last executing test programs: 4.092561609s ago: executing program 1 (id=164): r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs={0x1, 0x0, 0x4e21}, 0x6e) listen(r0, 0x9) shutdown(r0, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) connect$unix(r1, &(0x7f00000001c0)=@abs={0x1, 0x0, 0x4e21}, 0x6e) 3.697271279s ago: executing program 1 (id=165): r0 = socket$inet6(0xa, 0x3, 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000001440)={'bridge0\x00', &(0x7f0000000100)=@ethtool_ringparam={0x7, 0x0, 0x20000000, 0x0, 0x1, 0x900, 0x0, 0xfffffffe}}) 2.883321451s ago: executing program 0 (id=167): r0 = socket$packet(0x11, 0x3, 0x300) r1 = dup(r0) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$int_in(r2, 0x40000000af01, 0x0) ioctl$VHOST_SET_MEM_TABLE(r2, 0x4008af03, &(0x7f0000000340)) ioctl$VHOST_SET_FEATURES(r2, 0x4008af00, &(0x7f00000001c0)=0x304008000) write$vhost_msg_v2(r2, &(0x7f0000000100)={0x2, 0x0, {0x0, 0x0, 0x0, 0x6, 0x2}}, 0x48) ioctl$VHOST_NET_SET_BACKEND(r2, 0x4008af30, &(0x7f00000003c0)={0x1, r1}) 2.491295541s ago: executing program 0 (id=168): capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000040)={0x200000, 0x200000}) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='tmpfs\x00', 0x0, &(0x7f0000000300)='usrquota') chdir(&(0x7f0000000180)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) quotactl_fd$Q_SETQUOTA(r0, 0xffffffff80000800, 0x0, &(0x7f00000000c0)={0x3, 0x0, 0x0, 0x0, 0x2, 0x3, 0x0, 0x6, 0x7fffffff}) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') 2.072789362s ago: executing program 1 (id=169): unshare(0xc000400) r0 = socket$inet6_icmp(0xa, 0x2, 0x3a) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e24, 0x5, @remote, 0x1}, 0x1c) 1.841267055s ago: executing program 0 (id=170): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="180000006a000105fefdffffffdbdf2520"], 0x18}, 0x1, 0x0, 0x0, 0x40}, 0x20008000) 1.292023373s ago: executing program 1 (id=171): ioctl$NBD_SET_TIMEOUT(0xffffffffffffffff, 0xab09, 0x6) 1.073062774s ago: executing program 0 (id=172): r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, &(0x7f0000000240)={0xa, 0x4e25, 0x9, @mcast2, 0x3}, 0x1c) r1 = socket$igmp6(0xa, 0x3, 0x2) sendmsg$MPTCP_PM_CMD_GET_LIMITS(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x4001) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000b00)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000500)=@newtaction={0xa4, 0x30, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [{0x90, 0x1, [@m_bpf={0x50, 0x1, 0x0, 0x0, {{0x8}, {0x28, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x3, 0xef, 0x1, 0x8000, 0x2}}, @TCA_ACT_BPF_OPS={0x4}]}, {0x4}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x0, 0x2}}}}, @m_gact={0x3c, 0x1, 0x0, 0x0, {{0x9}, {0x10, 0x2, 0x0, 0x1, [@TCA_GACT_PROB={0xc, 0x3, {0x0, 0x60e, 0x20000002}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x1, 0x2}}}}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x2000c800}, 0x2400c800) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000900)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x9584, &(0x7f0000000100)=[{&(0x7f0000000000)="2c10", 0x5dc}], 0x1, 0x0, 0x0, 0x2c}, 0x44004) 850.751346ms ago: executing program 1 (id=173): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0xfffffffd) r1 = eventfd2(0x0, 0x80800) io_setup(0x6, &(0x7f0000000140)=0x0) io_submit(r2, 0x2, &(0x7f00000000c0)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0xfffd, r0, 0x0, 0x0, 0x0, 0x0, 0x3, r1}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) shutdown(r0, 0x0) 580.918359ms ago: executing program 0 (id=174): capset(&(0x7f0000000080)={0x19980330}, &(0x7f0000000040)={0x200000, 0x200000}) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mount(0x0, 0x0, &(0x7f0000000000)='tmpfs\x00', 0x0, &(0x7f0000000300)='usrquota') chdir(&(0x7f0000000180)='./file1\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='net_prio.prioidx\x00', 0x275a, 0x0) quotactl_fd$Q_SETQUOTA(r0, 0xffffffff80000800, 0x0, &(0x7f00000000c0)={0x3, 0x0, 0x0, 0x0, 0x2, 0x3, 0x0, 0x6, 0x7fffffff}) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') 209.014039ms ago: executing program 0 (id=175): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x10, 0x4, 0x8, 0x4, 0x0, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x14, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000000000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000500)={r1}, 0xc) 0s ago: executing program 1 (id=176): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00'}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='task_newtask\x00', r0}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r2 = bpf$ITER_CREATE(0xb, &(0x7f0000000100)={r1}, 0x8) close(r2) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@base={0x13, 0x8, 0x8}, 0x50) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x8, 0xf, &(0x7f0000000c80)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}, {}, {0x7, 0x0, 0xb, 0x2}, {0x85, 0x0, 0x0, 0x51}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000000)='GPL\x00'}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x18, 0x3, &(0x7f0000000d00)=ANY=[], &(0x7f0000000000)='syzkaller\x00'}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$ITER_CREATE(0xb, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) bpf$BPF_GET_PROG_INFO(0x1c, &(0x7f00000003c0)={r4, 0x0, 0x0}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000080), &(0x7f0000000300)}, 0x20) kernel console output (not intermixed with test