last executing test programs: 1m51.876040095s ago: executing program 0 (id=105): r0 = userfaultfd(0x80801) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)={0xaa, 0x190}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x2000006, 0x4200031, r0, 0xffffd000) syz_clone3(&(0x7f0000000340)={0x1000, 0x0, 0x0, 0x0, {0xfffffffc}, 0x0, 0x0, 0x0, 0x0}, 0x58) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x19) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000026000/0x2000)=nil, 0x2000}, 0x4}) 1m51.621926482s ago: executing program 0 (id=106): r0 = socket(0x11, 0x3, 0x0) sendmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1, 0x0, 0x0, 0xc}, 0x0) recvmmsg(r0, &(0x7f0000000400), 0x10, 0x840, &(0x7f0000000440)={0xfffffffffffffff7, 0x401}) 1m51.300371913s ago: executing program 0 (id=107): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) sched_setattr(0x0, &(0x7f0000000280)={0x38, 0x5, 0x8, 0x8001, 0x0, 0x9, 0x0, 0xfffffe0000000001, 0xfa11, 0xffffffff}, 0x0) openat$ttyS3(0xffffffffffffff9c, 0x0, 0x21800, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) fcntl$notify(r2, 0x402, 0x22) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x40000, 0x0) fcntl$notify(r3, 0x402, 0x40000029) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) close_range(r4, 0xffffffffffffffff, 0x0) 1m35.099950543s ago: executing program 0 (id=109): r0 = socket$kcm(0x11, 0x200000000000002, 0x300) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x4, &(0x7f0000000200)=@framed={{0x18, 0x8, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0xf}]}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000d00)=r1, 0x4) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r2, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000040)=ANY=[], 0x14}, 0x1, 0x0, 0x0, 0x4080}, 0xd0) 1m34.971342881s ago: executing program 0 (id=110): sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000000)=@newqdisc={0x8c, 0x24, 0xf0b, 0x0, 0xfffffffe, {0x0, 0x0, 0x12, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6], 0x0, [0x8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0xfffd], [0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}]}}]}, 0x8c}}, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x8400, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40186f40, &(0x7f0000000040)=0x1f) 1m34.610488496s ago: executing program 0 (id=111): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000880), 0xfffffffffffffed1, 0xc2, 0x0) 48.902272671s ago: executing program 32 (id=111): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000000880), 0xfffffffffffffed1, 0xc2, 0x0) 4.680496468s ago: executing program 1 (id=185): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x2f) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='bbr', 0x3) sendto$inet(r0, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) 3.430429161s ago: executing program 1 (id=186): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000580)={0x6, 0x7, 0x9, 0x0, 0xa, '\a\x00'}) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000000)=0x8001) openat$ttyS3(0xffffff9c, &(0x7f0000000140), 0x20040, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) socket$kcm(0xa, 0x7, 0x87) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) 3.14881228s ago: executing program 1 (id=188): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x8000, 0x0, 0x0, 0x7fff0000}]}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) bind$vsock_stream(r1, &(0x7f0000000440)={0x28, 0x0, 0xffffffff}, 0x10) listen(r1, 0x7ff) r2 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r2, &(0x7f0000000080)={0x28, 0x0, 0x2710}, 0x10) socket$vsock_stream(0x28, 0x1, 0x0) munmap(&(0x7f0000001000/0x4000)=nil, 0x4000) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000680)={0x7, "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"}) socket$nl_generic(0x10, 0x3, 0x10) r4 = add_key$user(&(0x7f0000000380), &(0x7f0000000000)={'syz', 0x0}, &(0x7f0000000140)='_', 0x1, 0xfffffffffffffffe) r5 = add_key$user(&(0x7f0000006400), &(0x7f0000006c00)={'syz', 0x3}, &(0x7f0000000600)="3e12d23d346cfdeb1716f738274bc1c03bee4423fa20837e6e86b86592e9be8351aabbd6e24f37d5095f839fa4a3507df4f7526f2440e7988da94ccd868dd8741d1e43eba0b67b516be14a8b51a75bfd611b2d7ae6a21d056c2c5116a416a76b1a03dc55ea62d43c809e0ed6e56163fdab317afd5c34d61436", 0x79, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, 0x0, r5}, 0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000040)={'sha256\x00'}}) keyctl$dh_compute(0x17, &(0x7f0000000100)={0x0, 0x0, r5}, &(0x7f0000000540)=""/22, 0x16, &(0x7f0000000500)={&(0x7f0000000280)={'sha1_mb\x00'}}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'syz_tun\x00'}) ioctl$SYNC_IOC_MERGE(0xffffffffffffffff, 0xc0303e03, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 2.799797723s ago: executing program 1 (id=190): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000500)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_IPTUN_ENCAP_TYPE={0x6, 0xf, 0x300}]}}}]}, 0x3c}}, 0x0) 2.659198882s ago: executing program 1 (id=191): r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1000, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000020c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB=',rootmode=00000000000000000100000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r1, &(0x7f00000021c0)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r1, &(0x7f0000000040)={0x50, 0x0, r2, {0x7, 0x1f, 0xdfffffff, 0x5e490420, 0x4, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88}}, 0x50) syz_fuse_handle_req(r1, &(0x7f000000e3c0)="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dc4e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ba045abcd5dfc67d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000230000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d838aae8c05dd22d0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000209bfd66eea210560000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001354c4b600", 