last executing test programs: 5m57.47318181s ago: executing program 1 (id=222): prlimit64(0x0, 0xe, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$cont(0x21, r0, 0x80000001, 0x4) 5m57.234619734s ago: executing program 1 (id=223): r0 = socket$inet6(0xa, 0x80002, 0x0) sendmsg$sock(r0, &(0x7f0000000780)={&(0x7f0000000300)=@in6={0xa, 0x4e20, 0x401, @loopback, 0x1}, 0x80, 0x0, 0x0, &(0x7f0000000040)=[@mark={{0x14}}], 0x18}, 0x4c040) 5m56.522970628s ago: executing program 1 (id=224): shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffffcfff) shmctl$SHM_LOCK(0x0, 0xb) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) shmctl$SHM_UNLOCK(0x0, 0xc) 5m56.201617734s ago: executing program 1 (id=225): quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000ac0)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') 5m55.781777962s ago: executing program 1 (id=226): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6, 0x1, 0x0, 0x7fff0000}]}) preadv2(0xffffffffffffffff, 0x0, 0x0, 0x867, 0x0, 0x0) 5m55.591742535s ago: executing program 1 (id=227): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xc) 5m10.476631233s ago: executing program 32 (id=227): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0xf241f1a146326c4, 0x2, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0xc) 4m44.904184473s ago: executing program 2 (id=353): write(0xffffffffffffffff, &(0x7f00000000c0)="8f2a0a65bd8c", 0x6) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x181002, 0x0) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000080)={0x49db, 0x0, 0xfff9, 0xbfff, 0x18, "ec28a144f13d7607"}) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xff2e) ioctl$TCSETS(r0, 0x40045431, &(0x7f00000001c0)={0x0, 0xffffef7b, 0x0, 0xb2, 0x10, "1b09000040000000000000e678000000001000"}) r1 = syz_open_pts(r0, 0xca440) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000100)=0x44) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x40008c0) 4m42.300992412s ago: executing program 2 (id=355): r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c0000001400030532bd7000fedbdf25021f00ff", @ANYRES32=r2, @ANYBLOB="08000200e0"], 0x3c}, 0x1, 0x0, 0x0, 0x2000e081}, 0x40400c2) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000180)={'lo\x00', {0x2, 0x4e21, @empty=0x7f000000}}) 4m42.102174846s ago: executing program 2 (id=357): mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) pselect6(0x40, &(0x7f0000000000)={0x6, 0x6, 0x0, 0x3aa6, 0x8, 0x2, 0x7, 0x6}, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x0, &(0x7f00000003c0)="18607651149d7b10b4024fbbdc08899b8f589df2dbb5d7a8d1b36cfab675cb3976ee8100e2878c9cfa178cac130eb046eda93df39ed4b41924dc225ad4028dd63defb87d698be5c749450b350a789dcfc6b2d6a696b5026d1e52f19274566d1da0f353dd65e330ebf71c5e823f2753c5fd76724828ef31b353e71805205c3dceb44cc4c7b3664e29fb") ptrace$getregset(0x4205, r0, 0x2, &(0x7f0000000380)={&(0x7f0000000000)=""/120, 0x78}) ptrace$getregset(0x4204, r0, 0x2, &(0x7f0000000740)={0x0}) 4m39.322931388s ago: executing program 2 (id=372): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=ANY=[@ANYBLOB="5400000010001fff26bd70008000000000000000", @ANYRES32=0x0, @ANYBLOB="05160000102f00002c0012800b00010067726574617000001c00028006000e000100000008000700e000000106001000"], 0x54}}, 0x4000) 4m39.120551802s ago: executing program 2 (id=374): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000003c0), 0x80000, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0xff, 0x0, {0x4, 0x39, 0x17, 0x19, 0x4, 0xe80, 0x5, 0x400040, 0xffffffffffffffff}}) 4m38.820893887s ago: executing program 2 (id=375): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x30, 0x8b}, 0x0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000000)='source', 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) 3m53.102765407s ago: executing program 33 (id=375): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x30, 0x8b}, 0x0) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, &(0x7f0000000000)='source', 0x0, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) 3m46.170873777s ago: executing program 0 (id=461): r0 = gettid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) getsockopt$sock_int(r1, 0x1, 0x1e, &(0x7f0000000000), &(0x7f0000000140)=0x4) timer_create(0x1, &(0x7f0000000800)={0x0, 0x21, 0x0, @tid=r0}, &(0x7f0000000000)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x3ed4, 0x2}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) timer_settime(r2, 0x1, &(0x7f0000000040), 0x0) pause() 3m33.119921382s ago: executing program 0 (id=462): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000380), 0x12) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x19, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000001000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sockopt=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000005c0)={r3, r2, 0x15, 0x0, @void}, 0x10) r4 = socket(0xa, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r4, 0x0, 0x43, &(0x7f0000000540)={'TPROXY\x00'}, &(0x7f0000000580)=0x1e) 3m32.221116389s ago: executing program 0 (id=465): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[], 0xb4}}, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x2e00, 0xffffffffffffffff) 3m31.268192187s ago: executing program 0 (id=467): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) getrusage(0xffffffffffffffff, &(0x7f0000000380)) 3m16.049569233s ago: executing program 0 (id=492): open(&(0x7f0000000300)='./bus\x00', 0x169042, 0x0) io_submit(0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f00000003c0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000000380)) clock_gettime(0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{}, {0x0, 0x989680}}, 0x0) listen(0xffffffffffffffff, 0x0) futex(&(0x7f0000004000)=0xfffff000, 0x5, 0x0, 0x0, &(0x7f0000004000)=0x1, 0xa3020000) 3m15.961606415s ago: executing program 0 (id=493): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="010000000300000004000000ff"], 0x48) 2m30.738067204s ago: executing program 34 (id=493): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="010000000300000004000000ff"], 0x48) 22.359940691s ago: executing program 4 (id=858): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5", 0x4) r4 = accept4(r3, 0x0, 0x0, 0x80800) sendmmsg$alg(r4, &(0x7f0000000400)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)="f78d9ca38fff48f3be52163448412ba8", 0xfffffe1a}], 0x1, &(0x7f0000000380)=[@op={0x18}], 0x18}], 0x4924924924924b9, 0x0) recvmsg(r4, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf500f0ff}, 0x0) 8.901892113s ago: executing program 4 (id=873): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x2}, 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x57) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={r0, 0x702, 0x60, 0x0, &(0x7f0000000580)="e460334470d8d400eb00c15286dd4b3547f2cbfad47001bd34d04351caf1f9a07be047c25d7670ea4a41b8a6800c0de87b6f8e6a725643f7b3ab502617b472091a730e36aabb2f2426a24a29edbed9463081eef61aa7fab052ffcc89b4bac5ba", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 8.01158215s ago: executing program 4 (id=874): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) socket$key(0xf, 0x3, 0x2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000780)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x1, 0x25dfdbfd, {0x0, 0x0, 0x0, r2, {0x0, 0xb}, {0xffff, 0xffff}, {0xfff2}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x3, 0xfffffffe, 0x6361, 0x7, 0xffffffff, 0x3}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x40088c1}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000800)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70b922, 0x25dfdc01, {0x0, 0x0, 0x0, r2, {0x0, 0x5}, {0xffff, 0xb}, {0x4, 0xffe0}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x240040a1}, 0x4890) 7.521733259s ago: executing program 4 (id=875): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000280)={'vcan0\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1, 0x0, {}, 0xfd}, 0x18) connect$can_j1939(r0, &(0x7f0000000080)={0x1d, r1, 0x0, {0x0, 0x0, 0x2}, 0xfe}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000180)={0x0, 0xf5, &(0x7f00000001c0)={&(0x7f0000000300)='.', 0x1a000}}, 0x0) 5.674271694s ago: executing program 4 (id=880): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000140)=0x40, 0x4) r2 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000340)={&(0x7f0000000000)=""/62, 0x328000, 0x800, 0x9, 0x3}, 0x20) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000080)=0x1, 0x4) setsockopt$XDP_UMEM_FILL_RING(r1, 0x11b, 0x5, &(0x7f00000000c0)=0x1000000, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000380)=0x2, 0x4) bind$xdp(r2, &(0x7f0000000100)={0x2c, 0x0, r3}, 0x10) bind$xdp(r1, &(0x7f0000000180)={0x2c, 0x1, r3, 0x3, r2}, 0x10) 5.039147275s ago: executing program 3 (id=882): capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xffffffff}) r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000140), 0xc8040, 0x0) ioctl$IOMMU_OPTION$IOMMU_OPTION_RLIMIT_MODE(r0, 0x3b87, &(0x7f00000003c0)={0x18, 0x0, 0x0, 0x0, 0x0, 0x1}) 4.181015922s ago: executing program 3 (id=883): sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB="80000000", @ANYRES16=0x0, @ANYBLOB="000229bdff030000df25040000004000078008000100a40f00000c00040001000000000000000c00030002080000000000000c000400000c0000800000000800010074000000080000002c000580140002800800020004000000080001"], 0x80}, 0x1, 0x0, 0x0, 0x200008c0}, 0x4008c50) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000006c0)=ANY=[@ANYBLOB="180100002f00010000000000fcdbdf250601f2800c"], 0x118}], 0x1, 0x0, 0x0, 0x1}, 0x0) 3.801016639s ago: executing program 3 (id=884): r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, 0x0) openat$binderfs(0xffffffffffffff9c, &(0x7f0000000380)='./binderfs/binder0\x00', 0x0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000380)={0x8, 0x100008b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000200)=0x5) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000300), 0x80200, 0x0) r1 = syz_open_dev$sndmidi(&(0x7f00000004c0), 0x2, 0x8081) r2 = syz_create_resource$binfmt(&(0x7f0000000040)='./file0\x00') openat$binfmt(0xffffffffffffff9c, r2, 0x42, 0x1ff) r3 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002040), 0x2, 0x0) mount$fuse(0x0, &(0x7f0000002080)='./file0\x00', &(0x7f00000020c0), 0x0, &(0x7f0000000580)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0x8000}}) writev(r1, &(0x7f0000000840)=[{&(0x7f00000002c0)="94", 0xf000}, {0x0}], 0x2) socket(0x1d, 0x2, 0x6) pselect6(0x40, &(0x7f00000001c0)={0x0, 0x0, 0x20000000000, 0xffffffffffffffff, 0x0, 0xfffffffffffffffd, 0x1000001000, 0x46}, 0x0, &(0x7f0000000000)={0x3ff, 0x7, 0xff00, 0x9, 0x0, 0xf, 0x80000002}, 0x0, 0x0) 882.316774ms ago: executing program 3 (id=885): r0 = syz_usb_connect$hid(0x3, 0x3f, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000000000406a05100000000000000109022d00010000000009040000010300000009210000080122070009058103"], 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, &(0x7f00000001c0)={0x24, 0x0, 0x0, &(0x7f0000000040)={0x0, 0x22, 0x7, {[@global=@item_012={0x1, 0x1, 