programs): Warning: Permanently added '[localhost]:54789' (ED25519) to the list of known hosts. [ 224.461687][ T30] audit: type=1400 audit(223.910:46): avc: denied { name_bind } for pid=3311 comm="sshd-session" src=30002 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 224.921762][ T30] audit: type=1400 audit(224.370:47): avc: denied { execute } for pid=3312 comm="sh" name="syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 224.932208][ T30] audit: type=1400 audit(224.380:48): avc: denied { execute_no_trans } for pid=3312 comm="sh" path="/syz-executor" dev="vda" ino=1867 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 231.229985][ T30] audit: type=1400 audit(230.670:49): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=1868 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 231.244842][ T30] audit: type=1400 audit(230.690:50): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 231.296855][ T3312] cgroup: Unknown subsys name 'net' [ 231.334206][ T30] audit: type=1400 audit(230.780:51): avc: denied { unmount } for pid=3312 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 231.662385][ T3312] cgroup: Unknown subsys name 'cpuset' [ 231.721044][ T3312] cgroup: Unknown subsys name 'rlimit' [ 232.119717][ T30] audit: type=1400 audit(231.560:52): avc: denied { setattr } for pid=3312 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 232.126202][ T30] audit: type=1400 audit(231.570:53): avc: denied { mounton } for pid=3312 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 232.141266][ T30] audit: type=1400 audit(231.580:54): avc: denied { mount } for pid=3312 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 232.970767][ T3314] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 232.982055][ T30] audit: type=1400 audit(232.420:55): avc: denied { relabelto } for pid=3314 comm="mkswap" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 232.992806][ T30] audit: type=1400 audit(232.440:56): avc: denied { write } for pid=3314 comm="mkswap" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 233.142309][ T30] audit: type=1400 audit(232.580:57): avc: denied { read } for pid=3312 comm="syz-executor" name="swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 233.145879][ T30] audit: type=1400 audit(232.590:58): avc: denied { open } for pid=3312 comm="syz-executor" path="/swap-file" dev="vda" ino=1871 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 233.167278][ T3312] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 250.748891][ T30] audit: type=1400 audit(250.190:59): avc: denied { execmem } for pid=3316 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 250.855080][ T30] audit: type=1400 audit(250.300:60): avc: denied { read } for pid=3317 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 250.860701][ T30] audit: type=1400 audit(250.300:61): avc: denied { open } for pid=3317 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 250.885203][ T30] audit: type=1400 audit(250.330:62): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 250.985995][ T30] audit: type=1400 audit(250.430:64): avc: denied { module_request } for pid=3317 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 250.991466][ T30] audit: type=1400 audit(250.430:63): avc: denied { module_request } for pid=3318 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 251.195870][ T30] audit: type=1400 audit(250.640:65): avc: denied { sys_module } for pid=3317 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 258.494086][ T3317] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 258.517284][ T3317] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 258.941392][ T3318] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 258.995954][ T3318] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 262.370060][ T3317] hsr_slave_0: entered promiscuous mode [ 262.387400][ T3317] hsr_slave_1: entered promiscuous mode [ 263.174447][ T3318] hsr_slave_0: entered promiscuous mode [ 263.184368][ T3318] hsr_slave_1: entered promiscuous mode [ 263.193432][ T3318] debugfs: 'hsr0' already exists in 'hsr' [ 263.195619][ T3318] Cannot create hsr debugfs directory [ 265.384527][ T30] audit: type=1400 audit(264.830:66): avc: denied { create } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 265.402856][ T30] audit: type=1400 audit(264.850:67): avc: denied { write } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 265.419613][ T30] audit: type=1400 audit(264.860:68): avc: denied { read } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 265.467102][ T3317] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 265.523119][ T3317] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 265.592235][ T3317] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 265.643402][ T3317] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 266.090789][ T3318] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 266.126203][ T3318] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 266.194762][ T3318] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 266.235836][ T3318] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 269.263330][ T3317] 8021q: adding VLAN 0 to HW filter on device bond0 [ 269.975986][ T3318] 8021q: adding VLAN 0 to HW filter on device bond0 [ 281.489228][ T3317] veth0_vlan: entered promiscuous mode [ 281.664606][ T3317] veth1_vlan: entered promiscuous mode [ 281.880298][ T3317] veth0_macvtap: entered promiscuous mode [ 281.951993][ T3317] veth1_macvtap: entered promiscuous mode [ 282.602606][ T1140] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 282.605425][ T1140] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 282.609695][ T1140] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 282.696315][ T1140] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 282.705451][ T3318] veth0_vlan: entered promiscuous mode [ 282.944469][ T3318] veth1_vlan: entered promiscuous mode [ 283.330586][ T30] audit: type=1400 audit(282.750:69): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 283.361286][ T30] audit: type=1400 audit(282.810:70): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzkaller.uFm8wh/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 283.382735][ T30] audit: type=1400 audit(282.820:71): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 283.420575][ T30] audit: type=1400 audit(282.860:72): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzkaller.uFm8wh/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 283.442789][ T30] audit: type=1400 audit(282.890:73): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/syzkaller.uFm8wh/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=4469 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 283.510515][ T30] audit: type=1400 audit(282.950:74): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 283.619272][ T30] audit: type=1400 audit(283.060:75): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=1544 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 283.650404][ T30] audit: type=1400 audit(283.090:76): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="gadgetfs" ino=4470 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 283.693432][ T30] audit: type=1400 audit(283.140:77): avc: denied { mount } for pid=3317 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 283.705538][ T30] audit: type=1400 audit(283.150:78): avc: denied { mounton } for pid=3317 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 283.956315][ T3318] veth0_macvtap: entered promiscuous mode [ 284.056950][ T3317] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 284.097405][ T3318] veth1_macvtap: entered promiscuous mode [ 284.914024][ T55] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 284.916490][ T55] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 284.924580][ T55] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 284.926808][ T55] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 289.489504][ T30] kauditd_printk_skb: 7 callbacks suppressed [ 289.490341][ T30] audit: type=1400 audit(288.930:86): avc: denied { bpf } for pid=3467 comm="syz.1.3" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 289.859264][ T30] audit: type=1400 audit(289.300:87): avc: denied { create } for pid=3465 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 289.910671][ T30] audit: type=1400 audit(289.350:88): avc: denied { write } for pid=3465 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 289.937348][ T30] audit: type=1400 audit(289.380:89): avc: denied { map_create } for pid=3465 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 289.954114][ T30] audit: type=1400 audit(289.400:90): avc: denied { ioctl } for pid=3465 comm="syz.0.1" path="socket:[4517]" dev="sockfs" ino=4517 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 291.510189][ T30] audit: type=1400 audit(290.950:91): avc: denied { create } for pid=3472 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 291.521955][ T30] audit: type=1400 audit(290.970:92): avc: denied { setopt } for pid=3472 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 291.530638][ T30] audit: type=1400 audit(290.970:93): avc: denied { write } for pid=3472 comm="syz.0.5" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 291.963844][ T30] audit: type=1400 audit(291.410:94): avc: denied { create } for pid=3474 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 291.981210][ T30] audit: type=1400 audit(291.430:95): avc: denied { write } for pid=3474 comm="syz.0.6" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 292.624938][ T3478] netlink: 'syz.0.7': attribute type 10 has an invalid length. [ 292.626818][ T3478] netlink: 40 bytes leftover after parsing attributes in process `syz.0.7'. [ 292.662619][ T3478] vxcan0: entered promiscuous mode [ 292.706167][ T3478] A link change request failed with some changes committed already. Interface vxcan0 may have been left with an inconsistent configuration, please check. [ 295.251089][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 295.252871][ T30] audit: type=1400 audit(294.700:101): avc: denied { read write } for pid=3482 comm="syz.1.10" name="vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 295.263674][ T30] audit: type=1400 audit(294.710:102): avc: denied { open } for pid=3482 comm="syz.1.10" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 295.273976][ T3488] process 'syz.1.10' launched './file0' with NULL argv: empty string added [ 295.293510][ T30] audit: type=1400 audit(294.740:103): avc: denied { ioctl } for pid=3482 comm="syz.1.10" path="/dev/vhost-vsock" dev="devtmpfs" ino=715 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 295.805766][ T3491] netlink: 12 bytes leftover after parsing attributes in process `syz.0.11'. [ 296.583197][ T30] audit: type=1400 audit(296.020:104): avc: denied { unmount } for pid=3317 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 296.999142][ T30] audit: type=1400 audit(296.440:105): avc: denied { read append } for pid=3494 