0x2000, &(0x7f00000062c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x20, 0x0, 0x3731, {0x0, 0x7f69ff17f1e1ab77}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0xc5001, 0x104) umount2(0x0, 0xb) close_range(r0, 0xffffffffffffffff, 0x0) 2.288832607s ago: executing program 2 (id=194): r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(des3_ede)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) r4 = accept4(r3, 0x0, 0x0, 0x0) sendmmsg$alg(r4, &(0x7f0000000400)=[{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)="f78d9ca38fff48f3be52163448412ba8", 0xfffffe1a}], 0x1, &(0x7f0000000380)=[@op={0x18}], 0x18}], 0x4924924924924b9, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) setns(r1, 0x24020000) syz_clone(0xb21e0000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.149946057s ago: executing program 2 (id=195): r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0xc, &(0x7f0000000040)=0x8, 0x4) sendmsg$nl_route(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="2800000012000100"/20, @ANYRESDEC=r0], 0x28}, 0x1, 0x0, 0x0, 0x2000c010}, 0x4802) 2.036411464s ago: executing program 2 (id=196): r0 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r1, @ANYBLOB="01000000000000001c0012000c000100626f6e64000000000c0002000800010006"], 0x3c}}, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x1, 0x803, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000006c0)=@newlink={0x3c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4, 0x90646}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bond={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BOND_PRIMARY={0x8, 0xb, r4}]}}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x600}, 0x8080) 1.820231228s ago: executing program 2 (id=197): r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r0, 0xaf01, 0x0) r1 = eventfd(0xffffffff) ioctl$VHOST_SET_LOG_FD(r0, 0x4004af07, &(0x7f0000000240)=r1) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000040)={0x1, r1}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000140)={0x0, 0x0, 0x0, &(0x7f0000000500)=""/67, 0x0, 0x4}) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000000280)={0x1, 0x1, 0x0, &(0x7f00000000c0)=""/87, &(0x7f0000000480)=""/74}) ioctl$VHOST_SET_MEM_TABLE(r0, 0x4008af03, &(0x7f0000000680)) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000000)=0x1) ioctl$VHOST_VDPA_GET_VRING_GROUP(r0, 0xc008af7b, &(0x7f00000002c0)={0x1, 0x4}) 1.681349608s ago: executing program 2 (id=198): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000040)=@newsa={0x180, 0x10, 0x832152701231f605, 0x70bd27, 0x0, {{@in=@loopback, @in6=@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}, 0x4, 0x0, 0x2}, {@in6=@remote, 0x0, 0x6c}, @in=@remote, {0x0, 0x8001000000000001, 0x4}, {}, {0x6, 0x0, 0x20}, 0x3, 0x0, 0xa, 0x4}, [@algo_comp={0x48, 0x3, {{'deflate\x00'}}}, @algo_crypt={0x48, 0x2, {{'salsa20-generic\x00'}}}]}, 0x180}}, 0x40080) 1.580518534s ago: executing program 2 (id=199): socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) io_uring_setup(0x1562, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x12, 0x3, 0x0, &(0x7f0000000240)='syzkaller\x00', 0x80000000, 0xfffffffffffffda2, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x24, &(0x7f0000000000)=0xa, 0x4) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket(0x1e, 0x4, 0x0) setsockopt$packet_tx_ring(r0, 0x10f, 0x87, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r3 = syz_io_uring_setup(0x8d2, &(0x7f00000000c0)={0x0, 0x6c48, 0x400, 0x4, 0x379}, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000240)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r3, 0x47ba, 0x3e82, 0x60, 0x0, 0x0) 0s ago: executing program 1 (id=200): syz_usb_control_io$uac1(0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x44, &(0x7f00000004c0)=ANY=[@ANYRES8, @ANYBLOB="fba210bbb49e8b5f0eb7bec3fd0f19f820d119863f77d616960051961a143900bc9d1026e8ed4d058d7155cfb01237b8b9f2b800fec2264edff060d6aafd030ebd87f262d6ec3960b2360ee45d0f68fdfb876816c01d814430bdf817c993b67360ecf89bebf9874eb8b42cccc8710fdf06ced1a8812e065cc94c48557bf831ed5728546d6715c223498f30b43400", @ANYRESDEC, @ANYRESOCT, @ANYRES8, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'skcipher\x00', 0x0, 0x0, 'pcbc(fcrypt)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000412ff8)="3665a1ab415b7ac7", 0x8) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_io_uring_setup(0x10d, &(0x7f0000000000)={0x0, 0x6bd7}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_SPLICE={0x1e, 0x48, 0x0, @fd, 0x3, {}, 0xa6, 0x3}) io_uring_enter(r1, 0x47f9, 0x1, 0x0, 0x0, 0x0) prctl$PR_SET_IO_FLUSHER(0x43, 0x1) prctl$PR_SET_IO_FLUSHER(0x43, 0x0) r4 = accept(r0, 0x0, 0x0) sendmmsg$alg(r4, 0x0, 0x0, 0x0) recvmsg(r4, &(0x7f000000b680)={0x0, 0x10400004, &(0x7f000000b600)=[{&(0x7f000000b4c0)=""/5, 0x4}, {&(0x7f000000b500)=""/153, 0xfb59}], 0x2}, 0x0) syz_open_dev$I2C(&(0x7f0000000000), 0x1, 0x402) kernel console output (not intermixed with test programs): [ 53.790349][ T29] audit: type=1400 audit(53.700:56): avc: denied { read write } for pid=3087 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 53.792039][ T29] audit: type=1400 audit(53.700:57): avc: denied { open } for pid=3087 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:59232' (ED25519) to the list of known hosts. [ 70.766867][ T29] audit: type=1400 audit(70.670:58): avc: denied { name_bind } for pid=3090 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 72.136577][ T29] audit: type=1400 audit(72.030:59): avc: denied { execute } for pid=3091 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 72.163134][ T29] audit: type=1400 audit(72.050:60): avc: denied { execute_no_trans } for pid=3091 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 76.080480][ T29] audit: type=1400 audit(75.990:61): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 76.084647][ T29] audit: type=1400 