0x8, "1f"}, @main=@item_012={0x2, 0x0, 0x8, 'Q;'}, @local=@item_012={0x1, 0x2, 0x5, "94"}]}}, 0x0}, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000080), 0xf, 0x8041) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, 0x0) 490.713501ms ago: executing program 3 (id=886): syz_usb_connect(0x0, 0x2d, &(0x7f0000000680)=ANY=[@ANYBLOB="120100005bd30a20f0031d58a3200122030109021b0002000000000904250000ff0120000904"], 0x0) 279.179214ms ago: executing program 3 (id=887): r0 = openat$comedi(0xffffffffffffff9c, &(0x7f0000000080)='/dev/comedi1\x00', 0x1, 0x0) ioctl$COMEDI_DEVCONFIG(r0, 0x40946400, &(0x7f0000000140)={'comedi_parport\x00', [0x95000, 0x2, 0x7fffffff, 0x84e1, 0x2f, 0x2006, 0x6, 0x8, 0xa0ffa, 0x0, 0x100, 0x2, 0x1003, 0x1000004, 0xf, 0x10000, 0xffffffa8, 0x7ffbfffd, 0x1ff, 0xecd0, 0x10, 0x3fffe, 0x8, 0x7, 0x746f, 0x4, 0x5, 0x408, 0x4, 0x0, 0x7ffd]}) 0s ago: executing program 4 (id=888): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r2, &(0x7f0000000380)={0x0, 0x4076cbba9945d516, &(0x7f0000000340)={0x0, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000200)=@newlink={0x50, 0x10, 0x439, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x9801}, [@IFLA_LINKINFO={0x30, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x20, 0x2, 0x0, 0x1, [@IFLA_IPTUN_TTL={0x5, 0x4, 0x30}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}]}}}]}, 0x50}}, 0x0) sendto$packet(r0, &(0x7f00000000c0)="3f031c000302", 0x6, 0x0, &(0x7f0000000040)={0xc9, 0x0, r3, 0x1, 0x0, 0x6, @multicast}, 0x14) kernel console output (not intermixed with test programs): syzkaller login: [ 40.697929][ T28] kauditd_printk_skb: 10 callbacks suppressed [ 40.718248][ T28] audit: type=1400 audit(40.630:56): avc: denied { read write } for pid=3085 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 40.718733][ T28] audit: type=1400 audit(40.650:57): avc: denied { open } for pid=3085 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:25900' (ED25519) to the list of known hosts. [ 56.797982][ T28] audit: type=1400 audit(56.730:58): avc: denied { name_bind } for pid=3094 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 58.265929][ T28] audit: type=1400 audit(58.200:59): avc: denied { execute } for pid=3095 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 58.270171][ T28] audit: type=1400 audit(58.210:60): avc: denied { execute_no_trans } for pid=3095 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 61.481214][ T28] audit: type=1400 audit(61.420:61): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 61.491414][ T28] audit: type=1400 audit(61.430:62): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 61.505971][ T3095] cgroup: Unknown subsys name 'net' [ 61.513991][ T28] audit: type=1400 audit(61.450:63): avc: denied { unmount } for pid=3095 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 61.634639][ T3095] cgroup: Unknown subsys name 'cpuset' [ 61.640894][ T3095] cgroup: Unknown subsys name 'hugetlb' [ 61.641774][ T3095] cgroup: Unknown subsys name 'rlimit' [ 61.825538][ T28] audit: type=1400 audit(61.760:64): avc: denied { setattr } for pid=3095 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 61.828092][ T28] audit: type=1400 audit(61.760:65): avc: denied { mounton } for pid=3095 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 61.832077][ T28] audit: type=1400 audit(61.770:66): avc: denied { mount } for pid=3095 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 62.016533][ T3097] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 62.019884][ T28] audit: type=1400 audit(61.960:67): avc: denied { relabelto } for pid=3097 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 62.024158][ T28] audit: type=1400 audit(61.960:68): avc: denied { write } for pid=3097 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 62.064668][ T28] audit: type=1400 audit(62.000:69): avc: denied { read } for pid=3095 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 62.065101][ T28] audit: type=1400 audit(62.000:70): avc: denied { open } for pid=3095 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 70.252464][ T3095] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 72.017031][ T28] audit: type=1400 audit(71.950:71): avc: denied { execmem } for pid=3098 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 72.076403][ T28] audit: type=1400 audit(72.010:72): avc: denied { read } for pid=3100 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 72.080591][ T28] audit: type=1400 audit(72.020:73): avc: denied { open } for pid=3100 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 72.085112][ T28] audit: type=1400 audit(72.020:74): avc: denied { mounton } for pid=3100 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 72.100442][ T28] audit: type=1400 audit(72.040:75): avc: denied { module_request } for pid=3100 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 72.102029][ T28] audit: type=1400 audit(72.040:76): avc: denied { module_request } for pid=3101 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 72.153223][ T28] audit: type=1400 audit(72.090:77): avc: denied { sys_module } for pid=3100 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 72.582136][ T28] audit: type=1400 audit(72.520:78): avc: denied { ioctl } for pid=3100 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 73.754101][ T3100] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.766301][ T3100] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 73.829255][ T3101] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 73.833237][ T3101] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 74.423511][ T3101] hsr_slave_0: entered promiscuous mode [ 74.426654][ T3101] hsr_slave_1: entered promiscuous mode [ 74.716606][ T3100] hsr_slave_0: entered promiscuous mode [ 74.721227][ T3100] hsr_slave_1: entered promiscuous mode [ 74.724223][ T3100] debugfs: 'hsr0' already exists in 'hsr' [ 74.725561][ T3100] Cannot create hsr debugfs directory [ 74.896688][ T28] audit: type=1400 audit(74.830:79): avc: denied { create } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.907069][ T3101] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 74.908119][ T28] audit: type=1400 audit(74.840:80): avc: denied { write } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 74.921732][ T3101] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 74.936321][ T3101] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 74.942786][ T3101] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 74.953952][ T3101] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 74.962878][ T3101] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 74.973742][ T3101] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 74.981528][ T3101] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 75.176005][ T3100] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 75.190841][ T3100] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 75.195001][ T3100] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 75.205822][ T3100] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 75.213837][ T3100] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 75.223090][ T3100] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 75.226269][ T3100] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 75.238988][ T3100] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 75.775372][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 75.983880][ T3100] 8021q: adding VLAN 0 to HW filter on device bond0 [ 76.456377][ T3101] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 78.337190][ T3101] veth0_vlan: entered promiscuous mode [ 78.354828][ T3101] veth1_vlan: entered promiscuous mode [ 78.414712][ T3101] veth0_macvtap: entered promiscuous mode [ 78.429771][ T3101] veth1_macvtap: entered promiscuous mode [ 78.513797][ T50] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.514216][ T50] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.514446][ T50] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.514576][ T50] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.628482][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 78.628720][ T28] audit: type=1400 audit(78.560:82): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 78.635587][ T28] audit: type=1400 audit(78.570:83): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.DiCifO/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 78.644142][ T28] audit: type=1400 audit(78.580:84): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 78.655473][ T28] audit: type=1400 audit(78.590:85): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.DiCifO/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 78.659666][ T28] audit: type=1400 audit(78.600:86): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/syzkaller.DiCifO/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2322 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 78.674293][ T28] audit: type=1400 audit(78.610:87): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 78.680268][ T28] audit: type=1400 audit(78.620:88): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 78.683699][ T28] audit: type=1400 audit(78.620:89): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="gadgetfs" ino=2323 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 78.689476][ T28] audit: type=1400 audit(78.630:90): avc: denied { mount } for pid=3101 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 78.691082][ T28] audit: type=1400 audit(78.630:91): avc: denied { mounton } for pid=3101 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 78.750561][ T3101] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 78.815628][ T3100] veth0_vlan: entered promiscuous mode [ 78.843272][ T3100] veth1_vlan: entered promiscuous mode [ 78.916459][ T3100] veth0_macvtap: entered promiscuous mode [ 78.930465][ T3100] veth1_macvtap: entered promiscuous mode [ 78.990001][ T1027] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.991463][ T1027] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.998040][ T1027] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 78.999264][ T1027] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 79.689456][ T23] usb 2-1: new full-speed USB device number 2 using dummy_hcd [ 79.888939][ T23] usb 2-1: unable to get BOS descriptor or descriptor too short [ 79.891966][ T23] usb 2-1: not running at top speed; connect to a high speed hub [ 79.900341][ T23] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 79.900630][ T23] usb 2-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 79.910399][ T23] usb 2-1: string descriptor 0 read error: -22 [ 79.910750][ T23] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 79.910930][ T23] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 79.928875][ T23] usb 2-1: 0:2 : does not exist [ 79.988402][ T1498] usb 1-1: new full-speed USB device number 2 using dummy_hcd [ 80.146789][ T1498] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 80.147019][ T1498] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 512, setting to 64 [ 80.147841][ T1498] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid maxpacket 512, setting to 64 [ 80.162578][ T1498] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 80.165176][ T1498] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 80.166496][ T1498] usb 1-1: Product: syz [ 80.167269][ T1498] usb 1-1: Manufacturer: syz [ 80.169722][ T1498] usb 1-1: SerialNumber: syz [ 80.191430][ T3713] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 80.406561][ T3713] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 81.044022][ T3713] raw-gadget.1 gadget.0: fail, usb_ep_enable returned -22 [ 81.213896][ T23] usb 2-1: 5:0: failed to get current value for ch 0 (-22) [ 81.229820][ T23] usb 2-1: 5:0: cannot get min/max values for control 3 (id 5) [ 81.238049][ T23] usb 2-1: 5:0: failed to get current value for ch 1 (-22) [ 81.262967][ T23] usb 2-1: 5:0: cannot get min/max values for control 3 (id 5) [ 81.270444][ T23] usb 2-1: USB disconnect, device number 2 [ 81.293199][ T1498] cdc_ncm 1-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 81.294770][ T1498] cdc_ncm 1-1:1.0: dwNtbInMaxSize=0 is too small. Using 2048 [ 81.298108][ T1498] cdc_ncm 1-1:1.0: setting rx_max = 2048 [ 81.502584][ T1498] cdc_ncm 1-1:1.0: setting tx_max = 184 [ 81.511429][ T1498] cdc_ncm 1-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.0-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 81.523665][ T1498] usb 1-1: USB disconnect, device number 2 [ 81.525106][ T1498] cdc_ncm 1-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.0-1, CDC NCM (NO ZLP) [ 81.727793][ T23] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 81.878158][ T23] usb 2-1: Using ep0 maxpacket: 32 [ 81.889023][ T23] usb 2-1: config 0 has an invalid interface number: 188 but max is 0 [ 81.889391][ T23] usb 2-1: config 0 has no interface number 0 [ 81.889713][ T23] usb 2-1: config 0 interface 188 altsetting 0 bulk endpoint 0x82 has invalid maxpacket 32 [ 82.017827][ T23] usb 2-1: New USB device found, idVendor=17ef, idProduct=7203, bcdDevice=2e.36 [ 82.019448][ T23] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 82.022190][ T23] usb 2-1: Product: syz [ 82.022982][ T23] usb 2-1: Manufacturer: syz [ 82.023757][ T23] usb 2-1: SerialNumber: syz [ 82.041885][ T23] usb 2-1: config 0 descriptor?? [ 82.044097][ T3737] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 82.282178][ T3737] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 83.119476][ T23] asix 2-1:0.188 (unnamed net_device) (uninitialized): Failed to read reg index 0x0000: -71 [ 83.120350][ T23] asix 2-1:0.188 (unnamed net_device) (uninitialized): Error reading PHY_ID register: ffffffb9 [ 83.121363][ T23] asix 2-1:0.188: probe with driver asix failed with error -71 [ 83.129809][ T23] usb 2-1: USB disconnect, device number 3 [ 85.130162][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 85.131168][ T28] audit: type=1400 audit(85.070:96): avc: denied { create } for pid=3779 comm="syz.0.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 85.144791][ T28] audit: type=1400 audit(85.080:97): avc: denied { write } for pid=3779 comm="syz.0.7" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 85.243418][ T28] audit: type=1400 audit(85.180:98): avc: denied { prog_load } for pid=3781 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 85.246764][ T28] audit: type=1400 audit(85.180:99): avc: denied { bpf } for pid=3781 comm="syz.0.8" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 85.278068][ T28] audit: type=1400 audit(85.210:100): avc: denied { watch watch_reads } for pid=3781 comm="syz.0.8" path="/4/control" dev="tmpfs" ino=38 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 85.540965][ T28] audit: type=1400 audit(85.480:101): avc: denied { create } for pid=3788 comm="syz.1.12" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 85.587312][ T28] audit: type=1400 audit(85.520:102): avc: denied { ioctl } for pid=3788 comm="syz.1.12" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2406 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 86.236797][ T28] audit: type=1400 audit(86.170:103): avc: denied { write } for pid=3794 comm="syz.1.14" name="ip6_tables_names" dev="proc" ino=4026532807 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 86.488069][ T1498] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 86.638263][ T1498] usb 2-1: Using ep0 maxpacket: 16 [ 86.662324][ T1498] usb 2-1: config 0 has an invalid interface number: 105 but max is 0 [ 86.662738][ T1498] usb 2-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 86.662797][ T1498] usb 2-1: config 0 has no interface number 0 [ 86.697104][ T1498] usb 2-1: New USB device found, idVendor=046d, idProduct=08f3, bcdDevice= b.28 [ 86.704727][ T1498] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 86.705131][ T1498] usb 2-1: Product: syz [ 86.705186][ T1498] usb 2-1: Manufacturer: syz [ 86.705213][ T1498] usb 2-1: SerialNumber: syz [ 86.713440][ T1498] usb 2-1: config 0 descriptor?? [ 86.925991][ T1498] usb 2-1: USB disconnect, device number 4 [ 87.191585][ T28] audit: type=1400 audit(87.130:104): avc: denied { allowed } for pid=3809 comm="syz.1.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 87.229379][ T3810] netlink: 8 bytes leftover after parsing attributes in process `syz.1.15'. [ 87.316024][ T28] audit: type=1400 audit(87.250:105): avc: denied { name_bind } for pid=3811 comm="syz.1.16" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 87.773449][ T3840] binder: 3839:3840 ioctl c018620c 20000000 returned -22 [ 89.050056][ T9] usb 1-1: new full-speed USB device number 3 using dummy_hcd [ 89.235697][ T9] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 89.236041][ T9] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 512, setting to 64 [ 89.236417][ T9] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x82 has invalid maxpacket 512, setting to 64 [ 89.236497][ T9] usb 1-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid maxpacket 512, setting to 64 [ 89.341268][ T9] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 89.342831][ T9] usb 1-1: New USB device strings: Mfr=0, Product=2, SerialNumber=3 [ 89.343114][ T9] usb 1-1: Product: syz [ 89.343278][ T9] usb 1-1: SerialNumber: syz [ 89.356300][ T3848] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 89.798872][ T3848] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 89.799773][ T3848] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 90.564771][ T3848] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 90.578920][ T3848] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 90.808952][ T9] cdc_ncm 1-1:1.0: MAC-Address: 42:42:42:42:42:42 [ 90.810372][ T9] cdc_ncm 1-1:1.0: setting tx_max = 16384 [ 90.824028][ T9] cdc_ncm 1-1:1.0 usb0: register 'cdc_ncm' at usb-dummy_hcd.0-1, CDC NCM (NO ZLP), 42:42:42:42:42:42 [ 91.004090][ T23] usb 1-1: USB disconnect, device number 3 [ 91.005822][ T23] cdc_ncm 1-1:1.0 usb0: unregister 'cdc_ncm' usb-dummy_hcd.0-1, CDC NCM (NO ZLP) [ 92.360412][ T28] kauditd_printk_skb: 21 callbacks suppressed [ 92.360768][ T28] audit: type=1400 audit(92.300:127): avc: denied { sqpoll } for pid=3884 comm="syz.0.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 92.599851][ T28] audit: type=1400 audit(92.540:128): avc: denied { read } for pid=3832 comm="syz.1.19" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3164 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 92.818499][ T28] audit: type=1400 audit(92.750:129): avc: denied { create } for pid=3890 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 93.300059][ T28] audit: type=1400 audit(93.240:130): avc: denied { wake_alarm } for pid=3832 comm="syz.1.19" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 93.390762][ T28] audit: type=1400 audit(93.330:131): avc: denied { accept } for pid=3832 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 93.804801][ T28] audit: type=1400 audit(93.740:132): avc: denied { setopt } for pid=3903 comm="syz.1.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 93.925610][ T28] audit: type=1400 audit(93.860:133): avc: denied { mounton } for pid=3905 comm="syz.1.32" path="/12/file0" dev="tmpfs" ino=79 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 95.745105][ T28] audit: type=1400 audit(95.670:134): avc: denied { create } for pid=3910 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 95.758977][ T28] audit: type=1400 audit(95.700:135): avc: denied { setopt } for pid=3910 comm="syz.0.33" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 96.535133][ T28] audit: type=1400 audit(96.470:136): avc: denied { prog_run } for pid=3912 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 101.132672][ T28] audit: type=1326 audit(101.070:137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3914 comm="syz.0.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 101.139444][ T28] audit: type=1326 audit(101.070:138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3914 comm="syz.0.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 101.268205][ T28] audit: type=1326 audit(101.180:139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3914 comm="syz.0.35" exe="/syz-executor" sig=0 arch=40000028 syscall=329 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 101.271839][ T28] audit: type=1326 audit(101.210:140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3914 comm="syz.0.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 101.274748][ T28] audit: type=1326 audit(101.210:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3914 comm="syz.0.35" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 107.789510][ T28] audit: type=1400 audit(107.730:142): avc: denied { unmount } for pid=3101 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 108.080289][ T28] audit: type=1400 audit(108.020:143): avc: denied { create } for pid=3919 comm="syz.1.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 108.345696][ T28] audit: type=1400 audit(108.280:144): avc: denied { create } for pid=3925 comm="syz.1.39" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 108.389518][ T28] audit: type=1400 audit(108.330:145): avc: denied { ioctl } for pid=3925 comm="syz.1.39" path="socket:[3268]" dev="sockfs" ino=3268 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 115.194837][ T3940] veth3: entered promiscuous mode [ 115.195380][ T3940] veth3: entered allmulticast mode [ 116.615032][ T28] audit: type=1400 audit(116.550:146): avc: denied { bind } for pid=3961 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 116.628918][ T28] audit: type=1400 audit(116.570:147): avc: denied { listen } for pid=3961 comm="syz.0.