comm="syz.1.12" name="card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 297.000117][ T30] audit: type=1400 audit(296.440:106): avc: denied { open } for pid=3494 comm="syz.1.12" path="/dev/dri/card1" dev="devtmpfs" ino=618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 297.024549][ T30] audit: type=1400 audit(296.470:107): avc: denied { ioctl } for pid=3494 comm="syz.1.12" path="/dev/dri/card1" dev="devtmpfs" ino=618 ioctlcmd=0x6411 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 298.191553][ T30] audit: type=1400 audit(297.630:108): avc: denied { read } for pid=3500 comm="syz.1.15" name="binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 298.192788][ T30] audit: type=1400 audit(297.630:109): avc: denied { open } for pid=3500 comm="syz.1.15" path="/dev/binderfs/binder0" dev="binder" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 298.279465][ T30] audit: type=1400 audit(297.700:110): avc: denied { ioctl } for pid=3500 comm="syz.1.15" path="/dev/binderfs/binder0" dev="binder" ino=4 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 298.320124][ T3501] binder: 3500:3501 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 298.321710][ T3501] binder: 3501 RLIMIT_NICE not set [ 299.051367][ T3503] capability: warning: `syz.1.16' uses 32-bit capabilities (legacy support in use) [ 299.883770][ T3505] netlink: 8 bytes leftover after parsing attributes in process `syz.1.17'. [ 299.884502][ T3505] netlink: 8 bytes leftover after parsing attributes in process `syz.1.17'. [ 300.555999][ T30] kauditd_printk_skb: 3 callbacks suppressed [ 300.557008][ T30] audit: type=1400 audit(299.990:114): avc: denied { read } for pid=3506 comm="syz.0.18" name="event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 300.557526][ T30] audit: type=1400 audit(300.000:115): avc: denied { open } for pid=3506 comm="syz.0.18" path="/dev/input/event0" dev="devtmpfs" ino=748 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 300.929640][ T30] audit: type=1400 audit(300.360:116): avc: denied { read write } for pid=3506 comm="syz.0.18" name="raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 300.933958][ T30] audit: type=1400 audit(300.370:117): avc: denied { open } for pid=3506 comm="syz.0.18" path="/dev/raw-gadget" dev="devtmpfs" ino=702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 300.942105][ T30] audit: type=1400 audit(300.370:118): avc: denied { ioctl } for pid=3506 comm="syz.0.18" path="/dev/raw-gadget" dev="devtmpfs" ino=702 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 301.421360][ T9] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 301.671286][ T9] usb 1-1: Using ep0 maxpacket: 8 [ 301.797159][ T9] usb 1-1: config 0 has no interfaces? [ 301.856974][ T30] audit: type=1400 audit(301.300:119): avc: denied { read write } for pid=3513 comm="syz.1.21" name="binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 301.892095][ T30] audit: type=1400 audit(301.300:120): avc: denied { open } for pid=3513 comm="syz.1.21" path="/dev/binderfs/binder1" dev="binder" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 301.894935][ T9] usb 1-1: New USB device found, idVendor=0ccd, idProduct=00b3, bcdDevice=2d.ee [ 301.895072][ T9] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 301.895124][ T9] usb 1-1: Product: syz [ 301.895167][ T9] usb 1-1: Manufacturer: syz [ 301.895209][ T9] usb 1-1: SerialNumber: syz [ 301.921035][ T3514] binder: 3513:3514 ERROR: Thread waiting for process work before calling BC_REGISTER_LOOPER or BC_ENTER_LOOPER (state 10) [ 301.921476][ T3514] binder: 3514 RLIMIT_NICE not set [ 301.927124][ T30] audit: type=1400 audit(301.370:121): avc: denied { ioctl } for pid=3513 comm="syz.1.21" path="/dev/binderfs/binder1" dev="binder" ino=5 ioctlcmd=0x6201 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 302.024351][ T9] usb 1-1: config 0 descriptor?? [ 302.485754][ T10] usb 1-1: USB disconnect, device number 2 [ 302.783413][ T3516] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65296 sclass=netlink_route_socket pid=3516 comm=syz.1.22 [ 303.243086][ T30] audit: type=1400 audit(302.690:122): avc: denied { prog_load } for pid=3517 comm="syz.0.23" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 303.246797][ T30] audit: type=1400 audit(302.690:123): avc: denied { perfmon } for pid=3517 comm="syz.0.23" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 307.077315][ T30] kauditd_printk_skb: 22 callbacks suppressed [ 307.088503][ T30] audit: type=1400 audit(306.520:146): avc: denied { create } for pid=3533 comm="syz.0.29" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 307.203344][ T30] audit: type=1400 audit(306.630:147): avc: denied { allowed } for pid=3534 comm="syz.1.30" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 307.256929][ T30] audit: type=1400 audit(306.700:148): avc: denied { create } for pid=3534 comm="syz.1.30" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 307.350647][ T30] audit: type=1400 audit(306.790:149): avc: denied { map } for pid=3534 comm="syz.1.30" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3640 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 307.354761][ T30] audit: type=1400 audit(306.800:150): avc: denied { read write } for pid=3534 comm="syz.1.30" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3640 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 311.070351][ T30] audit: type=1400 audit(310.470:151): avc: denied { write } for pid=3547 comm="syz.0.34" name="mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 