audit(75.990:62): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 76.097659][ T3091] cgroup: Unknown subsys name 'net' [ 76.103255][ T29] audit: type=1400 audit(76.010:63): avc: denied { unmount } for pid=3091 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 76.229848][ T3091] cgroup: Unknown subsys name 'cpuset' [ 76.235203][ T3091] cgroup: Unknown subsys name 'hugetlb' [ 76.238384][ T3091] cgroup: Unknown subsys name 'rlimit' [ 76.497335][ T29] audit: type=1400 audit(76.400:64): avc: denied { setattr } for pid=3091 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 76.499741][ T29] audit: type=1400 audit(76.410:65): avc: denied { mounton } for pid=3091 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 76.505707][ T29] audit: type=1400 audit(76.410:66): avc: denied { mount } for pid=3091 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 76.722842][ T3093] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 76.724765][ T29] audit: type=1400 audit(76.630:67): avc: denied { relabelto } for pid=3093 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.730862][ T29] audit: type=1400 audit(76.640:68): avc: denied { write } for pid=3093 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 76.778512][ T29] audit: type=1400 audit(76.690:69): avc: denied { read } for pid=3091 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 76.780586][ T29] audit: type=1400 audit(76.690:70): avc: denied { open } for pid=3091 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 85.980557][ T3091] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 88.412445][ T29] audit: type=1400 audit(88.320:71): avc: denied { execmem } for pid=3094 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 88.485485][ T29] audit: type=1400 audit(88.390:72): avc: denied { read } for pid=3096 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 88.496796][ T29] audit: type=1400 audit(88.400:73): avc: denied { open } for pid=3096 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 88.498970][ T29] audit: type=1400 audit(88.400:74): avc: denied { mounton } for pid=3096 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 88.527870][ T29] audit: type=1400 audit(88.440:75): avc: denied { module_request } for pid=3097 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 88.529664][ T29] audit: type=1400 audit(88.440:76): avc: denied { module_request } for pid=3096 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 88.610239][ T29] audit: type=1400 audit(88.520:77): avc: denied { sys_module } for pid=3097 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 89.225269][ T29] audit: type=1400 audit(89.130:78): avc: denied { ioctl } for pid=3097 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 90.224359][ T3096] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 90.238782][ T3096] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 90.353548][ T3097] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 90.362075][ T3097] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 91.223900][ T3096] hsr_slave_0: entered promiscuous mode [ 91.231191][ T3096] hsr_slave_1: entered promiscuous mode [ 91.318037][ T3097] hsr_slave_0: entered promiscuous mode [ 91.320901][ T3097] hsr_slave_1: entered promiscuous mode [ 91.322892][ T3097] debugfs: 'hsr0' already exists in 'hsr' [ 91.325093][ T3097] Cannot create hsr debugfs directory [ 91.678327][ T29] audit: type=1400 audit(91.590:79): avc: denied { create } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 91.680082][ T29] audit: type=1400 audit(91.590:80): avc: denied { write } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 91.689077][ T3097] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 91.700349][ T3097] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 91.714828][ T3097] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 91.732322][ T3097] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 91.803490][ T3096] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 91.812709][ T3096] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 91.827380][ T3096] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 91.832549][ T3096] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 92.453085][ T3097] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.589442][ T3096] 8021q: adding VLAN 0 to HW filter on device bond0 [ 93.261085][ T3097] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 93.261795][ T3097] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 95.061878][ T3097] veth0_vlan: entered promiscuous mode [ 95.092467][ T3097] veth1_vlan: entered promiscuous mode [ 95.172628][ T3097] veth0_macvtap: entered promiscuous mode [ 95.185275][ T3097] veth1_macvtap: entered promiscuous mode [ 95.289918][ T1383] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.290804][ T1383] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.290929][ T1383] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.291012][ T1383] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.394245][ T3096] veth0_vlan: entered promiscuous mode [ 95.438336][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 95.439310][ T29] audit: type=1400 audit(95.350:82): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 95.450364][ T29] audit: type=1400 audit(95.360:83): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.wTgFna/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 95.461094][ T29] audit: type=1400 audit(95.370:84): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 95.476713][ T29] audit: type=1400 audit(95.380:85): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.wTgFna/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 95.484317][ T29] audit: type=1400 audit(95.390:86): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/syzkaller.wTgFna/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=3094 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 95.495957][ T3096] veth1_vlan: entered promiscuous mode [ 95.505818][ T29] audit: type=1400 audit(95.410:87): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 95.518048][ T29] audit: type=1400 audit(95.420:88): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 95.522355][ T29] audit: type=1400 audit(95.430:89): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="gadgetfs" ino=3095 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 95.535186][ T29] audit: type=1400 audit(95.440:90): avc: denied { mount } for pid=3097 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 95.540143][ T29] audit: type=1400 audit(95.450:91): avc: denied { mounton } for pid=3097 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 95.615842][ T3097] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 95.630504][ T3096] veth0_macvtap: entered promiscuous mode [ 95.644613][ T3096] veth1_macvtap: entered promiscuous mode [ 95.799974][ T31] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.800445][ T31] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.802188][ T31] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 95.802560][ T31] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 101.763574][ T29] kauditd_printk_skb: 18 callbacks suppressed [ 101.765253][ T29] audit: type=1400 audit(101.670:110): avc: denied { create } for pid=3721 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 101.773459][ T29] audit: type=1400 audit(101.680:111): avc: denied { write } for pid=3721 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 101.777118][ T29] audit: type=1400 audit(101.690:112): avc: denied { nlmsg_write } for pid=3721 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 102.047083][ T29] audit: type=1400 audit(101.950:113): avc: denied { map_create } for pid=3725 comm="syz.0.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 105.011981][ T3733] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 105.020589][ T29] audit: type=1400 audit(104.930:114): avc: denied { perfmon } for pid=3732 comm="syz.0.12" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 108.098895][ T29] audit: type=1400 audit(108.010:115): avc: denied { setopt } for pid=3732 comm="syz.0.12" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 110.919147][ T29] audit: type=1400 audit(110.830:116): avc: denied { write } for pid=3739 comm="syz.1.14" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 111.059569][ T29] audit: type=1400 audit(110.970:117): avc: denied { append } for pid=3742 comm="syz.1.15" name="sequencer" dev="devtmpfs" ino=721 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 111.598358][ T29] audit: type=1400 audit(111.510:118): avc: denied { name_bind } for pid=3742 comm="syz.1.15" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 111.600630][ T29] audit: type=1400 audit(111.510:119): avc: denied { node_bind } for pid=3742 comm="syz.1.15" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 111.882474][ T29] audit: type=1400 audit(111.790:120): avc: denied { watch watch_reads } for pid=3748 comm="syz.1.17" path="/8" dev="tmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 112.215006][ T29] audit: type=1400 audit(112.120:121): avc: denied { map_read map_write } for pid=3750 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 112.353337][ T29] audit: type=1400 audit(112.260:122): avc: denied { prog_run } for pid=3750 comm="syz.1.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 117.293948][ T3755] netlink: 12 bytes leftover after parsing attributes in process `syz.1.19'. [ 124.044103][ T29] audit: type=1400 audit(123.950:123): avc: denied { read write } for pid=3763 comm="syz.0.23" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 124.057074][ T29] audit: type=1400 audit(123.950:124): avc: denied { open } for pid=3763 comm="syz.0.23" path="/11/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=chr_file permissive=1 [ 124.757383][ T29] audit: type=1400 audit(124.650:125): avc: denied { unmount } for pid=3096 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 129.233436][ T29] audit: type=1400 audit(129.140:126): avc: denied { ioctl } for pid=3771 comm="syz.0.24" path="socket:[2415]" dev="sockfs" ino=2415 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 142.302618][ T29] audit: type=1400 audit(142.210:127): avc: denied { create } for pid=3786 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 142.312662][ T29] audit: type=1400 audit(142.220:128): avc: denied { write } for pid=3786 comm="syz.0.28" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 142.327315][ T3787] netlink: 32 bytes leftover after parsing attributes in process `syz.0.28'. [ 142.725890][ T29] audit: type=1400 audit(142.630:129): avc: denied { allowed } for pid=3793 comm="syz.0.31" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 142.733032][ T29] audit: type=1400 audit(142.640:130): avc: denied { create } for pid=3793 comm="syz.0.31" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 142.738869][ T29] audit: type=1400 audit(142.640:131): avc: denied { map } for pid=3793 comm="syz.0.31" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3268 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 142.743956][ T29] audit: type=1400 audit(142.640:132): avc: denied { read write } for pid=3793 comm="syz.0.31" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3268 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 143.042294][ T3799] netlink: 8 bytes leftover after parsing attributes in process `syz.0.33'. [ 143.418327][ T29] audit: type=1400 audit(143.330:133): avc: denied { create } for pid=3810 comm="syz.0.36" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 143.660243][ T29] audit: type=1400 audit(143.570:134): avc: denied { create } for pid=3815 comm="syz.0.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 143.662668][ T29] audit: type=1400 audit(143.570:135): avc: denied { setopt } for pid=3815 comm="syz.0.