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 123.652839][ T3975] netlink: 8 bytes leftover after parsing attributes in process `syz.0.50'. [ 123.663149][ T3975] batadv_slave_0: entered promiscuous mode [ 127.033469][ T28] audit: type=1400 audit(126.970:148): avc: denied { setopt } for pid=3998 comm="syz.1.56" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 127.848683][ T28] audit: type=1400 audit(127.770:149): avc: denied { execute } for pid=4004 comm="syz.0.58" path=2F6D656D66643A0241BBCC960E6F1FE240CCB15967202864656C6574656429 dev="tmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 128.717358][ T4018] dvmrp1: tun_chr_ioctl cmd 2147767520 [ 128.721833][ T4018] dvmrp1: tun_chr_ioctl cmd 37728 [ 138.128923][ T4030] Zero length message leads to an empty skb [ 138.543711][ T28] audit: type=1400 audit(138.470:150): avc: denied { create } for pid=4035 comm="syz.1.70" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 139.769358][ T28] audit: type=1400 audit(139.710:151): avc: denied { name_bind } for pid=4040 comm="syz.1.71" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 140.562354][ T28] audit: type=1400 audit(140.500:152): avc: denied { module_load } for pid=4043 comm="syz.1.72" path="/39/file0" dev="tmpfs" ino=219 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=system permissive=1 [ 140.571938][ T4045] Invalid ELF header len 1 [ 145.771769][ T28] audit: type=1400 audit(145.710:153): avc: denied { name_bind } for pid=4075 comm="syz.0.83" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 152.460779][ T28] audit: type=1400 audit(152.390:154): avc: denied { bind } for pid=4113 comm="syz.0.96" lport=64 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 152.693816][ T4118] netlink: 16 bytes leftover after parsing attributes in process `syz.1.97'. [ 152.695255][ T28] audit: type=1400 audit(152.630:155): avc: denied { write } for pid=4117 comm="syz.1.97" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 154.320266][ T28] audit: type=1400 audit(154.260:156): avc: denied { mounton } for pid=4132 comm="syz.1.104" path="/proc/136/task" dev="proc" ino=2772 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 155.051176][ T28] audit: type=1400 audit(154.980:157): avc: denied { create } for pid=4140 comm="syz.0.107" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 155.085891][ T28] audit: type=1400 audit(155.020:158): avc: denied { map } for pid=4139 comm="syz.1.106" path="socket:[3548]" dev="sockfs" ino=3548 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 155.095370][ T28] audit: type=1400 audit(155.020:159): avc: denied { read write } for pid=4139 comm="syz.1.106" path="socket:[3548]" dev="sockfs" ino=3548 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 155.112594][ T28] audit: type=1400 audit(155.050:160): avc: denied { mounton } for pid=4140 comm="syz.0.107" path="/44/file0" dev="tmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 156.501745][ T28] audit: type=1400 audit(156.440:161): avc: denied { unlink } for pid=3100 comm="syz-executor" name="file0" dev="tmpfs" ino=244 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 157.715266][ T4159] process 'syz.0.114' launched './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa' with NULL argv: empty string added [ 157.739456][ T28] audit: type=1400 audit(157.680:162): avc: denied { execute_no_trans } for pid=4158 comm="syz.0.114" path="/47/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa" dev="tmpfs" ino=260 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 157.950787][ T28] audit: type=1400 audit(157.890:163): avc: denied { create } for pid=4160 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 158.030314][ T28] audit: type=1400 audit(157.970:164): avc: denied { write } for pid=4160 comm="syz.1.116" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 159.850913][ T28] audit: type=1326 audit(159.790:165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4170 comm="syz.0.120" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 159.852982][ T28] audit: type=1326 audit(159.790:166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4170 comm="syz.0.120" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 159.859605][ T28] audit: type=1326 audit(159.790:167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4170 comm="syz.0.120" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 159.861649][ T28] audit: type=1326 audit(159.790:168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4170 comm="syz.0.120" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 159.863495][ T28] audit: type=1326 audit(159.790:169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4170 comm="syz.0.120" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 159.867873][ T28] audit: type=1326 audit(159.800:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4170 comm="syz.0.120" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 159.872121][ T28] audit: type=1326 audit(159.800:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4170 comm="syz.0.120" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 164.200105][ T4194] netlink: 12 bytes leftover after parsing attributes in process `syz.1.129'. [ 164.361081][ T4194] 8021q: adding VLAN 0 to HW filter on device bond1 [ 164.430519][ T28] kauditd_printk_skb: 27 callbacks suppressed [ 164.430991][ T28] audit: type=1400 audit(164.370:199): avc: denied { create } for pid=4193 comm="syz.1.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 164.444340][ T28] audit: type=1400 audit(164.380:200): avc: denied { write } for pid=4193 comm="syz.1.129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 164.533546][ T4194] macvlan2: entered promiscuous mode [ 164.571860][ T4194] macvlan2: entered allmulticast mode [ 164.591094][ T4194] bond1: entered promiscuous mode [ 164.594698][ T4194] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 164.609370][ T4194] bond1: left promiscuous mode [ 167.049374][ T28] audit: type=1400 audit(166.990:201): avc: denied { create } for pid=4244 comm="syz.0.135" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 167.129809][ T28] audit: type=1400 audit(167.070:202): avc: denied { sys_admin } for pid=4244 comm="syz.0.135" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 167.846963][ T28] audit: type=1400 audit(167.780:203): avc: denied { block_suspend } for pid=4248 comm="syz.1.137" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 173.489120][ T4269] netlink: 12 bytes leftover after parsing attributes in process `syz.1.144'. [ 173.624830][ T4269] ipvlan2: entered allmulticast mode [ 173.628028][ T4269] veth1_to_batadv: entered allmulticast mode [ 173.972048][ T4275] netlink: 20 bytes leftover after parsing attributes in process `syz.1.145'. [ 174.008695][ T4275] vlan2: entered promiscuous mode [ 174.009036][ T4275] erspan0: entered promiscuous mode [ 177.516338][ T28] audit: type=1400 audit(177.450:204): avc: denied { remount } for pid=4303 comm="syz.1.155" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 179.545817][ T4319] netlink: 12 bytes leftover after parsing attributes in process `syz.1.162'. [ 179.723492][ T28] audit: type=1400 audit(179.660:205): avc: denied { mount } for pid=4327 comm="syz.0.167" name="/" dev="ramfs" ino=2990 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 179.762364][ T28] audit: type=1400 audit(179.700:206): avc: denied { create } for pid=4329 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 179.765487][ T28] audit: type=1400 audit(179.700:207): avc: denied { accept } for pid=4329 comm="syz.1.166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 180.080865][ T4334] netlink: 8 bytes leftover after parsing attributes in process `syz.1.169'. [ 180.413371][ T28] audit: type=1400 audit(180.350:208): avc: denied { ioctl } for pid=4341 comm="syz.1.172" path="socket:[3808]" dev="sockfs" ino=3808 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 180.718268][ T28] audit: type=1400 audit(180.660:209): avc: denied { bind } for pid=4345 comm="syz.1.173" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 182.293701][ T4352] netlink: 4 bytes leftover after parsing attributes in process `syz.0.175'. [ 182.489702][ T4352] netlink: 28 bytes leftover after parsing attributes in process `syz.0.175'. [ 182.845552][ T4360] ip6gre1: entered promiscuous mode [ 182.845935][ T4360] ip6gre1: entered allmulticast mode [ 183.798320][ T4369] netlink: 4 bytes leftover after parsing attributes in process `syz.0.180'. [ 183.860620][ T4365] *** NOT YET: opcode db *** [ 184.709282][ T11] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 184.962851][ T28] audit: type=1400 audit(184.900:210): avc: denied { map } for pid=4379 comm="syz.0.182" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3058 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 184.968146][ T28] audit: type=1400 audit(184.900:211): avc: denied { write } for pid=4379 comm="syz.0.182" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3058 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 185.058875][ T11] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 185.230440][ T28] audit: type=1400 audit(185.170:212): avc: denied { write } for pid=4381 comm="syz.0.183" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 186.858402][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 187.803239][ T28] audit: type=1400 audit(187.740:213): avc: denied { connect } for pid=4398 comm="syz.0.191" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 195.098144][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 195.477882][ T28] audit: type=1400 audit(195.410:214): avc: denied { read } for pid=4430 comm="syz.1.205" lport=6 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 196.021324][ T28] audit: type=1326 audit(195.960:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.206" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 196.023538][ T28] audit: type=1326 audit(195.960:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.206" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 196.030207][ T28] audit: type=1326 audit(195.970:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.206" exe="/syz-executor" sig=0 arch=40000028 syscall=217 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 196.032402][ T28] audit: type=1326 audit(195.970:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.206" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 196.034451][ T28] audit: type=1326 audit(195.970:219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4434 comm="syz.0.206" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 197.124001][ T4440] netlink: 8 bytes leftover after parsing attributes in process `syz.0.207'. [ 197.125311][ T4440] 8021q: VLANs not supported on ip_vti0 [ 199.898470][ C1] af_packet: tpacket_rcv: packet too big, clamped from 40 to 4294967272. macoff=96 [ 202.268478][ T28] audit: type=1400 audit(202.200:220): avc: denied { associate } for pid=4470 comm="syz.1.221" name="core" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 209.384593][ T28] audit: type=1400 audit(209.320:221): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 [ 210.470704][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 214.638286][ T28] audit: type=1400 audit(214.560:222): avc: denied { connect } for pid=4518 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 214.643721][ T28] audit: type=1400 audit(214.580:223): avc: denied { accept } for pid=4518 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 214.697863][ T28] audit: type=1400 audit(214.630:224): avc: denied { read } for pid=4518 comm="syz.0.240" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 216.548597][ T4522] capability: warning: `syz.0.241' uses deprecated v2 capabilities in a way that may be insecure [ 219.154739][ T4525] sch_tbf: burst 0 is lower than device syzkaller0 mtu (1514) ! [ 222.358012][ T28] audit: type=1400 audit(222.280:225): avc: denied { create } for pid=4540 comm="syz.0.