311.071316][ T30] audit: type=1400 audit(310.500:152): avc: denied { open } for pid=3547 comm="syz.0.34" path="/dev/input/mice" dev="devtmpfs" ino=705 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 312.318795][ T30] audit: type=1400 audit(311.750:153): avc: denied { create } for pid=3551 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 312.336449][ T30] audit: type=1400 audit(311.780:154): avc: denied { bind } for pid=3551 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 312.865934][ T30] audit: type=1400 audit(312.310:155): avc: denied { setopt } for pid=3551 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 312.883466][ T30] audit: type=1400 audit(312.330:156): avc: denied { accept } for pid=3551 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 314.267501][ T30] audit: type=1400 audit(313.710:157): avc: denied { create } for pid=3563 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 314.285635][ T30] audit: type=1400 audit(313.730:158): avc: denied { ioctl } for pid=3563 comm="syz.1.39" path="socket:[3663]" dev="sockfs" ino=3663 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 314.300507][ T30] audit: type=1400 audit(313.740:159): avc: denied { bind } for pid=3563 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 314.333519][ T30] audit: type=1400 audit(313.770:160): avc: denied { write } for pid=3563 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 315.468873][ T30] audit: type=1400 audit(314.910:161): avc: denied { create } for pid=3568 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 315.960407][ T30] audit: type=1400 audit(315.400:162): avc: denied { set_context_mgr } for pid=3570 comm="syz.1.41" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 315.987500][ T3571] binder: 3570:3571 ioctl c0306201 20000080 returned -14 [ 316.073320][ T3571] binder: 3570:3571 tried to acquire reference to desc 0, got 1 instead [ 316.090654][ T10] usb 1-1: new full-speed USB device number 3 using dummy_hcd [ 316.267151][ T3571] binder: 3570:3571 got transaction with invalid fd, 589824 [ 316.277349][ T3571] binder: 3571:3570 translate fd array failed [ 316.292118][ T3571] binder: 3570:3571 transaction async to 3570:0 failed 5/29201/-9, code 0 size 112-24 line 3591 [ 316.375322][ T3405] binder: undelivered TRANSACTION_ERROR: 29201 [ 316.404824][ T10] usb 1-1: config 0 has no interfaces? [ 316.632412][ T10] usb 1-1: New USB device found, idVendor=2040, idProduct=b138, bcdDevice= 1.42 [ 316.633278][ T10] usb 1-1: New USB device strings: Mfr=4, Product=0, SerialNumber=0 [ 316.633892][ T10] usb 1-1: Manufacturer: syz [ 316.725025][ T10] usb 1-1: config 0 descriptor?? [ 317.402248][ T30] kauditd_printk_skb: 4 callbacks suppressed [ 317.403456][ T30] audit: type=1400 audit(316.850:167): avc: denied { bind } for pid=3568 comm="syz.0.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 317.734722][ T23] usb 1-1: USB disconnect, device number 3 [ 322.186198][ T30] audit: type=1400 audit(321.630:168): avc: denied { ioctl } for pid=3602 comm="syz.0.45" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3692 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 324.701914][ T30] audit: type=1400 audit(324.150:169): avc: denied { write } for pid=3607 comm="syz.1.46" lport=132 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 325.153047][ T3613] netlink: 96 bytes leftover after parsing attributes in process `syz.0.47'. [ 325.948511][ T30] audit: type=1400 audit(325.390:170): avc: denied { setopt } for pid=3614 comm="syz.0.48" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 325.994034][ T30] audit: type=1400 audit(325.440:171): avc: denied { read } for pid=3615 comm="syz.1.49" name="usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 325.999634][ T30] audit: type=1400 audit(325.440:172): avc: denied { open } for pid=3615 comm="syz.1.49" path="/dev/usbmon0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 326.039360][ T30] audit: type=1400 audit(325.470:173): avc: denied { ioctl } for pid=3615 comm="syz.1.49" path="/dev/usbmon0" dev="devtmpfs" ino=696 ioctlcmd=0x920a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usbmon_device_t tclass=chr_file permissive=1 [ 326.226268][ T30] audit: type=1400 audit(325.670:174): avc: denied { mounton } for pid=3618 comm="syz.0.50" path="/23/file1" dev="tmpfs" ino=133 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 326.912002][ T3405] usb 1-1: new full-speed USB device number 4 using dummy_hcd [ 327.334310][ T3405] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 327.335604][ T3405] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x82 has an invalid bInterval 0, changing to 10 [ 327.336476][ T3405] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x2 has invalid wMaxPacketSize 0 [ 327.336725][ T3405] usb 1-1: config 0 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 5 [ 327.397396][ T3405] usb 1-1: New USB device found, idVendor=2040, idProduct=b138, bcdDevice= 1.42 [ 327.399250][ T3405] usb 1-1: New USB device strings: Mfr=4, Product=0, SerialNumber=0 [ 327.399818][ T3405] usb 1-1: Manufacturer: syz [ 327.496045][ T3405] usb 1-1: config 0 descriptor?? [ 328.475889][ T30] audit: type=1400 audit(327.920:175): avc: denied { read } for pid=3626 comm="syz.1.54" name="loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 328.480920][ T30] audit: type=1400 audit(327.920:176): avc: denied { open } for pid=3626 comm="syz.1.54" path="/dev/loop-control" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 328.495193][ T30] audit: type=1400 audit(327.940:177): avc: denied { ioctl } for pid=3626 comm="syz.1.54" path="/dev/loop-control" dev="devtmpfs" ino=636 ioctlcmd=0x4c81 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 330.369890][ T3635] binder: 3634:3635 tried to acquire reference to desc 0, got 1 instead [ 330.375514][ T3635] binder: 3635:3634 translate fd array failed [ 330.377320][ T3635] binder: 3634:3635 transaction call to 3634:0 failed 10/29201/-22, code 0 size 112-24 line 3591 [ 330.383551][ T10] binder: undelivered TRANSACTION_ERROR: 29201 [ 332.203064][ T30] audit: type=1400 audit(331.650:178): avc: denied { create } for pid=3644 comm="syz.1.