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 152.226342][ C1] hrtimer: interrupt took 7696256 ns [ 152.289105][ T29] audit: type=1400 audit(152.200:136): avc: denied { read } for pid=3834 comm="syz.1.46" name="binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 152.292881][ T29] audit: type=1400 audit(152.200:137): avc: denied { open } for pid=3834 comm="syz.1.46" path="/19/binderfs2/binder0" dev="binder" ino=10 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 152.353755][ T29] audit: type=1400 audit(152.260:138): avc: denied { unmount } for pid=3097 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 158.387105][ T29] audit: type=1400 audit(158.290:139): avc: denied { create } for pid=3836 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 158.397165][ T29] audit: type=1400 audit(158.300:140): avc: denied { setopt } for pid=3836 comm="syz.1.47" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 163.478608][ T23] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 163.667198][ T23] usb 1-1: Using ep0 maxpacket: 32 [ 163.686669][ T23] usb 1-1: config 0 has an invalid interface number: 89 but max is 0 [ 163.688325][ T23] usb 1-1: config 0 has no interface number 0 [ 163.689479][ T23] usb 1-1: config 0 interface 89 has no altsetting 0 [ 163.711162][ T23] usb 1-1: New USB device found, idVendor=0ccd, idProduct=10af, bcdDevice=38.4e [ 163.711524][ T23] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 163.711958][ T23] usb 1-1: Product: syz [ 163.712038][ T23] usb 1-1: Manufacturer: syz [ 163.712075][ T23] usb 1-1: SerialNumber: syz [ 163.731336][ T23] usb 1-1: config 0 descriptor?? [ 173.975297][ T10] usb 1-1: USB disconnect, device number 2 [ 174.165457][ T29] audit: type=1326 audit(174.070:141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3864 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127fac code=0x7ffc0000 [ 174.179124][ T29] audit: type=1326 audit(174.090:142): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3864 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef3f8 code=0x7ffc0000 [ 174.188519][ T29] audit: type=1326 audit(174.090:143): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3864 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127fac code=0x7ffc0000 [ 174.192824][ T29] audit: type=1326 audit(174.100:144): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3864 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef3f8 code=0x7ffc0000 [ 174.198953][ T29] audit: type=1326 audit(174.110:145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3864 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 174.204196][ T29] audit: type=1326 audit(174.110:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3864 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127fac code=0x7ffc0000 [ 174.208126][ T29] audit: type=1326 audit(174.120:147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3864 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef3f8 code=0x7ffc0000 [ 174.210751][ T29] audit: type=1326 audit(174.120:148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3864 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127fac code=0x7ffc0000 [ 174.214414][ T29] audit: type=1326 audit(174.120:149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3864 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=173 compat=0 ip=0xef3f8 code=0x7ffc0000 [ 174.221481][ T29] audit: type=1326 audit(174.120:150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3864 comm="syz.0.52" exe="/syz-executor" sig=0 arch=40000028 syscall=20 compat=0 ip=0x127fac code=0x7ffc0000 [ 191.000920][ T3881] ksmbd: Daemon and kernel module version mismatch. ksmbd: 0, kernel module: 1. User-space ksmbd should terminate. [ 191.386971][ T29] kauditd_printk_skb: 8 callbacks suppressed [ 191.387227][ T29] audit: type=1400 audit(191.290:159): avc: denied { create } for pid=3888 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 191.713462][ T3894] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 191.871066][ T29] audit: type=1400 audit(191.780:160): avc: denied { name_bind } for pid=3895 comm="syz.1.64" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 196.717100][ T29] audit: type=1326 audit(196.600:161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 196.727118][ T29] audit: type=1326 audit(196.600:162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 196.729129][ T29] audit: type=1326 audit(196.600:163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.70" exe="/syz-executor" sig=0 arch=40000028 syscall=170 compat=0 ip=0x132320 code=0x7ffc0000 [ 196.730834][ T29] audit: type=1326 audit(196.600:164): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 196.732588][ T29] audit: type=1326 audit(196.600:165): auid=4294967295 uid=0 gid=60928 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3915 comm="syz.0.70" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 196.944764][ T29] audit: type=1400 audit(196.850:166): avc: denied { ioctl } for pid=3917 comm="syz.0.71" path="/dev/binderfs/binder0" dev="binder" ino=7 ioctlcmd=0x620d scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 196.950412][ T29] audit: type=1400 audit(196.850:167): avc: denied { set_context_mgr } for pid=3917 comm="syz.0.71" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 197.004748][ T29] audit: type=1400 audit(196.910:168): avc: denied { write } for pid=3917 comm="syz.0.71" name="binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 197.012650][ T29] audit: type=1400 audit(196.920:169): avc: denied { map } for pid=3917 comm="syz.0.71" path="/dev/binderfs/binder0" dev="binder" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 197.015647][ T3918] binder: BINDER_SET_CONTEXT_MGR already set [ 197.020079][ T3918] binder: 3917:3918 ioctl 4018620d 20000040 returned -16 [ 205.541805][ T29] audit: type=1400 audit(205.450:170): avc: denied { create } for pid=3929 