last executing test programs: 24.275840612s ago: executing program 4 (id=1357): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000100000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) io_pgetevents(0x0, 0x721, 0x0, 0x0, 0x0, 0x0) munlock(&(0x7f0000ff0000/0xd000)=nil, 0xd000) 23.946783081s ago: executing program 4 (id=1360): r0 = syz_io_uring_setup(0x24fe, &(0x7f0000000300)={0x0, 0xf36e, 0x10100}, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) sendmsg$IPSET_CMD_TYPE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='8'], 0x38}}, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_FALLOCATE={0x11, 0x10, 0x0, @fd_index=0x8, 0xfff, 0x0, 0x6, 0x0, 0x1}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 23.615491345s ago: executing program 4 (id=1363): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) ioperm(0x8, 0x7, 0x1) 23.272067719s ago: executing program 4 (id=1366): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000c40)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x2901090, 0x0) chroot(&(0x7f0000000300)='./file0/../file0/../file0/../file0\x00') mount(0x0, &(0x7f0000000d40)='./file0/../file0/../file0\x00', &(0x7f00000002c0)='sysfs\x00', 0x0, 0x0) pivot_root(0x0, &(0x7f00000001c0)='./file0/../file0/../file0\x00') syz_open_dev$tty1(0xc, 0x4, 0x2) 22.995391081s ago: executing program 4 (id=1370): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$key(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x18}}, 0x0) io_setup(0x30, &(0x7f0000000600)=0x0) r1 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000002740), 0x101002) io_submit(r0, 0x1, &(0x7f0000000180)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f00000000c0)="01", 0x2024}]) 22.485418782s ago: executing program 4 (id=1373): sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020e000010000000000000000004830008001200000001000000ff000000400000001ea0abff7f00000000000000d41f9ab9000100700000ebdf000008000000c4fc0000100000000000e2ffff1c004f030006000020"], 0x80}}, 0x4814) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x8c, 0x24, 0xf0b, 0x70bd2b, 0x10004, {0x0, 0x0, 0x12, 0x0, {0x0, 0x4}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x10, 0x0, 0x0, 0xd, 0x0, 0x8, 0x2, 0x4, 0x0, 0x1, 0xff, 0x0, 0x0, 0x3], 0x0, [0x8, 0x4, 0x2, 0x0, 0x8, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xff, 0x1ff], [0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffff]}}]}}]}, 0x8c}}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x208, 0x98, 0x8, 0xfa04, 0x98, 0x6c02, 0x1e0, 0x194, 0x194, 0x1e0, 0x194, 0x3, 0x0, {[{{@ip={@broadcast, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'veth0_virt_wifi\x00', {}, {}, 0x6}, 0x0, 0x70, 0x98, 0x0, {0x0, 0x74020000}}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@multicast2, @dev, 0x0, 0x0, '\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x268) 22.212310056s ago: executing program 32 (id=1373): sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="020e000010000000000000000004830008001200000001000000ff000000400000001ea0abff7f00000000000000d41f9ab9000100700000ebdf000008000000c4fc0000100000000000e2ffff1c004f030006000020"], 0x80}}, 0x4814) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000001c0)=@newqdisc={0x8c, 0x24, 0xf0b, 0x70bd2b, 0x10004, {0x0, 0x0, 0x12, 0x0, {0x0, 0x4}, {0xffff, 0xffff}, {0x2}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x10, 0x0, 0x0, 0xd, 0x0, 0x8, 0x2, 0x4, 0x0, 0x1, 0xff, 0x0, 0x0, 0x3], 0x0, [0x8, 0x4, 0x2, 0x0, 0x8, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xff, 0x1ff], [0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x7, 0x0, 0x0, 0x0, 0xffff]}}]}}]}, 0x8c}}, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x12, r1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x208, 0x98, 0x8, 0xfa04, 0x98, 0x6c02, 0x1e0, 0x194, 0x194, 0x1e0, 0x194, 0x3, 0x0, {[{{@ip={@broadcast, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'veth0_virt_wifi\x00', {}, {}, 0x6}, 0x0, 0x70, 0x98, 0x0, {0x0, 0x74020000}}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@multicast2, @dev, 0x0, 0x0, '\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x268) 19.611320723s ago: executing program 2 (id=1390): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) io_setup(0x400, &(0x7f0000001080)=0x0) io_submit(r1, 0x20000029, &(0x7f0000000180)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000004c0)={0x10000000}) shutdown(r0, 0x0) 19.241305006s ago: executing program 2 (id=1393): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x2, 0xc}}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000480)=ANY=[], 0x20) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat(0xffffffffffffff9c, 0x0, 0x40, 0x0) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000380)={0x1, 0x10, 0xfa00, {&(0x7f0000000300), r1}}, 0x18) 17.894664857s ago: executing program 2 (id=1397): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001300)=@newtfilter={0x3c, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0x3}, {}, {0x7}}, [@filter_kind_options=@f_route={{0xa}, {0xc, 0x2, [@TCA_ROUTE4_FROM={0x8, 0x3, 0x92}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x44}, 0x0) 15.541463073s ago: executing program 1 (id=1402): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) io_setup(0x400, &(0x7f0000001080)=0x0) io_submit(r1, 0x20000029, &(0x7f0000000180)=[&(0x7f0000000000)={0x1802, 0x0, 0x0, 0x5, 0x0, r0, 0x0}]) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, &(0x7f00000004c0)={0x10000000}) shutdown(r0, 0x0) 14.949342226s ago: executing program 1 (id=1404): bpf$MAP_CREATE_TAIL_CALL(0x9, &(0x7f0000000380)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x80000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 14.631864065s ago: executing program 1 (id=1405): r0 = socket$inet6(0xa, 0x2, 0x0) open(0x0, 0x10080, 0xa8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000940)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_kthread_work_queue_work\x00', r2}, 0x10) socketpair(0x11, 0xa, 0x0, &(0x7f0000001080)) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)={0x7f, 0x1, 0x7f, 0x6, 0x8, 0x96}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000840)={0x0, {0x2, 0x4e24, @rand_addr=0x64010101}, {0x2, 0x0, @loopback}, {0x2, 0x4e23, @broadcast}, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x8}) bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0xff}, 0x18) r3 = gettid() bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x8, 0x3, 0x14, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffd, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b0000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="190000"], 0x48) process_vm_writev(r3, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x1f80}], 0x2b, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) syz_clone3(&(0x7f0000000400)={0x40000000, &(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000100), {0x11}, &(0x7f0000000140)=""/242, 0xf2, &(0x7f0000000240)=""/251, &(0x7f0000000340)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x3}, 0x58) sched_setscheduler(r5, 0x1, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000400850000008200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r7}, 0x10) openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz0\x00', 0x1ff) 6.055397011s ago: executing program 3 (id=1411): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) ioperm(0x8, 0x7, 0x1) 5.655242804s ago: executing program 3 (id=1412): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="18050000000000fe000000004b64ffec850000007d000000040000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x18, &(0x7f0000000780)={&(0x7f0000000080)=ANY=[@ANYBLOB="2c0000002000010000000000000000000a0000000000000000000000080017004e244c"], 0x2c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 5.211898476s ago: executing program 3 (id=1413): socket(0x15, 0x2, 0x6) socket(0x1e, 0x2, 0x0) socketpair(0x1, 0x20000000000001, 0x0, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x800, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000002c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000002540), 0x2, 0x0) 5.030679113s ago: executing program 1 (id=1415): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x6, [@var={0x4, 0x0, 0x0, 0xe, 0x3}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x3}, @volatile={0x0, 0x0, 0x0, 0xb, 0x1}]}, {0x0, [0x0, 0x0, 0x0, 0x61]}}, 0x0, 0x46, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) 4.810244118s ago: executing program 2 (id=1416): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000002140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fff0200}]}) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x1b, &(0x7f0000002140)={0x1, &(0x7f00000000c0)=[{0x6}]}) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x300, 0x0, 0x0, 0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r7 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x1, 0x800001, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000300)={{0x1, 0x1, 0x18, r8, {0x1}}, './file0\x00'}) r10 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r10, &(0x7f0000000140)="ab", 0xffe0, 0x4000815, &(0x7f0000000100)={0x2, 0x4e22, @local}, 0x10) r11 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000400)=@generic={&(0x7f00000003c0)='./file0\x00', 0x0, 0x18}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0xc, 0x4, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8}, [@call={0x85, 0x0, 0x0, 0x20}]}, &(0x7f0000000200)='GPL\x00', 0x9, 0x7e, &(0x7f0000000280)=""/126, 0x41000, 0x2, '\x00', r5, @fallback=0xc, r9, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000340)={0x2, 0x4, 0x5, 0x4}, 0x10, 0x0, r7, 0x0, &(0x7f00000004c0)=[r11, r6, r6, r6, r6], 0x0, 0x10, 0xfffffffe, @void, @value}, 0x94) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendmsg$nl_route(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvlan={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4001}, 0x0) 4.414585959s ago: executing program 0 (id=1417): r0 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000ec0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_DEL_SEC_KEY(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="d4000000", @ANYRES16=r0, @ANYBLOB="010000000000ffdbdf251800000008000300", @ANYRES32=r2, @ANYBLOB="28003080240003004696c164a86510547cf39b9e837ebed4a7d6e5c3a97b0484d595959fc67d51f690003080140004006c1743aa471ea8944e30e7a88faaeb0c0500020004000000140004008900001b00000000000000000402020030000180050024000380060001000100000006000300a0aa000006000300a0aa000006000100ffff0000240001800800040002"], 0xd4}, 0x1, 0x0, 0x0, 0x4004080}, 0x810) 4.414169311s ago: executing program 1 (id=1418): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000e00)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0700000000000000000005000000180001801400020073797a5f74756e0000000000000000000800038004000380080005"], 0x3c}}, 0x0) 3.453637055s ago: executing program 1 (id=1419): socket$netlink(0x10, 0x3, 0x0) r0 = socket(0x10, 0x1, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x59) r1 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x20000}}, {{0xa, 0x0, 0x40000, @dev={0xfe, 0x80, '\x00', 0x26}}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}}}, {{0xa, 0x0, 0x3, @loopback}}}, 0x108) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r2 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x4, 0x0, @mcast1={0xff, 0x7}, 0x8a4}}, {{0xa, 0x4e20, 0x100, @remote}}}, 0x108) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001d40)=[{&(0x7f0000000100)=ANY=[@ANYBLOB="2c00000010008100000000000080000000000000", @ANYRES32=0x0, @ANYBLOB="0a043cbf", @ANYRES32, @ANYBLOB="0a001b"], 0x2c}], 0x1}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) futex(0x0, 0x4, 0x2, 0x0, 0x0, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000080050005000200000011000300686173683a69702c706f7274"], 0x4c}}, 0x2) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000300)={0x54, 0x9, 0x6, 0x201, 0x300, 0x0, {0x2}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x2c, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @broadcast}}, @IPSET_ATTR_PROTO={0x5, 0x7, 0x29}, @IPSET_ATTR_PORT={0x6, 0x4, 0x1, 0x0, 0x4e21}, @IPSET_ATTR_IP_TO={0xc, 0x2, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @loopback}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = socket(0x840000000002, 0x3, 0x100) setsockopt$inet_MCAST_JOIN_GROUP(r7, 0x0, 0x2a, 0x0, 0x0) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x1c, 0x3, 0x6, 0x201, 0x0, 0x0, {0x5}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000800)={@random="e90c610faca2", @link_local, @void, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x11, 0x14, 0x68, 0x0, 0x2, 0x32, 0x0, @rand_addr=0x64010101, @multicast1}}}}}, 0x0) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x10000000, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x0) 3.383697036s ago: executing program 0 (id=1420): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x80000}, 0x18) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000001040)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@broadcast, @in6=@remote}, {@in6=@remote, 0x0, 0x32}, @in6=@mcast1, {}, {}, {}, 0x0, 0x0, 0xa, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}, 0x1, 0xe}, 0x0) 2.675128623s ago: executing program 3 (id=1421): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) ioperm(0x8, 0x7, 0x1) 2.07306438s ago: executing program 0 (id=1422): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000340)={{r0}, &(0x7f00000002c0), &(0x7f0000000300)=r1}, 0x20) semop(0x0, 0x0, 0x0) 1.912253835s ago: executing program 3 (id=1423): capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000}) mkdir(&(0x7f0000000580)='./file0\x00', 0x0) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='user.incfs.metadata\x00') 1.295458592s ago: executing program 3 (id=1424): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'macvlan1\x00', 0x0}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001000030500000000fddbdf0000000000", @ANYRES32=0x0, @ANYBLOB="02880100373004002000128008000100687372001400028008000100", @ANYRES32=r3, @ANYBLOB="08000200", @ANYRES32=r5], 0x40}}, 0x4) mount$9p_tcp(0x0, 0x0, 0x0, 0x8, 0x0) 1.294871385s ago: executing program 0 (id=1425): r0 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e20, @broadcast}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) 731.591663ms ago: executing program 0 (id=1426): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0) 545.376023ms ago: executing program 2 (id=1427): r0 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x5) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000740)="aefdda9d240300005a99f57f07703aeff0f64ebbee07962c22772e11b44e65d766", 0x21}], 0x1) 144.698906ms ago: executing program 0 (id=1428): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e0000000000000005000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000580)=@deltaction={0x4c, 0x18, 0x1, 0x0, 0x25dfdbfe, {0xa}, [@TCA_ACT_TAB={0x38, 0x1, [{0xc, 0x80, 0x0, 0x0, @TCA_ACT_INDEX={0x8}}, {0x14, 0x8, 0x0, 0x0, @TCA_ACT_KIND={0x6, 0x1, 'tunnel_key\x00'}}, {0x14, 0x9, 0x0, 0x0, @TCA_ACT_KIND={0xf, 0x1, 'tunnel_key\x00'}}]}]}, 0x4c}}, 0x0) 0s ago: executing program 2 (id=1429): pipe(&(0x7f0000000300)) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, 0x0, 0x0, 0x4) r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x80a, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, r3, 0x0, 0x2}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_USE_CARRIER={0x5}, @IFLA_BOND_FAIL_OVER_MAC={0x5, 0xd, 0x1}]}}}]}, 0x44}}, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8480d0000005e140604000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) kernel console output (not intermixed with test programs): 197.464458][ T5866] usb 5-1: Using ep0 maxpacket: 16 [ 197.473472][ T7827] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 197.480739][ T7827] Bluetooth: hci2: Error when powering off device on rfkill (-4) [ 197.481155][ T5866] usb 5-1: config 0 interface 0 altsetting 5 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 197.547023][ T30] audit: type=1400 audit(1743182978.739:650): avc: denied { read write } for pid=7836 comm="syz.3.517" name="ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 197.606523][ T30] audit: type=1400 audit(1743182978.739:651): avc: denied { open } for pid=7836 comm="syz.3.517" path="/dev/ppp" dev="devtmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 197.622175][ T5866] usb 5-1: config 0 interface 0 altsetting 5 endpoint 0x81 has invalid wMaxPacketSize 0 [ 197.638478][ T7827] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 197.639459][ T5866] usb 5-1: config 0 interface 0 altsetting 5 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 197.645903][ T7827] Bluetooth: hci3: Error when powering off device on rfkill (-4) [ 197.659255][ T5866] usb 5-1: config 0 interface 0 has no altsetting 0 [ 197.677848][ T5866] usb 5-1: New USB device found, idVendor=0458, idProduct=5010, bcdDevice= 0.00 [ 197.678679][ T7827] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 197.687039][ T5866] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 197.692815][ T7827] Bluetooth: hci4: Error when powering off device on rfkill (-4) [ 197.772810][ T5866] usb 5-1: config 0 descriptor?? [ 198.063282][ T30] audit: type=1400 audit(1743182978.749:652): avc: denied { ioctl } for pid=7836 comm="syz.3.517" path="/dev/ppp" dev="devtmpfs" ino=709 ioctlcmd=0x743e scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 198.088001][ T30] audit: type=1400 audit(1743182978.809:653): avc: denied { accept } for pid=7836 comm="syz.3.517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 198.108161][ T30] audit: type=1400 audit(1743182978.809:654): avc: denied { create } for pid=7836 comm="syz.3.517" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 198.414361][ T5865] usb 4-1: new full-speed USB device number 22 using dummy_hcd [ 198.426305][ T5870] usb 2-1: new high-speed USB device number 23 using dummy_hcd [ 198.588307][ T5865] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 10 [ 198.621289][ T5866] hid (null): invalid report_size -807597463 [ 198.637532][ T5865] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 512, setting to 64 [ 198.688062][ T5866] hid (null): unknown global tag 0x92 [ 198.716707][ T5865] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 198.855144][ T5866] input: HID 0458:5010 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0458:5010.0006/input/input14 [ 198.855651][ T5870] usb 2-1: config index 0 descriptor too short (expected 23569, got 27) [ 198.867114][ T5865] usb 4-1: New USB device found, idVendor=0755, idProduct=2626, bcdDevice= 0.00 [ 198.889146][ T5870] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 198.892962][ T5866] kye 0003:0458:5010.0006: input,hiddev0,hidraw0: USB HID v2.00 Device [HID 0458:5010] on usb-dummy_hcd.4-1/input0 [ 198.924673][ T5865] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 198.927234][ T5870] usb 2-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 198.934357][ T5865] usb 4-1: config 0 descriptor?? [ 199.073247][ T5870] usb 2-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 199.081217][ T5866] usb 5-1: USB disconnect, device number 11 [ 199.241454][ T7845] raw-gadget.3 gadget.3: fail, usb_ep_enable returned -22 [ 199.339703][ T5870] usb 2-1: Manufacturer: syz [ 199.357671][ T5870] usb 2-1: config 0 descriptor?? [ 199.369867][ T5870] igorplugusb 2-1:0.0: endpoint incorrect [ 199.375539][ T7855] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 199.393462][ T7855] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 199.806230][ T5865] aureal 0003:0755:2626.0007: invalid report_size 21660 [ 199.970964][ T5865] aureal 0003:0755:2626.0007: item 0 2 1 7 parsing failed [ 200.115827][ T5865] aureal 0003:0755:2626.0007: probe with driver aureal failed with error -22 [ 200.127889][ T5865] usb 4-1: USB disconnect, device number 22 [ 201.156458][ T30] audit: type=1400 audit(1743182982.369:655): avc: granted { setsecparam } for pid=7866 comm="syz.4.526" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security [ 201.364285][ T5918] usb 1-1: new high-speed USB device number 19 using dummy_hcd [ 201.577099][ T5918] usb 1-1: config index 0 descriptor too short (expected 23569, got 27) [ 201.585598][ T5918] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 201.598748][ T5918] usb 1-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 201.608416][ T5918] usb 1-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 201.616453][ T5918] usb 1-1: Manufacturer: syz [ 201.622159][ T5918] usb 1-1: config 0 descriptor?? [ 202.822707][ T5918] igorplugusb 1-1:0.0: endpoint incorrect [ 202.833990][ T5870] usb 2-1: USB disconnect, device number 23 [ 202.985232][ T30] audit: type=1400 audit(1743182984.179:656): avc: denied { read append } for pid=7878 comm="syz.1.529" name="mice" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 203.164406][ T30] audit: type=1400 audit(1743182984.199:657): avc: denied { read open } for pid=7878 comm="syz.1.529" path="/dev/input/mice" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 203.190464][ T30] audit: type=1400 audit(1743182984.229:658): avc: denied { prog_load } for pid=7870 comm="syz.0.527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 203.254318][ T30] audit: type=1400 audit(1743182984.229:659): avc: denied { bpf } for pid=7870 comm="syz.0.527" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 203.343823][ T30] audit: type=1400 audit(1743182984.239:660): avc: denied { perfmon } for pid=7870 comm="syz.0.527" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 204.266660][ T30] audit: type=1400 audit(1743182984.269:661): avc: denied { prog_load } for pid=7870 comm="syz.0.527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 204.402401][ T30] audit: type=1400 audit(1743182984.269:662): avc: denied { bpf } for pid=7870 comm="syz.0.527" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 204.461736][ T30] audit: type=1400 audit(1743182984.269:663): avc: denied { perfmon } for pid=7870 comm="syz.0.527" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 204.612900][ T30] audit: type=1400 audit(1743182984.269:664): avc: denied { perfmon } for pid=7870 comm="syz.0.527" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 204.664369][ T30] audit: type=1400 audit(1743182984.319:665): avc: denied { perfmon } for pid=7870 comm="syz.0.527" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 205.301099][ T5865] usb 1-1: USB disconnect, device number 19 [ 205.809737][ T7898] Invalid ELF header magic: != ELF [ 207.504381][ T5865] usb 5-1: new high-speed USB device number 12 using dummy_hcd [ 207.782187][ T5865] usb 5-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 207.818957][ T5865] usb 5-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47 [ 207.861081][ T5865] usb 5-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 207.870298][ T5867] usb 1-1: new high-speed USB device number 20 using dummy_hcd [ 207.907501][ T5865] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 207.960272][ T7920] raw-gadget.1 gadget.4: fail, usb_ep_enable returned -22 [ 207.977247][ T5865] usb 5-1: Quirk or no altset; falling back to MIDI 1.0 [ 208.055692][ T30] kauditd_printk_skb: 180 callbacks suppressed [ 208.055708][ T30] audit: type=1400 audit(1743182989.269:846): avc: denied { ioctl } for pid=7923 comm="syz.0.540" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 208.101738][ T5867] usb 1-1: config index 0 descriptor too short (expected 23569, got 27) [ 208.134351][ T5867] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 208.181591][ T7930] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 208.204266][ T5867] usb 1-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 208.213341][ T5867] usb 1-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 208.221517][ T30] audit: type=1400 audit(1743182989.299:847): avc: denied { ioctl } for pid=7923 comm="syz.0.540" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 208.235415][ T5918] usb 5-1: USB disconnect, device number 12 [ 208.264455][ T7930] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 208.272285][ T5867] usb 1-1: Manufacturer: syz [ 208.284229][ T30] audit: type=1400 audit(1743182989.309:848): avc: denied { ioctl } for pid=7923 comm="syz.0.540" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 208.318347][ T30] audit: type=1400 audit(1743182989.309:849): avc: denied { ioctl } for pid=7923 comm="syz.0.540" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 208.344309][ T5867] usb 1-1: config 0 descriptor?? [ 208.378631][ T7930] fuse: Bad value for 'fd' [ 208.384480][ T5867] igorplugusb 1-1:0.0: endpoint incorrect [ 208.434250][ T30] audit: type=1400 audit(1743182989.309:850): avc: denied { ioctl } for pid=7923 comm="syz.0.540" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 208.498112][ T30] audit: type=1400 audit(1743182989.309:851): avc: denied { create } for pid=7929 comm="syz.2.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 208.544238][ T30] audit: type=1400 audit(1743182989.309:852): avc: denied { ioctl } for pid=7923 comm="syz.0.540" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5502 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 208.626567][ T7925] audit: audit_backlog=65 > audit_backlog_limit=64 [ 208.634705][ T7939] audit: audit_backlog=65 > audit_backlog_limit=64 [ 208.641220][ T7939] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 208.779020][ T7941] netlink: 20 bytes leftover after parsing attributes in process `syz.2.546'. [ 208.914460][ T5918] usb 4-1: new high-speed USB device number 23 using dummy_hcd [ 209.449758][ T5918] usb 4-1: config 0 has no interfaces? [ 209.515519][ T5918] usb 4-1: New USB device found, idVendor=091e, idProduct=0003, bcdDevice=d7.3b [ 209.542235][ T5918] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 209.579568][ T5918] usb 4-1: Product: syz [ 209.598894][ T5918] usb 4-1: Manufacturer: syz [ 209.690319][ T5918] usb 4-1: SerialNumber: syz [ 209.723958][ T5918] usb 4-1: config 0 descriptor?? [ 210.543557][ T5867] usb 1-1: USB disconnect, device number 20 [ 210.758579][ T7954] Invalid ELF header magic: != ELF [ 211.408029][ T7958] netlink: 'syz.3.545': attribute type 10 has an invalid length. [ 211.617892][ T7958] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 213.174557][ T5918] usb 4-1: USB disconnect, device number 23 [ 213.206412][ T30] kauditd_printk_skb: 294 callbacks suppressed [ 213.206426][ T30] audit: type=1400 audit(1743182994.419:1096): avc: denied { create } for pid=7967 comm="syz.1.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 213.244693][ T7978] mkiss: ax0: crc mode is auto. [ 214.040140][ T30] audit: type=1400 audit(1743182994.419:1097): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 214.314309][ T30] audit: type=1400 audit(1743182994.419:1098): avc: denied { search } for pid=5177 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 214.424884][ T30] audit: type=1400 audit(1743182994.419:1099): avc: denied { append } for pid=5177 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 214.504795][ T30] audit: type=1400 audit(1743182994.419:1100): avc: denied { append open } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 214.610192][ T30] audit: type=1400 audit(1743182994.419:1101): avc: denied { getattr } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 214.693812][ T7990] netlink: 8 bytes leftover after parsing attributes in process `syz.2.559'. [ 214.739341][ T30] audit: type=1400 audit(1743182994.449:1102): avc: denied { bind } for pid=7967 comm="syz.1.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 214.805269][ T7272] udevd[7272]: error opening ATTR{/sys/devices/platform/dummy_hcd.4/usb5/5-1/5-1:27.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 214.844259][ T30] audit: type=1400 audit(1743182994.449:1103): avc: denied { create } for pid=7967 comm="syz.1.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 214.865235][ T47] usb 4-1: new high-speed USB device number 24 using dummy_hcd [ 214.905675][ T30] audit: type=1400 audit(1743182994.549:1104): avc: denied { create } for pid=7977 comm="syz.2.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 214.953005][ T30] audit: type=1400 audit(1743182994.549:1105): avc: denied { connect } for pid=7977 comm="syz.2.556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 215.071101][ T47] usb 4-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 215.088707][ T47] usb 4-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47 [ 215.122369][ T47] usb 4-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 215.168109][ T47] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 215.230639][ T7989] raw-gadget.1 gadget.3: fail, usb_ep_enable returned -22 [ 215.280109][ T47] usb 4-1: Quirk or no altset; falling back to MIDI 1.0 [ 215.564822][ T47] usb 4-1: USB disconnect, device number 24 [ 215.668290][ T7996] netlink: 'syz.0.561': attribute type 2 has an invalid length. [ 215.860800][ T7996] netlink: 24 bytes leftover after parsing attributes in process `syz.0.561'. [ 215.870953][ T8004] mkiss: ax0: crc mode is auto. [ 215.944327][ T24] usb 2-1: new high-speed USB device number 24 using dummy_hcd [ 216.154821][ T24] usb 2-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 216.198588][ T24] usb 2-1: config 1 has 2 interfaces, different from the descriptor's value: 3 [ 216.240427][ T24] usb 2-1: config 1 has no interface number 1 [ 216.279312][ T24] usb 2-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 0 [ 216.379959][ T24] usb 2-1: config 1 interface 2 altsetting 1 endpoint 0x6 has an invalid bInterval 0, changing to 7 [ 216.501225][ T8008] FAULT_INJECTION: forcing a failure. [ 216.501225][ T8008] name failslab, interval 1, probability 0, space 0, times 0 [ 216.507928][ T24] usb 2-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 216.594127][ T24] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 216.609495][ T8008] CPU: 0 UID: 0 PID: 8008 Comm: syz.2.565 Not tainted 6.14.0-syzkaller-07422-gacb4f33713b9 #0 PREEMPT(full) [ 216.609524][ T8008] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 216.609535][ T8008] Call Trace: [ 216.609540][ T8008] [ 216.609547][ T8008] dump_stack_lvl+0x16c/0x1f0 [ 216.609573][ T8008] should_fail_ex+0x512/0x640 [ 216.609598][ T8008] ? fs_reclaim_acquire+0xae/0x150 [ 216.609625][ T8008] ? tomoyo_realpath_from_path+0xc2/0x6e0 [ 216.609647][ T8008] should_failslab+0xc2/0x120 [ 216.609667][ T8008] __kmalloc_noprof+0xd2/0x510 [ 216.609689][ T8008] tomoyo_realpath_from_path+0xc2/0x6e0 [ 216.609712][ T8008] ? tomoyo_profile+0x47/0x60 [ 216.609737][ T8008] tomoyo_path_number_perm+0x245/0x580 [ 216.609754][ T8008] ? tomoyo_path_number_perm+0x237/0x580 [ 216.609774][ T8008] ? __pfx_tomoyo_path_number_perm+0x10/0x10 [ 216.609793][ T8008] ? find_held_lock+0x2b/0x80 [ 216.609828][ T8008] ? find_held_lock+0x2b/0x80 [ 216.609847][ T8008] ? __fget_files+0x204/0x3c0 [ 216.609869][ T8008] ? __fget_files+0x20e/0x3c0 [ 216.609889][ T8008] security_file_ioctl+0x9b/0x240 [ 216.609912][ T8008] __x64_sys_ioctl+0xb7/0x200 [ 216.609938][ T8008] do_syscall_64+0xcd/0x260 [ 216.609958][ T8008] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 216.609975][ T8008] RIP: 0033:0x7f280498d169 [ 216.609989][ T8008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.610006][ T8008] RSP: 002b:00007f28058ca038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 216.610023][ T8008] RAX: ffffffffffffffda RBX: 00007f2804ba5fa0 RCX: 00007f280498d169 [ 216.610035][ T8008] RDX: 0000200000000200 RSI: 000000004068aea3 RDI: 0000000000000004 [ 216.610045][ T8008] RBP: 00007f28058ca090 R08: 0000000000000000 R09: 0000000000000000 [ 216.610056][ T8008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.610066][ T8008] R13: 0000000000000000 R14: 00007f2804ba5fa0 R15: 00007fff15da15d8 [ 216.610085][ T8008] [ 216.610109][ T8008] ERROR: Out of memory at tomoyo_realpath_from_path. [ 216.632299][ T24] usb 2-1: Product: syz [ 217.120021][ T24] usb 2-1: Manufacturer: syz [ 217.143362][ T24] usb 2-1: SerialNumber: syz [ 217.214548][ T8002] raw-gadget.1 gadget.1: fail, usb_ep_enable returned -22 [ 217.225034][ T5918] usb 4-1: new high-speed USB device number 25 using dummy_hcd [ 217.458002][ T5918] usb 4-1: config index 0 descriptor too short (expected 23569, got 27) [ 217.491516][ T5918] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 217.593261][ T5918] usb 4-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 217.624611][ T5918] usb 4-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 217.678400][ T5918] usb 4-1: Manufacturer: syz [ 217.698964][ T24] usb 2-1: 2:1 : no or invalid class specific endpoint descriptor [ 217.717112][ T5918] usb 4-1: config 0 descriptor?? [ 217.754882][ T24] usb 2-1: 2:1 : no or invalid class specific endpoint descriptor [ 217.768389][ T5918] igorplugusb 4-1:0.0: endpoint incorrect [ 217.977708][ T5940] udevd[5940]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:27.