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 334.087058][ T3650] [U] Y [ 341.505817][ T10] usb 1-1: USB disconnect, device number 4 [ 342.106728][ T3665] netlink: 'syz.1.67': attribute type 32 has an invalid length. [ 342.131578][ T3665] (unnamed net_device) (uninitialized): option coupled_control: mode dependency failed, not supported in mode balance-rr(0) [ 345.379126][ T10] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 345.924346][ T10] usb 1-1: too many endpoints for config 0 interface 0 altsetting 0: 253, using maximum allowed: 30 [ 345.925358][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 345.925975][ T10] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 345.926291][ T10] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 253 [ 346.033793][ T10] usb 1-1: New USB device found, idVendor=05ac, idProduct=8243, bcdDevice=8b.40 [ 346.034906][ T10] usb 1-1: New USB device strings: Mfr=11, Product=0, SerialNumber=0 [ 346.035128][ T10] usb 1-1: Manufacturer: syz [ 346.161386][ T10] usb 1-1: config 0 descriptor?? [ 346.964628][ T10] hid-generic 0003:05AC:8243.0001: unknown main item tag 0x0 [ 347.136648][ T10] hid-generic 0003:05AC:8243.0001: hidraw0: USB HID v0.00 Device [syz] on usb-dummy_hcd.0-1/input0 [ 347.434771][ T10] usb 1-1: USB disconnect, device number 5 [ 350.348955][ T3693] fido_id[3693]: Failed to open report descriptor at '/sys/devices/platform/dummy_hcd.0/usb1/report_descriptor': No such file or directory [ 352.775130][ T30] audit: type=1400 audit(352.220:179): avc: denied { watch watch_reads } for pid=3695 comm="syz.0.78" path="pipe:[968]" dev="pipefs" ino=968 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 353.620266][ T30] audit: type=1400 audit(353.070:180): avc: denied { create } for pid=3699 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 353.635610][ T30] audit: type=1400 audit(353.080:181): avc: denied { write } for pid=3699 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 353.636220][ T30] audit: type=1400 audit(353.080:182): avc: denied { read } for pid=3699 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 354.195180][ T30] audit: type=1400 audit(353.640:183): avc: denied { bind } for pid=3699 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 354.240373][ T30] audit: type=1400 audit(353.690:184): avc: denied { write } for pid=3699 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 357.627155][ T30] audit: type=1400 audit(357.070:185): avc: denied { ioctl } for pid=3705 comm="syz.1.81" path="socket:[3843]" dev="sockfs" ino=3843 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 357.921057][ T30] audit: type=1400 audit(357.350:186): avc: denied { read } for pid=3710 comm="syz.0.83" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 357.922211][ T30] audit: type=1400 audit(357.360:187): avc: denied { open } for pid=3710 comm="syz.0.83" path="/37/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 358.234080][ T3716] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 358.236340][ T3716] block device autoloading is deprecated and will be removed. [ 361.518885][ T3736] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 361.534396][ T3736] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 362.401185][ T3744] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 363.243115][ T3751] netlink: 12 bytes leftover after parsing attributes in process `syz.0.97'. [ 364.262873][ T3756] 8021q: adding VLAN 0 to HW filter on device bond2 [ 364.285599][ T3756] bond1: (slave bond2): Enslaving as an active interface with an up link [ 364.344681][ T3751] netlink: 4 bytes leftover after parsing attributes in process `syz.0.97'. [ 364.511490][ T3751] bond1 (unregistering): (slave bond2): Releasing backup interface [ 364.639798][ T3751] bond1 (unregistering): Released all slaves [ 365.009515][ T3761] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 365.013022][ T3761] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 367.384329][ T3777] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 367.415692][ T3777] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 368.251946][ T3780] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 368.257157][ T3780] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 369.826652][ T3788] binder: 3785:3788 tried to acquire reference to desc 0, got 1 instead [ 369.876508][ T30] audit: type=1400 audit(369.320:188): avc: denied { transfer } for pid=3785 comm="syz.1.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 369.877229][ T3788] binder: tried to use weak ref as strong ref [ 369.877639][ T3788] binder: 3785:3788 got transaction with invalid handle, 0 [ 369.922393][ T3788] binder: 3788:3785 translate handle failed [ 369.936432][ T3788] binder: 3785:3788 transaction async to 3785:0 failed 17/29201/-22, code 0 size 88-24 line 3498 [ 369.970077][ T23] binder: undelivered TRANSACTION_ERROR: 29201 [ 370.474212][ T30] audit: type=1400 audit(369.910:189): avc: denied { write } for pid=3789 comm="syz.1.109" name="uinput" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 370.602605][ T30] audit: type=1400 audit(370.050:190): avc: denied { write } for pid=3789 comm="syz.1.