1400 audit(223.360:787): avc: denied { mounton } for pid=5031 comm="syz.1.244" path="/141/file0" dev="tmpfs" ino=729 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 223.450786][ T31] audit: type=1400 audit(223.360:788): avc: denied { mount } for pid=5031 comm="syz.1.244" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 224.420128][ T31] audit: type=1326 audit(224.330:789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5045 comm="syz.2.249" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 224.425079][ T31] audit: type=1326 audit(224.330:790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5045 comm="syz.2.249" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 224.454040][ T31] audit: type=1326 audit(224.350:791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5045 comm="syz.2.249" exe="/syz-executor" sig=0 arch=40000028 syscall=363 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 224.454359][ T31] audit: type=1326 audit(224.350:792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5045 comm="syz.2.249" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 226.608055][ T31] audit: type=1326 audit(226.500:793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5062 comm="syz.1.257" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 226.608515][ T31] audit: type=1326 audit(226.510:794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5062 comm="syz.1.257" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 226.633169][ T31] audit: type=1326 audit(226.540:795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5062 comm="syz.1.257" exe="/syz-executor" sig=0 arch=40000028 syscall=144 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 226.633593][ T31] audit: type=1326 audit(226.540:796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5062 comm="syz.1.257" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 228.765955][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 228.766180][ T31] audit: type=1400 audit(228.670:817): avc: denied { watch watch_reads } for pid=5099 comm="syz.1.265" path="/156" dev="tmpfs" ino=800 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 231.086450][ T31] audit: type=1326 audit(231.000:818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5114 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 231.089608][ T31] audit: type=1326 audit(231.000:819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5114 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 231.089932][ T31] audit: type=1326 audit(231.000:820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5114 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 231.090131][ T31] audit: type=1326 audit(231.000:821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5114 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 231.096663][ T31] audit: type=1326 audit(231.000:822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5114 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 231.096977][ T31] audit: type=1326 audit(231.000:823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5114 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 231.101439][ T31] audit: type=1326 audit(231.010:824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5114 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 231.105081][ T31] audit: type=1326 audit(231.010:825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5114 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 231.107858][ T31] audit: type=1326 audit(231.010:826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5114 comm="syz.1.272" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 233.023735][ T5129] netlink: 16 bytes leftover after parsing attributes in process `syz.1.279'. [ 242.008760][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 242.009050][ T31] audit: type=1326 audit(241.910:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 242.046076][ T31] audit: type=1326 audit(241.960:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 242.052934][ T31] audit: type=1326 audit(241.960:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 242.086872][ T31] audit: type=1326 audit(242.000:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 242.087174][ T31] audit: type=1326 audit(242.000:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 242.089643][ T31] audit: type=1326 audit(242.000:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 242.109392][ T31] audit: type=1326 audit(242.000:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 242.111118][ T31] audit: type=1326 audit(242.020:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 242.128416][ T31] audit: type=1326 audit(242.040:848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 242.135231][ T31] audit: type=1326 audit(242.040:849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5168 comm="syz.1.298" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 246.191172][ T5195] pimreg: entered allmulticast mode [ 246.200330][ T5195] pimreg: left allmulticast mode [ 246.590097][ T5201] netlink: 12 bytes leftover after parsing attributes in process `syz.1.312'. [ 247.096577][ T31] kauditd_printk_skb: 7 callbacks suppressed [ 247.098892][ T31] audit: type=1326 audit(247.010:857): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5204 comm="syz.1.314" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 247.106393][ T31] audit: type=1326 audit(247.020:858): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5204 comm="syz.1.314" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 247.107833][ T31] audit: type=1326 audit(247.020:859): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5204 comm="syz.1.314" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 247.109041][ T31] audit: type=1326 audit(247.020:860): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5204 comm="syz.1.314" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 247.113946][ T31] audit: type=1326 audit(247.020:861): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5204 comm="syz.1.314" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 247.118707][ T31] audit: type=1326 audit(247.030:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5204 comm="syz.1.314" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 247.121450][ T31] audit: type=1326 audit(247.030:863): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5204 comm="syz.1.314" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 247.124117][ T31] audit: type=1326 audit(247.030:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5204 comm="syz.1.314" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 247.128170][ T31] audit: type=1326 audit(247.040:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5204 comm="syz.1.314" exe="/syz-executor" sig=0 arch=40000028 syscall=290 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 247.130970][ T31] audit: type=1326 audit(247.040:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5204 comm="syz.1.314" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 248.002250][ T5211] netlink: 12 bytes leftover after parsing attributes in process `syz.1.316'. [ 249.192713][ T5207] hid_parser_main: 33 callbacks suppressed [ 249.193078][ T5207] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 249.193389][ T5207] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 249.193504][ T5207] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 249.193597][ T5207] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 249.193744][ T5207] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 249.193841][ T5207] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 249.193934][ T5207] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 249.194022][ T5207] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 249.194109][ T5207] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 249.194198][ T5207] hid-generic 0008:0006:0007.0002: unknown main item tag 0x0 [ 249.285942][ T5207] hid-generic 0008:0006:0007.0002: hidraw0: HID v0.0b Device [syz1] on syz1 [ 253.215851][ T31] kauditd_printk_skb: 47 callbacks suppressed [ 253.216164][ T31] audit: type=1326 audit(253.100:914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5257 comm="syz.1.328" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 253.217293][ T31] audit: type=1326 audit(253.130:915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5257 comm="syz.1.328" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 253.221368][ T31] audit: type=1326 audit(253.130:916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5257 comm="syz.1.328" exe="/syz-executor" sig=0 arch=40000028 syscall=260 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 253.222857][ T31] audit: type=1326 audit(253.130:917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5257 comm="syz.1.328" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 254.489987][ T31] audit: type=1400 audit(254.400:918): avc: denied { bind } for pid=5268 comm="syz.1.330" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 258.979711][ T5310] netlink: 24 bytes leftover after parsing attributes in process `syz.1.342'. [ 259.235170][ T31] audit: type=1326 audit(259.140:919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5323 comm="syz.1.343" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 259.235517][ T31] audit: type=1326 audit(259.140:920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5323 comm="syz.1.343" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 259.253692][ T31] audit: type=1326 audit(259.160:921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5323 comm="syz.1.343" exe="/syz-executor" sig=0 arch=40000028 syscall=304 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 259.254038][ T31] audit: type=1326 audit(259.160:922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5323 comm="syz.1.343" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 259.418521][ T31] audit: type=1400 audit(259.330:923): avc: denied { kexec_image_load } for pid=5327 comm="syz.1.344" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 260.942650][ T31] audit: type=1400 audit(260.850:924): avc: granted { setsecparam } for pid=5342 comm="syz.1.350" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 261.462707][ T5349] macvtap0: refused to change device tx_queue_len [ 261.812705][ T31] audit: type=1400 audit(261.720:925): avc: denied { name_bind } for pid=5354 comm="syz.1.354" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 262.345331][ T5362] netlink: 8 bytes leftover after parsing attributes in process `syz.1.356'. [ 262.346213][ T5362] netlink: 8 bytes leftover after parsing attributes in process `syz.1.356'. [ 262.583801][ T5365] syz.1.357 uses obsolete (PF_INET,SOCK_PACKET) [ 263.149174][ T31] audit: type=1326 audit(263.060:926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5370 comm="syz.1.360" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 263.155126][ T31] audit: type=1326 audit(263.060:927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5370 comm="syz.1.360" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 263.160109][ T31] audit: type=1326 audit(263.070:928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5370 comm="syz.1.360" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 263.868961][ T5377] syzkaller0: entered promiscuous mode [ 263.869408][ T5377] syzkaller0: entered allmulticast mode [ 264.263225][ T5375] hid_parser_main: 43 callbacks suppressed [ 264.264287][ T5375] hid-generic 0008:0006:0007.0003: unknown main item tag 0x0 [ 264.265795][ T5375] hid-generic 0008:0006:0007.0003: unknown main item tag 0x0 [ 264.275158][ T5375] hid-generic 0008:0006:0007.0003: unknown main item tag 0x0 [ 264.277118][ T5375] hid-generic 0008:0006:0007.0003: unknown main item tag 0x0 [ 264.285659][ T5375] hid-generic 0008:0006:0007.0003: unknown main item tag 0x0 [ 264.286644][ T5375] hid-generic 0008:0006:0007.0003: unknown main item tag 0x0 [ 264.287504][ T5375] hid-generic 0008:0006:0007.0003: unknown main item tag 0x0 [ 264.288337][ T5375] hid-generic 0008:0006:0007.0003: unknown main item tag 0x0 [ 264.289183][ T5375] hid-generic 0008:0006:0007.0003: unknown main item tag 0x0 [ 264.290010][ T5375] hid-generic 0008:0006:0007.0003: unknown main item tag 0x0 [ 264.306052][ T5375] hid-generic 0008:0006:0007.0003: hidraw0: HID v0.0b Device [syz1] on syz1 [ 267.622384][ T5397] netlink: 'syz.1.364': attribute type 4 has an invalid length. [ 267.622714][ T5397] netlink: 17 bytes leftover after parsing attributes in process `syz.1.364'. [ 267.640903][ T5397] netlink: 2 bytes leftover after parsing attributes in process `syz.1.364'. [ 274.643307][ T5399] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 274.656544][ T5399] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 276.427182][ T5399] hsr_slave_0: entered promiscuous mode [ 276.438113][ T5399] hsr_slave_1: entered promiscuous mode [ 276.440315][ T5399] debugfs: 'hsr0' already exists in 'hsr' [ 276.441091][ T5399] Cannot create hsr debugfs directory [ 277.041914][ T5399] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 277.115737][ T5399] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 277.194420][ T5399] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 277.209320][ T5399] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 278.671600][ T5399] 8021q: adding VLAN 0 to HW filter on device bond0 [ 285.038913][ T5399] veth0_vlan: entered promiscuous mode [ 285.146199][ T5399] veth1_vlan: entered promiscuous mode [ 285.275831][ T5399] veth0_macvtap: entered promiscuous mode [ 285.309100][ T5399] veth1_macvtap: entered promiscuous mode [ 285.432763][ T3813] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 285.433191][ T3813] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 285.433435][ T3813] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 285.433646][ T3813] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 291.997329][ T31] kauditd_printk_skb: 13 callbacks suppressed [ 291.997599][ T31] audit: type=1326 audit(291.910:942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.3.381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 292.001162][ T31] audit: type=1326 audit(291.910:943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.3.381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 292.006557][ T31] audit: type=1326 audit(291.920:944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.3.381" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 292.008697][ T31] audit: type=1326 audit(291.920:945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.3.381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 292.052360][ T31] audit: type=1326 audit(291.960:946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.3.381" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 292.052928][ T31] audit: type=1326 audit(291.960:947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.3.381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 292.070160][ T31] audit: type=1326 audit(291.980:948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.3.381" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 292.072553][ T31] audit: type=1326 audit(291.980:949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.3.381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 292.105842][ T31] audit: type=1326 audit(292.010:950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.3.381" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 292.106428][ T31] audit: type=1326 audit(292.010:951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5794 comm="syz.3.381" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 294.454185][ T3061] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 294.551729][ T3061] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 294.658934][ T3061] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 294.782518][ T3061] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 295.703164][ T3061] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 295.737401][ T3061] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 295.752537][ T3061] bond0 (unregistering): Released all slaves [ 295.799350][ T3061] bond1 (unregistering): Released all slaves [ 295.965578][ T3061] hsr_slave_0: left promiscuous mode [ 295.967594][ T3061] hsr_slave_1: left promiscuous mode [ 295.995925][ T3061] veth1_macvtap: left promiscuous mode [ 295.998204][ T3061] veth0_macvtap: left promiscuous mode [ 296.000282][ T3061] veth1_vlan: left promiscuous mode [ 296.001481][ T3061] veth0_vlan: left promiscuous mode [ 297.021224][ T5853] netlink: 24 bytes leftover after parsing attributes in process `syz.3.396'. [ 297.876298][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 297.876560][ T31] audit: type=1326 audit(297.780:954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5852 comm="syz.3.396" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 297.990486][ T31] audit: type=1400 audit(297.900:955): avc: denied { write } for pid=5856 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 297.992640][ T31] audit: type=1400 audit(297.900:956): avc: denied { open } for pid=5856 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 298.472760][ T31] audit: type=1400 audit(298.370:957): avc: denied { search } for pid=5858 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 298.485292][ T31] audit: type=1400 audit(298.390:958): avc: denied { search } for pid=5858 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 298.485611][ T31] audit: type=1400 audit(298.390:959): avc: denied { search } for pid=5858 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 298.485814][ T31] audit: type=1400 audit(298.390:960): avc: denied { search } for pid=5858 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 298.560296][ T31] audit: type=1400 audit(298.450:961): avc: denied { read open } for pid=5859 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 298.595498][ T31] audit: type=1400 audit(298.490:962): avc: denied { getattr } for pid=5859 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 298.673560][ T31] audit: type=1400 audit(298.580:963): avc: denied { add_name } for pid=5858 comm="dhcpcd-run-hook" name="resolv.conf.eth1.link" scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 302.981598][ T31] kauditd_printk_skb: 9 callbacks suppressed [ 302.981898][ T31] audit: type=1326 audit(302.890:973): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5881 comm="syz.3.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 303.065242][ T31] audit: type=1326 audit(302.920:974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5881 comm="syz.3.401" exe="/syz-executor" sig=0 arch=40000028 syscall=315 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 303.067981][ T31] audit: type=1326 audit(302.920:975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5881 comm="syz.3.401" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 303.367191][ T5886] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 314.812282][ T5935] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 314.837335][ T5935] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 317.324185][ T5935] hsr_slave_0: entered promiscuous mode [ 317.334432][ T5935] hsr_slave_1: entered promiscuous mode [ 318.121082][ T5935] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 318.148944][ T5935] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 318.169281][ T5935] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 318.184368][ T5935] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 319.936199][ T5935] 8021q: adding VLAN 0 to HW filter on device bond0 [ 322.070001][ T5935] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 329.698459][ T5935] veth0_vlan: entered promiscuous mode [ 329.767003][ T5935] veth1_vlan: entered promiscuous mode [ 329.959825][ T5935] veth0_macvtap: entered promiscuous mode [ 330.005986][ T5935] veth1_macvtap: entered promiscuous mode [ 330.251948][ T3061] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.252465][ T3061] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.252779][ T3061] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.253016][ T3061] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 330.921657][ T31] audit: type=1326 audit(330.830:976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6324 comm="syz.4.416" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 330.924343][ T31] audit: type=1326 audit(330.830:977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6324 comm="syz.4.416" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 330.937246][ T31] audit: type=1326 audit(330.850:978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6324 comm="syz.4.416" exe="/syz-executor" sig=0 