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 222.364199][ T28] audit: type=1400 audit(222.300:226): avc: denied { write } for pid=4540 comm="syz.0.248" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 226.748768][ T28] audit: type=1326 audit(226.680:227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4574 comm="syz.0.264" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 226.749201][ T28] audit: type=1326 audit(226.680:228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4574 comm="syz.0.264" exe="/syz-executor" sig=0 arch=40000028 syscall=377 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 226.752650][ T28] audit: type=1326 audit(226.680:229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4574 comm="syz.0.264" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 227.171923][ T4577] batadv_slave_1: entered promiscuous mode [ 227.221151][ T4577] netlink: 4 bytes leftover after parsing attributes in process `syz.0.265'. [ 227.330600][ T4577] batadv_slave_1 (unregistering): left promiscuous mode [ 230.199088][ T28] audit: type=1400 audit(230.130:230): avc: denied { setopt } for pid=4588 comm="syz.0.267" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 230.974117][ T28] audit: type=1400 audit(230.910:231): avc: denied { append } for pid=4593 comm="syz.0.268" name="tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 233.711748][ T28] audit: type=1400 audit(233.650:232): avc: denied { lock } for pid=4608 comm="syz.0.273" path="socket:[5256]" dev="sockfs" ino=5256 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_stream_socket permissive=1 [ 234.852595][ T28] audit: type=1400 audit(234.780:233): avc: denied { kexec_image_load } for pid=4612 comm="syz.0.275" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 235.729482][ T4619] syz.0.278 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 236.068767][ T28] audit: type=1400 audit(235.990:234): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 236.899408][ T4623] syzkaller0: entered promiscuous mode [ 236.900374][ T4623] syzkaller0: entered allmulticast mode [ 241.818151][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 242.999250][ T28] audit: type=1400 audit(242.940:235): avc: denied { ioctl } for pid=4660 comm="syz.0.291" path="socket:[5327]" dev="sockfs" ino=5327 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 249.618550][ T28] audit: type=1400 audit(249.550:236): avc: denied { write } for pid=4672 comm="syz.0.296" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 249.639917][ T28] audit: type=1400 audit(249.580:237): avc: denied { open } for pid=4672 comm="syz.0.296" path="/166/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 249.655514][ T28] audit: type=1400 audit(249.590:238): avc: denied { ioctl } for pid=4672 comm="syz.0.296" path="/166/file0/file0" dev="fuse" ino=64 ioctlcmd=0x4d02 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 250.421027][ T28] audit: type=1400 audit(250.360:239): avc: denied { connect } for pid=4682 comm="syz.0.299" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 250.438593][ T28] audit: type=1400 audit(250.370:240): avc: denied { write } for pid=4682 comm="syz.0.299" laddr=fe80::13 lport=49078 faddr=ff02::1 fport=20004 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 250.690571][ T28] audit: type=1400 audit(250.620:241): avc: denied { read } for pid=4682 comm="syz.0.299" path="socket:[4430]" dev="sockfs" ino=4430 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 252.892195][ T4678] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 252.904055][ T4678] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.863506][ T4678] hsr_slave_0: entered promiscuous mode [ 253.869448][ T4678] hsr_slave_1: entered promiscuous mode [ 253.872937][ T4678] debugfs: 'hsr0' already exists in 'hsr' [ 253.877018][ T4678] Cannot create hsr debugfs directory [ 254.225057][ T4678] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 254.230434][ T4678] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 254.232230][ T4678] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 254.239887][ T4678] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 254.242316][ T4678] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 254.252139][ T4678] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 254.254547][ T4678] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 254.280139][ T4678] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 255.653562][ T4678] 8021q: adding VLAN 0 to HW filter on device bond0 [ 256.802054][ T28] audit: type=1326 audit(256.740:242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4978 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 256.808955][ T28] audit: type=1326 audit(256.750:243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4978 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 256.812323][ T28] audit: type=1326 audit(256.750:244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4978 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 256.822111][ T28] audit: type=1326 audit(256.760:245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4978 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 256.822376][ T28] audit: type=1326 audit(256.760:246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4978 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 256.822569][ T28] audit: type=1326 audit(256.760:247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4978 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 256.822765][ T28] audit: type=1326 audit(256.760:248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4978 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 256.859519][ T28] audit: type=1326 audit(256.790:250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4978 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=250 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 256.859913][ T28] audit: type=1326 audit(256.790:251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4978 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 256.860213][ T28] audit: type=1326 audit(256.790:252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4978 comm="syz.0.303" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 261.311172][ T4678] veth0_vlan: entered promiscuous mode [ 261.352383][ T4678] veth1_vlan: entered promiscuous mode [ 261.461551][ T4678] veth0_macvtap: entered promiscuous mode [ 261.475735][ T4678] veth1_macvtap: entered promiscuous mode [ 261.949460][ T50] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.950285][ T50] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.951077][ T50] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.951541][ T50] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 266.213823][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 266.218130][ T28] audit: type=1400 audit(266.150:261): avc: denied { bind } for pid=5027 comm="syz.2.313" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 266.550852][ T5033] netlink: 'syz.0.315': attribute type 13 has an invalid length. [ 267.318619][ T43] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 267.978629][ T3045] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 270.743896][ T5081] netlink: 16 bytes leftover after parsing attributes in process `syz.0.334'. [ 271.008876][ T28] audit: type=1400 audit(270.940:262): avc: denied { create } for pid=5086 comm="syz.2.337" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 271.018832][ T28] audit: type=1400 audit(270.950:263): avc: denied { write } for pid=5086 comm="syz.2.337" name="file0" dev="tmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 271.028755][ T28] audit: type=1400 audit(270.950:264): avc: denied { open } for pid=5086 comm="syz.2.337" path="/13/file0" dev="tmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 271.083338][ T28] audit: type=1400 audit(271.020:265): avc: denied { unlink } for pid=4678 comm="syz-executor" name="file0" dev="tmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 271.908846][ T5103] netlink: 20 bytes leftover after parsing attributes in process `syz.0.346'. [ 277.927073][ T5129] netlink: 28 bytes leftover after parsing attributes in process `syz.2.355'. [ 279.444699][ T5156] syzkaller0: entered promiscuous mode [ 279.445228][ T5156] syzkaller0: entered allmulticast mode [ 280.019645][ T5164] ======================================================= [ 280.019645][ T5164] WARNING: The mand mount option has been deprecated and [ 280.019645][ T5164] and is ignored by this kernel. Remove the mand [ 280.019645][ T5164] option from the mount to silence this warning. [ 280.019645][ T5164] ======================================================= [ 280.067021][ T28] audit: type=1400 audit(280.000:266): avc: denied { unmount } for pid=3100 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 280.338915][ T5168] fuse: Bad value for 'fd' [ 280.908775][ T5176] netlink: 8 bytes leftover after parsing attributes in process `syz.2.372'. [ 280.941195][ T5176] gretap1: entered allmulticast mode [ 282.044292][ T5186] netlink: 8 bytes leftover after parsing attributes in process `syz.0.376'. [ 288.954646][ T5213] : renamed from bond0 (while UP) [ 288.991674][ T28] audit: type=1400 audit(288.890:267): avc: denied { ioctl } for pid=5212 comm="syz.0.383" path="socket:[5989]" dev="sockfs" ino=5989 ioctlcmd=0x8923 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 293.677295][ T28] audit: type=1400 audit(293.610:268): avc: denied { bind } for pid=5229 comm="syz.0.390" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 294.828669][ T28] audit: type=1400 audit(294.760:269): avc: denied { setopt } for pid=5235 comm="syz.0.