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 218.006523][ T24] usb 2-1: USB disconnect, device number 24 [ 218.229276][ T30] kauditd_printk_skb: 243 callbacks suppressed [ 218.229292][ T30] audit: type=1400 audit(1743182999.439:1349): avc: denied { create } for pid=8019 comm="syz.2.568" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 218.324520][ T30] audit: type=1400 audit(1743182999.479:1350): avc: denied { map_create } for pid=8019 comm="syz.2.568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 218.336689][ T8020] syzkaller1: entered promiscuous mode [ 218.725531][ T30] audit: type=1400 audit(1743182999.479:1351): avc: denied { read write } for pid=8019 comm="syz.2.568" name="virtual_nci" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 218.763586][ T30] audit: type=1400 audit(1743182999.479:1352): avc: denied { read write open } for pid=8019 comm="syz.2.568" path="/dev/virtual_nci" dev="devtmpfs" ino=698 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 218.788506][ T8020] syzkaller1: entered allmulticast mode [ 218.906750][ T30] audit: type=1400 audit(1743182999.539:1353): avc: denied { create } for pid=8019 comm="syz.2.568" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 218.965346][ T8036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 218.971862][ T8036] audit: audit_lost=20 audit_rate_limit=0 audit_backlog_limit=64 [ 218.979633][ T8036] audit: backlog limit exceeded [ 218.984957][ T8036] audit: audit_backlog=65 > audit_backlog_limit=64 [ 218.991441][ T8036] audit: audit_lost=21 audit_rate_limit=0 audit_backlog_limit=64 [ 220.194707][ T5867] usb 4-1: USB disconnect, device number 25 [ 221.145822][ T8043] netlink: 20 bytes leftover after parsing attributes in process `syz.4.572'. [ 221.254309][ T5867] usb 2-1: new high-speed USB device number 25 using dummy_hcd [ 221.429491][ T5867] usb 2-1: config index 0 descriptor too short (expected 23569, got 27) [ 221.440292][ T5867] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 221.496266][ T5867] usb 2-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 221.534323][ T5867] usb 2-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 221.574525][ T5867] usb 2-1: Manufacturer: syz [ 221.605167][ T5867] usb 2-1: config 0 descriptor?? [ 221.675079][ T8050] No source specified [ 222.452767][ T8065] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 222.496719][ T8065] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 222.655562][ T5867] rc_core: IR keymap rc-hauppauge not found [ 222.662130][ T5867] Registered IR keymap rc-empty [ 222.675185][ T5867] rc rc0: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0 [ 222.789283][ T5867] input: IgorPlug-USB IR Receiver as /devices/platform/dummy_hcd.1/usb2/2-1/2-1:0.0/rc/rc0/input15 [ 222.811442][ T8068] netlink: 16 bytes leftover after parsing attributes in process `syz.1.571'. [ 223.254608][ T30] kauditd_printk_skb: 2071 callbacks suppressed [ 223.254638][ T30] audit: type=1400 audit(1743183004.259:1567): avc: denied { read } for pid=8069 comm="syz.4.579" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 223.429348][ C0] igorplugusb 2-1:0.0: Error: urb status = -32 [ 223.442720][ T30] audit: type=1400 audit(1743183004.259:1568): avc: denied { read open } for pid=8069 comm="syz.4.579" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 223.474721][ T7272] udevd[7272]: error opening ATTR{/sys/devices/platform/dummy_hcd.1/usb2/2-1/2-1:1.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 223.493183][ T30] audit: type=1400 audit(1743183004.299:1569): avc: denied { ioctl } for pid=8069 comm="syz.4.579" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 223.593938][ T30] audit: type=1400 audit(1743183004.549:1570): avc: denied { read append } for pid=8069 comm="syz.4.579" name="rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 223.792735][ T30] audit: type=1400 audit(1743183004.559:1571): avc: denied { read open } for pid=8069 comm="syz.4.579" path="/dev/rtc0" dev="devtmpfs" ino=921 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 223.919107][ T30] audit: type=1400 audit(1743183004.599:1572): avc: denied { ioctl } for pid=8040 comm="syz.1.571" path="/dev/dri/card1" dev="devtmpfs" ino=628 ioctlcmd=0x64c6 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 224.026114][ T24] usb 2-1: USB disconnect, device number 25 [ 224.064315][ T30] audit: type=1400 audit(1743183004.619:1573): avc: denied { ioctl } for pid=8069 comm="syz.4.579" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae83 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 224.129577][ T30] audit: type=1400 audit(1743183004.619:1574): avc: denied { write } for pid=8067 comm="syz.3.580" name="mice" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 224.258207][ T30] audit: type=1400 audit(1743183004.619:1575): avc: denied { write open } for pid=8067 comm="syz.3.580" path="/dev/input/mice" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 [ 224.334286][ T30] audit: type=1400 audit(1743183004.619:1576): avc: denied { create } for pid=8063 comm="syz.2.577" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 224.353990][ T5867] usb 5-1: new high-speed USB device number 13 using dummy_hcd [ 224.537974][ T5867] usb 5-1: config 27 interface 0 altsetting 0 endpoint 0x8B has an invalid bInterval 0, changing to 7 [ 224.612549][ T5867] usb 5-1: config 27 interface 0 altsetting 0 bulk endpoint 0xB has invalid maxpacket 47 [ 225.090911][ T5867] usb 5-1: New USB device found, idVendor=0582, idProduct=0014, bcdDevice=bb.9d [ 225.128253][ T5867] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 225.178942][ T8079] raw-gadget.1 gadget.4: fail, usb_ep_enable returned -22 [ 225.200967][ T5867] usb 5-1: Quirk or no altset; falling back to MIDI 1.0 [ 225.583422][ T8091] 9pnet_fd: Insufficient options for proto=fd [ 225.657366][ T5866] usb 5-1: USB disconnect, device number 13 [ 225.744658][ T8095] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 225.794431][ T8095] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 225.924438][ T8094] netlink: 12 bytes leftover after parsing attributes in process `syz.0.585'. [ 227.267862][ T8111] netlink: 'syz.0.590': attribute type 10 has an invalid length. [ 227.334863][ T8106] Invalid ELF header magic: != ELF [ 228.157063][ T8116] openvswitch: netlink: Missing key (keys=40, expected=200000) [ 228.286687][ T30] kauditd_printk_skb: 230 callbacks suppressed [ 228.286703][ T30] audit: type=1400 audit(1743183009.499:1807): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 228.301198][ T8116] netlink: 4 bytes leftover after parsing attributes in process `syz.0.590'. [ 228.428748][ T30] audit: type=1400 audit(1743183009.509:1808): avc: denied { write } for pid=8109 comm="syz.0.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 228.889709][ T30] audit: type=1400 audit(1743183009.579:1809): avc: denied { search } for pid=5177 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 228.911270][ C1] vkms_vblank_simulate: vblank timer overrun [ 229.084294][ T30] audit: type=1400 audit(1743183009.579:1810): avc: denied { append } for pid=5177 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 229.187944][ T30] audit: type=1400 audit(1743183009.579:1811): avc: denied { append open } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 229.258336][ T30] audit: type=1400 audit(1743183009.579:1812): avc: denied { getattr } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 229.360567][ T8132] audit: audit_backlog=65 > audit_backlog_limit=64 [ 229.365275][ T8111] audit: audit_backlog=65 > audit_backlog_limit=64 [ 229.373738][ T30] audit: type=1400 audit(1743183009.599:1813): avc: denied { unmount } for pid=5817 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 229.385648][ T8130] audit: audit_backlog=65 > audit_backlog_limit=64 [ 229.420162][ T8136] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 229.424385][ T24] usb 1-1: new high-speed USB device number 21 using dummy_hcd [ 229.509736][ T8136] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 229.621079][ T24] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x7 has invalid wMaxPacketSize 0 [ 229.646200][ T24] usb 1-1: config 0 interface 0 altsetting 0 bulk endpoint 0x7 has invalid maxpacket 0 [ 229.678884][ T24] usb 1-1: New USB device found, idVendor=2040, idProduct=4900, bcdDevice=4d.8b [ 229.714233][ T24] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 229.787584][ T24] usb 1-1: config 0 descriptor?? [ 229.834244][ T5866] usb 5-1: new high-speed USB device number 14 using dummy_hcd [ 230.246296][ T24] usb 1-1: can't set config #0, error -71 [ 230.270745][ T24] usb 1-1: USB disconnect, device number 21 [ 230.366306][ T5866] usb 5-1: Using ep0 maxpacket: 16 [ 230.395454][ T5866] usb 5-1: config 0 interface 0 altsetting 5 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 230.432310][ T5866] usb 5-1: config 0 interface 0 altsetting 5 endpoint 0x81 has invalid wMaxPacketSize 0 [ 230.461334][ T5866] usb 5-1: config 0 interface 0 altsetting 5 has 1 endpoint descriptor, different from the interface descriptor's value: 5 [ 230.508685][ T5866] usb 5-1: config 0 interface 0 has no altsetting 0 [ 230.525597][ T5866] usb 5-1: New USB device found, idVendor=0458, idProduct=5010, bcdDevice= 0.00 [ 230.560608][ T5866] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 230.608924][ T5866] usb 5-1: config 0 descriptor?? [ 231.472287][ T5866] hid (null): invalid report_size -807597463 [ 231.915527][ T5866] input: HID 0458:5010 as /devices/platform/dummy_hcd.4/usb5/5-1/5-1:0.0/0003:0458:5010.0008/input/input16 [ 231.938092][ T8153] Invalid ELF header magic: != ELF [ 231.990133][ T5866] kye 0003:0458:5010.0008: input,hiddev0,hidraw0: USB HID v2.00 Device [HID 0458:5010] on usb-dummy_hcd.4-1/input0 [ 232.004603][ T5866] usb 5-1: USB disconnect, device number 14 [ 232.015110][ T5865] usb 2-1: new high-speed USB device number 26 using dummy_hcd [ 232.208734][ T5865] usb 2-1: config index 0 descriptor too short (expected 23569, got 27) [ 232.267768][ T5865] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 232.334985][ T5865] usb 2-1: New USB device found, idVendor=03eb, idProduct=0002, bcdDevice=ba.c0 [ 232.436922][ T5865] usb 2-1: New USB device strings: Mfr=5, Product=0, SerialNumber=0 [ 232.455740][ T5865] usb 2-1: Manufacturer: syz [ 232.474819][ T5865] usb 2-1: config 0 descriptor?? [ 232.506615][ T5865] igorplugusb 2-1:0.0: endpoint incorrect [ 232.706447][ T7272] udevd[7272]: error opening ATTR{/sys/devices/platform/dummy_hcd.4/usb5/5-1/5-1:27.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 233.304219][ T30] kauditd_printk_skb: 2179 callbacks suppressed [ 233.304234][ T30] audit: type=1400 audit(1743183014.509:2166): avc: denied { bpf } for pid=8167 comm="syz.4.607" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 233.429878][ T30] audit: type=1400 audit(1743183014.539:2167): avc: denied { prog_load } for pid=8152 comm="syz.1.603" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 233.582632][ T30] audit: type=1400 audit(1743183014.539:2168): avc: denied { bpf } for pid=8152 comm="syz.1.603" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 234.023422][ T30] audit: type=1400 audit(1743183014.549:2169): avc: denied { bpf } for pid=8167 comm="syz.4.607" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 234.044252][ T30] audit: type=1400 audit(1743183014.549:2170): avc: denied { prog_run } for pid=8167 comm="syz.4.607" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 234.063187][ T30] audit: type=1400 audit(1743183014.549:2171): avc: denied { perfmon } for pid=8152 comm="syz.1.603" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 234.084995][ T30] audit: type=1400 audit(1743183014.549:2172): avc: denied { perfmon } for pid=8152 comm="syz.1.603" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 234.133805][ T30] audit: type=1400 audit(1743183014.569:2173): avc: denied { perfmon } for pid=8152 comm="syz.1.603" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 234.265152][ T30] audit: type=1400 audit(1743183014.579:2174): avc: denied { perfmon } for pid=8152 comm="syz.1.603" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 234.286741][ T30] audit: type=1400 audit(1743183014.579:2175): avc: denied { perfmon } for pid=8152 comm="syz.1.603" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 234.774516][ T5918] usb 5-1: new full-speed USB device number 15 using dummy_hcd [ 234.814779][ T8186] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 234.826711][ T8186] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 234.986058][ T5918] usb 5-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid maxpacket 1023, setting to 64 [ 235.001069][ T5918] usb 5-1: New USB device found, idVendor=04f3, idProduct=0755, bcdDevice= 0.00 [ 235.021779][ T5918] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 235.100540][ T24] usb 2-1: USB disconnect, device number 26 [ 235.226000][ T8193] netlink: 40 bytes leftover after parsing attributes in process `syz.0.612'. [ 235.235063][ T8193] netlink: 'syz.0.612': attribute type 2 has an invalid length. [ 235.242722][ T8193] netlink: 248 bytes leftover after parsing attributes in process `syz.0.612'. [ 235.869958][ T5918] usb 5-1: config 0 descriptor?? [ 235.885714][ T8184] raw-gadget.2 gadget.4: fail, usb_ep_enable returned -22 [ 236.543969][ T5918] elan 0003:04F3:0755.0009: hidraw0: USB HID v1.01 Device [HID 04f3:0755] on usb-dummy_hcd.4-1/input0 [ 236.834529][ T8184] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 236.843068][ T8184] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 237.345080][ T5870] usb 2-1: new high-speed USB device number 27 using dummy_hcd [ 237.539261][ T5870] usb 2-1: config 1 interface 0 altsetting 0 endpoint 0x1 has invalid wMaxPacketSize 0 [ 237.572384][ T5870] usb 2-1: config 1 interface 0 altsetting 0 bulk endpoint 0x1 has invalid maxpacket 0 [ 237.606118][ T5918] usb 5-1: USB disconnect, device number 15 [ 237.617211][ T5870] usb 2-1: config 1 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 2 [ 237.667016][ T8220] netlink: 20 bytes leftover after parsing attributes in process `syz.0.621'. [ 237.679035][ T5870] usb 2-1: New USB device found, idVendor=0525, idProduct=a4a8, bcdDevice= 0.40 [ 237.701419][ T5870] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 237.734561][ T5870] usb 2-1: Product: syz [ 237.760537][ T5870] usb 2-1: Manufacturer: syz [ 237.786017][ T5870] usb 2-1: SerialNumber: syz [ 237.941943][ T8222] netlink: 40 bytes leftover after parsing attributes in process `syz.2.622'. [ 237.950894][ T8222] netlink: 'syz.2.622': attribute type 2 has an invalid length. [ 237.958626][ T8222] netlink: 248 bytes leftover after parsing attributes in process `syz.2.622'. [ 238.557436][ T30] kauditd_printk_skb: 2126 callbacks suppressed [ 238.557452][ T30] audit: type=1400 audit(1743183019.769:2460): avc: denied { append open } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 238.587166][ T30] audit: type=1400 audit(1743183019.769:2461): avc: denied { getattr } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 238.613859][ T30] audit: type=1400 audit(1743183019.829:2462): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 238.748926][ T30] audit: type=1400 audit(1743183019.859:2463): avc: denied { read write open } for pid=5817 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 238.774884][ T30] audit: type=1400 audit(1743183019.859:2464): avc: denied { ioctl } for pid=5817 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 238.800528][ T30] audit: type=1400 audit(1743183019.889:2465): avc: denied { ioctl } for pid=8202 comm="syz.1.618" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x550a scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 238.825730][ T30] audit: type=1400 audit(1743183019.889:2466): avc: denied { ioctl } for pid=8202 comm="syz.1.618" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5509 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 238.850566][ T30] audit: type=1400 audit(1743183019.899:2467): avc: denied { ioctl } for pid=8202 comm="syz.1.618" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5505 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 238.884298][ T30] audit: type=1400 audit(1743183019.899:2468): avc: denied { ioctl } for pid=8202 comm="syz.1.618" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5504 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 239.145879][ T30] audit: type=1400 audit(1743183020.069:2469): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 239.286403][ T5870] usblp 2-1:1.0: usblp0: USB Unidirectional printer dev 27 if 0 alt 0 proto 1 vid 0x0525 pid 0xA4A8 [ 239.387124][ T8230] xt_CT: You must specify a L4 protocol and not use inversions on it [ 239.816746][ T8206] xt_addrtype: both incoming and outgoing interface limitation cannot be selected [ 240.037693][ T5866] usb 2-1: USB disconnect, device number 27 [ 240.070048][ T5866] usblp0: removed [ 240.137690][ T8238] netlink: 'syz.4.625': attribute type 12 has an invalid length. [ 240.154294][ T8238] netlink: 'syz.4.625': attribute type 29 has an invalid length. [ 240.172328][ T8238] netlink: 148 bytes leftover after parsing attributes in process `syz.4.625'. [ 240.192452][ T8238] netlink: 59 bytes leftover after parsing attributes in process `syz.4.625'. [ 240.875854][ T8258] lo speed is unknown, defaulting to 1000 [ 241.326167][ T8268] netlink: 4 bytes leftover after parsing attributes in process `syz.0.638'. [ 242.123568][ T8288] bond0: option fail_over_mac: unable to set because the bond device has slaves [ 242.159456][ T8288] netlink: 'syz.0.645': attribute type 10 has an invalid length. [ 242.188477][ T8288] bridge0: port 2(bridge_slave_1) entered disabled state [ 242.195866][ T8288] bridge0: port 1(bridge_slave_0) entered disabled state [ 242.266295][ T8288] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.273441][ T8288] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.280863][ T8288] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.287987][ T8288] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.356754][ T8288] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 242.486358][ T8291] netlink: 4 bytes leftover after parsing attributes in process `syz.2.647'. [ 242.557735][ T8291] 8021q: adding VLAN 0 to HW filter on device team1 [ 242.642634][ T8295] hub 5-0:1.0: USB hub found [ 242.661117][ T8295] hub 5-0:1.0: 1 port detected [ 243.041085][ T8306] netlink: 24 bytes leftover after parsing attributes in process `syz.3.654'. [ 243.581477][ T30] kauditd_printk_skb: 703 callbacks suppressed [ 243.581493][ T30] audit: type=1400 audit(1743183024.789:3173): avc: denied { map_create } for pid=8313 comm="syz.3.