arch=40000028 syscall=162 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 331.001892][ T31] audit: type=1326 audit(330.910:979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6324 comm="syz.4.416" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 331.017810][ T31] audit: type=1326 audit(330.930:980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6324 comm="syz.4.416" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 331.547549][ T31] audit: type=1326 audit(331.460:981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6326 comm="syz.4.417" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 331.556499][ T31] audit: type=1326 audit(331.470:982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6326 comm="syz.4.417" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 331.567588][ T31] audit: type=1326 audit(331.480:983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6326 comm="syz.4.417" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 331.570085][ T31] audit: type=1326 audit(331.480:984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6326 comm="syz.4.417" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 331.571488][ T31] audit: type=1326 audit(331.480:985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6326 comm="syz.4.417" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 332.354051][ T1055] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 332.432812][ T1055] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 332.535907][ T1055] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 333.176588][ T1055] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 334.102290][ T1055] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 334.116060][ T1055] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 334.120943][ T1055] bond0 (unregistering): Released all slaves [ 334.159080][ T1055] bond1 (unregistering): Released all slaves [ 334.229302][ T1055] bond2 (unregistering): Released all slaves [ 334.353530][ T1055] hsr_slave_1: left promiscuous mode [ 334.436271][ T1055] veth1_macvtap: left promiscuous mode [ 334.436778][ T1055] veth0_macvtap: left allmulticast mode [ 334.437048][ T1055] veth0_macvtap: left promiscuous mode [ 334.437460][ T1055] veth1_vlan: left allmulticast mode [ 334.438255][ T1055] veth1_vlan: left promiscuous mode [ 334.438636][ T1055] veth0_vlan: left promiscuous mode [ 336.035284][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 336.035720][ T31] audit: type=1326 audit(335.940:987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6359 comm="syz.4.424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 336.035977][ T31] audit: type=1326 audit(335.940:988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6359 comm="syz.4.424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 336.036332][ T31] audit: type=1326 audit(335.940:989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6359 comm="syz.4.424" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 336.043092][ T31] audit: type=1326 audit(335.950:990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6359 comm="syz.4.424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 336.045918][ T31] audit: type=1326 audit(335.950:991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6359 comm="syz.4.424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 336.047753][ T31] audit: type=1326 audit(335.950:992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6359 comm="syz.4.424" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 336.050577][ T31] audit: type=1326 audit(335.950:993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6359 comm="syz.4.424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 336.052161][ T31] audit: type=1326 audit(335.960:994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6359 comm="syz.4.424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 336.053900][ T31] audit: type=1326 audit(335.960:995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6359 comm="syz.4.424" exe="/syz-executor" sig=0 arch=40000028 syscall=287 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 336.056959][ T31] audit: type=1326 audit(335.960:996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6359 comm="syz.4.424" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 337.097867][ T6373] netlink: 180 bytes leftover after parsing attributes in process `syz.4.427'. [ 345.601770][ T31] kauditd_printk_skb: 20 callbacks suppressed [ 345.602454][ T31] audit: type=1326 audit(345.510:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6444 comm="syz.4.439" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 345.618796][ T31] audit: type=1326 audit(345.530:1018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6444 comm="syz.4.439" exe="/syz-executor" sig=0 arch=40000028 syscall=163 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 345.635257][ T31] audit: type=1326 audit(345.540:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6444 comm="syz.4.439" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 345.638200][ T31] audit: type=1326 audit(345.550:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6444 comm="syz.4.439" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 356.673519][ T12] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 357.191234][ T12] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 357.340261][ T12] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 357.530884][ T12] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 357.880983][ T6467] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 357.916956][ T6467] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 358.442900][ T12] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 358.476002][ T12] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 358.480503][ T12] bond0 (unregistering): Released all slaves [ 358.728242][ T12] hsr_slave_0: left promiscuous mode [ 358.730318][ T12] hsr_slave_1: left promiscuous mode [ 358.756718][ T12] veth1_macvtap: left promiscuous mode [ 358.757066][ T12] veth0_macvtap: left promiscuous mode [ 358.758318][ T12] veth1_vlan: left promiscuous mode [ 358.758494][ T12] veth0_vlan: left promiscuous mode [ 362.608334][ T6467] hsr_slave_0: entered promiscuous mode [ 362.616325][ T6467] hsr_slave_1: entered promiscuous mode [ 362.617045][ T6467] debugfs: 'hsr0' already exists in 'hsr' [ 362.617166][ T6467] Cannot create hsr debugfs directory [ 363.439701][ T6467] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 363.480041][ T6467] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 363.490103][ T6467] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 363.498991][ T6467] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 365.590943][ T6467] 8021q: adding VLAN 0 to HW filter on device bond0 [ 370.078363][ T3813] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 370.199730][ T3813] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 370.282017][ T3813] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 370.387858][ T3813] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 370.796147][ T3813] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 370.804284][ T3813] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 370.810666][ T3813] bond0 (unregistering): Released all slaves [ 370.889901][ T3813] hsr_slave_0: left promiscuous mode [ 370.892674][ T3813] hsr_slave_1: left promiscuous mode [ 370.913136][ T3813] veth1_macvtap: left promiscuous mode [ 370.914141][ T3813] veth0_macvtap: left promiscuous mode [ 370.920236][ T3813] veth1_vlan: left promiscuous mode [ 370.924122][ T3813] veth0_vlan: left promiscuous mode [ 373.429093][ T6467] veth0_vlan: entered promiscuous mode [ 373.478172][ T6467] veth1_vlan: entered promiscuous mode [ 373.615723][ T6467] veth0_macvtap: entered promiscuous mode [ 373.639701][ T6467] veth1_macvtap: entered promiscuous mode [ 373.759105][ T1055] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 373.759610][ T1055] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 373.759717][ T1055] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 373.759842][ T1055] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 379.692982][ T31] audit: type=1400 audit(379.600:1021): avc: denied { connect } for pid=6924 comm="syz.5.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 379.712816][ T31] audit: type=1400 audit(379.620:1022): avc: denied { write } for pid=6924 comm="syz.5.446" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 380.516496][ T6933] wireguard0: entered promiscuous mode [ 380.517750][ T6933] wireguard0: entered allmulticast mode [ 397.699582][ T6969] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 397.717355][ T6969] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 400.000779][ T6969] hsr_slave_0: entered promiscuous mode [ 400.007084][ T6969] hsr_slave_1: entered promiscuous mode [ 400.019037][ T6969] debugfs: 'hsr0' already exists in 'hsr' [ 400.019999][ T6969] Cannot create hsr debugfs directory [ 400.810871][ T6969] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 400.847164][ T6969] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 400.891948][ T6969] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 400.929494][ T6969] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 402.786056][ T6969] 8021q: adding VLAN 0 to HW filter on device bond0 [ 410.640704][ T6969] veth0_vlan: entered promiscuous mode [ 410.726528][ T6969] veth1_vlan: entered promiscuous mode [ 410.926479][ T6969] veth0_macvtap: entered promiscuous mode [ 410.959109][ T6969] veth1_macvtap: entered promiscuous mode [ 411.140253][ T1055] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 411.157778][ T1055] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 411.159028][ T1055] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 411.160089][ T1055] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 411.863526][ T31] audit: type=1326 audit(411.770:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.6.451" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 411.869853][ T31] audit: type=1326 audit(411.770:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.6.451" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 411.887127][ T7385] capability: warning: `syz.6.451' uses 32-bit capabilities (legacy support in use) [ 411.891834][ T31] audit: type=1326 audit(411.800:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.6.451" exe="/syz-executor" sig=0 arch=40000028 syscall=185 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 411.893454][ T31] audit: type=1326 audit(411.800:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7383 comm="syz.6.451" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x7ffc0000 [ 412.747219][ T31] audit: type=1400 audit(412.660:1027): avc: denied { read } for pid=7391 comm="syz.6.458" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 412.750117][ T31] audit: type=1400 audit(412.660:1028): avc: denied { open } for pid=7391 comm="syz.6.458" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 412.769278][ T31] audit: type=1400 audit(412.680:1029): avc: denied { ioctl } for pid=7391 comm="syz.6.458" path="/dev/binderfs/binder0" dev="binder" ino=10 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 412.785588][ T31] audit: type=1400 audit(412.690:1030): avc: denied { set_context_mgr } for pid=7391 comm="syz.6.458" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 412.793947][ T7393] binder: 7391:7393 unknown command 0 [ 412.805611][ T7393] binder: 7391:7393 ioctl c0306201 20000080 returned -22 [ 412.844999][ T31] audit: type=1400 audit(412.750:1031): avc: denied { write } for pid=7391 comm="syz.6.458" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 412.847393][ T31] audit: type=1400 audit(412.760:1032): avc: denied { map } for pid=7391 comm="syz.6.458" path="/dev/binderfs/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 413.169405][ T7396] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 413.172163][ T7396] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 418.843903][ T7428] netlink: 4 bytes leftover after parsing attributes in process `syz.6.466'. [ 426.611362][ T7447] netlink: 20 bytes leftover after parsing attributes in process `syz.6.470'. [ 426.867241][ T7449] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 426.871103][ T7449] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 429.817391][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 429.817656][ T31] audit: type=1400 audit(429.730:1036): avc: denied { create } for pid=7466 comm="syz.6.477" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 431.427903][ T31] audit: type=1400 audit(431.340:1037): avc: denied { create } for pid=7476 comm="syz.6.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 432.448267][ T31] audit: type=1400 audit(432.360:1038): avc: denied { sqpoll } for pid=7483 comm="syz.6.483" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 434.435298][ T31] audit: type=1400 audit(434.340:1039): avc: denied { unmount } for pid=6969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 434.608405][ T31] audit: type=1400 audit(434.520:1040): avc: denied { create } for pid=7492 comm="syz.6.485" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 436.238368][ T7496] netlink: 4 bytes leftover after parsing attributes in process `syz.6.485'. [ 439.191482][ T31] audit: type=1400 audit(439.100:1041): avc: denied { bind } for pid=7497 comm="syz.5.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 439.193425][ T31] audit: type=1400 audit(439.100:1042): avc: denied { setopt } for pid=7497 comm="syz.5.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 439.202811][ T31] audit: type=1400 audit(439.110:1043): avc: denied { accept } for pid=7497 comm="syz.5.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 439.213434][ T31] audit: type=1400 audit(439.120:1044): avc: denied { read } for pid=7497 comm="syz.5.486" path="socket:[9318]" dev="sockfs" ino=9318 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 439.731467][ T31] audit: type=1400 audit(439.640:1045): avc: denied { write } for pid=7497 comm="syz.5.486" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 442.468418][ T7512] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 442.471064][ T7512] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 464.088776][ T31] audit: type=1400 audit(464.000:1046): avc: denied { create } for pid=7564 comm="syz.5.509" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 466.309735][ T7592] ipvlan0: entered promiscuous mode [ 466.312044][ T7592] ipvlan0: entered allmulticast mode [ 466.312886][ T7592] veth0_vlan: entered allmulticast mode [ 466.417355][ T7594] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 466.420215][ T7594] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 466.717233][ T7598] veth0_to_team: entered promiscuous mode [ 466.718773][ T7598] veth0_to_team: entered allmulticast mode [ 466.837375][ T31] audit: type=1400 audit(466.750:1047): avc: denied { write } for pid=7599 comm="syz.5.524" name="ptype" dev="proc" ino=4026532739 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 470.624388][ T7647] Illegal XDP return value 4294967283 on prog (id 296) dev N/A, expect packet loss! [ 471.071555][ T31] audit: type=1400 audit(470.980:1048): avc: denied { ioctl } for pid=7650 comm="syz.5.542" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=10432 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 475.108951][ T7690] bond0: (slave bond_slave_0): Releasing backup interface [ 475.165484][ T7690] bond0: (slave bond_slave_1): Releasing backup interface [ 476.795688][ T7717] netlink: 8 bytes leftover after parsing attributes in process `syz.5.567'. [ 478.915451][ T7754] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 478.916536][ T7754] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 480.725533][ T7766] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 480.740761][ T7766] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 482.432127][ T31] audit: type=1400 audit(482.320:1049): avc: denied { mounton } for pid=7776 comm="syz.6.592" path="/70/file0" dev="tmpfs" ino=371 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 492.127959][ T1055] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 492.199927][ T1055] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 492.290200][ T1055] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 492.348108][ T1055] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 492.615434][ T1055] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 492.622027][ T1055] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 492.631292][ T1055] bond0 (unregistering): Released all slaves [ 492.707838][ T1055] hsr_slave_0: left promiscuous mode [ 492.711881][ T1055] hsr_slave_1: left promiscuous mode [ 492.724896][ T1055] veth1_macvtap: left promiscuous mode [ 492.725937][ T1055] veth0_macvtap: left promiscuous mode [ 492.726909][ T1055] veth1_vlan: left promiscuous mode [ 492.727899][ T1055] veth0_vlan: left promiscuous mode [ 493.377934][ T7799] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 493.380440][ T7799] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 494.280563][ T7817] binfmt_misc: register: failed to install interpreter file ./bus [ 496.266335][ T31] audit: type=1400 audit(496.180:1050): avc: denied { bind } for pid=7845 comm="syz.5.608" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 496.268144][ T31] audit: type=1400 audit(496.180:1051): avc: denied { name_bind } for pid=7845 comm="syz.5.608" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 496.269228][ T31] audit: type=1400 audit(496.180:1052): avc: denied { node_bind } for pid=7845 comm="syz.5.608" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 497.213966][ T31] audit: type=1326 audit(497.120:1053): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7861 comm="syz.5.613" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 497.587120][ T31] audit: type=1400 audit(497.500:1054): avc: denied { unmount } for pid=7869 comm="syz.5.616" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 497.953661][ T1055] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 498.047186][ T1055] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 498.117183][ T1055] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 498.192470][ T1055] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 498.787196][ T1055] bond0 (unregistering): Released all slaves [ 498.896574][ T1055] hsr_slave_0: left promiscuous mode [ 498.898517][ T1055] hsr_slave_1: left promiscuous mode [ 498.902691][ T1055] veth1_macvtap: left promiscuous mode [ 498.904042][ T1055] veth0_macvtap: left promiscuous mode [ 498.905481][ T1055] veth1_vlan: left promiscuous mode [ 498.906095][ T1055] veth0_vlan: left promiscuous mode [ 499.848173][ T31] audit: type=1400 audit(499.750:1055): avc: denied { setopt } for pid=7847 comm="syz.6.609" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 502.168458][ T7890] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 502.177195][ T7890] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 503.702516][ T7890] hsr_slave_0: entered promiscuous mode [ 503.705804][ T7890] hsr_slave_1: entered promiscuous mode [ 504.319788][ T7890] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 504.338830][ T7890] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 504.359110][ T7890] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 504.378283][ T7890] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 505.702778][ T7890] 8021q: adding VLAN 0 to HW filter on device bond0 [ 510.676864][ T7890] veth0_vlan: entered promiscuous mode [ 510.694148][ T7890] veth1_vlan: entered promiscuous mode [ 510.767127][ T7890] veth0_macvtap: entered promiscuous mode [ 510.782688][ T7890] veth1_macvtap: entered promiscuous mode [ 510.907018][ T3813] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 510.907735][ T3813] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 510.907969][ T3813] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 510.908210][ T3813] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 511.679851][ T31] audit: type=1400 audit(511.590:1056): avc: denied { getopt } for pid=8303 comm="syz.6.623" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 511.703214][ T31] audit: type=1400 audit(511.610:1057): avc: denied { remount } for pid=8303 comm="syz.6.623" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 511.728373][ T31] audit: type=1400 audit(511.640:1058): avc: denied { unmount } for pid=6969 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 512.226092][ T8321] bridge_slave_0: default FDB implementation only supports local addresses [ 513.232942][ T31] audit: type=1400 audit(513.140:1059): avc: denied { read } for pid=8336 comm="syz.7.636" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 513.233346][ T31] audit: type=1400 audit(513.140:1060): avc: denied { open } for pid=8336 comm="syz.7.636" path="/9/file0" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 516.658609][ T31] audit: type=1400 audit(516.560:1061): avc: denied { getopt } for pid=8390 comm="syz.7.650" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 523.807075][ T8447] syzkaller1: tun_chr_ioctl cmd 1074812118 [ 525.575233][ T8484] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 525.576261][ T8484] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 526.337375][ T31] audit: type=1400 audit(526.250:1062): avc: denied { watch } for pid=8496 comm="syz.7.685" path="/proc/81" dev="proc" ino=11551 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 527.397039][ T31] audit: type=1400 audit(527.310:1063): avc: denied { mounton } for pid=8493 comm="syz.6.684" path=2F3131362F66696C65302F66696C6530202864656C6574656429 dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 527.610620][ T8513] fuse: Bad value for 'fd' [ 528.319701][ T8521] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 528.329988][ T8521] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 529.146584][ T8531] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 529.147569][ T8531] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 529.395668][ T31] audit: type=1400 audit(529.310:1064): avc: denied { ioctl } for pid=8536 comm="syz.6.698" path="cgroup:[4026532937]" dev="nsfs" ino=4026532937 ioctlcmd=0xb704 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 529.855485][ T8544] netlink: 'syz.6.700': attribute type 1 has an invalid length. [ 530.387037][ T31] audit: type=1326 audit(530.300:1065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8550 comm="syz.7.702" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 531.443956][ T8568] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 531.446081][ T8568] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 532.821713][ T8584] fuse: Bad value for 'fd' [ 534.230325][ T8596] fuse: Bad value for 'fd' [ 534.812405][ T31] audit: type=1400 audit(534.720:1066): avc: denied { execute } for pid=8604 comm="syz.6.715" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=12481 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 535.685209][ T31] audit: type=1326 audit(535.590:1067): auid=4294967295 uid=60928 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8621 comm="syz.7.723" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1322c0 code=0x0 [ 538.973667][ T8650] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 538.977308][ T8650] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 539.888719][ T8665] ======================================================= [ 539.888719][ T8665] WARNING: The mand mount option has been deprecated and [ 539.888719][ T8665] and is ignored by this kernel. Remove the mand [ 539.888719][ T8665] option from the mount to silence this warning. [ 539.888719][ T8665] ======================================================= [ 540.068429][ T8669] cgroup: Bad value for 'name' [ 541.185714][ T3813] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 541.228043][ T3813] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 541.283583][ T3813] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 541.359688][ T3813] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 541.661733][ T3813] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 541.678354][ T3813] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 541.688511][ T3813] bond0 (unregistering): Released all slaves [ 541.802991][ T3813] hsr_slave_0: left promiscuous mode [ 541.805317][ T3813] hsr_slave_1: left promiscuous mode [ 541.819333][ T3813] veth1_macvtap: left promiscuous mode [ 541.819715][ T3813] veth0_macvtap: left promiscuous mode [ 541.820126][ T3813] veth1_vlan: left promiscuous mode [ 541.820305][ T3813] veth0_vlan: left promiscuous mode [ 543.463993][ T31] audit: type=1400 audit(543.370:1068): avc: denied { setattr } for pid=8794 comm="syz.7.750" name="event1" dev="devtmpfs" ino=723 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 543.960105][ T8689] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 543.968922][ T8689] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 544.827832][ T8689] hsr_slave_0: entered promiscuous mode [ 544.831975][ T8689] hsr_slave_1: entered promiscuous mode [ 544.833793][ T8689] debugfs: 'hsr0' already exists in 'hsr' [ 544.835061][ T8689] Cannot create hsr debugfs directory [ 545.171622][ T8689] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 545.182140][ T8689] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 545.192812][ T8689] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 545.204202][ T8689] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 545.938423][ T8689] 8021q: adding VLAN 0 to HW filter on device bond0 [ 549.259290][ T8689] veth0_vlan: entered promiscuous mode [ 549.282303][ T8689] veth1_vlan: entered promiscuous mode [ 549.340709][ T8689] veth0_macvtap: entered promiscuous mode [ 549.349788][ T8689] veth1_macvtap: entered promiscuous mode [ 549.401422][ T1055] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 549.402258][ T1055] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 549.402449][ T1055] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 549.402527][ T1055] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 549.610941][ T9103] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 549.612733][ T9103] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 555.943844][ T9138] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 555.951949][ T9138] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 556.282335][ T31] audit: type=1400 audit(556.190:1069): avc: denied { create } for pid=9149 comm="syz.8.766" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 556.308728][ T31] audit: type=1400 audit(556.220:1070): avc: denied { write } for pid=9149 comm="syz.8.766" path="socket:[13238]" dev="sockfs" ino=13238 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 560.157911][ T31] audit: type=1400 audit(560.060:1071): avc: denied { connect } for pid=9243 comm="syz.7.778" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 561.267234][ T9287] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 561.269923][ T9287] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 563.214420][ T9311] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 563.217602][ T9311] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 564.250765][ T31] audit: type=1400 audit(564.160:1072): avc: denied { setopt } for pid=9327 comm="syz.8.794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 565.559787][ T9343] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 565.560805][ T9343] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 565.768363][ T31] audit: type=1400 audit(565.670:1073): avc: denied { nlmsg_write } for pid=9349 comm="syz.8.800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 567.312549][ T31] audit: type=1400 audit(567.220:1074): avc: denied { read } for pid=9368 comm="syz.7.809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 570.820339][ T31] audit: type=1400 audit(570.730:1075): avc: denied { create } for pid=9400 comm="syz.7.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 571.915518][ T31] audit: type=1400 audit(571.810:1076): avc: denied { audit_write } for pid=9411 comm="syz.7.827" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 571.988410][ T31] audit: type=1107 audit(571.900:1077): pid=9411 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg=',Yp٧ȁX' [ 572.501614][ T9417] netlink: 8 bytes leftover after parsing attributes in process `syz.7.829'. [ 572.849677][ T9424] netlink: 684 bytes leftover after parsing attributes in process `syz.8.833'. [ 572.886603][ T31] audit: type=1400 audit(572.790:1078): avc: denied { write } for pid=9423 comm="syz.7.832" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 574.465749][ T9447] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 574.477023][ T9447] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 577.799516][ T31] audit: type=1400 audit(577.700:1079): avc: denied { nlmsg_tty_audit } for pid=9481 comm="syz.7.858" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 577.925622][ T9486] netlink: 28 bytes leftover after parsing attributes in process `syz.8.861'. [ 578.443537][ T9496] netlink: 16402 bytes leftover after parsing attributes in process `syz.7.864'. [ 579.949860][ T9517] netlink: 'syz.7.873': attribute type 10 has an invalid length. [ 580.002315][ T31] audit: type=1400 audit(579.910:1080): avc: denied { nlmsg_read } for pid=9516 comm="syz.8.874" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 582.061279][ T9547] fuse: Unknown parameter 'group_i00000000000000000000' [ 583.933887][ T9571] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 583.936831][ T9571] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 584.238636][ T9575] fuse: Bad value for 'fd' [ 586.900232][ T9590] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 586.901774][ T9590] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 587.639218][ T9594] fuse: Bad value for 'fd' [ 592.227769][ T9606] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 592.228972][ T9606] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 592.652565][ T9610] fuse: Bad value for 'fd' [ 594.599311][ T31] audit: type=1400 audit(594.500:1081): avc: denied { getopt } for pid=9620 comm="syz.7.915" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 595.343840][ T9652] netlink: 4 bytes leftover after parsing attributes in process `syz.7.927'. [ 596.136409][ T9662] fuse: Bad value for 'user_id' [ 596.139381][ T9662] fuse: Bad value for 'user_id' [ 597.762325][ T9673] fuse: Bad value for 'user_id' [ 597.775811][ T9673] fuse: Bad value for 'user_id' [ 599.600495][ T9689] fuse: Bad value for 'fd' [ 599.982644][ T31] audit: type=1400 audit(599.890:1082): avc: denied { setopt } for pid=9692 comm="syz.7.943" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 600.068419][ T9696] netlink: 'syz.7.943': attribute type 10 has an invalid length. [ 601.168876][ T9709] syzkaller0: entered promiscuous mode [ 