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 294.860187][ T28] audit: type=1400 audit(294.800:270): avc: denied { getopt } for pid=5235 comm="syz.0.393" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 296.928357][ T43] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 297.079920][ T4137] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 300.915906][ T5261] GUP no longer grows the stack in syz.0.403 (5261): 20004000-2000a000 (20003000) [ 300.944200][ T5261] CPU: 1 UID: 0 PID: 5261 Comm: syz.0.403 Not tainted syzkaller #0 PREEMPT [ 300.944566][ T5261] Hardware name: ARM-Versatile Express [ 300.944823][ T5261] Call trace: [ 300.945121][ T5261] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 300.945545][ T5261] r7:60000013 r6:60000013 r5:8231c350 r4:00000000 [ 300.945651][ T5261] [<80201af0>] (show_stack) from [<8021e320>] (dump_stack_lvl+0x5c/0x70) [ 300.945715][ T5261] [<8021e2c4>] (dump_stack_lvl) from [<8021e34c>] (dump_stack+0x18/0x1c) [ 300.945777][ T5261] r7:00000000 r6:ded4d110 r5:20003000 r4:20003000 [ 300.945795][ T5261] [<8021e334>] (dump_stack) from [<804d9bcc>] (gup_vma_lookup+0xbc/0xc0) [ 300.945851][ T5261] [<804d9b10>] (gup_vma_lookup) from [<804db8d0>] (__get_user_pages+0x108/0x718) [ 300.945903][ T5261] r4:002d0001 [ 300.945921][ T5261] [<804db7c8>] (__get_user_pages) from [<804dce90>] (__gup_longterm_locked+0xd8/0xb90) [ 300.946003][ T5261] r10:84f1de00 r9:86526000 r8:eac61e30 r7:eac61e30 r6:00000001 r5:002d0001 [ 300.946034][ T5261] r4:84f1df0c [ 300.946053][ T5261] [<804dcdb8>] (__gup_longterm_locked) from [<804de328>] (pin_user_pages_remote+0x80/0xa4) [ 300.946120][ T5261] r10:00000001 r9:0d8d0481 r8:86526000 r7:eac61e30 r6:00000800 r5:20001000 [ 300.946142][ T5261] r4:84f1de00 [ 300.946159][ T5261] [<804de2a8>] (pin_user_pages_remote) from [<80513e00>] (process_vm_rw_core.constprop.0+0x1b0/0x47c) [ 300.946247][ T5261] r8:0000d8d2 r7:00000000 r6:eac61eb8 r5:00000cc0 r4:00000800 [ 300.946272][ T5261] [<80513c50>] (process_vm_rw_core.constprop.0) from [<805141f0>] (process_vm_rw+0x124/0x14c) [ 300.946350][ T5261] r10:eac61ed4 r9:00000001 r8:00000000 r7:00000236 r6:20001d80 r5:eac61f14 [ 300.946381][ T5261] r4:0d8d051d [ 300.946405][ T5261] [<805140cc>] (process_vm_rw) from [<80514278>] (sys_process_vm_writev+0x2c/0x34) [ 300.946517][ T5261] r10:00000179 r9:85156e40 r8:8020029c r7:00000179 r6:0034631c r5:00000000 [ 300.946538][ T5261] r4:00000001 [ 300.946554][ T5261] [<8051424c>] (sys_process_vm_writev) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 300.946677][ T5261] Exception stack(0xeac61fa8 to 0xeac61ff0) [ 300.946840][ T5261] 1fa0: 00000001 00000000 00000236 20001c80 00000067 20001d80 [ 300.947136][ T5261] 1fc0: 00000001 00000000 0034631c 00000179 003462d8 00000000 00000001 76f810dc [ 300.947174][ T5261] 1fe0: 76f80e88 76f80e78 00018e58 001307a0 [ 302.340899][ T28] audit: type=1400 audit(302.270:271): avc: denied { create } for pid=5269 comm="syz.0.407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 305.178612][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 305.858817][ T5281] netlink: 12 bytes leftover after parsing attributes in process `syz.0.411'. [ 306.608429][ T28] audit: type=1326 audit(306.540:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5284 comm="syz.0.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 306.614063][ T28] audit: type=1326 audit(306.550:273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5284 comm="syz.0.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 306.620180][ T28] audit: type=1326 audit(306.550:274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5284 comm="syz.0.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 306.635606][ T28] audit: type=1326 audit(306.570:275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5284 comm="syz.0.413" exe="/syz-executor" sig=0 arch=40000028 syscall=358 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 306.638407][ T28] audit: type=1326 audit(306.570:276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5284 comm="syz.0.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 306.642842][ T28] audit: type=1326 audit(306.570:277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5284 comm="syz.0.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 306.660556][ T28] audit: type=1326 audit(306.590:278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5284 comm="syz.0.413" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 306.674571][ T28] audit: type=1326 audit(306.600:279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5284 comm="syz.0.413" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 306.676689][ T28] audit: type=1326 audit(306.600:280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5284 comm="syz.0.413" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 307.744225][ T28] audit: type=1400 audit(307.680:281): avc: denied { read } for pid=5286 comm="syz.0.414" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 307.744752][ T28] audit: type=1400 audit(307.680:282): avc: denied { open } for pid=5286 comm="syz.0.414" path="/258/file0/file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 307.800745][ T5288] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 307.809827][ T5288] block device autoloading is deprecated and will be removed. [ 307.842506][ T28] audit: type=1400 audit(307.780:283): avc: denied { ioctl } for pid=5286 comm="syz.0.414" path="/258/file0/file0" dev="fuse" ino=64 ioctlcmd=0x915 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 [ 308.158668][ T5294] netlink: 8 bytes leftover after parsing attributes in process `syz.0.415'. [ 308.160888][ T5294] netlink: 16 bytes leftover after parsing attributes in process `syz.0.415'. [ 315.433169][ T1265] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 315.542113][ T1265] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 315.791415][ T1265] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 315.926546][ T1265] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 316.814933][ T1265] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 316.845988][ T1265] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 316.878791][ T1265] bond0 (unregistering): Released all slaves [ 316.892896][ T1265] bond1 (unregistering): Released all slaves [ 317.062305][ T1265] hsr_slave_0: left promiscuous mode [ 317.080325][ T1265] hsr_slave_1: left promiscuous mode [ 317.099877][ T1265] veth1_macvtap: left promiscuous mode [ 317.100978][ T1265] veth0_macvtap: left promiscuous mode [ 317.104385][ T1265] veth1_vlan: left promiscuous mode [ 317.108332][ T1265] veth0_vlan: left promiscuous mode [ 318.344279][ T28] audit: type=1400 audit(318.280:284): avc: denied { getopt } for pid=5359 comm="syz.0.433" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 319.292289][ T28] audit: type=1400 audit(319.230:285): avc: denied { setcurrent } for pid=5365 comm="syz.0.436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 323.471170][ T2955] 8021q: adding VLAN 0 to HW filter on device eth1 [ 326.732951][ T2955] 8021q: adding VLAN 0 to HW filter on device eth2 [ 328.159753][ T2955] 8021q: adding VLAN 0 to HW filter on device eth3 [ 329.489504][ T5440] tmpfs: Unsupported parameter 'mpol' [ 330.945199][ T2955] 8021q: adding VLAN 0 to HW filter on device eth4 [ 333.339968][ T5416] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 333.372289][ T5416] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 335.182512][ T5416] hsr_slave_0: entered promiscuous mode [ 335.192120][ T5416] hsr_slave_1: entered promiscuous mode [ 336.164439][ T5416] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 336.193721][ T5416] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 336.200655][ T5416] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 336.213077][ T5416] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 336.221303][ T5416] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 336.234447][ T5416] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 336.250329][ T5416] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 336.282403][ T5416] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 338.052573][ T5416] 8021q: adding VLAN 0 to HW filter on device bond0 [ 345.265414][ T5416] veth0_vlan: entered promiscuous mode [ 345.436455][ T5416] veth1_vlan: entered promiscuous mode [ 345.689346][ T5416] veth0_macvtap: entered promiscuous mode [ 345.723917][ T5416] veth1_macvtap: entered promiscuous mode [ 345.921500][ T1027] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 345.922151][ T1027] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 345.922673][ T1027] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 345.923604][ T1027] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 346.490405][ T1027] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 346.616149][ T1027] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 346.743850][ T1027] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.035183][ T1027] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.909189][ T1027] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 347.940366][ T1027] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 347.946975][ T1027] bond0 (unregistering): Released all slaves [ 348.043584][ T1027] hsr_slave_0: left promiscuous mode [ 348.101096][ T1027] hsr_slave_1: left promiscuous mode [ 348.131527][ T1027] veth1_macvtap: left promiscuous mode [ 348.131966][ T1027] veth0_macvtap: left promiscuous mode [ 348.139234][ T1027] veth1_vlan: left promiscuous mode [ 348.139454][ T1027] veth0_vlan: left promiscuous mode [ 351.648901][ T28] audit: type=1400 audit(351.580:286): avc: denied { read } for pid=5826 comm="syz.3.468" name="file0" dev="fuse" ino=67 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 352.047779][ T2955] 8021q: adding VLAN 0 to HW filter on device eth5 [ 358.211748][ T2955] 8021q: adding VLAN 0 to HW filter on device eth6 [ 359.709884][ T2955] 8021q: adding VLAN 0 to HW filter on device eth7 [ 361.381971][ T2955] 8021q: adding VLAN 0 to HW filter on device eth8 [ 362.186065][ T5919] netlink: 16 bytes leftover after parsing attributes in process `syz.3.485'. [ 364.121986][ T5940] futex_wake_op: syz.0.492 tries to shift op by 32; fix this program [ 381.159805][ T6023] syzkaller0: entered promiscuous mode [ 381.160165][ T6023] syzkaller0: entered allmulticast mode [ 382.759615][ T6040] pim6reg1: entered promiscuous mode [ 382.761049][ T6040] pim6reg1: entered allmulticast mode [ 387.122497][ T6066] netlink: 8 bytes leftover after parsing attributes in process `syz.3.525'. [ 387.124106][ T6066] netlink: 8 bytes leftover after parsing attributes in process `syz.3.525'. [ 388.089306][ T28] audit: type=1400 audit(388.030:287): avc: denied { append } for pid=6073 comm="syz.3.529" name="file0" dev="fuse" ino=1024 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 396.583143][ T6087] netlink: 56 bytes leftover after parsing attributes in process `syz.3.532'. [ 397.249283][ T28] audit: type=1400 audit(397.190:288): avc: denied { bind } for pid=6098 comm="syz.3.538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 397.255425][ T28] audit: type=1400 audit(397.190:289): avc: denied { setopt } for pid=6098 comm="syz.3.538" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 397.674097][ T6106] veth2: entered allmulticast mode [ 398.037304][ T6118] syzkaller0: entered promiscuous mode [ 398.043476][ T6118] syzkaller0: entered allmulticast mode [ 398.358826][ T6124] netlink: 12 bytes leftover after parsing attributes in process `syz.3.544'. [ 398.429749][ T6124] 8021q: adding VLAN 0 to HW filter on device bond1 [ 398.455361][ T6124] bond1: (slave dummy0): Enslaving as an active interface with an up link [ 398.752467][ T6162] netlink: 4 bytes leftover after parsing attributes in process `syz.3.546'. [ 408.629147][ T28] audit: type=1400 audit(408.570:290): avc: denied { mount } for pid=6208 comm="syz.3.566" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 412.368552][ T28] audit: type=1326 audit(412.300:291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6235 comm="syz.3.575" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 412.368947][ T28] audit: type=1326 audit(412.300:292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6235 