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 243.662932][ T30] audit: type=1400 audit(1743183024.789:3174): avc: denied { perfmon } for pid=8313 comm="syz.3.659" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 243.734270][ T30] audit: type=1400 audit(1743183024.789:3175): avc: denied { map_read map_write } for pid=8313 comm="syz.3.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 243.789740][ T8317] netlink: 12 bytes leftover after parsing attributes in process `syz.3.659'. [ 243.805871][ T30] audit: type=1400 audit(1743183024.809:3176): avc: denied { prog_load } for pid=8313 comm="syz.3.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 243.867459][ T30] audit: type=1400 audit(1743183024.809:3177): avc: denied { bpf } for pid=8313 comm="syz.3.659" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 243.926556][ T30] audit: type=1400 audit(1743183024.809:3178): avc: denied { perfmon } for pid=8313 comm="syz.3.659" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 243.983589][ T30] audit: type=1400 audit(1743183024.809:3179): avc: denied { map_create } for pid=8313 comm="syz.3.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 244.040748][ T30] audit: type=1400 audit(1743183024.809:3180): avc: denied { map_read map_write } for pid=8313 comm="syz.3.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 244.100442][ T30] audit: type=1400 audit(1743183024.829:3181): avc: denied { prog_load } for pid=8313 comm="syz.3.659" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 244.142065][ T30] audit: type=1400 audit(1743183024.849:3182): avc: denied { bpf } for pid=8313 comm="syz.3.659" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 244.823583][ T8347] sch_fq: defrate 0 ignored. [ 244.969639][ T8354] 9p: Unknown access argument „: -22 [ 245.409179][ T8362] netlink: 'syz.1.674': attribute type 10 has an invalid length. [ 245.485114][ T8362] bridge0: port 3(syz_tun) entered disabled state [ 245.491734][ T8362] bridge0: port 2(bridge_slave_1) entered disabled state [ 245.534111][ T8362] bridge0: port 3(syz_tun) entered blocking state [ 245.540666][ T8362] bridge0: port 3(syz_tun) entered forwarding state [ 245.548207][ T8362] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.555342][ T8362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.590495][ T8362] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 245.813610][ T8366] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 246.161317][ T8382] 9p: Unknown access argument „: -22 [ 246.646227][ T8394] netlink: 12 bytes leftover after parsing attributes in process `syz.4.688'. [ 246.971249][ T8399] ieee802154 phy0 wpan0: encryption failed: -22 [ 248.615294][ T30] kauditd_printk_skb: 1062 callbacks suppressed [ 248.615310][ T30] audit: type=1400 audit(1743183029.829:4221): avc: denied { prog_load } for pid=8429 comm="syz.3.705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 248.657088][ T8435] netlink: 96 bytes leftover after parsing attributes in process `syz.2.707'. [ 248.665964][ T30] audit: type=1400 audit(1743183029.829:4222): avc: denied { bpf } for pid=8429 comm="syz.3.705" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 248.665996][ T30] audit: type=1400 audit(1743183029.829:4223): avc: denied { perfmon } for pid=8429 comm="syz.3.705" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 248.666022][ T30] audit: type=1400 audit(1743183029.829:4224): avc: denied { perfmon } for pid=8429 comm="syz.3.705" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 248.666074][ T30] audit: type=1400 audit(1743183029.829:4225): avc: denied { perfmon } for pid=8429 comm="syz.3.705" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 248.838936][ T30] audit: type=1400 audit(1743183029.829:4226): avc: denied { perfmon } for pid=8429 comm="syz.3.705" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 248.920725][ T5831] audit: audit_backlog=65 > audit_backlog_limit=64 [ 248.921310][ T8442] audit: audit_backlog=65 > audit_backlog_limit=64 [ 248.936595][ T30] audit: type=1400 audit(1743183029.839:4227): avc: denied { perfmon } for pid=8429 comm="syz.3.705" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 248.947200][ T5831] audit: audit_lost=1873 audit_rate_limit=0 audit_backlog_limit=64 [ 249.196238][ T8448] netlink: 36 bytes leftover after parsing attributes in process `syz.2.712'. [ 249.288178][ T8448] bridge0: port 2(bridge_slave_1) entered disabled state [ 249.296223][ T8448] bridge0: port 1(bridge_slave_0) entered disabled state [ 250.568386][ T8478] syz.1.724 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 251.189644][ T8493] 9p: Unknown access argument „: -22 [ 251.304885][ T8496] netlink: 8 bytes leftover after parsing attributes in process `syz.4.731'. [ 251.387984][ T24] raw-gadget.0 gadget.2: failed to queue reset event [ 251.474386][ T24] raw-gadget.0 gadget.2: failed to queue resume event [ 251.574297][ T24] usb 3-1: new full-speed USB device number 15 using dummy_hcd [ 251.582059][ C1] raw-gadget.0 gadget.2: ignoring, device is not running [ 251.613139][ T24] raw-gadget.0 gadget.2: failed to queue reset event [ 251.699393][ T24] raw-gadget.0 gadget.2: failed to queue resume event [ 251.773530][ T24] usb 3-1: device descriptor read/64, error -32 [ 251.895513][ T24] raw-gadget.0 gadget.2: failed to queue suspend event [ 251.933017][ T24] raw-gadget.0 gadget.2: failed to queue reset event [ 252.034389][ T24] raw-gadget.0 gadget.2: failed to queue resume event [ 252.124284][ T24] usb 3-1: new full-speed USB device number 16 using dummy_hcd [ 252.154697][ C1] raw-gadget.0 gadget.2: ignoring, device is not running [ 252.172010][ T24] raw-gadget.0 gadget.2: failed to queue reset event [ 252.274780][ T24] raw-gadget.0 gadget.2: failed to queue resume event [ 252.354567][ T24] usb 3-1: device descriptor read/64, error -32 [ 252.470526][ T24] raw-gadget.0 gadget.2: failed to queue suspend event [ 252.497742][ T24] usb usb3-port1: attempt power cycle [ 252.503200][ T24] raw-gadget.0 gadget.2: failed to queue disconnect event [ 252.557050][ T24] raw-gadget.0 gadget.2: failed to queue reset event [ 252.645364][ T24] raw-gadget.0 gadget.2: failed to queue resume event [ 252.664694][ T24] raw-gadget.0 gadget.2: failed to queue reset event [ 252.914337][ T24] raw-gadget.0 gadget.2: failed to queue resume event [ 252.974649][ T24] usb 3-1: new full-speed USB device number 17 using dummy_hcd [ 253.014522][ C1] raw-gadget.0 gadget.2: ignoring, device is not running [ 253.021650][ T24] usb 3-1: device descriptor read/8, error -32 [ 253.134490][ T24] raw-gadget.0 gadget.2: failed to queue suspend event [ 253.172752][ T24] raw-gadget.0 gadget.2: failed to queue reset event [ 253.254344][ T24] raw-gadget.0 gadget.2: failed to queue resume event [ 253.340608][ T24] usb 3-1: new full-speed USB device number 18 using dummy_hcd [ 253.387194][ C1] raw-gadget.0 gadget.2: ignoring, device is not running [ 253.394497][ T24] usb 3-1: device descriptor read/8, error -32 [ 253.504281][ T24] raw-gadget.0 gadget.2: failed to queue suspend event [ 253.520199][ T24] usb usb3-port1: unable to enumerate USB device [ 253.624215][ T30] kauditd_printk_skb: 882 callbacks suppressed [ 253.624230][ T30] audit: type=1400 audit(1743183034.829:5098): avc: denied { append } for pid=8445 comm="dhcpcd-run-hook" name="resolv.conf.lapb4.link" dev="tmpfs" ino=4249 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 253.699123][ T8551] rdma_op ffff88802e84a9f0 conn xmit_rdma 0000000000000000 [ 253.801876][ T30] audit: type=1400 audit(1743183034.869:5099): avc: denied { bpf } for pid=8548 comm="syz.1.755" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 254.321362][ T30] audit: type=1400 audit(1743183034.869:5100): avc: denied { bpf } for pid=8548 comm="syz.1.755" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 254.351289][ T30] audit: type=1400 audit(1743183034.869:5101): avc: denied { bpf } for pid=8548 comm="syz.1.755" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 254.514317][ T30] audit: type=1400 audit(1743183034.869:5102): avc: denied { bpf } for pid=8548 comm="syz.1.755" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 254.554032][ T8562] audit: audit_backlog=65 > audit_backlog_limit=64 [ 254.561529][ T8560] 9p: Unknown access argument „: -22 [ 254.561726][ T5827] audit: audit_backlog=65 > audit_backlog_limit=64 [ 254.577323][ T8564] audit: audit_backlog=65 > audit_backlog_limit=64 [ 254.583846][ T8564] audit: audit_lost=1878 audit_rate_limit=0 audit_backlog_limit=64 [ 254.609923][ T30] audit: type=1400 audit(1743183034.869:5103): avc: denied { prog_run } for pid=8548 comm="syz.1.755" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 255.274495][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 255.293680][ T8571] syzkaller0: entered promiscuous mode [ 255.344254][ T8571] syzkaller0: entered allmulticast mode [ 255.394472][ T7877] syzkaller0: tun_net_xmit 48 [ 255.566229][ T8571] syzkaller0: create flow: hash 1106801713 index 1 [ 255.804435][ T8571] syzkaller0: delete flow: hash 1106801713 index 1 [ 255.853386][ T8585] netlink: 28 bytes leftover after parsing attributes in process `syz.4.765'. [ 256.424439][ T8565] sg_write: process 503 (syz.1.758) changed security contexts after opening file descriptor, this is not allowed. [ 258.639581][ T30] kauditd_printk_skb: 418 callbacks suppressed [ 258.639599][ T30] audit: type=1400 audit(1743183039.849:5496): avc: denied { execmem } for pid=8628 comm="syz.3.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 258.779871][ T30] audit: type=1400 audit(1743183039.959:5497): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 258.819695][ T30] audit: type=1400 audit(1743183039.959:5498): avc: denied { search } for pid=5177 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 259.268677][ T30] audit: type=1400 audit(1743183039.959:5499): avc: denied { append } for pid=5177 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 259.294744][ T30] audit: type=1400 audit(1743183039.959:5500): avc: denied { append open } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 259.329305][ T30] audit: type=1400 audit(1743183039.969:5501): avc: denied { getattr } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 259.353859][ T30] audit: type=1400 audit(1743183040.119:5502): avc: denied { prog_load } for pid=8628 comm="syz.3.784" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 259.382035][ T30] audit: type=1400 audit(1743183040.129:5503): avc: denied { bpf } for pid=8628 comm="syz.3.784" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 259.406531][ T8606] bond0: option fail_over_mac: unable to set because the bond device has slaves [ 259.418990][ T30] audit: type=1400 audit(1743183040.129:5504): avc: denied { perfmon } for pid=8628 comm="syz.3.784" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 259.505439][ T30] audit: type=1400 audit(1743183040.139:5505): avc: denied { perfmon } for pid=8628 comm="syz.3.784" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 259.608727][ T8620] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 259.658810][ T8633] lo speed is unknown, defaulting to 1000 [ 259.870361][ T8620] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 260.135372][ T8620] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 260.319182][ T8620] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 260.458668][ T8652] macvlan2: entered promiscuous mode [ 260.480770][ T8652] bridge0: entered promiscuous mode [ 260.505754][ T8652] bridge0: port 3(macvlan2) entered blocking state [ 260.530125][ T5866] IPVS: starting estimator thread 0... [ 260.573387][ T8652] bridge0: port 3(macvlan2) entered disabled state [ 260.621202][ T8652] macvlan2: entered allmulticast mode [ 260.634347][ T8657] IPVS: using max 54 ests per chain, 129600 per kthread [ 260.656254][ T8652] bridge0: entered allmulticast mode [ 260.690488][ T8652] macvlan2: left allmulticast mode [ 260.709101][ T8652] bridge0: left allmulticast mode [ 260.755614][ T8652] bridge0: left promiscuous mode [ 260.967985][ T8620] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.008402][ T8620] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.094416][ T8620] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 261.139974][ T8620] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 262.037170][ T8673] bond0: option fail_over_mac: unable to set because the bond device has slaves [ 262.646417][ T8685] 9pnet_fd: p9_fd_create_tcp (8685): problem connecting socket to 127.0.0.1 [ 263.284385][ T8693] xt_CT: No such helper "snmp_trap" [ 263.648974][ T30] kauditd_printk_skb: 451 callbacks suppressed [ 263.648989][ T30] audit: type=1400 audit(1743183044.859:5957): avc: denied { prog_load } for pid=8702 comm="syz.2.807" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 263.763944][ T30] audit: type=1400 audit(1743183044.859:5958): avc: denied { bpf } for pid=8702 comm="syz.2.807" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 263.864328][ T30] audit: type=1400 audit(1743183044.859:5959): avc: denied { bpf } for pid=8700 comm="syz.4.806" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 263.958221][ T30] audit: type=1400 audit(1743183044.879:5960): avc: denied { bpf } for pid=8700 comm="syz.4.806" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 264.031903][ T8710] audit: audit_backlog=65 > audit_backlog_limit=64 [ 264.039614][ T8711] audit: audit_backlog=65 > audit_backlog_limit=64 [ 264.046372][ T30] audit: type=1400 audit(1743183044.879:5961): avc: denied { prog_run } for pid=8700 comm="syz.4.806" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 264.080146][ T8697] audit: audit_backlog=65 > audit_backlog_limit=64 [ 264.088870][ T8711] audit: audit_lost=1888 audit_rate_limit=0 audit_backlog_limit=64 [ 264.093038][ T8710] audit: audit_lost=1889 audit_rate_limit=0 audit_backlog_limit=64 [ 266.080116][ T8765] bond0: option fail_over_mac: unable to set because the bond device has slaves [ 266.114839][ T8765] netlink: 'syz.0.831': attribute type 10 has an invalid length. [ 266.143589][ T8765] bridge0: port 2(bridge_slave_1) entered disabled state [ 266.150818][ T8765] bridge0: port 1(bridge_slave_0) entered disabled state [ 266.495942][ T8772] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 266.555416][ T8773] netlink: 'syz.1.833': attribute type 3 has an invalid length. [ 266.557635][ T8771] syzkaller0: entered allmulticast mode [ 266.786982][ T8778] netlink: 'syz.0.837': attribute type 3 has an invalid length. [ 266.898899][ T8782] netlink: 12 bytes leftover after parsing attributes in process `syz.1.840'. [ 267.227497][ T8788] tmpfs: Bad value for 'mpol' [ 267.983843][ T8809] 9p: Unknown access argument „: -22 [ 268.682496][ T30] kauditd_printk_skb: 875 callbacks suppressed [ 268.682511][ T30] audit: type=1400 audit(1743183049.889:6821): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 268.804229][ T30] audit: type=1400 audit(1743183049.929:6822): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 268.904224][ T30] audit: type=1400 audit(1743183049.929:6823): avc: denied { read write open } for pid=5821 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 269.024257][ T30] audit: type=1400 audit(1743183049.929:6824): avc: denied { ioctl } for pid=5821 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 269.062980][ T8837] audit: audit_backlog=65 > audit_backlog_limit=64 [ 269.072679][ T8838] audit: audit_backlog=65 > audit_backlog_limit=64 [ 269.074577][ T5821] audit: audit_backlog=65 > audit_backlog_limit=64 [ 269.085870][ T8838] audit: audit_lost=1895 audit_rate_limit=0 audit_backlog_limit=64 [ 269.094208][ T8837] audit: audit_lost=1896 audit_rate_limit=0 audit_backlog_limit=64 [ 269.102723][ T8837] audit: backlog limit exceeded [ 269.553216][ T8845] netlink: 'syz.2.865': attribute type 10 has an invalid length. [ 269.655422][ T8845] bridge0: port 2(bridge_slave_1) entered blocking state [ 269.662570][ T8845] bridge0: port 2(bridge_slave_1) entered listening state [ 269.670594][ T8845] bridge0: port 1(bridge_slave_0) entered blocking state [ 269.677714][ T8845] bridge0: port 1(bridge_slave_0) entered listening state [ 269.710411][ T8845] bond0: (slave bridge0): Enslaving as an active interface with a down link [ 269.724086][ T8851] netlink: 72 bytes leftover after parsing attributes in process `syz.3.867'. [ 269.774279][ T8851] netlink: 12 bytes leftover after parsing attributes in process `syz.3.867'. [ 270.207909][ T8863] bond0: option fail_over_mac: unable to set because the bond device has slaves [ 270.278663][ T8862] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 270.292466][ T8866] netlink: 'syz.3.873': attribute type 10 has an invalid length. [ 270.337784][ T7877] bond0: (slave wlan1): link status definitely down, disabling slave [ 270.487097][ T8866] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.494532][ T8866] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.697998][ T8866] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.705170][ T8866] bridge0: port 2(bridge_slave_1) entered forwarding state [ 270.712529][ T8866] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.719673][ T8866] bridge0: port 1(bridge_slave_0) entered forwarding state [ 270.795287][ T8866] bond0: (slave bridge0): Enslaving as an active interface with an up link [ 270.829036][ T8859] IPv6: NLM_F_CREATE should be specified when creating new route [ 271.247918][ T8880] netlink: 68 bytes leftover after parsing attributes in process `syz.2.875'. [ 271.293522][ T8881] 9pnet_virtio: no channels available for device 127.0.0.1 [ 271.537917][ T8884] syzkaller0: entered promiscuous mode [ 271.735478][ C1] bridge0: port 1(bridge_slave_0) entered learning state [ 271.743639][ C1] bridge0: port 2(bridge_slave_1) entered learning state [ 273.514841][ T8927] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.708528][ T8927] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 273.726489][ T30] kauditd_printk_skb: 718 callbacks suppressed [ 273.726504][ T30] audit: type=1400 audit(1743183054.939:7534): avc: denied { map_create } for pid=8933 comm="syz.3.899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 273.762045][ T8919] xt_CT: No such helper "snmp_trap" [ 273.815188][ C1] bridge0: port 2(bridge_slave_1) entered forwarding state [ 273.822453][ C1] bridge0: topology change detected, propagating [ 273.829034][ C1] bridge0: port 1(bridge_slave_0) entered forwarding state [ 273.836350][ C1] bridge0: topology change detected, propagating [ 273.854298][ T30] audit: type=1400 audit(1743183054.939:7535): avc: denied { map_read map_write } for pid=8933 comm="syz.3.899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 273.949520][ T30] audit: type=1400 audit(1743183054.939:7536): avc: denied { prog_load } for pid=8933 comm="syz.3.899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 273.970866][ T8927] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 274.034250][ T30] audit: type=1400 audit(1743183054.949:7537): avc: denied { bpf } for pid=8933 comm="syz.3.899" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 274.117892][ T30] audit: type=1400 audit(1743183054.949:7538): avc: denied { prog_load } for pid=8933 comm="syz.3.899" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 274.215574][ T30] audit: type=1400 audit(1743183054.959:7539): avc: denied { bpf } for pid=8933 comm="syz.3.899" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 274.420388][ T8944] audit: audit_backlog=65 > audit_backlog_limit=64 [ 274.426988][ T8944] audit: audit_lost=1900 audit_rate_limit=0 audit_backlog_limit=64 [ 274.434940][ T8944] audit: backlog limit exceeded [ 274.444193][ T8944] audit: audit_backlog=65 > audit_backlog_limit=64 [ 274.617981][ T8927] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 274.766698][ T8927] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.837772][ T8927] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.863296][ T8927] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 274.909221][ T8927] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.098048][ T8951] ieee802154 phy0 wpan0: encryption failed: -22 [ 275.705632][ T8962] netlink: 12 bytes leftover after parsing attributes in process `syz.1.907'. [ 276.398741][ T3456] batman_adv: batadv1: adding TT local entry 33:33:00:00:00:01 to non-existent VLAN -1 [ 276.484651][ T8966] xt_CT: No such helper "snmp_trap" [ 276.926304][ T8977] netlink: 12 bytes leftover after parsing attributes in process `syz.0.913'. [ 277.035530][ T8982] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 278.097887][ T8986] lo speed is unknown, defaulting to 1000 [ 278.757188][ T30] kauditd_printk_skb: 547 callbacks suppressed [ 278.757204][ T30] audit: type=1400 audit(1743183059.969:8064): avc: denied { search } for pid=8996 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 278.859609][ T30] audit: type=1400 audit(1743183059.969:8065): avc: denied { search } for pid=8996 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=1703 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 278.962715][ T30] audit: type=1400 audit(1743183059.969:8066): avc: denied { search } for pid=8996 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=1707 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 279.058328][ T30] audit: type=1400 audit(1743183059.969:8067): avc: denied { read } for pid=8996 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=1708 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 279.098262][ T9013] audit: audit_backlog=65 > audit_backlog_limit=64 [ 279.105903][ T9012] audit: audit_backlog=65 > audit_backlog_limit=64 [ 279.112420][ T9012] audit: audit_lost=1909 audit_rate_limit=0 audit_backlog_limit=64 [ 279.153339][ T9013] audit: audit_lost=1910 audit_rate_limit=0 audit_backlog_limit=64 [ 279.157365][ T30] audit: type=1400 audit(1743183059.969:8068): avc: denied { read open } for pid=8996 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=1708 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 279.175540][ T9013] audit: backlog limit exceeded [ 279.362993][ T9021] netlink: 12 bytes leftover after parsing attributes in process `syz.4.928'. [ 279.616568][ T9024] bond0: option fail_over_mac: unable to set because the bond device has slaves [ 279.657258][ T9024] netlink: 'syz.0.930': attribute type 10 has an invalid length. [ 280.391093][ T9048] 9pnet_virtio: no channels available for device 127.0.0.1 [ 280.609476][ T9053] 9pnet_fd: p9_fd_create_tcp (9053): problem connecting socket to 127.0.0.1 [ 281.078059][ T9054] sg_write: data in/out 768/1 bytes for SCSI command 0x0-- guessing data in; [ 281.078059][ T9054] program syz.2.937 not setting count and/or reply_len properly [ 281.455039][ T9065] wireguard0: entered promiscuous mode [ 281.460559][ T9065] wireguard0: entered allmulticast mode [ 281.737216][ T9073] netlink: 12 bytes leftover after parsing attributes in process `syz.1.944'. [ 282.129091][ T9082] netlink: 36 bytes leftover after parsing attributes in process `syz.2.946'. [ 282.154653][ T9082] netlink: 16 bytes leftover after parsing attributes in process `syz.2.946'. [ 282.163559][ T9082] netlink: 36 bytes leftover after parsing attributes in process `syz.2.946'. [ 282.264388][ T9082] netlink: 36 bytes leftover after parsing attributes in process `syz.2.946'. [ 282.385380][ T9089] netlink: 8 bytes leftover after parsing attributes in process `syz.3.949'. [ 283.341826][ T9108] 9pnet_virtio: no channels available for device 127.0.0.1 [ 283.689630][ T9109] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 283.813025][ T30] kauditd_printk_skb: 627 callbacks suppressed [ 283.813040][ T30] audit: type=1400 audit(1743183065.019:8620): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 283.887348][ T9109] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 283.898969][ T30] audit: type=1400 audit(1743183065.039:8621): avc: denied { create } for pid=9117 comm="syz.0.961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 283.953988][ T30] audit: type=1400 audit(1743183065.049:8622): avc: denied { create } for pid=9117 comm="syz.0.961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 284.017408][ T30] audit: type=1400 audit(1743183065.059:8623): avc: denied { bind } for pid=9117 comm="syz.0.961" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 284.112872][ T9109] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.143536][ T30] audit: type=1400 audit(1743183065.069:8624): avc: denied { read write open } for pid=5827 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 284.254210][ T30] audit: type=1400 audit(1743183065.069:8625): avc: denied { ioctl } for pid=5827 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 284.354292][ T30] audit: type=1400 audit(1743183065.079:8626): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 284.434585][ T30] audit: type=1400 audit(1743183065.099:8627): avc: denied { search } for pid=5177 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 284.511112][ T30] audit: type=1400 audit(1743183065.099:8628): avc: denied { append } for pid=5177 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 284.570873][ T9109] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.610140][ T30] audit: type=1400 audit(1743183065.099:8629): avc: denied { append open } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 284.667806][ T9125] geneve0: entered allmulticast mode [ 284.802742][ T9073] Set syz1 is full, maxelem 65536 reached [ 284.819471][ T9109] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 284.896101][ T9109] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 284.958506][ T9109] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 285.036543][ T9109] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 286.141956][ T9149] lo speed is unknown, defaulting to 1000 [ 286.218561][ T5867] IPVS: starting estimator thread 0... [ 286.243012][ T9151] netlink: 20 bytes leftover after parsing attributes in process `syz.1.974'. [ 286.324268][ T9152] IPVS: using max 46 ests per chain, 110400 per kthread [ 286.515854][ T9151] netdevsim netdevsim1 netdevsim0: set [1, 1] type 2 family 0 port 20000 - 0 [ 286.612860][ T9151] netdevsim netdevsim1 netdevsim1: set [1, 1] type 2 family 0 port 20000 - 0 [ 286.642855][ T9163] 9pnet_fd: p9_fd_create_tcp (9163): problem connecting socket to 127.0.0.1 [ 286.694241][ T9151] netdevsim netdevsim1 netdevsim2: set [1, 1] type 2 family 0 port 20000 - 0 [ 286.714916][ T9151] netdevsim netdevsim1 netdevsim3: set [1, 1] type 2 family 0 port 20000 - 0 [ 286.755687][ T9151] geneve2: entered promiscuous mode [ 286.777461][ T9151] geneve2: entered allmulticast mode [ 288.673884][ T9194] IPVS: Error connecting to the multicast addr [ 288.892020][ T30] kauditd_printk_skb: 646 callbacks suppressed [ 288.892035][ T30] audit: type=1400 audit(1743183070.099:9276): avc: denied { read write } for pid=5831 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 289.044342][ T30] audit: type=1400 audit(1743183070.119:9277): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 289.154338][ T30] audit: type=1400 audit(1743183070.119:9278): avc: denied { search } for pid=5177 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 289.257687][ T30] audit: type=1400 audit(1743183070.119:9279): avc: denied { append } for pid=5177 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 289.372490][ T30] audit: type=1400 audit(1743183070.119:9280): avc: denied { append open } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 289.390560][ T5817] audit: audit_backlog=65 > audit_backlog_limit=64 [ 289.403886][ T9209] audit: audit_backlog=65 > audit_backlog_limit=64 [ 289.418262][ T9209] audit: audit_lost=1936 audit_rate_limit=0 audit_backlog_limit=64 [ 289.428335][ T5817] audit: audit_lost=1937 audit_rate_limit=0 audit_backlog_limit=64 [ 289.443771][ T5821] audit: audit_backlog=65 > audit_backlog_limit=64 [ 289.894580][ T9221] 9pnet_fd: p9_fd_create_tcp (9221): problem connecting socket to 127.0.0.1 [ 290.746723][ T9243] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1011'. [ 291.449018][ T9245] xt_CT: No such helper "snmp_trap" [ 291.862967][ T9259] IPv6: NLM_F_CREATE should be specified when creating new route [ 292.508163][ T9272] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1021'. [ 292.550897][ T9272] IPVS: Error joining to the multicast group [ 293.054411][ T9280] SELinux: Context Ëö is not valid (left unmapped). [ 293.740640][ T9296] 9pnet_fd: p9_fd_create_tcp (9296): problem connecting socket to 127.0.0.1 [ 293.895979][ T30] kauditd_printk_skb: 657 callbacks suppressed [ 293.895995][ T30] audit: type=1400 audit(1743183075.109:9901): avc: denied { write } for pid=9292 comm="syz.3.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 294.014485][ T30] audit: type=1400 audit(1743183075.109:9902): avc: denied { create } for pid=9292 comm="syz.3.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 294.098115][ T30] audit: type=1400 audit(1743183075.109:9903): avc: denied { write } for pid=9292 comm="syz.3.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 294.188563][ T30] audit: type=1400 audit(1743183075.109:9904): avc: denied { nlmsg_write } for pid=9292 comm="syz.3.1031" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 294.272671][ T30] audit: type=1400 audit(1743183075.109:9905): avc: denied { module_request } for pid=9292 comm="syz.3.1031" kmod="crypto-rfc4543(gcm(aes))" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 294.296639][ T9308] 9pnet_fd: p9_fd_create_tcp (9308): problem connecting socket to 127.0.0.1 [ 294.383017][ T30] audit: type=1400 audit(1743183075.109:9906): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 294.499407][ T30] audit: type=1400 audit(1743183075.109:9907): avc: denied { read write open } for pid=5827 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 294.613505][ T30] audit: type=1400 audit(1743183075.109:9908): avc: denied { ioctl } for pid=5827 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 294.724268][ T30] audit: type=1400 audit(1743183075.139:9909): avc: denied { bpf } for pid=9300 comm="syz.1.1034" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 294.844856][ T30] audit: type=1400 audit(1743183075.139:9910): avc: denied { perfmon } for pid=9300 comm="syz.1.1034" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 294.982823][ T9243] Set syz1 is full, maxelem 65536 reached [ 295.663577][ T9324] xt_CT: No such helper "snmp_trap" [ 298.322055][ T9377] xt_CT: No such helper "snmp_trap" [ 298.907759][ T30] kauditd_printk_skb: 433 callbacks suppressed [ 298.907773][ T30] audit: type=1400 audit(1743183080.119:10344): avc: denied { read write open } for pid=5821 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 298.970311][ T9395] 9pnet_fd: p9_fd_create_tcp (9395): problem connecting socket to 127.0.0.1 [ 299.026746][ T30] audit: type=1400 audit(1743183080.159:10345): avc: denied { ioctl } for pid=5821 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 299.094313][ T30] audit: type=1400 audit(1743183080.159:10346): avc: denied { name_bind } for pid=9392 comm="syz.3.1065" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 299.174584][ T30] audit: type=1400 audit(1743183080.159:10347): avc: denied { node_bind } for pid=9392 comm="syz.3.1065" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 299.261436][ T30] audit: type=1400 audit(1743183080.159:10348): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 299.346615][ T30] audit: type=1400 audit(1743183080.159:10349): avc: denied { search } for pid=5177 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 299.413906][ T30] audit: type=1400 audit(1743183080.159:10350): avc: denied { append } for pid=5177 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 299.506836][ T30] audit: type=1400 audit(1743183080.159:10351): avc: denied { append open } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 299.591985][ T30] audit: type=1400 audit(1743183080.159:10352): avc: denied { getattr } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 299.650129][ T5827] audit: audit_backlog=65 > audit_backlog_limit=64 [ 300.486862][ T9418] netlink: 1196 bytes leftover