601.169211][ T9709] syzkaller0: entered allmulticast mode [ 610.446606][ T9755] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 612.499832][ T9761] netlink: 28 bytes leftover after parsing attributes in process `syz.8.960'. [ 618.595948][ T9765] netlink: 8 bytes leftover after parsing attributes in process `syz.7.962'. [ 619.185235][ T31] audit: type=1400 audit(619.090:1083): avc: denied { setopt } for pid=9770 comm="syz.7.965" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 628.640522][ T9848] netlink: 20 bytes leftover after parsing attributes in process `syz.8.990'. [ 641.583806][ T9905] netlink: 20 bytes leftover after parsing attributes in process `syz.7.1012'. [ 641.584243][ T9905] netlink: 16 bytes leftover after parsing attributes in process `syz.7.1012'. [ 644.521159][ T9948] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1030'. [ 644.602125][ T9949] fuse: Unknown parameter 'group_i00000000000000000000' [ 646.750867][ T9966] fuse: Unknown parameter 'group_id00000000000000000000' [ 647.966410][ T6387] hid_parser_main: 43 callbacks suppressed [ 647.966723][ T6387] hid-generic 0000:0000:0000.0004: unknown main item tag 0x0 [ 647.975087][ T6387] hid-generic 0000:0000:0000.0004: hidraw0: HID v0.00 Device [syz1] on syz0 [ 651.133804][ T9985] fuse: Unknown parameter 'group_id00000000000000000000' [ 658.446307][T10020] tmpfs: Unsupported parameter 'huge' [ 658.661839][ T31] audit: type=1400 audit(658.570:1084): avc: denied { setopt } for pid=10023 comm="syz.7.1060" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 664.093958][T10040] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1067'. [ 665.690471][T10052] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1072'. [ 674.159436][ T31] audit: type=1400 audit(674.070:1085): avc: denied { map } for pid=10084 comm="syz.7.1083" path="/dev/dsp" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 674.379354][T10089] binder: 10088:10089 unknown command 0 [ 674.379759][T10089] binder: 10088:10089 ioctl c0306201 20000080 returned -22 [ 679.026615][ T31] audit: type=1400 audit(678.940:1086): avc: denied { append } for pid=10134 comm="syz.8.1101" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 679.352942][T10141] gtp0: entered promiscuous mode [ 679.353954][T10141] gtp0: entered allmulticast mode [ 686.378281][ T31] audit: type=1400 audit(686.280:1087): avc: denied { read } for pid=10150 comm="syz.7.1107" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 697.272207][ T31] audit: type=1400 audit(697.180:1088): avc: denied { ioctl } for pid=10185 comm="syz.7.1125" path="socket:[16506]" dev="sockfs" ino=16506 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 697.572079][ T31] audit: type=1400 audit(697.480:1089): avc: denied { create } for pid=10190 comm="syz.7.1127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 697.573897][ T31] audit: type=1400 audit(697.480:1090): avc: denied { write } for pid=10190 comm="syz.7.1127" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 699.735954][ T31] audit: type=1400 audit(699.640:1091): avc: denied { mount } for pid=10223 comm="syz.7.1142" name="/" dev="tracefs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 699.765226][ T31] audit: type=1400 audit(699.660:1092): avc: denied { unmount } for pid=7890 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tracefs_t tclass=filesystem permissive=1 [ 702.415170][ T31] audit: type=1400 audit(702.320:1093): avc: denied { lock } for pid=10253 comm="syz.8.1155" path="socket:[16618]" dev="sockfs" ino=16618 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 704.798578][T10271] MPI: mpi too large (32776 bits) [ 706.107443][T10296] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1170'. [ 713.557245][ T31] audit: type=1400 audit(713.470:1094): avc: denied { module_load } for pid=10309 comm="syz.8.1176" path="/sys/power/wakeup_count" dev="sysfs" ino=752 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysfs_t tclass=system permissive=1 [ 716.203266][T10343] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1187'. [ 716.300841][ T31] audit: type=1400 audit(716.210:1095): avc: denied { ioctl } for pid=10344 comm="syz.8.1188" path="socket:[15619]" dev="sockfs" ino=15619 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 716.311678][T10345] netlink: 4 bytes leftover after parsing attributes in process `syz.8.1188'. [ 717.290184][T10361] vlan0: entered promiscuous mode [ 719.056885][T10378] fuse: Unknown parameter '0x0000000000000003' [ 719.602199][T10383] vlan0: entered promiscuous mode [ 720.679362][T10405] fuse: Unknown parameter '0x0000000000000003' [ 724.421562][T10426] netlink: 36 bytes leftover after parsing attributes in process `syz.8.1211'. [ 724.424066][T10426] netlink: 16 bytes leftover after parsing attributes in process `syz.8.1211'. [ 724.427636][T10426] netlink: 36 bytes leftover after parsing attributes in process `syz.8.1211'. [ 724.431679][T10426] netlink: 36 bytes leftover after parsing attributes in process `syz.8.1211'. [ 725.977097][T10430] smc: net device bond0 applied user defined pnetid SYZ2 [ 735.481019][T10447] netdevsim netdevsim8 netdevsim0: entered allmulticast mode [ 749.757931][T10490] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 749.762509][T10490] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 757.624105][T10518] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 757.641458][T10518] iommufd_mock iommufd_mock0: Adding to iommu group 0 [ 776.815391][T10592] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 776.816322][T10592] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 779.530763][T10598] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 779.543843][T10598] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 792.778167][T10611] ptrace attach of "/syz-executor exec"[7890] was attempted by "/syz-executor exec"[10611] [ 793.332485][T10612] x_tables: ip_tables: recent.0 match: invalid size 216 (kernel) != (user) 4096 [ 797.648206][T10632] smc: net device bond0 erased user defined pnetid SYZ2 [ 802.120740][T10651] cgroup: Unknown subsys name 'hugetlb' [ 802.128194][ T31] audit: type=1400 audit(802.040:1096): avc: denied { remount } for pid=10645 comm="syz.8.1282" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 809.951182][T10692] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 809.966174][T10692] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 810.497214][T10698] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 810.546214][T10698] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 815.451324][ T5925] hid-generic 0000:007F:0001.0005: unknown main item tag 0x0 [ 815.457808][ T5925] hid-generic 0000:007F:0001.0005: unknown main item tag 0x0 [ 815.459167][ T5925] hid-generic 0000:007F:0001.0005: unknown main item tag 0x0 [ 815.460746][ T5925] hid-generic 0000:007F:0001.0005: unknown main item tag 0x0 [ 815.464120][ T5925] hid-generic 0000:007F:0001.0005: unknown main item tag 0x0 [ 815.466442][ T5925] hid-generic 0000:007F:0001.0005: unknown main item tag 0x0 [ 815.467611][ T5925] hid-generic 0000:007F:0001.0005: unknown main item tag 0x0 [ 815.469764][ T5925] hid-generic 0000:007F:0001.0005: unknown main item tag 0x0 [ 815.471547][ T5925] hid-generic 0000:007F:0001.0005: unknown main item tag 0x0 [ 815.475708][ T5925] hid-generic 0000:007F:0001.0005: unknown main item tag 0x0 [ 815.497973][ T5925] hid-generic 0000:007F:0001.0005: hidraw0: HID v0.00 Device [syz1] on syz0 [ 823.324348][ T31] audit: type=1400 audit(823.230:1097): avc: denied { relabelfrom } for pid=10723 comm="syz.8.1294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 823.327470][ T31] audit: type=1400 audit(823.240:1098): avc: denied { relabelto } for pid=10723 comm="syz.8.1294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 827.277657][T10775] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 827.279196][T10775] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 827.646735][T10780] netlink: 16 bytes leftover after parsing attributes in process `syz.7.1310'. [ 828.055938][T10785] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 828.066998][T10785] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 828.472428][T10789] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 828.489384][T10789] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 828.877047][T10797] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 828.915778][T10797] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 868.121881][ T31] audit: type=1400 audit(868.030:1099): avc: denied { bind } for pid=10898 comm="syz.8.1351" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 868.124290][ T31] audit: type=1400 audit(868.030:1100): avc: denied { name_bind } for pid=10898 comm="syz.8.1351" src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 868.126186][ T31] audit: type=1400 audit(868.030:1101): avc: denied { node_bind } for pid=10898 comm="syz.8.1351" src=512 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 887.777170][T10938] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 887.785516][T10938] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 887.871922][T10942] fuse: Bad value for 'fd' [ 894.024842][ C0] sched: DL replenish lagged too much [ 902.497241][T10957] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 902.516796][T10957] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 913.389922][T10964] fuse: Bad value for 'fd' [ 949.831519][T10973] syz_tun: entered allmulticast mode [ 960.980978][T10980] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 960.990808][T10980] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 989.782533][T10992] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 989.792156][T10992] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1080.423567][T11024] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1080.429011][T11024] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1090.233440][T11029] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1090.241706][T11029] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1094.128562][T11032] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1389'. [ 1107.450550][T11037] netlink: 12 bytes leftover after parsing attributes in process `syz.7.1392'. [ 1119.907048][T11041] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1120.498431][T11041] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 