comm="syz.3.575" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 412.369280][ T28] audit: type=1326 audit(412.300:293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6235 comm="syz.3.575" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 412.369390][ T28] audit: type=1326 audit(412.300:294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6235 comm="syz.3.575" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 412.369445][ T28] audit: type=1326 audit(412.300:295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6235 comm="syz.3.575" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 412.369488][ T28] audit: type=1326 audit(412.300:296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6235 comm="syz.3.575" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 412.369553][ T28] audit: type=1326 audit(412.300:297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6235 comm="syz.3.575" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 412.369602][ T28] audit: type=1326 audit(412.300:298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6235 comm="syz.3.575" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 412.369661][ T28] audit: type=1326 audit(412.300:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6235 comm="syz.3.575" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x7ffc0000 [ 414.209377][ T28] kauditd_printk_skb: 9 callbacks suppressed [ 414.209965][ T28] audit: type=1400 audit(414.150:309): avc: denied { mounton } for pid=6295 comm="syz.3.579" path="/112/file0" dev="tmpfs" ino=587 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 417.090551][ T6217] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 417.096414][ T6217] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 417.402378][ T6387] netlink: 4 bytes leftover after parsing attributes in process `syz.3.580'. [ 419.908889][ T6217] hsr_slave_0: entered promiscuous mode [ 419.911900][ T6217] hsr_slave_1: entered promiscuous mode [ 419.916698][ T6217] debugfs: 'hsr0' already exists in 'hsr' [ 419.920424][ T6217] Cannot create hsr debugfs directory [ 420.272372][ T6217] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 420.279649][ T6217] 8021q: adding VLAN 0 to HW filter on device netdevsim0 [ 420.285215][ T6217] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 420.293954][ T6217] 8021q: adding VLAN 0 to HW filter on device netdevsim1 [ 420.301234][ T6217] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 420.307414][ T6217] 8021q: adding VLAN 0 to HW filter on device netdevsim2 [ 420.311873][ T6217] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 420.321139][ T6217] 8021q: adding VLAN 0 to HW filter on device netdevsim3 [ 420.887269][ T6535] netlink: 16 bytes leftover after parsing attributes in process `syz.3.588'. [ 421.108759][ T6217] 8021q: adding VLAN 0 to HW filter on device bond0 [ 425.401690][ T6217] veth0_vlan: entered promiscuous mode [ 425.415825][ T6217] veth1_vlan: entered promiscuous mode [ 425.470968][ T6217] veth0_macvtap: entered promiscuous mode [ 425.483790][ T6217] veth1_macvtap: entered promiscuous mode [ 425.575092][ T12] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.576412][ T12] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.579831][ T12] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 425.580977][ T12] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 427.001405][ T6604] mmap: syz.3.598 (6604) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 428.058158][ C1] ip6_tunnel: ip6gre1 xmit: Local address not yet configured! [ 435.829583][ T28] audit: type=1400 audit(435.770:310): avc: denied { read } for pid=6628 comm="syz.4.608" path="socket:[8984]" dev="sockfs" ino=8984 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 436.248595][ T28] audit: type=1400 audit(436.180:311): avc: denied { write } for pid=6628 comm="syz.4.608" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 437.679308][ T28] audit: type=1400 audit(437.620:312): avc: denied { setopt } for pid=6649 comm="syz.3.616" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 437.931354][ T6652] raw_sendmsg: syz.3.617 forgot to set AF_INET. Fix it! [ 448.573998][ T6736] A link change request failed with some changes committed already. Interface lo may have been left with an inconsistent configuration, please check. [ 449.035421][ T6742] netlink: 16 bytes leftover after parsing attributes in process `syz.3.654'. [ 457.851779][ T6794] syz.4.677 uses obsolete (PF_INET,SOCK_PACKET) [ 461.972810][ T6829] blkio.reset_stats is deprecated [ 464.109084][ T28] audit: type=1400 audit(464.050:313): avc: denied { create } for pid=6851 comm="syz.4.696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 465.629688][ T6858] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 465.630604][ T6858] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 467.002319][ T28] audit: type=1400 audit(466.940:314): avc: denied { unlink } for pid=6861 comm="syz.4.698" name="file0" dev="fuse" ino=64 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 473.071304][ T6909] syzkaller1: entered promiscuous mode [ 473.071763][ T6909] syzkaller1: entered allmulticast mode [ 473.664328][ T6888] nci: __nci_request: wait_for_completion_interruptible_timeout failed 0 [ 473.773719][ T6931] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 473.776175][ T6931] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 473.863398][ T6931] i2c i2c-0: died at extended address code [ 474.159056][ T37] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 474.239328][ T37] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 474.320731][ T37] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 474.404786][ T37] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 475.126994][ T37]  (unregistering): (slave bond_slave_0): Releasing backup interface [ 475.142642][ T37]  (unregistering): (slave bond_slave_1): Releasing backup interface [ 475.156192][ T37]  (unregistering): Released all slaves [ 475.259134][ T37] hsr_slave_0: left promiscuous mode [ 475.261707][ T37] hsr_slave_1: left promiscuous mode [ 475.281344][ T37] veth1_macvtap: left promiscuous mode [ 475.281761][ T37] veth0_macvtap: left promiscuous mode [ 475.284161][ T37] veth1_vlan: left promiscuous mode [ 475.284676][ T37] veth0_vlan: left promiscuous mode [ 477.827209][ T6989] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2 sclass=netlink_route_socket pid=6989 comm=syz.4.728 [ 478.360635][ T28] audit: type=1400 audit(478.300:315): avc: denied { ioctl } for pid=6993 comm="syz.4.731" path="socket:[10457]" dev="sockfs" ino=10457 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 478.363863][ T28] audit: type=1400 audit(478.300:316): avc: denied { bind } for pid=6993 comm="syz.4.731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 478.378617][ T28] audit: type=1400 audit(478.320:317): avc: denied { connect } for pid=6993 comm="syz.4.731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 478.383323][ T28] audit: type=1400 audit(478.320:318): avc: denied { write } for pid=6993 comm="syz.4.731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 478.386512][ T6994] vxcan1: tx drop: invalid sa for name 0x0000000000000002 [ 478.753670][ T2955] 8021q: adding VLAN 0 to HW filter on device eth9 [ 480.902138][ T28] audit: type=1400 audit(480.810:319): avc: denied { create } for pid=7020 comm="syz.4.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 480.930313][ T28] audit: type=1400 audit(480.870:320): avc: denied { setopt } for pid=7020 comm="syz.4.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 481.151395][ T7024] input: syz1 as /devices/virtual/input/input3 [ 482.080021][ T2955] 8021q: adding VLAN 0 to HW filter on device eth10 [ 482.372261][ T28] audit: type=1400 audit(482.310:321): avc: denied { bind } for pid=7020 comm="syz.4.739" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 484.682768][ T2955] 8021q: adding VLAN 0 to HW filter on device eth11 [ 484.885858][ T7060] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 484.891910][ T7060] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 485.989331][ T2955] 8021q: adding VLAN 0 to HW filter on device eth12 [ 486.977049][ T28] audit: type=1400 audit(486.910:322): avc: denied { allowed } for pid=7076 comm="syz.4.749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 489.509990][ T28] audit: type=1400 audit(489.450:323): avc: denied { map } for pid=7109 comm="syz.3.758" path="/dev/audio" dev="devtmpfs" ino=726 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 490.219013][ T28] audit: type=1400 audit(490.160:324): avc: denied { map } for pid=7122 comm="syz.3.763" path="/dev/nullb0" dev="devtmpfs" ino=654 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 491.139469][ T28] audit: type=1400 audit(491.080:325): avc: denied { node_bind } for pid=7135 comm="syz.4.766" saddr=224.0.0.1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 492.334876][ T7140] syz.4.768 (7140): drop_caches: 2 [ 493.030397][ T7154] syzkaller1: entered promiscuous mode [ 493.035614][ T7154] syzkaller1: entered allmulticast mode [ 493.275823][ T7160] block nbd4: shutting down sockets [ 493.503269][ T7172] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 493.505014][ T7172] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 498.583370][ T28] audit: type=1326 audit(498.520:326): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7234 comm="syz.3.790" exe="/syz-executor" sig=9 arch=40000028 syscall=240 compat=0 ip=0x1307a0 code=0x0 [ 504.602066][ T28] audit: type=1400 audit(504.540:327): avc: denied { create } for pid=7271 comm="syz.4.795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 504.612267][ T28] audit: type=1400 audit(504.550:328): avc: denied { write } for pid=7271 comm="syz.4.795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 505.119717][ T28] audit: type=1400 audit(505.060:329): avc: denied { listen } for pid=7271 comm="syz.4.795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 505.169871][ T28] audit: type=1400 audit(505.110:330): avc: denied { accept } for pid=7271 comm="syz.4.795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 509.870563][ T28] audit: type=1400 audit(509.810:331): avc: denied { create } for pid=7297 comm="syz.3.805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 511.249482][ T7313] binder: 7312:7313 ioctl 4018620d 0 returned -22 [ 514.201028][ T7324] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 514.203945][ T7324] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 517.227990][ T28] audit: type=1400 audit(517.160:332): avc: denied { create } for pid=7339 comm="syz.4.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 517.245771][ T28] audit: type=1400 audit(517.180:333): avc: denied { create } for pid=7339 comm="syz.4.