after parsing attributes in process `syz.4.1074'. [ 300.519418][ T9418] openvswitch: netlink: Flow key attr not present in new flow. [ 301.315428][ T9437] syzkaller0: entered allmulticast mode [ 302.819846][ T9464] xt_CT: No such helper "snmp_trap" [ 303.709708][ T9489] netlink: 12 bytes leftover after parsing attributes in process `syz.4.1100'. [ 303.936764][ T30] kauditd_printk_skb: 401 callbacks suppressed [ 303.936779][ T30] audit: type=1400 audit(1743183085.149:10749): avc: denied { search } for pid=9474 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 304.064468][ T30] audit: type=1400 audit(1743183085.179:10750): avc: denied { search } for pid=9474 comm="rm" name="dhcpcd" dev="tmpfs" ino=1703 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 304.165051][ T30] audit: type=1400 audit(1743183085.189:10751): avc: denied { execute } for pid=9495 comm="syz.3.1103" path="/217/cpu.stat" dev="tmpfs" ino=1163 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 304.264465][ T30] audit: type=1400 audit(1743183085.189:10752): avc: denied { search } for pid=9474 comm="rm" name="hook-state" dev="tmpfs" ino=1707 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 304.464259][ T30] audit: type=1400 audit(1743183085.189:10753): avc: denied { getattr } for pid=9474 comm="rm" path="/run/dhcpcd/hook-state/resolv.conf.lapb5.dhcp" dev="tmpfs" ino=4264 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 304.641676][ T30] audit: type=1400 audit(1743183085.189:10754): avc: denied { search } for pid=9474 comm="rm" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 304.994325][ T30] audit: type=1400 audit(1743183085.199:10755): avc: denied { read write } for pid=5831 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 305.073747][ T9508] xt_CT: No such helper "snmp_trap" [ 305.138762][ T30] audit: type=1400 audit(1743183085.209:10756): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 305.160964][ T30] audit: type=1400 audit(1743183085.209:10757): avc: denied { read write open } for pid=5831 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 305.196929][ T30] audit: type=1400 audit(1743183085.209:10758): avc: denied { ioctl } for pid=5831 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 307.146230][ T9541] 9pnet_fd: Insufficient options for proto=fd [ 309.017457][ T30] kauditd_printk_skb: 382 callbacks suppressed [ 309.017474][ T30] audit: type=1400 audit(1743183090.229:11141): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 309.073770][ T9489] Set syz1 is full, maxelem 65536 reached [ 309.088525][ T30] audit: type=1400 audit(1743183090.229:11142): avc: denied { read write open } for pid=5817 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 309.233549][ T30] audit: type=1400 audit(1743183090.229:11143): avc: denied { ioctl } for pid=5817 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 309.314355][ T30] audit: type=1400 audit(1743183090.259:11144): avc: denied { create } for pid=9570 comm="syz.0.1130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 309.362585][ T9576] 9pnet_fd: Insufficient options for proto=fd [ 309.384302][ T30] audit: type=1400 audit(1743183090.269:11145): avc: denied { getopt } for pid=9570 comm="syz.0.1130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 309.441930][ T30] audit: type=1400 audit(1743183090.299:11146): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 309.501971][ T30] audit: type=1400 audit(1743183090.349:11147): avc: denied { search } for pid=5177 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 309.553716][ T30] audit: type=1400 audit(1743183090.349:11148): avc: denied { append } for pid=5177 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 309.649321][ T30] audit: type=1400 audit(1743183090.349:11149): avc: denied { append open } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 309.713178][ T5831] audit: audit_backlog=65 > audit_backlog_limit=64 [ 311.675078][ T9622] 9pnet_fd: Insufficient options for proto=fd [ 312.899650][ T9651] netlink: 10 bytes leftover after parsing attributes in process `syz.0.1161'. [ 313.722350][ T5818] block device autoloading is deprecated and will be removed. [ 313.866662][ T9658] xt_CT: No such helper "snmp_trap" [ 313.925503][ T9663] syzkaller0: entered allmulticast mode [ 314.026148][ T30] kauditd_printk_skb: 376 callbacks suppressed [ 314.026164][ T30] audit: type=1400 audit(1743183095.239:11521): avc: denied { map_create } for pid=9665 comm="syz.4.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 314.104764][ T30] audit: type=1400 audit(1743183095.239:11522): avc: denied { map_read map_write } for pid=9665 comm="syz.4.1168" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 314.112733][ T9671] 9pnet_fd: Insufficient options for proto=fd [ 314.150811][ T30] audit: type=1400 audit(1743183095.299:11523): avc: denied { create } for pid=9668 comm="syz.0.1166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 314.240478][ T9673] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1169'. [ 314.249694][ T30] audit: type=1400 audit(1743183095.319:11524): avc: denied { mounton } for pid=9668 comm="syz.0.1166" path="/245/file0" dev="tmpfs" ino=1299 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 314.334253][ T30] audit: type=1400 audit(1743183095.419:11525): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 314.437455][ T30] audit: type=1400 audit(1743183095.439:11526): avc: denied { create } for pid=9672 comm="syz.2.1169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 314.505913][ T30] audit: type=1400 audit(1743183095.439:11527): avc: denied { write } for pid=9672 comm="syz.2.1169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 314.531751][ T9675] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 314.586856][ T30] audit: type=1400 audit(1743183095.449:11528): avc: denied { read write open } for pid=5817 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 314.657748][ T9683] audit: audit_backlog=65 > audit_backlog_limit=64 [ 314.664847][ T30] audit: type=1400 audit(1743183095.449:11529): avc: denied { ioctl } for pid=5817 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 315.346084][ T9698] 9pnet_fd: Insufficient options for proto=fd [ 316.377672][ T9712] 9pnet_fd: Insufficient options for proto=fd [ 316.573022][ T9717] netlink: 24 bytes leftover after parsing attributes in process `syz.1.1185'. [ 316.696990][ T1295] ieee802154 phy0 wpan0: encryption failed: -22 [ 318.940681][ T9750] 9pnet_fd: Insufficient options for proto=fd [ 319.215046][ T30] kauditd_printk_skb: 362 callbacks suppressed [ 319.215061][ T30] audit: type=1400 audit(1743183100.429:11875): avc: denied { create } for pid=9751 comm="syz.0.1198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 319.258265][ T30] audit: type=1400 audit(1743183100.469:11876): avc: denied { write } for pid=9751 comm="syz.0.1198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 319.260010][ T9752] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1198'. [ 319.282447][ T30] audit: type=1400 audit(1743183100.469:11877): avc: denied { write } for pid=9751 comm="syz.0.1198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 319.360131][ T30] audit: type=1400 audit(1743183100.569:11878): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 319.399181][ T30] audit: type=1400 audit(1743183100.569:11879): avc: denied { read write open } for pid=5821 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 319.433381][ T30] audit: type=1400 audit(1743183100.569:11880): avc: denied { ioctl } for pid=5821 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 319.514839][ T30] audit: type=1400 audit(1743183100.709:11881): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=3038 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 319.596970][ T30] audit: type=1400 audit(1743183100.709:11882): avc: denied { read write open } for pid=5818 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=3038 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 319.635264][ T30] audit: type=1400 audit(1743183100.709:11883): avc: denied { ioctl } for pid=5818 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=3038 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 319.670434][ T30] audit: type=1400 audit(1743183100.739:11884): avc: denied { map_create } for pid=9753 comm="syz.1.1199" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 322.232568][ T9789] xt_CT: No such helper "snmp_trap" [ 324.045754][ T9810] syzkaller0: left promiscuous mode [ 324.054437][ T9810] syzkaller0: left allmulticast mode [ 324.228130][ T30] kauditd_printk_skb: 307 callbacks suppressed [ 324.228146][ T30] audit: type=1400 audit(1743183105.439:12192): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 324.319996][ T30] audit: type=1400 audit(1743183105.469:12193): avc: denied { read write open } for pid=5827 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 324.404242][ T30] audit: type=1400 audit(1743183105.469:12194): avc: denied { ioctl } for pid=5827 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 324.482156][ T9824] 9pnet_fd: Insufficient options for proto=fd [ 324.494312][ T30] audit: type=1400 audit(1743183105.469:12195): avc: denied { write } for pid=9821 comm="syz.0.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 324.566131][ T30] audit: type=1400 audit(1743183105.479:12196): avc: denied { write } for pid=9821 comm="syz.0.1223" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 324.597684][ T9828] 9pnet_fd: Insufficient options for proto=fd [ 324.638485][ T30] audit: type=1400 audit(1743183105.479:12197): avc: denied { read write open } for pid=5821 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 324.718778][ T30] audit: type=1400 audit(1743183105.479:12198): avc: denied { ioctl } for pid=5821 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 324.832061][ T30] audit: type=1400 audit(1743183105.519:12199): avc: denied { read write } for pid=5831 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 324.911198][ T30] audit: type=1400 audit(1743183105.519:12200): avc: denied { read write open } for pid=5831 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 325.460319][ T30] audit: type=1400 audit(1743183105.519:12201): avc: denied { ioctl } for pid=5831 comm="syz-executor" path="/dev/loop2" dev="devtmpfs" ino=649 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 326.513032][ T9859] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1237'. [ 327.335391][ T9869] syzkaller0: entered promiscuous mode [ 327.340907][ T9869] syzkaller0: entered allmulticast mode [ 328.014024][ T9812] Set syz1 is full, maxelem 65536 reached [ 328.028900][ T9886] sg_write: data in/out 768/1 bytes for SCSI command 0x0-- guessing data in; [ 328.028900][ T9886] program syz.4.1246 not setting count and/or reply_len properly [ 328.271833][ T9888] 9pnet_fd: Insufficient options for proto=fd [ 328.414653][ T9890] 9pnet_fd: Insufficient options for proto=fd [ 328.627044][ T9894] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1250'. [ 329.086661][ T9905] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 329.238819][ T30] kauditd_printk_skb: 344 callbacks suppressed [ 329.238834][ T30] audit: type=1400 audit(1743183110.459:12546): avc: denied { prog_load } for pid=9907 comm="syz.0.1256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 329.308086][ T30] audit: type=1400 audit(1743183110.459:12547): avc: denied { bpf } for pid=9907 comm="syz.0.1256" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 329.344676][ T30] audit: type=1400 audit(1743183110.459:12548): avc: denied { prog_load } for pid=9907 comm="syz.0.1256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 329.368823][ T30] audit: type=1400 audit(1743183110.459:12549): avc: denied { bpf } for pid=9907 comm="syz.0.1256" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 329.402317][ T30] audit: type=1400 audit(1743183110.459:12550): avc: denied { perfmon } for pid=9907 comm="syz.0.1256" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 329.428741][ T30] audit: type=1400 audit(1743183110.459:12551): avc: denied { perfmon } for pid=9907 comm="syz.0.1256" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 329.460807][ T30] audit: type=1400 audit(1743183110.469:12552): avc: denied { perfmon } for pid=9907 comm="syz.0.1256" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 329.539102][ T30] audit: type=1400 audit(1743183110.469:12553): avc: denied { perfmon } for pid=9907 comm="syz.0.1256" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 329.614359][ T30] audit: type=1400 audit(1743183110.469:12554): avc: denied { perfmon } for pid=9907 comm="syz.0.1256" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 329.684325][ T30] audit: type=1400 audit(1743183110.469:12555): avc: denied { bpf } for pid=9907 comm="syz.0.1256" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 330.968496][ T9926] 9pnet_fd: Insufficient options for proto=fd [ 331.040932][ T9932] 9pnet_fd: Insufficient options for proto=fd [ 331.168086][ T9936] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1264'. [ 331.438859][ T9947] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 331.790004][ T9954] netlink: 4 bytes leftover after parsing attributes in process `syz.2.1270'. [ 332.680774][ T9975] netlink: 'syz.0.1278': attribute type 10 has an invalid length. [ 333.472832][ T9987] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1284'. [ 333.844917][ T9991] 9pnet_fd: Insufficient options for proto=fd [ 334.259023][ T30] kauditd_printk_skb: 385 callbacks suppressed [ 334.259039][ T30] audit: type=1400 audit(1743183115.469:12941): avc: denied { module_request } for pid=9992 comm="syz.3.1287" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 334.561863][ T30] audit: type=1400 audit(1743183115.769:12942): avc: denied { sys_module } for pid=9992 comm="syz.3.1287" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 334.607986][ T30] audit: type=1400 audit(1743183115.769:12943): avc: denied { module_request } for pid=9992 comm="syz.3.1287" kmod="syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 335.051996][ T9981] IPv6: NLM_F_CREATE should be specified when creating new route [ 335.097084][ T30] audit: type=1400 audit(1743183116.299:12944): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 335.154233][ T30] audit: type=1400 audit(1743183116.299:12945): avc: denied { search } for pid=5177 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 335.204855][ T30] audit: type=1400 audit(1743183116.299:12946): avc: denied { append } for pid=5177 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 335.279238][ T30] audit: type=1400 audit(1743183116.299:12947): avc: denied { append open } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 335.453250][ T30] audit: type=1400 audit(1743183116.309:12948): avc: denied { getattr } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 335.490956][ T30] audit: type=1400 audit(1743183116.339:12949): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 335.558451][ T30] audit: type=1400 audit(1743183116.339:12950): avc: denied { read write open } for pid=5821 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 335.776019][T10012] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 336.115503][T10020] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1296'. [ 336.518467][T10027] netlink: 'syz.0.1299': attribute type 10 has an invalid length. [ 337.408387][T10036] xt_CT: No such helper "snmp_trap" [ 338.199496][T10009] Set syz1 is full, maxelem 65536 reached [ 339.363050][ T30] kauditd_printk_skb: 422 callbacks suppressed [ 339.363067][ T30] audit: type=1400 audit(1743183120.569:13373): avc: denied { map_create } for pid=10086 comm="syz.4.1321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 339.452183][ T30] audit: type=1400 audit(1743183120.609:13375): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 339.498904][T10076] xt_CT: No such helper "snmp_trap" [ 339.544767][ T30] audit: type=1400 audit(1743183120.609:13376): avc: denied { map_create } for pid=10087 comm="syz.0.1322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 339.599873][ T30] audit: type=1400 audit(1743183120.609:13377): avc: denied { map_read map_write } for pid=10087 comm="syz.0.1322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 339.621784][ T30] audit: type=1400 audit(1743183120.619:13378): avc: denied { search } for pid=5177 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 339.647637][ T30] audit: type=1400 audit(1743183120.609:13374): avc: denied { bpf } for pid=10086 comm="syz.4.1321" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 339.671577][ T30] audit: type=1400 audit(1743183120.619:13379): avc: denied { map_read map_write } for pid=10086 comm="syz.4.1321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 