1396.518173][ T32] INFO: task kworker/0:68:6072 blocked for more than 426 seconds. [ 1396.541846][ T32] Not tainted 6.17.0-rc1-syzkaller #0 [ 1396.548428][ T32] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1396.569739][ T32] task:kworker/0:68 state:D stack:0 pid:6072 tgid:6072 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1396.611912][ T32] Workqueue: events bpf_prog_free_deferred [ 1396.650807][ T32] Call trace: [ 1396.678157][ T32] [<81a3b41c>] (__schedule) from [<81a3c3b0>] (schedule+0x2c/0x130) [ 1397.630592][ T32] r10:dff39d84 r9:00000002 r8:60000013 r7:82916554 r6:dff39d8c r5:84c3a400 [ 1397.638858][ T32] r4:84c3a400 [ 1397.648509][ T32] [<81a3c384>] (schedule) from [<81a3c798>] (schedule_preempt_disabled+0x18/0x24) [ 1397.656121][ T32] r5:84c3a400 r4:82916550 [ 1397.680268][ T32] [<81a3c780>] (schedule_preempt_disabled) from [<81a3f4f0>] (__mutex_lock.constprop.0+0x378/0xaf8) [ 1398.843613][ T32] [<81a3f178>] (__mutex_lock.constprop.0) from [<81a3fd44>] (__mutex_lock_slowpath+0x14/0x18) [ 1398.867241][ T32] r10:8280c960 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:dff39e08 [ 1398.897552][ T32] r4:00000000 [ 1398.913445][ T32] [<81a3fd30>] (__mutex_lock_slowpath) from [<81a3fd84>] (mutex_lock+0x3c/0x40) [ 1399.169391][ T32] [<81a3fd48>] (mutex_lock) from [<804e0654>] (_vm_unmap_aliases+0x68/0x240) [ 1399.191012][ T32] [<804e05ec>] (_vm_unmap_aliases) from [<804e4434>] (vfree+0x16c/0x210) [ 1399.198571][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:8684f940 [ 1400.636292][ T32] r4:00000000 [ 1400.888500][ T31] audit: type=1400 audit(1398.520:1102): avc: denied { write } for pid=3118 comm="syz-executor" path="pipe:[1950]" dev="pipefs" ino=1950 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 1403.770414][ T32] [<804e42c8>] (vfree) from [<8054cfd4>] (execmem_free+0x30/0x50) [ 1403.781130][ T32] r9:83018005 r8:84c3a400 r7:00000000 r6:83018000 r5:00001000 r4:7f312000 [ 1406.682234][ T32] [<8054cfa4>] (execmem_free) from [<803c33dc>] (bpf_jit_free_exec+0x10/0x14) [ 1407.689247][ T32] r5:00001000 r4:df901000 [ 1407.710961][ T32] [<803c33cc>] (bpf_jit_free_exec) from [<803c37bc>] (bpf_jit_free+0x68/0xe4) [ 1407.719385][ T32] [<803c3754>] (bpf_jit_free) from [<803c4864>] (bpf_prog_free_deferred+0x140/0x158) [ 1407.742233][ T32] r5:85b1838c r4:85550780 [ 1407.761113][ T32] [<803c4724>] (bpf_prog_free_deferred) from [<8027a3bc>] (process_one_work+0x1b4/0x4f4) [ 1407.790384][ T32] r7:dddced40 r6:83018000 r5:85b1838c r4:85550780 [ 1407.798642][ T32] [<8027a208>] (process_one_work) from [<8027b004>] (worker_thread+0x1fc/0x3d8) [ 1407.823027][ T32] r10:61c88647 r9:84c3a400 r8:855507ac r7:82804d40 r6:dddced40 r5:dddced60 [ 1408.348648][ T32] r4:85550780 [ 1409.582073][ T32] [<8027ae08>] (worker_thread) from [<80281fec>] (kthread+0x12c/0x280) [ 1409.600708][ T32] r10:00000000 r9:85550780 r8:8027ae08 r7:dfea9e60 r6:84d2f600 r5:84c3a400 [ 1409.619388][ T32] r4:00000001 [ 1409.640286][ T32] [<80281ec0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1409.659488][ T32] Exception stack(0xdff39fb0 to 0xdff39ff8) [ 1409.678952][ T32] 9fa0: 00000000 00000000 00000000 00000000 [ 1409.697505][ T32] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1409.712525][ T32] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1409.730531][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ec0 [ 1409.747643][ T32] r4:859ded40 [ 1409.766549][ T32] INFO: task kworker/0:68:6072 is blocked on a mutex likely owned by task kworker/0:76:6400. [ 1409.786035][ T32] task:kworker/0:76 state:R running task stack:0 pid:6400 tgid:6400 ppid:2 task_flags:0x4208060 flags:0x00000000 [ 1409.847318][ T32] Workqueue: events bpf_prog_free_deferred [ 1409.894243][ T32] Call trace: [ 1409.943279][ T32] [<81a3b41c>] (__schedule) from [<81a3c7e4>] (preempt_schedule_irq+0x40/0xa8) [ 1409.961850][ T32] r10:8280c9b4 r9:85f6e000 r8:80200c04 r7:dfef5d54 r6:ffffffff r5:85f6e000 [ 1409.979866][ T32] r4:00000000 [ 1410.863943][ T32] [<81a3c7a4>] (preempt_schedule_irq) from [<80200c24>] (svc_preempt+0x8/0x18) [ 1410.884197][ T32] Exception stack(0xdfef5d20 to 0xdfef5d68) [ 1410.907067][ T32] 5d20: b23b4000 e035b000 00000001 80239bb8 7f310000 00000001 82ac8f44 82ac8320 [ 1410.947674][ T32] 5d40: 7f310000 e035b000 8280c9b4 dfef5d9c dfef5da0 dfef5d70 80230af0 80239bd0 [ 1410.963026][ T32] 5d60: 80000013 ffffffff [ 1411.238112][ T32] r5:80000013 r4:80239bd0 [ 1411.238190][ T32] [<80230a8c>] (flush_tlb_kernel_range) from [<804e0418>] (__purge_vmap_area_lazy+0x284/0x458) [ 1411.238293][ T32] r4:82ac8f64 [ 1411.238306][ T32] [<804e0194>] (__purge_vmap_area_lazy) from [<804e07d0>] (_vm_unmap_aliases+0x1e4/0x240) [ 1411.238377][ T32] r10:00000000 r9:00000000 r8:00000000 r7:ffffffff r6:dfef5dc0 r5:dfef5e08 [ 1411.238394][ T32] r4:dfef5dc0 [ 1411.238407][ T32] [<804e05ec>] (_vm_unmap_aliases) from [<804e4434>] (vfree+0x16c/0x210) [ 1411.238479][ T32] r10:83016070 r9:00000001 r8:00000000 r7:ffffffff r6:00000000 r5:84eaac40 [ 1411.238496][ T32] r4:00000000 [ 1411.238510][ T32] [<804e42c8>] (vfree) from [<8054cfd4>] (execmem_free+0x30/0x50) [ 1411.238574][ T32] r9:83018005 r8:85f6e000 r7:00000000 r6:83018000 r5:00001000 r4:7f310000 [ 1411.238590][ T32] [<8054cfa4>] (execmem_free) from [<803c33dc>] (bpf_jit_free_exec+0x10/0x14) [ 1411.238648][ T32] r5:00001000 r4:df877000 [ 1411.238663][ T32] [<803c33cc>] (bpf_jit_free_exec) from [<803c37bc>] (bpf_jit_free+0x68/0xe4) [ 1411.238724][ T32] [<803c3754>] (bpf_jit_free) from [<803c4864>] (bpf_prog_free_deferred+0x140/0x158) [ 1411.238779][ T32] r5:85b1878c r4:84b1cf00 [ 1411.238792][ T32] [<803c4724>] (bpf_prog_free_deferred) from [<8027a3bc>] (process_one_work+0x1b4/0x4f4) [ 1411.238855][ T32] r7:dddced40 r6:83018000 r5:85b1878c r4:84b1cf00 [ 1411.238870][ T32] [<8027a208>] (process_one_work) from [<8027b004>] (worker_thread+0x1fc/0x3d8) [ 1411.238937][ T32] r10:61c88647 r9:85f6e000 r8:84b1cf2c r7:82804d40 r6:dddced40 r5:dddced60 [ 1411.238955][ T32] r4:84b1cf00 [ 1411.238968][ T32] [<8027ae08>] (worker_thread) from [<80281fec>] (kthread+0x12c/0x280) [ 1411.239031][ T32] r10:00000000 r9:84b1cf00 r8:8027ae08 r7:dfda5e60 r6:84b1cd00 r5:85f6e000 [ 1411.239058][ T32] r4:00000001 [ 1411.239071][ T32] [<80281ec0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1411.239116][ T32] Exception stack(0xdfef5fb0 to 0xdfef5ff8) [ 1411.239150][ T32] 5fa0: 00000000 00000000 00000000 00000000 [ 1411.239180][ T32] 5fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1411.239207][ T32] 5fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1411.239239][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ec0 [ 1411.239257][ T32] r4:84f83780 [ 1411.240350][ T32] NMI backtrace for cpu 0 [ 1411.240701][ T32] CPU: 0 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 1411.240848][ T32] Hardware name: ARM-Versatile Express [ 1411.240920][ T32] Call trace: [ 1411.240970][ T32] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1411.241039][ T32] r7:00000000 r6:00000113 r5:60000193 r4:822602a4 [ 1411.241053][ T32] [<80201b08>] (show_stack) from [<8021fb90>] (dump_stack_lvl+0x70/0x7c) [ 1411.241100][ T32] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1411.241152][ T32] r5:00000000 r4:00000001 [ 1411.241164][ T32] [<8021fb9c>] (dump_stack) from [<81a25030>] (nmi_cpu_backtrace+0x160/0x17c) [ 1411.241214][ T32] [<81a24ed0>] (nmi_cpu_backtrace) from [<81a2517c>] (nmi_trigger_cpumask_backtrace+0x130/0x1d8) [ 1411.241266][ T32] r7:00000000 r6:8280c690 r5:8281ac94 r4:ffffffff [ 1411.241279][ T32] [<81a2504c>] (nmi_trigger_cpumask_backtrace) from [<802304fc>] (arch_trigger_cpumask_backtrace+0x18/0x1c) [ 1411.241346][ T32] r9:82abd564 r8:82804d40 r7:0001b20a r6:00007ef2 r5:8281b248 r4:858e660c [ 1411.241360][ T32] [<802304e4>] (arch_trigger_cpumask_backtrace) from [<8037da20>] (watchdog+0x4d4/0x81c) [ 1411.241417][ T32] [<8037d54c>] (watchdog) from [<80281fec>] (kthread+0x12c/0x280) [ 1411.241481][ T32] r10:00000000 r9:00000000 r8:8037d54c r7:830cf580 r6:830cf580 r5:8321d400 [ 1411.241498][ T32] r4:00000001 [ 1411.241510][ T32] [<80281ec0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1411.241552][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 1411.241578][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1411.241607][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1411.241634][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1411.241666][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ec0 [ 1411.241690][ T32] r4:833a1f00 [ 1411.241895][ T32] Sending NMI from CPU 0 to CPUs 1: [ 1411.245043][ C1] NMI backtrace for cpu 1 [ 1411.245890][ C1] CPU: 1 UID: 0 PID: 11102 Comm: modprobe Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 1411.246032][ C1] Hardware name: ARM-Versatile Express [ 1411.246319][ C1] PC is at ip_finish_output2+0x54/0x6d4 [ 1411.246513][ C1] LR is at __ip_finish_output.part.0+0x9c/0x150 [ 1411.246564][ C1] pc : [<8172da78>] lr : [<8172efd4>] psr: 80000113 [ 1411.246603][ C1] sp : df805a18 ip : df805a48 fp : df805a44 [ 1411.246634][ C1] r10: 862a7554 r9 : aa1414ac r8 : 854b3b00 [ 1411.246674][ C1] r7 : 85812000 r6 : 871d1f00 r5 : 861f5d80 r4 : 00000010 [ 1411.246727][ C1] r3 : 00000002 r2 : 00000000 r1 : 00000000 r0 : 854b3b00 [ 1411.246848][ C1] Flags: Nzcv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 1411.246916][ C1] Control: 30c5387d Table: 87138680 DAC: 00000000 [ 1411.247002][ C1] Call trace: frame pointer underflow [ 1411.247919][ C1] [<8172da24>] (ip_finish_output2) from [<8172efd4>] (__ip_finish_output.part.0+0x9c/0x150) [ 1411.248230][ C1] r9:aa1414ac r8:85812000 r7:854b3b00 r6:0000ffff r5:00000000 r4:861f5d80 [ 1411.248342][ C1] [<8172ef38>] (__ip_finish_output.part.0) from [<8172f0c4>] (__ip_finish_output+0x3c/0x40) [ 1411.248420][ C1] r9:aa1414ac r8:85812000 r7:00000000 r6:00000001 r5:854b3b00 r4:861f5d80 [ 1411.248441][ C1] [<8172f088>] (__ip_finish_output) from [<8172f130>] (ip_output+0x68/0x104) [ 1411.248496][ C1] [<8172f0c8>] (ip_output) from [<817305c0>] (ip_local_out+0x40/0x44) [ 1411.248579][ C1] r8:aa1414ac r7:00000008 r6:00000000 r5:854b3b00 r4:861f5d80 [ 1411.248606][ C1] [<81730580>] (ip_local_out) from [<816cdc18>] (synproxy_send_tcp+0x108/0x140) [ 1411.248677][ C1] r7:00000008 r6:854b3b00 r5:862e7100 r4:861f5d80 [ 1411.248705][ C1] [<816cdb10>] (synproxy_send_tcp) from [<816ce4b0>] (synproxy_send_client_synack+0x190/0x1e8) [ 1411.248772][ C1] r9:862a7c00 r8:862a7c14 r7:df805b80 r6:861f5cc0 r5:00000014 r4:861f5d80 [ 1411.248786][ C1] [<816ce320>] (synproxy_send_client_synack) from [<81708470>] (nft_synproxy_do_eval+0x25c/0x2b4) [ 1411.248859][ C1] r10:81e6fb48 r9:862a7c14 r8:858aaa40 r7:85e2a018 r6:df805c4c r5:854b3b00 [ 1411.248876][ C1] r4:861f5cc0 [ 1411.248889][ C1] [<81708214>] (nft_synproxy_do_eval) from [<817084f4>] (nft_synproxy_eval+0x14/0x18) [ 1411.248952][ C1] r9:df805ce4 r8:81e6fcd0 r7:81e6fa34 r6:81e6f9f0 r5:85e2a020 r4:85e2a010 [ 1411.248967][ C1] [<817084e0>] (nft_synproxy_eval) from [<816d1158>] (nft_do_chain+0x12c/0x570) [ 1411.249018][ C1] [<816d102c>] (nft_do_chain) from [<816ea418>] (nft_do_chain_inet+0xac/0x120) [ 1411.249086][ C1] r10:ddde3e88 r9:85e2a100 r8:df805d3c r7:861f5cc0 r6:85e2a100 r5:00000000 [ 1411.249102][ C1] r4:84fb1580 [ 1411.249115][ C1] [<816ea36c>] (nft_do_chain_inet) from [<81698694>] (nf_hook_slow+0x40/0x104) [ 1411.249170][ C1] r4:861f5cc0 [ 1411.249184][ C1] [<81698654>] (nf_hook_slow) from [<8172a0d4>] (ip_local_deliver+0xf0/0x110) [ 1411.249246][ C1] r9:00000040 r8:00000026 r7:00000000 r6:854b3b00 r5:85812000 r4:861f5cc0 [ 1411.249262][ C1] [<81729fe4>] (ip_local_deliver) from [<81729178>] (ip_rcv_finish+0x98/0xb0) [ 1411.249320][ C1] r6:85812000 r5:854b3b00 r4:861f5cc0 [ 1411.249336][ C1] [<817290e0>] (ip_rcv_finish) from [<8172a1c8>] (ip_rcv+0xd4/0xe0) [ 1411.249392][ C1] r7:00000000 r6:854b3b00 r5:861f5cc0 r4:00000001 [ 1411.249406][ C1] [<8172a0f4>] (ip_rcv) from [<8157b314>] (__netif_receive_skb_one_core+0x5c/0x80) [ 1411.249494][ C1] r6:00000000 r5:8172a0f4 r4:85812000 [ 1411.249509][ C1] [<8157b2b8>] (__netif_receive_skb_one_core) from [<8157b380>] (__netif_receive_skb+0x18/0x5c) [ 1411.249564][ C1] r5:ddde3f70 r4:861f5cc0 [ 1411.249577][ C1] [<8157b368>] (__netif_receive_skb) from [<8157b688>] (process_backlog+0xa0/0x17c) [ 1411.249630][ C1] r5:ddde3f70 r4:861f5cc0 [ 1411.249645][ C1] [<8157b5e8>] (process_backlog) from [<8157bee4>] (__napi_poll+0x34/0x240) [ 1411.249716][ C1] r10:ddde3e80 r9:00000000 r8:df805ea8 r7:df805ea3 r6:00000040 r5:ddde3f70 [ 1411.249741][ C1] r4:00000001 [ 1411.249753][ C1] [<8157beb0>] (__napi_poll) from [<8157c7d0>] (net_rx_action+0x3a0/0x430) [ 1411.249876][ C1] r9:00000000 r8:df805ea8 r7:0000012c r6:00000000 r5:5b721000 r4:ddde3f70 [ 1411.249891][ C1] [<8157c430>] (net_rx_action) from [<8025de30>] (handle_softirqs+0x140/0x458) [ 1411.249978][ C1] r10:85f1c800 r9:82804d40 r8:00000101 r7:00000003 r6:00000002 r5:00000002 [ 1411.249998][ C1] r4:8280408c [ 1411.250010][ C1] [<8025dcf0>] (handle_softirqs) from [<8025e2a4>] (__irq_exit_rcu+0x110/0x1d0) [ 1411.250075][ C1] r10:868a9b00 r9:85f1c800 r8:00000000 r7:df985d58 r6:8240f7bc r5:8244d118 [ 1411.250092][ C1] r4:85f1c800 [ 1411.250104][ C1] [<8025e194>] (__irq_exit_rcu) from [<8025e61c>] (irq_exit+0x10/0x18) [ 1411.250159][ C1] r5:8244d118 r4:826c195c [ 1411.250171][ C1] [<8025e60c>] (irq_exit) from [<81a37c80>] (generic_handle_arch_irq+0x7c/0x80) [ 1411.250219][ C1] [<81a37c04>] (generic_handle_arch_irq) from [<81a07164>] (call_with_stack+0x1c/0x20) [ 1411.250283][ C1] r9:85f1c800 r8:860a3a80 r7:df985d8c r6:ffffffff r5:00000113 r4:802308a8 [ 1411.250298][ C1] [<81a07148>] (call_with_stack) from [<80200bec>] (__irq_svc+0x8c/0xbc) [ 1411.250438][ C1] Exception stack(0xdf985d58 to 0xdf985da0) [ 1411.250601][ C1] 5d40: fffff000 76fb7000 [ 1411.250654][ C1] 5d60: 90f00000 76fb7033 868a9b00 76fb7000 dfd17fdf 04600000 860a3a80 def89070 [ 1411.250698][ C1] 5d80: 868a9b00 df985dcc 868a9b00 df985da8 90f00000 802308a8 00000113 ffffffff [ 1411.250754][ C1] [<80230814>] (flush_tlb_page) from [<804d78ec>] (ptep_clear_flush+0x74/0x78) [ 1411.250814][ C1] [<804d7878>] (ptep_clear_flush) from [<804c419c>] (do_wp_page+0x518/0x1248) [ 1411.250880][ C1] r9:def89070 r8:deb7273c r7:fce3c75f r6:00e00000 r5:00000000 r4:df985eb0 [ 1411.250898][ C1] [<804c3c84>] (do_wp_page) from [<804c743c>] (handle_mm_fault+0x9b8/0x14dc) [ 1411.250964][ C1] r10:df985fb0 r9:04600000 r8:dfd17fdf r7:00000040 r6:76fb7848 r5:85f1c800 [ 1411.250981][ C1] r4:00001255 [ 1411.250994][ C1] [<804c6a84>] (handle_mm_fault) from [<802342f0>] (do_page_fault+0x1c8/0x49c) [ 1411.251059][ C1] r10:00000002 r9:860a3a80 r8:00000255 r7:85f1c800 r6:00000a0f r5:76fb7848 [ 1411.251077][ C1] r4:df985fb0 [ 1411.251090][ C1] [<80234128>] (do_page_fault) from [<802347ac>] (do_DataAbort+0x38/0xa8) [ 1411.251153][ C1] r10:00000010 r9:76fb86f4 r8:80234128 r7:df985fb0 r6:76fb7848 r5:00000a0f [ 1411.251171][ C1] r4:8281cf70 [ 1411.251186][ C1] [<80234774>] (do_DataAbort) from [<80200edc>] (__dabt_usr+0x5c/0x60) [ 1411.251232][ C1] Exception stack(0xdf985fb0 to 0xdf985ff8) [ 1411.251261][ C1] 5fa0: 76ede000 76fb93b0 76ede0f4 76fb7844 [ 1411.251295][ C1] 5fc0: 76fb9390 6ffffdff 00000005 7e83e078 00000002 76fb86f4 00000010 7e83e21c [ 1411.251325][ C1] 5fe0: 6fffffff 7e83e0f8 70000025 76fc1d40 20000010 ffffffff [ 1411.251356][ C1] r8:826b7044 r7:85f1c800 r6:ffffffff r5:20000010 r4:76fc1d40 [ 1413.052181][ T32] Kernel panic - not syncing: hung_task: blocked tasks [ 1413.074504][ T32] CPU: 1 UID: 0 PID: 32 Comm: khungtaskd Not tainted 6.17.0-rc1-syzkaller #0 PREEMPT [ 1413.074805][ T32] Hardware name: ARM-Versatile Express [ 1413.074977][ T32] Call trace: [ 1413.075157][ T32] [<80201a24>] (dump_backtrace) from [<80201b20>] (show_stack+0x18/0x1c) [ 1413.075447][ T32] r7:00000000 r6:8281f77c r5:00000000 r4:822602a4 [ 1413.075609][ T32] [<80201b08>] (show_stack) from [<8021fb74>] (dump_stack_lvl+0x54/0x7c) [ 1413.075851][ T32] [<8021fb20>] (dump_stack_lvl) from [<8021fbb4>] (dump_stack+0x18/0x1c) [ 1413.076117][ T32] r5:00000000 r4:82a77d18 [ 1413.076238][ T32] [<8021fb9c>] (dump_stack) from [<80202624>] (vpanic+0x10c/0x30c) [ 1413.076467][ T32] [<80202518>] (vpanic) from [<80202858>] (trace_suspend_resume+0x0/0xd8) [ 1413.076703][ T32] r7:0001b20a [ 1413.076806][ T32] [<80202824>] (panic) from [<8037d880>] (watchdog+0x334/0x81c) [ 1413.077031][ T32] r3:00000001 r2:00000000 r1:00000000 r0:82260f90 [ 1413.077190][ T32] [<8037d54c>] (watchdog) from [<80281fec>] (kthread+0x12c/0x280) [ 1413.077421][ T32] r10:00000000 r9:00000000 r8:8037d54c r7:830cf580 r6:830cf580 r5:8321d400 [ 1413.077637][ T32] r4:00000001 [ 1413.077740][ T32] [<80281ec0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 1413.077955][ T32] Exception stack(0xdf8e1fb0 to 0xdf8e1ff8) [ 1413.078120][ T32] 1fa0: 00000000 00000000 00000000 00000000 [ 1413.078338][ T32] 1fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 1413.078560][ T32] 1fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 1413.078755][ T32] r10:00000000 r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:80281ec0 [ 1413.078956][ T32] r4:833a1f00 [ 1413.104231][ T32] Rebooting in 86400 seconds.. VM DIAGNOSIS: 12:17:11 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=8240f7bc R02=00000001 R03=00000101 R04=00000000 R05=829eae40 R06=00000020 R07=60000013 R08=00000001 R09=85ca7a00 R10=80000000 R11=df80191c R12=df8018e0 R13=df8018f0 R14=81a388b8 R15=8097108c PSR=20000093 --C- A S svc32 s00=04000000 s01=00000000 d00=0000000004000000 s02=28000000 s03=fff74b1d d01=fff74b1d28000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=fea3beab s09=ff8bc349 d04=ff8bc349fea3beab s10=ffffffff s11=ffffffff d05=ffffffffffffffff s12=fe7f04af s13=ffead478 d06=ffead478fe7f04af s14=ffffffff s15=ffffffff d07=ffffffffffffffff s16=00000000 s17=090457b3 d08=090457b300000000 s18=ea000000 s19=0000652e d09=0000652eea000000 s20=0172ea0e s21=ffead471 d10=ffead4710172ea0e s22=00000000 s23=ffffffff d11=ffffffff00000000 s24=04a3beab s25=00000000 d12=0000000004a3beab s26=28000000 s27=fff74b1d d13=fff74b1d28000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=011cfddb s33=0057ac75 d16=0057ac75011cfddb s34=00000000 s35=00000000 d17=0000000000000000 s36=fe89c4dc s37=fff0d367 d18=fff0d367fe89c4dc s38=ffffffff s39=ffffffff d19=ffffffffffffffff s40=01000000 s41=00000000 d20=0000000001000000 s42=0097c65f s43=00000000 d21=000000000097c65f s44=00000001 s45=00000000 d22=0000000000000001 s46=00329775 s47=00000000 d23=0000000000329775 s48=00fe0a38 s49=090457b3 d24=090457b300fe0a38 s50=03c13daf s51=00000000 d25=0000000003c13daf s52=ff07cead s53=ffe40692 d26=ffe40692ff07cead s54=feb515fb s55=ff353262 d27=ff353262feb515fb s56=0055509b s57=01abe568 d28=01abe5680055509b s58=00d5f2b4 s59=feb515fb d29=feb515fb00d5f2b4 s60=1c2df1de s61=fff74b1d d30=fff74b1d1c2df1de s62=3ae280fc s63=ffd56391 d31=ffd563913ae280fc FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=80340980 R01=df805de8 R02=dddda488 R03=00000000 R04=830b9c00 R05=00000001 R06=df805de8 R07=00000000 R08=80340980 R09=8280c7e4 R10=848b4800 R11=df805ddc R12=df805de0 R13=df805db8 R14=80343e20 R15=80341d9c PSR=60030193 -ZC- A S svc32 s00=fc000000 s01=ffffffff d00=fffffffffc000000 s02=74000000 s03=0010270b d01=0010270b74000000 s04=fc000000 s05=ffffffff d02=fffffffffc000000 s06=fc000000 s07=ffffffff d03=fffffffffc000000 s08=0006c5e7 s09=ff5cad69 d04=ff5cad690006c5e7 s10=00000000 s11=ffffffff d05=ffffffff00000000 s12=ff254a92 s13=004ba596 d06=004ba596ff254a92 s14=ffffffff s15=00000000 d07=00000000ffffffff s16=fe000000 s17=06d94902 d08=06d94902fe000000 s18=88000000 s19=ffff6224 d09=ffff622488000000 s20=01ef2141 s21=004ba59a d10=004ba59a01ef2141 s22=00000000 s23=00000000 d11=0000000000000000 s24=fe06c5e7 s25=ffffffff d12=fffffffffe06c5e7 s26=74000000 s27=0010270b d13=0010270b74000000 s28=02000000 s29=00000000 d14=0000000002000000 s30=02000000 s31=00000000 d15=0000000002000000 s32=004de31c s33=ffeb7c2d d16=ffeb7c2d004de31c s34=00000000 s35=ffffffff d17=ffffffff00000000 s36=01c0f618 s37=00c2cefd d18=00c2cefd01c0f618 s38=00000000 s39=00000000 d19=0000000000000000 s40=01000000 s41=00000000 d20=0000000001000000 s42=ff1336cc s43=ffffffff d21=ffffffffff1336cc s44=ffffffff s45=ffffffff d22=ffffffffffffffff s46=ffb11244 s47=ffffffff d23=ffffffffffb11244 s48=fe2dcbe3 s49=06d94902 d24=06d94902fe2dcbe3 s50=fa245b0c s51=ffffffff d25=fffffffffa245b0c s52=017d575d s53=017395f4 d26=017395f4017d575d s54=004bb1c0 s55=fe89932a d27=fe89932a004bb1c0 s56=0004afe5 s57=fe57fd2c d28=fe57fd2c0004afe5 s58=ff2bfe96 s59=004bb1c0 d29=004bb1c0ff2bfe96 s60=674feb63 s61=0010270b d30=0010270b674feb63 s62=45e26adb s63=007ff0aa d31=007ff0aa45e26adb FPSCR: 00000000