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 517.399877][ T7342] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 517.401186][ T7342] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 517.489771][ T28] audit: type=1400 audit(517.430:334): avc: denied { create } for pid=7345 comm="syz.4.820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 517.493785][ T28] audit: type=1400 audit(517.430:335): avc: denied { write } for pid=7345 comm="syz.4.820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 517.497846][ T28] audit: type=1400 audit(517.430:336): avc: denied { nlmsg_write } for pid=7345 comm="syz.4.820" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 524.735221][ T7375] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 524.741069][ T7375] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 524.955980][ T7375] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 524.956738][ T7375] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 525.072318][ T7383] comedi comedi3: Minor 20259 is invalid! [ 528.035400][ T7406] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 528.041174][ T7406] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 531.013195][ T7427] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 531.014029][ T7427] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 534.134945][ T7441] netlink: 4 bytes leftover after parsing attributes in process `syz.4.852'. [ 538.520909][ T1027] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 538.521554][ T1027] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 538.526052][ T1027] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 538.528853][ T1027] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 540.345172][ T7488] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 540.347320][ T7488] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 544.252103][ T28] audit: type=1400 audit(544.190:337): avc: denied { create } for pid=7503 comm="syz.3.863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 544.264222][ T28] audit: type=1400 audit(544.200:338): avc: denied { write } for pid=7503 comm="syz.3.863" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 544.433194][ T7509] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 544.436129][ T7509] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 544.611629][ T7509] netlink: 'syz.3.864': attribute type 10 has an invalid length. [ 544.612179][ T7509] syz_tun: entered promiscuous mode [ 545.445776][ T7518] ipvlan0: entered promiscuous mode [ 545.446593][ T7518] ipvlan0: entered allmulticast mode [ 545.446659][ T7518] veth0_vlan: entered allmulticast mode [ 549.486468][ T7528] fuse: Bad value for 'fd' [ 554.258158][ T7554] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 554.268406][ T7554] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 554.288068][ C1] vcan0: j1939_tp_rxtimer: 0x85dfa600: rx timeout, send abort [ 554.298714][ C1] vcan0: j1939_xtp_rx_abort_one: 0x85dfa600: 0x20000: (3) A timeout occurred and this is the connection abort to close the session. [ 554.341178][ T28] audit: type=1400 audit(554.280:339): avc: denied { read } for pid=2907 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 554.359295][ T28] audit: type=1400 audit(554.290:340): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 554.359670][ T28] audit: type=1400 audit(554.290:341): avc: denied { search } for pid=2907 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 554.360017][ T28] audit: type=1400 audit(554.290:342): avc: denied { add_name } for pid=2907 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 554.360227][ T28] audit: type=1400 audit(554.290:343): avc: denied { create } for pid=2907 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 554.360453][ T28] audit: type=1400 audit(554.290:344): avc: denied { append open } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 554.360726][ T28] audit: type=1400 audit(554.290:345): avc: denied { getattr } for pid=2907 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 554.876762][ T7560] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 554.877928][ T7560] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 559.573231][ T7575] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 559.574319][ T7575] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 559.731625][ T7579] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 559.732402][ T7579] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 560.280415][ T7583] 8<--- cut here --- [ 560.288067][ T7583] Unable to handle kernel paging request at virtual address fee95000 when write [ 560.288485][ T7583] [fee95000] *pgd=80000080007003, *pmd=00000000 [ 560.290075][ T7583] Internal error: Oops: a06 [#1] SMP ARM [ 560.292707][ T7583] Modules linked in: [ 560.293263][ T7583] CPU: 1 UID: 0 PID: 7583 Comm: syz.3.887 Not tainted syzkaller #0 PREEMPT [ 560.293795][ T7583] Hardware name: ARM-Versatile Express [ 560.294102][ T7583] PC is at parport_attach+0x184/0x1e0 [ 560.294643][ T7583] LR is at parport_attach+0x174/0x1e0 [ 560.295114][ T7583] pc : [<8144d544>] lr : [<8144d534>] psr: 60000013 [ 560.295577][ T7583] sp : dfba1d30 ip : dfba1d30 fp : dfba1d54 [ 560.295969][ T7583] r10: 82d2bd44 r9 : 00000003 r8 : 8334c3c0 [ 560.296339][ T7583] r7 : dfba1d90 r6 : 8334c3c0 r5 : 00000000 r4 : 00000000 [ 560.296846][ T7583] r3 : fee95000 r2 : 81e274c8 r1 : 00000001 r0 : 8144d1a4 [ 560.297385][ T7583] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 560.297822][ T7583] Control: 30c5387d Table: 85ef0b40 DAC: 00000000 [ 560.298161][ T7583] Register r0 information: non-slab/vmalloc memory [ 560.299009][ T7583] Register r1 information: non-paged memory [ 560.299420][ T7583] Register r2 information: non-slab/vmalloc memory [ 560.299786][ T7583] Register r3 information: 0-page vmalloc region starting at 0xfee00000 allocated at pci_reserve_io+0x0/0x38 [ 560.300600][ T7583] Register r4 information: NULL pointer [ 560.300867][ T7583] Register r5 information: NULL pointer [ 560.301116][ T7583] Register r6 information: slab kmalloc-192 start 8334c3c0 pointer offset 0 size 192 [ 560.302013][ T7583] Register r7 information: 2-page vmalloc region starting at 0xdfba0000 allocated at kernel_clone+0xbc/0x438 [ 560.302483][ T7583] Register r8 information: slab kmalloc-192 start 8334c3c0 pointer offset 0 size 192 [ 560.303026][ T7583] Register r9 information: non-paged memory [ 560.303362][ T7583] Register r10 information: non-slab/vmalloc memory [ 560.303676][ T7583] Register r11 information: 2-page vmalloc region starting at 0xdfba0000 allocated at kernel_clone+0xbc/0x438 [ 560.304254][ T7583] Register r12 information: 2-page vmalloc region starting at 0xdfba0000 allocated at kernel_clone+0xbc/0x438 [ 560.305021][ T7583] Process syz.3.887 (pid: 7583, stack limit = 0xdfba0000) [ 560.305611][ T7583] Stack: (0xdfba1d30 to 0xdfba2000) [ 560.305972][ T7583] 1d20: 824ba458 8334c3c0 00000000 82bd26a0 [ 560.306610][ T7583] 1d40: 81e27988 00000000 dfba1d8c dfba1d58 814490a4 8144d3cc 40946400 00000000 [ 560.307143][ T7583] 1d60: dfba1d7c 20000140 8334c3c0 b5403587 40946400 00000001 00000003 83fd1880 [ 560.307668][ T7583] 1d80: dfba1e4c dfba1d90 814448b0 81448fa8 656d6f63 705f6964 6f707261 00007472 [ 560.308144][ T7583] 1da0: 00000000 00095000 00000002 7fffffff 000084e1 0000002f 00002006 00000006 [ 560.308599][ T7583] 1dc0: 00000008 000a0ffa 00000000 00000100 00000002 00001003 01000004 0000000f [ 560.309170][ T7583] 1de0: 00010000 ffffffa8 7ffbfffd 000001ff 0000ecd0 00000010 0003fffe 00000008 [ 560.309774][ T7583] 1e00: 00000007 0000746f 00000004 00000005 00000408 00000004 00000000 00007ffd [ 560.310303][ T7583] 1e20: 00000000 61141171 00000000 8388d900 8334c3c0 20000140 40946400 00000001 [ 560.310799][ T7583] 1e40: dfba1f14 dfba1e50 81445bd4 814447e8 00000000 61141171 00000000 00000000 [ 560.311322][ T7583] 1e60: 8252e804 dfba1ea4 0000005f 84240b68 00000064 8334c3f0 dfba1ee4 dfba1e88 [ 560.311722][ T7583] 1e80: 807ded8c 807d50bc 00000064 00000001 00000000 dfba1ea4 8335d310 83431b28 [ 560.312205][ T7583] 1ea0: 00006400 0000000b dfba1e98 00000000 00000000 61141171 00000000 8388d900 [ 560.312813][ T7583] 1ec0: 40946400 20000140 20000140 8388d900 00000003 83fd1880 dfba1ef4 dfba1ee8 [ 560.313323][ T7583] 1ee0: 807deec0 61141171 dfba1f14 00000000 8388d901 40946400 20000140 8388d900 [ 560.313959][ T7583] 1f00: 00000003 83fd1880 dfba1fa4 dfba1f18 8059c2ac 8144588c ecac8b10 83fd1880 [ 560.314480][ T7583] 1f20: dfba1f3c dfba1f30 81b058d4 81b057a0 dfba1f54 dfba1f40 8025a4dc 8028c2bc [ 560.314914][ T7583] 1f40: dfba1fb0 40000000 dfba1f84 dfba1f58 80220be0 8025a498 00000000 82a1c33c [ 560.315288][ T7583] 1f60: dfba1fb0 0013e940 ecac8b10 80220b34 00000000 61141171 dfba1fac 00000000 [ 560.315931][ T7583] 1f80: 00000000 00346310 00000036 8020029c 83fd1880 00000036 00000000 dfba1fa8 [ 560.316499][ T7583] 1fa0: 80200060 8059c074 00000000 00000000 00000003 40946400 20000140 00000000 [ 560.317080][ T7583] 1fc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f170dc [ 560.317550][ T7583] 1fe0: 76f16e88 76f16e78 00018e58 001307a0 60000010 00000003 00000000 00000000 [ 560.318040][ T7583] Call trace: [ 560.318322][ T7583] [<8144d3c0>] (parport_attach) from [<814490a4>] (comedi_device_attach+0x108/0x244) [ 560.318757][ T7583] r6:00000000 r5:81e27988 r4:82bd26a0 [ 560.318987][ T7583] [<81448f9c>] (comedi_device_attach) from [<814448b0>] (do_devconfig_ioctl+0xd4/0x21c) [ 560.319455][ T7583] r10:83fd1880 r9:00000003 r8:00000001 r7:40946400 r6:b5403587 r5:8334c3c0 [ 560.319823][ T7583] r4:20000140 [ 560.319984][ T7583] [<814447dc>] (do_devconfig_ioctl) from [<81445bd4>] (comedi_unlocked_ioctl+0x354/0x1db8) [ 560.320449][ T7583] r8:00000001 r7:40946400 r6:20000140 r5:8334c3c0 r4:8388d900 [ 560.320796][ T7583] [<81445880>] (comedi_unlocked_ioctl) from [<8059c2ac>] (sys_ioctl+0x244/0xb5c) [ 560.321193][ T7583] r10:83fd1880 r9:00000003 r8:8388d900 r7:20000140 r6:40946400 r5:8388d901 [ 560.321522][ T7583] r4:00000000 [ 560.321701][ T7583] [<8059c068>] (sys_ioctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 560.322149][ T7583] Exception stack(0xdfba1fa8 to 0xdfba1ff0) [ 560.322445][ T7583] 1fa0: 00000000 00000000 00000003 40946400 20000140 00000000 [ 560.322776][ T7583] 1fc0: 00000000 00000000 00346310 00000036 003462d8 00000000 00000001 76f170dc [ 560.323201][ T7583] 1fe0: 76f16e88 76f16e78 00018e58 001307a0 [ 560.323546][ T7583] r10:00000036 r9:83fd1880 r8:8020029c r7:00000036 r6:00346310 r5:00000000 [ 560.323916][ T7583] r4:00000000 [ 560.324348][ T7583] Code: e5963064 e3a04000 e7f33053 e2433612 (e5c34000) [ 560.326067][ T7583] ---[ end trace 0000000000000000 ]--- SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 560.386649][ T7583] Kernel panic - not syncing: Fatal exception [ 560.389124][ T7583] Rebooting in 86400 seconds.. VM DIAGNOSIS: 01:00:40 Registers: info registers vcpu 0 CPU#0 R00=dddc8080 R01=20000013 R02=000003e8 R03=00001c1d R04=dfc01ea8 R05=dddc80d0 R06=dddc8080 R07=00000000 R08=dddc80ec R09=00000000 R10=00000082 R11=dfc01d6c R12=dfc01d70 R13=dfc01d60 R14=8032be60 R15=81b12e20 PSR=60000013 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00000001 R01=8231c350 R02=00000001 R03=81b061dc R04=00000006 R05=82af7388 R06=dddda3d5 R07=82af7380 R08=83fd1880 R09=82af7388 R10=00000000 R11=dfba1a14 R12=dfba1a18 R13=dfba1a08 R14=80342820 R15=81b061ec PSR=800d0193 N--- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000