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 373.422526][ T3806] binder: 3805:3806 tried to acquire reference to desc 0, got 1 instead [ 373.433668][ T3806] binder: 3805:3806 got transaction with invalid data ptr [ 373.436688][ T3806] binder: 3805:3806 transaction call to 3805:0 failed 24/29201/-14, code 0 size 72-24 line 3438 [ 373.444894][ T10] binder: undelivered TRANSACTION_ERROR: 29201 [ 375.586067][ T3814] binder: 3812:3814 unknown command 0 [ 375.586534][ T3814] binder: 3812:3814 ioctl c0306201 20000080 returned -22 [ 375.614262][ T3814] binder: 3812:3814 tried to acquire reference to desc 0, got 1 instead [ 375.619991][ T3814] binder: 3812:3814 got transaction with invalid parent offset or type [ 375.621221][ T3814] binder: 3814:3812 failed to fixup parent [ 375.622350][ T3814] binder: 3812:3814 transaction call to 3812:0 failed 30/29201/-22, code 0 size 112-24 line 3644 [ 375.637033][ T9] binder: undelivered TRANSACTION_ERROR: 29201 [ 381.799903][ T30] audit: type=1400 audit(381.240:191): avc: denied { execute } for pid=3860 comm="syz.0.136" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=5236 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 384.895508][ T30] audit: type=1400 audit(384.340:192): avc: denied { execute } for pid=3880 comm="syz.0.145" name="file1" dev="tmpfs" ino=381 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 384.912636][ T30] audit: type=1400 audit(384.360:193): avc: denied { execute_no_trans } for pid=3880 comm="syz.0.145" path="/71/file1" dev="tmpfs" ino=381 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 386.019618][ T30] audit: type=1400 audit(385.460:194): avc: denied { create } for pid=3886 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 386.044827][ T30] audit: type=1400 audit(385.490:195): avc: denied { write } for pid=3886 comm="syz.0.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 386.894513][ T897] block nbd1: Receive control failed (result -32) [ 386.930484][ T3878] block nbd1: shutting down sockets [ 389.074733][ T30] audit: type=1400 audit(388.110:196): avc: denied { create } for pid=3893 comm="syz.0.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 400.560366][ T30] audit: type=1400 audit(400.000:197): avc: denied { create } for pid=3936 comm="syz.1.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 400.603153][ T30] audit: type=1400 audit(400.050:198): avc: denied { bind } for pid=3936 comm="syz.1.169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 400.610679][ T30] audit: type=1400 audit(400.050:199): avc: denied { name_bind } for pid=3936 comm="syz.1.169" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=icmp_socket permissive=1 [ 400.615836][ T30] audit: type=1400 audit(400.050:200): avc: denied { node_bind } for pid=3936 comm="syz.1.169" saddr=fe80::bb src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=icmp_socket permissive=1 [ 401.210303][ T30] audit: type=1400 audit(400.650:201): avc: denied { connect } for pid=3941 comm="syz.0.172" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 402.126431][ T3949] ------------[ cut here ]------------ [ 402.126936][ T3949] verifier bug: not inlined functions bpf_probe_read_user#112 is missing func(1) [ 402.134667][ T3949] WARNING: CPU: 0 PID: 3949 at kernel/bpf/verifier.c:22838 do_misc_fixups+0xa938/0xcf04 [ 402.138276][ T3949] Modules linked in: [ 402.140291][ T3949] CPU: 0 UID: 0 PID: 3949 Comm: syz.0.175 Not tainted syzkaller #0 PREEMPT [ 402.141866][ T3949] Hardware name: linux,dummy-virt (DT) [ 402.142755][ T3949] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--) [ 402.143328][ T3949] pc : do_misc_fixups+0xa938/0xcf04 [ 402.143781][ T3949] lr : do_misc_fixups+0xa938/0xcf04 [ 402.144197][ T3949] sp : ffff8000a2337450 [ 402.144613][ T3949] x29: ffff8000a2337450 x28: ffff000018fb8000 x27: ffff000018fbe130 [ 402.145593][ T3949] x26: ffff000018fbe148 x25: ffff000018fb8000 x24: 0000000000000000 [ 402.146264][ T3949] x23: ffff000018fbe128 x22: 1ffff00011b45a12 x21: ffff80008da2d090 [ 402.146922][ T3949] x20: ffff800085585480 x19: ffff80008556d4a0 x18: ffff80008d9e746c [ 402.147697][ T3949] x17: ffff8000870bef80 x16: ffff00006a08a4c4 x15: ffff00000e3a6780 [ 402.148499][ T3949] x14: 1ffff00011b3cf08 x13: 0000000000000000 x12: ffff6000024c85c9 [ 402.149203][ T3949] x11: 1fffe000024c85c8 x10: ffff6000024c85c8 x9 : dfff800000000000 [ 402.150007][ T3949] x8 : ffff000012642e43 x7 : 0000000000000001 x6 : ffff6000024c85c8 [ 402.150760][ T3949] x5 : ffff000012642e40 x4 : ffff6000024c85c9 x3 : 1fffe0000d41313e [ 402.151446][ T3949] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff00000f435ac0 [ 402.152382][ T3949] Call trace: [ 402.153109][ T3949] do_misc_fixups+0xa938/0xcf04 (P) [ 402.153767][ T3949] bpf_check+0x3c84/0x9508 [ 402.154170][ T3949] bpf_prog_load+0xe2c/0x1b74 [ 402.154581][ T3949] __sys_bpf+0x9c4/0x29c8 [ 402.155027][ T3949] __arm64_sys_bpf+0x70/0xa4 [ 402.155466][ T3949] invoke_syscall+0x6c/0x258 [ 402.155929][ T3949] el0_svc_common.constprop.0+0xac/0x230 [ 402.156448][ T3949] do_el0_svc+0x40/0x58 [ 402.156813][ T3949] el0_svc+0x50/0x1a0 [ 402.157205][ T3949] el0t_64_sync_handler+0xa0/0xe4 [ 402.157637][ T3949] el0t_64_sync+0x198/0x19c [ 402.158376][ T3949] irq event stamp: 426 [ 402.158740][ T3949] hardirqs last enabled at (425): [] finish_task_switch.isra.0+0x1a8/0x854 [ 402.159475][ T3949] hardirqs last disabled at (426): [] el1_brk64+0x1c/0x48 [ 402.160389][ T3949] softirqs last enabled at (350): [] handle_softirqs+0x88c/0xdb4 [ 402.161053][ T3949] softirqs last disabled at (343): [] __do_softirq+0x14/0x20 [ 402.161875][ T3949] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 403.840811][ T2131] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 404.062868][ T2131] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 404.271115][ T2131] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 404.584990][ T2131] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 405.153598][ T30] audit: type=1400 audit(404.600:202): avc: denied { read } for pid=3162 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 407.040863][ T2131] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 407.126710][ T2131] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 407.182426][ T2131] bond0 (unregistering): Released all slaves [ 407.446541][ T2131] bond2 (unregistering): Released all slaves [ 408.007243][ T2131] hsr_slave_0: left promiscuous mode [ 408.020658][ T2131] hsr_slave_1: left promiscuous mode [ 408.138758][ T2131] veth1_macvtap: left promiscuous mode [ 408.140446][ T2131] veth0_macvtap: left promiscuous mode [ 408.141243][ T2131] veth1_vlan: left promiscuous mode [ 408.146285][ T2131] veth0_vlan: left promiscuous mode [ 414.665259][ T2131] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 414.866262][ T2131] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 415.027548][ T2131] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 415.292900][ T2131] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.572573][ T2131] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 418.642278][ T2131] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 418.715326][ T2131] bond0 (unregistering): Released all slaves [ 419.093187][ T2131] hsr_slave_0: left promiscuous mode [ 419.102264][ T2131] hsr_slave_1: left promiscuous mode [ 419.156051][ T2131] veth1_macvtap: left promiscuous mode [ 419.157600][ T2131] veth0_macvtap: left promiscuous mode [ 419.161184][ T2131] veth1_vlan: left promiscuous mode [ 419.162446][ T2131] veth0_vlan: left promiscuous mode VM DIAGNOSIS: 01:36:53 Registers: info registers vcpu 0 CPU#0 PC=ffff800080350f60 X00=00000000000003c0 X01=00000000ffffe436 X02=0000000000000000 X03=ffff800080350f08 X04=ffff700014466d75 X05=ffff8000a2336ba0 X06=ffff700014466d74 X07=0000000000000001 X08=ffff8000a2336ba7 X09=dfff800000000000 X10=ffff700014466d74 X11=1ffff00014466d74 X12=ffff700014466d75 X13=00000000ffffffff X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=ffff80008d9e746c X19=1ffff00014466da5 X20=ffff8000a2336d20 X21=ffff8000a2336d28 X22=ffff800087220ca0 X23=1ffff00014466d70 X24=ffff8000a2336ba0 X25=00000000ffffe436 X26=000000000000000d X27=00000000ffffe436 X28=1fffe0000d4114b5 X29=ffff8000a2336b20 X30=ffff800080350f08 SP=ffff8000a2336b20 PSTATE=600003c5 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=732528746174736c:00000073252f7325 Q02=0000000000000000:ffffffff00000000 Q03=00ff000000000000:ffffff00ff0000ff Q04=0000000000000000:0f000000fff0f00f Q05=bb448243222c92da:e3914ed4e87380b0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe4ed5910:0000ffffe4ed5910 Q17=ffffff80ffffffd0:0000ffffe4ed58e0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000 info registers vcpu 1 CPU#1 PC=ffff80008173f1c0 X00=0000000007920155 X01=0000000000000000 X02=0000000000000007 X03=00000000f3f3f300 X04=ffff80008024a634 X05=00000000f1f1f1f1 X06=dfff800000000000 X07=ffff70001428ef4a X08=0000000041b58ab3 X09=0000000000000000 X10=ffff70001428eee8 X11=ffff8000870aa25c X12=0000000000000004 X13=0000000000000000 X14=0000000000000000 X15=0000000000000000 X16=0000000000000000 X17=0000000000000000 X18=0000000000000000 X19=ffff000022bb6600 X20=ffff000022bb6620 X21=0000ffffe4ed4910 X22=ffff8000a1477c80 X23=0000000000000000 X24=0000000000000000 X25=ffff800080ae7b20 X26=0000000000000000 X27=ffff8000a14779f0 X28=ffff8000870e5780 X29=ffff8000a1477830 X30=ffff800085443278 SP=ffff8000a1477830 PSTATE=60000005 -ZC- EL1h FPCR=00000000 FPSR=00000000 Q00=2525252525252525:2525252525252525 Q01=732528746174736c:00000073252f7325 Q02=0000000000000000:ffffffff00000000 Q03=00ff000000000000:ffffff00ff0000ff Q04=0000000000000000:0f000000fff0f00f Q05=bb448243222c92da:e3914ed4e87380b0 Q06=6edc4d3a2914b135:d8e9c869e2695c88 Q07=b20fae707afde253:388e9c6c4fa85ca0 Q08=0000000000000000:0000000000000000 Q09=0000000000000000:0000000000000000 Q10=0000000000000000:0000000000000000 Q11=0000000000000000:0000000000000000 Q12=0000000000000000:0000000000000000 Q13=0000000000000000:0000000000000000 Q14=0000000000000000:0000000000000000 Q15=0000000000000000:0000000000000000 Q16=0000ffffe4ed5910:0000ffffe4ed5910 Q17=ffffff80ffffffd0:0000ffffe4ed58e0 Q18=0000000000000000:0000000000000000 Q19=0000000000000000:0000000000000000 Q20=0000000000000000:0000000000000000 Q21=0000000000000000:0000000000000000 Q22=0000000000000000:0000000000000000 Q23=0000000000000000:0000000000000000 Q24=0000000000000000:0000000000000000 Q25=0000000000000000:0000000000000000 Q26=0000000000000000:0000000000000000 Q27=0000000000000000:0000000000000000 Q28=0000000000000000:0000000000000000 Q29=0000000000000000:0000000000000000 Q30=0000000000000000:0000000000000000 Q31=0000000000000000:0000000000000000