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 205.617992][ T29] audit: type=1400 audit(205.530:171): avc: denied { bind } for pid=3929 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 205.708890][ T29] audit: type=1400 audit(205.620:172): avc: denied { accept } for pid=3929 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 205.717640][ T29] audit: type=1400 audit(205.620:173): avc: denied { write } for pid=3929 comm="syz.1.75" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 214.487928][ T3715] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 214.636805][ T3715] usb 1-1: Using ep0 maxpacket: 32 [ 214.661721][ T3715] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 214.662191][ T3715] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 214.663821][ T3715] usb 1-1: New USB device found, idVendor=0403, idProduct=6030, bcdDevice= 0.00 [ 214.663892][ T3715] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 214.680039][ T3715] usb 1-1: config 0 descriptor?? [ 215.175417][ T3715] ft260 0003:0403:6030.0001: unknown main item tag 0x7 [ 215.385714][ T3715] ft260 0003:0403:6030.0001: chip code: 0000 0000 [ 215.824877][ T3715] usb 1-1: USB disconnect, device number 3 [ 215.983768][ T29] audit: type=1400 audit(215.890:174): avc: denied { accept } for pid=3960 comm="syz.0.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=unix_dgram_socket permissive=1 [ 216.774809][ T29] audit: type=1326 audit(216.680:175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3963 comm="syz.1.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.781338][ T29] audit: type=1326 audit(216.690:176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3963 comm="syz.1.81" exe="/syz-executor" sig=0 arch=40000028 syscall=427 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.783818][ T29] audit: type=1326 audit(216.690:177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3963 comm="syz.1.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.786356][ T29] audit: type=1326 audit(216.690:178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3963 comm="syz.1.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.791036][ T29] audit: type=1326 audit(216.700:179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3963 comm="syz.1.81" exe="/syz-executor" sig=0 arch=40000028 syscall=80 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.793684][ T29] audit: type=1326 audit(216.700:180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3963 comm="syz.1.81" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 220.847362][ T29] audit: type=1400 audit(220.740:181): avc: denied { setopt } for pid=3973 comm="syz.1.85" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 225.878318][ T3994] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 226.041888][ T3994] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 226.152483][ T3994] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 226.287794][ T3994] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 226.441499][ T1364] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 226.467872][ T1132] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 226.554404][ T52] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 226.554907][ T52] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 227.529849][ T29] audit: type=1400 audit(227.440:182): avc: denied { create } for pid=4020 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 227.543951][ T29] audit: type=1400 audit(227.450:183): avc: denied { getopt } for pid=4020 comm="syz.1.98" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 227.729975][ T29] audit: type=1400 audit(227.640:184): avc: denied { create } for pid=4022 comm="syz.1.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 227.732371][ T29] audit: type=1400 audit(227.640:185): avc: denied { setopt } for pid=4022 comm="syz.1.99" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 228.797153][ T29] audit: type=1400 audit(228.700:186): avc: denied { block_suspend } for pid=4026 comm="syz.1.101" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 231.618491][ T29] audit: type=1400 audit(231.530:187): avc: denied { setopt } for pid=4038 comm="syz.1.102" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 232.664489][ T4047] A link change request failed with some changes committed already. Interface hsr0 may have been left with an inconsistent configuration, please check. [ 232.831683][ T29] audit: type=1400 audit(232.730:188): avc: denied { create } for pid=4048 comm="syz.1.104" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 234.362289][ T29] audit: type=1400 audit(234.270:189): avc: denied { name_bind } for pid=4048 comm="syz.1.104" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 238.130284][ T29] audit: type=1400 audit(238.040:190): avc: denied { ioctl } for pid=4054 comm="syz.0.105" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=3641 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 238.479866][ T29] audit: type=1400 audit(238.360:191): avc: denied { create } for pid=4056 comm="syz.0.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 238.509204][ T29] audit: type=1400 audit(238.420:192): avc: denied { write } for pid=4056 comm="syz.0.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 254.737865][ T29] audit: type=1400 audit(254.650:193): avc: denied { write } for pid=4063 comm="syz.1.108" name="anycast6" dev="proc" ino=4026532702 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 254.798184][ T29] audit: type=1400 audit(254.710:194): avc: denied { setopt } for pid=4067 comm="syz.0.109" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 255.122999][ T4070] ubi31: attaching mtd0 [ 255.136686][ T4070] ubi31 error: ubi_attach_mtd_dev: bad VID header (524288) or data offsets (524352) [ 265.766613][ T29] audit: type=1400 audit(265.670:195): avc: denied { create } for pid=4077 comm="syz.1.