339.704063][ T30] audit: type=1400 audit(1743183120.619:13380): avc: denied { append } for pid=5177 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 339.735260][T10090] netlink: 52 bytes leftover after parsing attributes in process `syz.0.1322'. [ 339.772969][ T30] audit: type=1400 audit(1743183120.619:13381): avc: denied { prog_load } for pid=10087 comm="syz.0.1322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 339.821452][ T30] audit: type=1400 audit(1743183120.619:13382): avc: denied { append open } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 342.610673][T10119] netlink: 'syz.1.1332': attribute type 10 has an invalid length. [ 342.823997][T10109] tipc: Started in network mode [ 342.834275][T10109] tipc: Node identity , cluster identity 4711 [ 342.840374][T10109] tipc: Failed to obtain node identity [ 342.882653][T10109] tipc: Enabling of bearer rejected, failed to enable media [ 342.948245][T10118] bond0: option fail_over_mac: unable to set because the bond device has slaves [ 342.975683][T10119] bridge0: port 3(syz_tun) entered disabled state [ 342.982237][T10119] bridge0: port 2(bridge_slave_1) entered disabled state [ 344.129374][T10141] netlink: 20 bytes leftover after parsing attributes in process `syz.1.1341'. [ 344.465346][ T30] kauditd_printk_skb: 303 callbacks suppressed [ 344.465362][ T30] audit: type=1400 audit(1743183125.679:13686): avc: denied { prog_load } for pid=10142 comm="syz.0.1343" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 344.554629][ T30] audit: type=1400 audit(1743183125.699:13687): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 344.637591][ T30] audit: type=1400 audit(1743183125.699:13688): avc: denied { read write open } for pid=5821 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 344.727343][ T30] audit: type=1400 audit(1743183125.699:13689): avc: denied { ioctl } for pid=5821 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 344.727384][ T30] audit: type=1400 audit(1743183125.699:13690): avc: denied { bpf } for pid=10142 comm="syz.0.1343" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 344.727413][ T30] audit: type=1400 audit(1743183125.699:13691): avc: denied { perfmon } for pid=10142 comm="syz.0.1343" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 344.727466][ T30] audit: type=1400 audit(1743183125.719:13692): avc: denied { read write } for pid=5827 comm="syz-executor" name="loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 344.727495][ T30] audit: type=1400 audit(1743183125.719:13693): avc: denied { read write open } for pid=5827 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 344.727526][ T30] audit: type=1400 audit(1743183125.719:13694): avc: denied { ioctl } for pid=5827 comm="syz-executor" path="/dev/loop4" dev="devtmpfs" ino=651 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 344.727557][ T30] audit: type=1400 audit(1743183125.729:13695): avc: denied { perfmon } for pid=10142 comm="syz.0.1343" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 345.624995][T10174] netlink: 16 bytes leftover after parsing attributes in process `syz.4.1354'. [ 347.767619][ T188] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 347.872914][T10205] xt_CT: No such helper "snmp_trap" [ 347.975178][ T188] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 348.118699][ T188] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 348.326203][ T188] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 348.608305][ T5146] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 348.624342][ T5146] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 348.632192][ T5146] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 348.640216][ T5146] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 348.758800][ T188] bridge_slave_1: left allmulticast mode [ 348.785584][ T5146] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 348.802773][ T188] bridge_slave_1: left promiscuous mode [ 348.853510][ T188] bridge0: port 2(bridge_slave_1) entered disabled state [ 348.878009][ T5820] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 348.886353][ T5820] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 348.893576][ T5820] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 348.902853][ T5820] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 348.911453][ T5820] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 348.928365][ T188] bridge_slave_0: left allmulticast mode [ 348.964979][ T188] bridge_slave_0: left promiscuous mode [ 349.002132][ T188] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.350870][T10237] netlink: 'syz.3.1381': attribute type 10 has an invalid length. [ 349.485849][ T30] kauditd_printk_skb: 435 callbacks suppressed [ 349.485864][ T30] audit: type=1400 audit(1743183130.699:14131): avc: denied { prog_load } for pid=10238 comm="syz.1.1382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 349.556604][ T30] audit: type=1400 audit(1743183130.699:14132): avc: denied { prog_load } for pid=10240 comm="syz.0.1383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 349.614222][ T30] audit: type=1400 audit(1743183130.699:14133): avc: denied { bpf } for pid=10240 comm="syz.0.1383" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 349.674206][ T30] audit: type=1400 audit(1743183130.699:14134): avc: denied { perfmon } for pid=10240 comm="syz.0.1383" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 349.733764][ T30] audit: type=1400 audit(1743183130.699:14135): avc: denied { read write } for pid=10240 comm="syz.0.1383" name="qrtr-tun" dev="devtmpfs" ino=1309 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 349.826965][ T30] audit: type=1400 audit(1743183130.729:14136): avc: denied { read write open } for pid=10240 comm="syz.0.1383" path="/dev/qrtr-tun" dev="devtmpfs" ino=1309 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 349.886739][ T30] audit: type=1400 audit(1743183130.729:14137): avc: denied { bpf } for pid=10238 comm="syz.1.1382" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 349.962488][ T30] audit: type=1400 audit(1743183130.729:14138): avc: denied { perfmon } for pid=10238 comm="syz.1.1382" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 349.997245][ T30] audit: type=1400 audit(1743183130.729:14139): avc: denied { perfmon } for pid=10238 comm="syz.1.1382" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 350.144347][ T30] audit: type=1400 audit(1743183130.729:14140): avc: denied { perfmon } for pid=10238 comm="syz.1.1382" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 350.581126][ T188] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 350.629692][ T188] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 350.669869][ T188] bond0 (unregistering): Released all slaves [ 350.709310][T10236] bond0: option fail_over_mac: unable to set because the bond device has slaves [ 350.728356][T10237] bridge0: port 2(bridge_slave_1) entered disabled state [ 350.735632][T10237] bridge0: port 1(bridge_slave_0) entered disabled state [ 350.790303][T10224] lo speed is unknown, defaulting to 1000 [ 351.051860][ T5820] Bluetooth: hci3: command tx timeout [ 352.138426][T10224] chnl_net:caif_netlink_parms(): no params data found [ 353.096659][ T5820] Bluetooth: hci3: command tx timeout [ 354.504049][ T30] kauditd_printk_skb: 312 callbacks suppressed [ 354.504065][ T30] audit: type=1400 audit(1743183135.709:14453): avc: denied { read write } for pid=5821 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 354.574208][ T30] audit: type=1400 audit(1743183135.729:14454): avc: denied { read write open } for pid=5821 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 354.680093][ T30] audit: type=1400 audit(1743183135.729:14455): avc: denied { ioctl } for pid=5821 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=648 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 354.795504][ T30] audit: type=1400 audit(1743183135.769:14456): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 354.893344][ T30] audit: type=1400 audit(1743183135.779:14457): avc: denied { search } for pid=5177 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 354.999527][ T30] audit: type=1400 audit(1743183135.779:14458): avc: denied { append } for pid=5177 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 355.037908][T10303] netlink: 'syz.0.1403': attribute type 10 has an invalid length. [ 355.094322][ T30] audit: type=1400 audit(1743183135.779:14459): avc: denied { append open } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 355.175010][ T5820] Bluetooth: hci3: command tx timeout [ 355.196632][ T30] audit: type=1400 audit(1743183135.779:14460): avc: denied { getattr } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 355.239296][ T30] audit: type=1400 audit(1743183135.869:14461): avc: denied { read write } for pid=5818 comm="syz-executor" name="loop0" dev="devtmpfs" ino=3038 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 355.274281][ T30] audit: type=1400 audit(1743183135.869:14462): avc: denied { read write open } for pid=5818 comm="syz-executor" path="/dev/loop0" dev="devtmpfs" ino=3038 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 355.716442][T10307] capability: warning: `syz.1.1405' uses 32-bit capabilities (legacy support in use) [ 357.255925][ T5820] Bluetooth: hci3: command tx timeout [ 360.139425][ T188] hsr_slave_0: left promiscuous mode [ 360.164492][ T188] hsr_slave_1: left promiscuous mode [ 360.184833][ T188] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 360.192303][ T188] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 360.199524][ T30] kauditd_printk_skb: 61 callbacks suppressed [ 360.199536][ T30] audit: type=1400 audit(1743183141.399:14524): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 360.292263][ T188] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 360.300682][ T30] audit: type=1400 audit(1743183141.399:14525): avc: denied { search } for pid=5177 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 360.335757][ T188] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 360.384415][ T30] audit: type=1400 audit(1743183141.399:14526): avc: denied { append } for pid=5177 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 360.412521][ T188] veth1_macvtap: left promiscuous mode [ 360.434561][ T188] veth0_macvtap: left promiscuous mode [ 360.454341][ T188] veth1_vlan: left promiscuous mode [ 360.459853][ T188] veth0_vlan: left promiscuous mode [ 360.496772][ T30] audit: type=1400 audit(1743183141.399:14527): avc: denied { append open } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 360.564499][ T30] audit: type=1400 audit(1743183141.399:14528): avc: denied { getattr } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 360.654304][ T30] audit: type=1400 audit(1743183141.489:14529): avc: denied { read write } for pid=5817 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 360.776696][ T30] audit: type=1400 audit(1743183141.489:14530): avc: denied { read write open } for pid=5817 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 360.864413][ T5866] page_pool_release_retry() stalled pool shutdown: id 28, 1 inflight 60 sec [ 360.892719][ T30] audit: type=1400 audit(1743183141.489:14531): avc: denied { ioctl } for pid=5817 comm="syz-executor" path="/dev/loop3" dev="devtmpfs" ino=650 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 361.032466][ T30] audit: type=1400 audit(1743183141.849:14532): avc: denied { read write } for pid=10311 comm="syz.3.1406" name="rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 361.099241][ T30] audit: type=1400 audit(1743183141.849:14533): avc: denied { read write open } for pid=10311 comm="syz.3.1406" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=1271 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 362.990646][T10320] SELinux: ebitmap: truncated map [ 363.013716][ T188] team0 (unregistering): Port device team_slave_1 removed [ 363.104923][T10320] SELinux: failed to load policy [ 363.322607][ T188] team0 (unregistering): Port device team_slave_0 removed [ 364.661650][T10328] netlink: 8 bytes leftover after parsing attributes in process `syz.3.1412'. [ 364.793235][T10302] bond0: option fail_over_mac: unable to set because the bond device has slaves [ 364.855964][ T5867] lo speed is unknown, defaulting to 1000 [ 364.861859][ T5867] infiniband syz2: ib_query_port failed (-19) [ 365.094992][ T5867] page_pool_release_retry() stalled pool shutdown: id 29, 1 inflight 60 sec [ 365.264241][ T30] kauditd_printk_skb: 135 callbacks suppressed [ 365.264259][ T30] audit: type=1400 audit(1743183146.459:14669): avc: denied { execmem } for pid=10329 comm="syz.3.1413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 365.390952][ T30] audit: type=1400 audit(1743183146.589:14670): avc: denied { write } for pid=10335 comm="syz.0.1414" name="sg0" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 365.421849][ T30] audit: type=1400 audit(1743183146.589:14671): avc: denied { write open } for pid=10335 comm="syz.0.1414" path="/dev/sg0" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 365.448972][ T30] audit: type=1400 audit(1743183146.589:14672): avc: denied { prog_load } for pid=10334 comm="syz.2.1416" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 365.496212][ T30] audit: type=1400 audit(1743183146.589:14673): avc: denied { bpf } for pid=10334 comm="syz.2.1416" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 365.664329][ T30] audit: type=1400 audit(1743183146.589:14674): avc: denied { perfmon } for pid=10334 comm="syz.2.1416" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 365.700329][T10224] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.736424][T10224] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.780920][T10224] bridge_slave_0: entered allmulticast mode [ 365.837605][ T30] audit: type=1400 audit(1743183146.629:14675): avc: denied { bpf } for pid=10336 comm="syz.1.1415" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 365.869051][T10224] bridge_slave_0: entered promiscuous mode [ 365.907527][T10224] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.970851][T10224] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.978019][ T30] audit: type=1400 audit(1743183146.649:14676): avc: denied { read } for pid=10334 comm="syz.2.1416" name="sg0" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 366.005165][T10224] bridge_slave_1: entered allmulticast mode [ 366.011785][T10224] bridge_slave_1: entered promiscuous mode [ 366.026978][ T30] audit: type=1400 audit(1743183146.649:14677): avc: denied { read open } for pid=10334 comm="syz.2.1416" path="/dev/sg0" dev="devtmpfs" ino=765 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 366.103229][ T30] audit: type=1400 audit(1743183146.809:14678): avc: denied { prog_load } for pid=10329 comm="syz.3.1413" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 366.275147][T10224] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 366.338027][T10224] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 366.473557][T10352] netlink: 'syz.0.1417': attribute type 2 has an invalid length. [ 366.659141][T10224] team0: Port device team_slave_0 added [ 366.743863][T10224] team0: Port device team_slave_1 added [ 366.920102][T10224] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 366.944559][T10224] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 367.090782][T10224] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 367.223722][T10361] netlink: 'syz.1.1419': attribute type 27 has an invalid length. [ 367.254769][T10224] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 367.261738][T10224] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 367.456205][T10224] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 368.911089][T10361] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 368.931264][T10361] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 369.247986][T10361] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 369.289429][T10361] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 369.324210][T10361] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 369.333112][T10361] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 369.623331][T10361] netdevsim netdevsim1 netdevsim0: unset [1, 1] type 2 family 0 port 20000 - 0 [ 369.636730][T10361] netdevsim netdevsim1 netdevsim1: unset [1, 1] type 2 family 0 port 20000 - 0 [ 369.681566][T10361] netdevsim netdevsim1 netdevsim2: unset [1, 1] type 2 family 0 port 20000 - 0 [ 369.743942][T10361] netdevsim netdevsim1 netdevsim3: unset [1, 1] type 2 family 0 port 20000 - 0 [ 369.824472][T10361] geneve2: left promiscuous mode [ 369.855461][T10361] geneve2: left allmulticast mode [ 369.950495][T10359] bridge0: port 3(syz_tun) entered blocking state [ 369.957039][T10359] bridge0: port 3(syz_tun) entered forwarding