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 266.826887][ T29] audit: type=1400 audit(266.730:196): avc: denied { connect } for pid=4085 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 266.854649][ T29] audit: type=1400 audit(266.760:197): avc: denied { write } for pid=4085 comm="syz.1.117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 269.228431][ T29] audit: type=1400 audit(269.140:198): avc: denied { create } for pid=4090 comm="syz.1.119" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 269.532352][ T29] audit: type=1400 audit(269.440:199): avc: denied { map } for pid=4096 comm="syz.1.120" path="/dev/dsp" dev="devtmpfs" ino=727 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 277.502700][ T29] audit: type=1400 audit(277.410:200): avc: denied { bind } for pid=4102 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 277.512882][ T29] audit: type=1400 audit(277.420:201): avc: denied { bind } for pid=4102 comm="syz.1.122" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 277.513292][ T29] audit: type=1400 audit(277.420:202): avc: denied { name_bind } for pid=4102 comm="syz.1.122" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 277.513372][ T29] audit: type=1400 audit(277.420:203): avc: denied { node_bind } for pid=4102 comm="syz.1.122" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 279.066933][ T4019] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 279.217304][ T4019] usb 2-1: Using ep0 maxpacket: 32 [ 279.235940][ T4019] usb 2-1: config 0 has an invalid interface number: 132 but max is 0 [ 279.238081][ T4019] usb 2-1: config 0 has no interface number 0 [ 279.238910][ T4019] usb 2-1: config 0 interface 132 altsetting 0 endpoint 0x82 has invalid wMaxPacketSize 0 [ 279.261551][ T4019] usb 2-1: New USB device found, idVendor=0413, idProduct=6023, bcdDevice=ec.e5 [ 279.263208][ T4019] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 279.264893][ T4019] usb 2-1: Product: syz [ 279.265569][ T4019] usb 2-1: Manufacturer: syz [ 279.267472][ T4019] usb 2-1: SerialNumber: syz [ 279.273996][ T4019] usb 2-1: config 0 descriptor?? [ 289.505205][ T23] usb 2-1: USB disconnect, device number 2 [ 289.644490][ T4133] Zero length message leads to an empty skb [ 299.655751][ T29] audit: type=1400 audit(299.560:204): avc: denied { read } for pid=4155 comm="syz.1.134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 303.288077][ T4165] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 303.320885][ T4165] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.350452][ T4165] hsr_slave_0: entered promiscuous mode [ 304.358414][ T4165] hsr_slave_1: entered promiscuous mode [ 304.360403][ T4165] debugfs: 'hsr0' already exists in 'hsr' [ 304.361359][ T4165] Cannot create hsr debugfs directory [ 304.742956][ T4165] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 304.754752][ T4165] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 304.763890][ T4165] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 304.773471][ T4165] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 305.623002][ T4165] 8021q: adding VLAN 0 to HW filter on device bond0 [ 308.519863][ T4165] veth0_vlan: entered promiscuous mode [ 308.549397][ T4165] veth1_vlan: entered promiscuous mode [ 308.653314][ T4165] veth0_macvtap: entered promiscuous mode [ 308.670860][ T4165] veth1_macvtap: entered promiscuous mode [ 308.767206][ T1383] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 308.767609][ T1383] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 308.767747][ T1383] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 308.767812][ T1383] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 310.497797][ T29] audit: type=1400 audit(310.400:205): avc: denied { read } for pid=4497 comm="syz.2.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 312.805668][ T29] audit: type=1400 audit(312.710:206): avc: denied { call } for pid=4506 comm="syz.2.151" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=binder permissive=1 [ 313.349452][ T4508] binder_alloc: 4506: binder_alloc_buf, no vma [ 317.643926][ T31] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 317.737657][ T31] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 317.832656][ T31] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 317.971886][ T31] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 318.671330][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 318.695877][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 318.708771][ T31] bond0 (unregistering): Released all slaves [ 318.827420][ T31] hsr_slave_0: left promiscuous mode [ 318.832153][ T31] hsr_slave_1: left promiscuous mode [ 318.858393][ T31] veth1_macvtap: left promiscuous mode [ 318.859957][ T31] veth0_macvtap: left promiscuous mode [ 318.862048][ T31] veth1_vlan: left promiscuous mode [ 318.863139][ T31] veth0_vlan: left promiscuous mode [ 319.373500][ T4550] faux_driver vkms: [drm] Unknown color mode 6; guessing buffer size. [ 331.769275][ T4053] usb 2-1: new full-speed USB device number 3 using dummy_hcd [ 331.946405][ T4053] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xF3, changing to 0x83 [ 331.947866][ T4053] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x83 has an invalid bInterval 0, changing to 4 [ 331.962786][ T4053] usb 2-1: New USB device found, idVendor=2040, idProduct=0264, bcdDevice=4e.d1 [ 331.964321][ T4053] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 331.965222][ T4053] usb 2-1: Product: syz [ 331.966513][ T4053] usb 2-1: Manufacturer: syz [ 331.967313][ T4053] usb 2-1: SerialNumber: syz [ 331.972950][ T4053] usb 2-1: config 0 descriptor?? [ 332.993976][ T29] audit: type=1400 audit(332.900:207): avc: denied { create } for pid=4651 comm="syz.2.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 333.008980][ T29] audit: type=1400 audit(332.920:208): avc: denied { write } for pid=4651 comm="syz.2.178" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 344.768975][ T2884] usb 2-1: USB disconnect, device number 3 [ 346.758336][ T4710] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 346.761651][ T4710] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 346.764570][ T29] audit: type=1400 audit(346.670:209): avc: denied { create } for pid=4709 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 346.771500][ T29] audit: type=1400 audit(346.680:210): avc: denied { bind } for pid=4709 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 346.775022][ T29] audit: type=1400 audit(346.680:211): avc: denied { listen } for pid=4709 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 346.783792][ T29] audit: type=1400 audit(346.690:212): avc: denied { connect } for pid=4709 comm="syz.1.188" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 346.987905][ T4711] could not allocate digest TFM handle sha1_mb [ 347.201032][ T29] audit: type=1400 audit(347.110:213): avc: denied { execute } for pid=4716 comm="syz.2.189" path="/33/cpu.stat" dev="tmpfs" ino=185 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 347.285769][ T29] audit: type=1400 audit(347.190:214): avc: denied { mounton } for pid=4720 comm="syz.1.191" path="/110/file0" dev="tmpfs" ino=573 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=fifo_file permissive=1 [ 347.394825][ T4724] netlink: 4 bytes leftover after parsing attributes in process `syz.2.192'. [ 347.497192][ T4727] netlink: 28 bytes leftover after parsing attributes in process `syz.2.193'. [ 347.609697][ T29] audit: type=1400 audit(347.520:215): avc: denied { create } for pid=4728 comm="syz.2.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 347.620288][ T29] audit: type=1400 audit(347.530:216): avc: denied { sys_admin } for pid=4728 comm="syz.2.194" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 347.839804][ T4734] netlink: 'syz.2.196': attribute type 1 has an invalid length. [ 347.905630][ T4734] 8021q: adding VLAN 0 to HW filter on device bond1 [ 347.948508][ T4734] bond1: entered allmulticast mode [ 350.553862][ T4781] ------------[ cut here ]------------ [ 350.554428][ T4781] WARNING: mm/highmem.c:622 at kunmap_local_indexed+0x294/0x2e8, CPU#1: syz.1.200/4781 [ 350.570173][ T4781] Modules linked in: [ 350.572148][ T4781] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 350.573326][ T4781] CPU: 1 UID: 0 PID: 4781 Comm: syz.1.200 Not tainted syzkaller #0 PREEMPT [ 350.573806][ T4781] Hardware name: ARM-Versatile Express [ 350.574332][ T4781] Call trace: [ 350.574786][ T4781] [<80201a74>] (dump_backtrace) from [<80201b70>] (show_stack+0x18/0x1c) [ 350.575458][ T4781] r7:82283ac4 r6:838f9800 r5:00000000 r4:82295878 [ 350.575900][ T4781] [<80201b58>] (show_stack) from [<8021ee18>] (dump_stack_lvl+0x54/0x7c) [ 350.576474][ T4781] [<8021edc4>] (dump_stack_lvl) from [<8021ee58>] (dump_stack+0x18/0x1c) [ 350.576999][ T4781] r5:00000000 r4:82a7bd14 [ 350.577228][ T4781] [<8021ee40>] (dump_stack) from [<80202648>] (vpanic+0xe0/0x2e8) [ 350.579235][ T4781] [<80202568>] (vpanic) from [<80202884>] (trace_suspend_resume+0x0/0xd8) [ 350.579668][ T4781] r7:804d0480 [ 350.583106][ T4781] [<80202850>] (panic) from [<802520b0>] (get_taint+0x0/0x1c) [ 350.586639][ T4781] r3:8280c704 r2:00000001 r1:8227c02c r0:82283ac4 [ 350.587102][ T4781] [<80252038>] (check_panic_on_warn) from [<80252228>] (__warn+0x94/0x1a4) [ 350.587513][ T4781] [<80252194>] (__warn) from [<802524b0>] (warn_slowpath_fmt+0x178/0x1f4) [ 350.587925][ T4781] r8:00000009 r7:822b04e0 r6:ea695d34 r5:838f9800 r4:00000000 [ 350.588200][ T4781] [<8025233c>] (warn_slowpath_fmt) from [<804d0480>] (kunmap_local_indexed+0x294/0x2e8) [ 350.588685][ T4781] r10:8280ca28 r9:ea695e68 r8:00200000 r7:ffedd000 r6:00000001 r5:838f9800 [ 350.589029][ T4781] r4:ffedd000 [ 350.589205][ T4781] [<804d01ec>] (kunmap_local_indexed) from [<80534e58>] (break_ksm_pmd_entry+0x168/0x270) [ 350.589664][ T4781] r7:ffedd000 r6:00200000 r5:00000000 r4:00000000 [ 350.590051][ T4781] [<80534cf0>] (break_ksm_pmd_entry) from [<804e9f0c>] (walk_pgd_range+0x3dc/0x63c) [ 350.590521][ T4781] r10:81c1f394 r9:001ee000 r8:ea695e68 r7:80534cf0 r6:85d22000 r5:00200000 [ 350.590845][ T4781] r4:002e8000 [ 350.591001][ T4781] [<804e9b30>] (walk_pgd_range) from [<804ea1b0>] (__walk_page_range+0x44/0x64) [ 350.591408][ T4781] r10:00000000 r9:838f9800 r8:81c1f394 r7:002e8000 r6:001ee000 r5:ea695e68 [ 350.591891][ T4781] r4:84f70e80 [ 350.592058][ T4781] [<804ea16c>] (__walk_page_range) from [<804ea894>] (walk_page_range_vma_unsafe+0xb4/0x24c) [ 350.592494][ T4781] r9:838f9800 r8:00000000 r7:81c1f394 r6:002e8000 r5:001ee000 r4:84f70e80 [ 350.592821][ T4781] [<804ea7e0>] (walk_page_range_vma_unsafe) from [<804eaa58>] (walk_page_range_vma+0x2c/0x34) [ 350.593247][ T4781] r7:ea695ecc r6:002e8000 r5:81c1f394 r4:84f70e80 [ 350.593517][ T4781] [<804eaa2c>] (walk_page_range_vma) from [<80533c9c>] (break_ksm+0x5c/0x9c) [ 350.593886][ T4781] [<80533c40>] (break_ksm) from [<80534914>] (ksm_del_vmas+0x7c/0x108) [ 350.594228][ T4781] r7:00000000 r6:00000000 r5:00000043 r4:84f70e80 [ 350.594486][ T4781] [<80534898>] (ksm_del_vmas) from [<80539368>] (ksm_disable_merge_any+0x2c/0x54) [ 350.594862][ T4781] r4:845be940 [ 350.595035][ T4781] [<8053933c>] (ksm_disable_merge_any) from [<802705f8>] (sys_prctl+0xa14/0xb8c) [ 350.595500][ T4781] r5:00000043 r4:845be940 [ 350.595751][ T4781] [<8026fbe4>] (sys_prctl) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 350.596411][ T4781] Exception stack(0xea695fa8 to 0xea695ff0) [ 350.596988][ T4781] 5fa0: 00000000 00000000 00000043 00000000 00000000 00000000 [ 350.597406][ T4781] 5fc0: 00000000 00000000 0031630c 000000ac 00300000 00000000 00006364 76f370bc [ 350.597784][ T4781] 5fe0: 76f36ec0 76f36eb0 0001929c 00132320 [ 350.598197][ T4781] r10:000000ac r9:838f9800 r8:8020029c r7:000000ac r6:0031630c r5:00000000 [ 350.598764][ T4781] r4:00000000 [ 350.602868][ T4781] Rebooting in 86400 seconds..