state [ 370.056487][ T12] [ 370.057060][T10359] 8021q: adding VLAN 0 to HW filter on device bond0 [ 370.059051][ T12] ============================= [ 370.059070][ T12] WARNING: suspicious RCU usage [ 370.059077][ T12] 6.14.0-syzkaller-07422-gacb4f33713b9 #0 Not tainted [ 370.082223][ T12] ----------------------------- [ 370.087092][ T12] net/sched/sch_generic.c:1251 suspicious rcu_dereference_protected() usage! [ 370.095879][ T12] [ 370.095879][ T12] other info that might help us debug this: [ 370.095879][ T12] [ 370.106188][ T12] [ 370.106188][ T12] rcu_scheduler_active = 2, debug_locks = 1 [ 370.114324][ T12] 3 locks held by kworker/u8:0/12: [ 370.119429][ T12] #0: ffff88805fa77948 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 370.129965][ T12] #1: ffffc90000117d18 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 370.142272][ T12] #2: ffffffff8e3bdcc0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x134/0x2dc0 [ 370.152046][ T12] [ 370.152046][ T12] stack backtrace: [ 370.153341][T10359] 8021q: adding VLAN 0 to HW filter on device team0 [ 370.157953][ T12] CPU: 0 UID: 0 PID: 12 Comm: kworker/u8:0 Not tainted 6.14.0-syzkaller-07422-gacb4f33713b9 #0 PREEMPT(full) [ 370.157975][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 370.157986][ T12] Workqueue: bond0 bond_mii_monitor [ 370.158013][ T12] Call Trace: [ 370.158018][ T12] [ 370.158024][ T12] dump_stack_lvl+0x16c/0x1f0 [ 370.158045][ T12] lockdep_rcu_suspicious+0x166/0x260 [ 370.158070][ T12] dev_activate+0x45c/0x12d0 [ 370.158092][ T12] ? ethtool_op_get_link+0x1d/0x70 [ 370.158107][ T12] ? bond_check_dev_link+0x196/0x480 [ 370.158124][ T12] ? bond_mii_monitor+0x3c0/0x2dc0 [ 370.158143][ T12] ? process_one_work+0x9cc/0x1b70 [ 370.158158][ T12] ? worker_thread+0x6c8/0xf10 [ 370.158172][ T12] ? kthread+0x3c2/0x780 [ 370.158184][ T12] ? ret_from_fork+0x45/0x80 [ 370.158199][ T12] ? __pfx_dev_activate+0x10/0x10 [ 370.158220][ T12] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 370.158244][ T12] linkwatch_do_dev+0x13d/0x160 [ 370.158262][ T12] linkwatch_sync_dev+0x181/0x210 [ 370.158280][ T12] ? __pfx_ethtool_op_get_link+0x10/0x10 [ 370.158294][ T12] ethtool_op_get_link+0x1d/0x70 [ 370.158309][ T12] bond_check_dev_link+0x196/0x480 [ 370.158327][ T12] ? __pfx_bond_check_dev_link+0x10/0x10 [ 370.158352][ T12] bond_mii_monitor+0x3c0/0x2dc0 [ 370.158376][ T12] ? __pfx_bond_mii_monitor+0x10/0x10 [ 370.158400][ T12] ? rcu_is_watching+0x12/0xc0 [ 370.158418][ T12] process_one_work+0x9cc/0x1b70 [ 370.158437][ T12] ? __pfx_batadv_nc_worker+0x10/0x10 [ 370.158458][ T12] ? __pfx_process_one_work+0x10/0x10 [ 370.158477][ T12] ? assign_work+0x1a0/0x250 [ 370.158492][ T12] worker_thread+0x6c8/0xf10 [ 370.158522][ T12] ? __pfx_worker_thread+0x10/0x10 [ 370.158537][ T12] kthread+0x3c2/0x780 [ 370.158550][ T12] ? __pfx_kthread+0x10/0x10 [ 370.158562][ T12] ? __pfx_kthread+0x10/0x10 [ 370.158575][ T12] ? __pfx_kthread+0x10/0x10 [ 370.158587][ T12] ? __pfx_kthread+0x10/0x10 [ 370.158599][ T12] ? rcu_is_watching+0x12/0xc0 [ 370.158615][ T12] ? __pfx_kthread+0x10/0x10 [ 370.158629][ T12] ret_from_fork+0x45/0x80 [ 370.158642][ T12] ? __pfx_kthread+0x10/0x10 [ 370.158656][ T12] ret_from_fork_asm+0x1a/0x30 [ 370.158683][ T12] [ 370.287808][ T30] kauditd_printk_skb: 413 callbacks suppressed SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 370.287820][ T30] audit: type=1400 audit(1743183151.499:15092): avc: denied { search } for pid=10378 comm="sed" name="resolv.conf" dev="tmpfs" ino=1708 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 370.444217][ T12] [ 370.446599][ T12] ============================= [ 370.451435][ T12] WARNING: suspicious RCU usage [ 370.456363][ T12] 6.14.0-syzkaller-07422-gacb4f33713b9 #0 Not tainted [ 370.463119][ T12] ----------------------------- [ 370.468021][ T12] net/sched/sch_generic.c:1229 suspicious rcu_dereference_protected() usage! [ 370.477386][ T12] [ 370.477386][ T12] other info that might help us debug this: [ 370.477386][ T12] [ 370.487667][ T12] [ 370.487667][ T12] rcu_scheduler_active = 2, debug_locks = 1 [ 370.495746][ T12] 3 locks held by kworker/u8:0/12: [ 370.500854][ T12] #0: ffff88805fa77948 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 370.511250][ T12] #1: ffffc90000117d18 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 370.523717][ T12] #2: ffffffff8e3bdcc0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x134/0x2dc0 [ 370.533425][ T12] [ 370.533425][ T12] stack backtrace: [ 370.539334][ T12] CPU: 0 UID: 0 PID: 12 Comm: kworker/u8:0 Not tainted 6.14.0-syzkaller-07422-gacb4f33713b9 #0 PREEMPT(full) [ 370.539357][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 370.539369][ T12] Workqueue: bond0 bond_mii_monitor [ 370.539396][ T12] Call Trace: [ 370.539401][ T12] [ 370.539407][ T12] dump_stack_lvl+0x16c/0x1f0 [ 370.539429][ T12] lockdep_rcu_suspicious+0x166/0x260 [ 370.539456][ T12] transition_one_qdisc+0x1d4/0x210 [ 370.539481][ T12] dev_activate+0x216/0x12d0 [ 370.539505][ T12] ? worker_thread+0x6c8/0xf10 [ 370.539522][ T12] ? kthread+0x3c2/0x780 [ 370.539537][ T12] ? ret_from_fork+0x45/0x80 [ 370.539553][ T12] ? __pfx_dev_activate+0x10/0x10 [ 370.539578][ T12] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 370.539608][ T12] linkwatch_do_dev+0x13d/0x160 [ 370.539629][ T12] linkwatch_sync_dev+0x181/0x210 [ 370.539649][ T12] ? __pfx_ethtool_op_get_link+0x10/0x10 [ 370.539666][ T12] ethtool_op_get_link+0x1d/0x70 [ 370.539683][ T12] bond_check_dev_link+0x196/0x480 [ 370.539703][ T12] ? __pfx_bond_check_dev_link+0x10/0x10 [ 370.539731][ T12] bond_mii_monitor+0x3c0/0x2dc0 [ 370.539760][ T12] ? __pfx_bond_mii_monitor+0x10/0x10 [ 370.539789][ T12] ? rcu_is_watching+0x12/0xc0 [ 370.539810][ T12] process_one_work+0x9cc/0x1b70 [ 370.539832][ T12] ? __pfx_batadv_nc_worker+0x10/0x10 [ 370.539857][ T12] ? __pfx_process_one_work+0x10/0x10 [ 370.539879][ T12] ? assign_work+0x1a0/0x250 [ 370.539897][ T12] worker_thread+0x6c8/0xf10 [ 370.539922][ T12] ? __pfx_worker_thread+0x10/0x10 [ 370.539940][ T12] kthread+0x3c2/0x780 [ 370.539956][ T12] ? __pfx_kthread+0x10/0x10 [ 370.539971][ T12] ? __pfx_kthread+0x10/0x10 [ 370.539985][ T12] ? __pfx_kthread+0x10/0x10 [ 370.540000][ T12] ? __pfx_kthread+0x10/0x10 [ 370.540015][ T12] ? rcu_is_watching+0x12/0xc0 [ 370.540034][ T12] ? __pfx_kthread+0x10/0x10 [ 370.540050][ T12] ret_from_fork+0x45/0x80 [ 370.540067][ T12] ? __pfx_kthread+0x10/0x10 [ 370.540082][ T12] ret_from_fork_asm+0x1a/0x30 [ 370.540114][ T12] [ 370.770588][ T30] audit: type=1400 audit(1743183151.509:15093): avc: denied { write } for pid=5807 comm="syz-executor" path="pipe:[3834]" dev="pipefs" ino=3834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 370.844348][ T12] [ 370.846713][ T12] ============================= [ 370.851551][ T12] WARNING: suspicious RCU usage [ 370.856452][ T12] 6.14.0-syzkaller-07422-gacb4f33713b9 #0 Not tainted [ 370.863204][ T12] ----------------------------- [ 370.868157][ T12] ./include/linux/rtnetlink.h:163 suspicious rcu_dereference_protected() usage! [ 370.877188][ T12] [ 370.877188][ T12] other info that might help us debug this: [ 370.877188][ T12] [ 370.887431][ T12] [ 370.887431][ T12] rcu_scheduler_active = 2, debug_locks = 1 [ 370.895509][ T12] 3 locks held by kworker/u8:0/12: [ 370.900615][ T12] #0: ffff88805fa77948 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 370.911013][ T12] #1: ffffc90000117d18 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 370.923340][ T12] #2: ffffffff8e3bdcc0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x134/0x2dc0 [ 370.933026][ T12] [ 370.933026][ T12] stack backtrace: [ 370.938980][ T12] CPU: 0 UID: 0 PID: 12 Comm: kworker/u8:0 Not tainted 6.14.0-syzkaller-07422-gacb4f33713b9 #0 PREEMPT(full) [ 370.939003][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 370.939014][ T12] Workqueue: bond0 bond_mii_monitor [ 370.939042][ T12] Call Trace: [ 370.939047][ T12] [ 370.939054][ T12] dump_stack_lvl+0x16c/0x1f0 [ 370.939076][ T12] lockdep_rcu_suspicious+0x166/0x260 [ 370.939103][ T12] dev_activate+0x7f8/0x12d0 [ 370.939129][ T12] ? worker_thread+0x6c8/0xf10 [ 370.939147][ T12] ? kthread+0x3c2/0x780 [ 370.939161][ T12] ? ret_from_fork+0x45/0x80 [ 370.939178][ T12] ? __pfx_dev_activate+0x10/0x10 [ 370.939203][ T12] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 370.939233][ T12] linkwatch_do_dev+0x13d/0x160 [ 370.939254][ T12] linkwatch_sync_dev+0x181/0x210 [ 370.939275][ T12] ? __pfx_ethtool_op_get_link+0x10/0x10 [ 370.939293][ T12] ethtool_op_get_link+0x1d/0x70 [ 370.939310][ T12] bond_check_dev_link+0x196/0x480 [ 370.939331][ T12] ? __pfx_bond_check_dev_link+0x10/0x10 [ 370.939360][ T12] bond_mii_monitor+0x3c0/0x2dc0 [ 370.939389][ T12] ? __pfx_bond_mii_monitor+0x10/0x10 [ 370.939418][ T12] ? rcu_is_watching+0x12/0xc0 [ 370.939439][ T12] process_one_work+0x9cc/0x1b70 [ 370.939461][ T12] ? __pfx_batadv_nc_worker+0x10/0x10 [ 370.939485][ T12] ? __pfx_process_one_work+0x10/0x10 [ 370.939513][ T12] ? assign_work+0x1a0/0x250 [ 370.939530][ T12] worker_thread+0x6c8/0xf10 [ 370.939555][ T12] ? __pfx_worker_thread+0x10/0x10 [ 370.939573][ T12] kthread+0x3c2/0x780 [ 370.939588][ T12] ? __pfx_kthread+0x10/0x10 [ 370.939603][ T12] ? __pfx_kthread+0x10/0x10 [ 370.939617][ T12] ? __pfx_kthread+0x10/0x10 [ 370.939632][ T12] ? __pfx_kthread+0x10/0x10 [ 370.939645][ T12] ? rcu_is_watching+0x12/0xc0 [ 370.939664][ T12] ? __pfx_kthread+0x10/0x10 [ 370.939679][ T12] ret_from_fork+0x45/0x80 [ 370.939695][ T12] ? __pfx_kthread+0x10/0x10 [ 370.939711][ T12] ret_from_fork_asm+0x1a/0x30 [ 370.939744][ T12] [ 370.939759][ T12] BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523 [ 371.054245][ T30] audit: type=1400 audit(1743183151.509:15094): avc: denied { write } for pid=5807 comm="syz-executor" path="pipe:[3834]" dev="pipefs" ino=3834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 371.239019][ T6460] raw-gadget.0 gadget.2: failed to queue disconnect event [ 371.376152][ T12] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 12, name: kworker/u8:0 [ 371.414948][ T30] audit: type=1400 audit(1743183151.509:15095): avc: denied { write } for pid=5807 comm="syz-executor" path="pipe:[3834]" dev="pipefs" ino=3834 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 371.424265][ T12] preempt_count: 0, expected: 0 [ 371.484187][ T12] RCU nest depth: 1, expected: 0 [ 371.489159][ T12] 3 locks held by kworker/u8:0/12: [ 371.514163][ T12] #0: ffff88805fa77948 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 371.521086][ T30] audit: type=1400 audit(1743183151.619:15096): avc: denied { read } for pid=10378 comm="sed" name="eth0.dhcp" dev="tmpfs" ino=1749 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 371.544195][ T12] #1: ffffc90000117d18 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 371.572895][ T30] audit: type=1400 audit(1743183151.619:15097): avc: denied { read open } for pid=10378 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=1749 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 371.604256][ T12] #2: ffffffff8e3bdcc0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x134/0x2dc0 [ 371.613973][ T12] CPU: 1 UID: 0 PID: 12 Comm: kworker/u8:0 Not tainted 6.14.0-syzkaller-07422-gacb4f33713b9 #0 PREEMPT(full) [ 371.613995][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 371.614006][ T12] Workqueue: bond0 bond_mii_monitor [ 371.614034][ T12] Call Trace: [ 371.614039][ T12] [ 371.614045][ T12] dump_stack_lvl+0x16c/0x1f0 [ 371.614067][ T12] __might_resched+0x3c0/0x5e0 [ 371.614089][ T12] ? __pfx___might_resched+0x10/0x10 [ 371.614114][ T12] down_read+0x74/0x480 [ 371.614136][ T12] ? __pfx_down_read+0x10/0x10 [ 371.614154][ T12] ? dev_map_notification+0x6a/0xb00 [ 371.614174][ T12] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 371.614203][ T12] wireless_nlevent_flush+0x1b/0x100 [ 371.614220][ T12] wext_netdev_notifier_call+0xe/0x20 [ 371.614235][ T12] notifier_call_chain+0xb9/0x410 [ 371.614256][ T12] ? __pfx_wext_netdev_notifier_call+0x10/0x10 [ 371.614275][ T12] call_netdevice_notifiers_info+0xbe/0x140 [ 371.614298][ T12] netdev_state_change+0x113/0x150 [ 371.614317][ T12] ? __pfx_netdev_state_change+0x10/0x10 [ 371.614339][ T12] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 371.614367][ T12] linkwatch_do_dev+0x12b/0x160 [ 371.614388][ T12] linkwatch_sync_dev+0x181/0x210 [ 371.614409][ T12] ? __pfx_ethtool_op_get_link+0x10/0x10 [ 371.614427][ T12] ethtool_op_get_link+0x1d/0x70 [ 371.614444][ T12] bond_check_dev_link+0x196/0x480 [ 371.614465][ T12] ? __pfx_bond_check_dev_link+0x10/0x10 [ 371.614499][ T12] bond_mii_monitor+0x3c0/0x2dc0 [ 371.614529][ T12] ? __pfx_bond_mii_monitor+0x10/0x10 [ 371.614558][ T12] ? rcu_is_watching+0x12/0xc0 [ 371.614579][ T12] process_one_work+0x9cc/0x1b70 [ 371.614602][ T12] ? __pfx_batadv_nc_worker+0x10/0x10 [ 371.614627][ T12] ? __pfx_process_one_work+0x10/0x10 [ 371.614649][ T12] ? assign_work+0x1a0/0x250 [ 371.614667][ T12] worker_thread+0x6c8/0xf10 [ 371.614691][ T12] ? __pfx_worker_thread+0x10/0x10 [ 371.614707][ T12] kthread+0x3c2/0x780 [ 371.614722][ T12] ? __pfx_kthread+0x10/0x10 [ 371.614736][ T12] ? __pfx_kthread+0x10/0x10 [ 371.614751][ T12] ? __pfx_kthread+0x10/0x10 [ 371.614766][ T12] ? __pfx_kthread+0x10/0x10 [ 371.614780][ T12] ? rcu_is_watching+0x12/0xc0 [ 371.614798][ T12] ? __pfx_kthread+0x10/0x10 [ 371.614814][ T12] ret_from_fork+0x45/0x80 [ 371.614830][ T12] ? __pfx_kthread+0x10/0x10 [ 371.614845][ T12] ret_from_fork_asm+0x1a/0x30 [ 371.614878][ T12] [ 371.711581][ T30] audit: type=1400 audit(1743183151.629:15098): avc: denied { getattr } for pid=10378 comm="sed" path="/run/dhcpcd/hook-state/resolv.conf/eth0.dhcp" dev="tmpfs" ino=1749 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 371.797560][ T12] [ 371.878646][ T12] ============================= [ 371.883467][ T12] [ BUG: Invalid wait context ] [ 371.888292][ T12] 6.14.0-syzkaller-07422-gacb4f33713b9 #0 Tainted: G W [ 371.896505][ T12] ----------------------------- [ 371.901323][ T12] kworker/u8:0/12 is trying to lock: [ 371.906616][ T12] ffffffff900f3f90 (net_rwsem){++++}-{4:4}, at: wireless_nlevent_flush+0x1b/0x100 [ 371.915811][ T12] other info that might help us debug this: [ 371.921671][ T12] context-{5:5} [ 371.925101][ T12] 3 locks held by kworker/u8:0/12: [ 371.930183][ T12] #0: ffff88805fa77948 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work+0x12a2/0x1b70 [ 371.940514][ T12] #1: ffffc90000117d18 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work+0x929/0x1b70 [ 371.952748][ T12] #2: ffffffff8e3bdcc0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x134/0x2dc0 [ 371.962383][ T12] stack backtrace: [ 371.966077][ T12] CPU: 1 UID: 0 PID: 12 Comm: kworker/u8:0 Tainted: G W 6.14.0-syzkaller-07422-gacb4f33713b9 #0 PREEMPT(full) [ 371.966104][ T12] Tainted: [W]=WARN [ 371.966109][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 371.966117][ T12] Workqueue: bond0 bond_mii_monitor [ 371.966136][ T12] Call Trace: [ 371.966140][ T12] [ 371.966145][ T12] dump_stack_lvl+0x116/0x1f0 [ 371.966162][ T12] __lock_acquire+0x3ff/0x1ba0 [ 371.966182][ T12] ? dump_stack_lvl+0x197/0x1f0 [ 371.966197][ T12] lock_acquire+0x179/0x350 [ 371.966215][ T12] ? wireless_nlevent_flush+0x1b/0x100 [ 371.966227][ T12] ? __pfx___might_resched+0x10/0x10 [ 371.966245][ T12] down_read+0x9b/0x480 [ 371.966262][ T12] ? wireless_nlevent_flush+0x1b/0x100 [ 371.966274][ T12] ? __pfx_down_read+0x10/0x10 [ 371.966289][ T12] ? dev_map_notification+0x6a/0xb00 [ 371.966304][ T12] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 371.966326][ T12] wireless_nlevent_flush+0x1b/0x100 [ 371.966338][ T12] wext_netdev_notifier_call+0xe/0x20 [ 371.966350][ T12] notifier_call_chain+0xb9/0x410 [ 371.966368][ T12] ? __pfx_wext_netdev_notifier_call+0x10/0x10 [ 371.966381][ T12] call_netdevice_notifiers_info+0xbe/0x140 [ 371.966399][ T12] netdev_state_change+0x113/0x150 [ 371.966413][ T12] ? __pfx_netdev_state_change+0x10/0x10 [ 371.966428][ T12] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 371.966449][ T12] linkwatch_do_dev+0x12b/0x160 [ 371.966464][ T12] linkwatch_sync_dev+0x181/0x210 [ 371.966479][ T12] ? __pfx_ethtool_op_get_link+0x10/0x10 [ 371.966493][ T12] ethtool_op_get_link+0x1d/0x70 [ 371.966510][ T12] bond_check_dev_link+0x196/0x480 [ 371.966526][ T12] ? __pfx_bond_check_dev_link+0x10/0x10 [ 371.966544][ T12] bond_mii_monitor+0x3c0/0x2dc0 [ 371.966563][ T12] ? __pfx_bond_mii_monitor+0x10/0x10 [ 371.966583][ T12] ? rcu_is_watching+0x12/0xc0 [ 371.966599][ T12] process_one_work+0x9cc/0x1b70 [ 371.966613][ T12] ? __pfx_batadv_nc_worker+0x10/0x10 [ 371.966632][ T12] ? __pfx_process_one_work+0x10/0x10 [ 371.966647][ T12] ? assign_work+0x1a0/0x250 [ 371.966659][ T12] worker_thread+0x6c8/0xf10 [ 371.966675][ T12] ? __pfx_worker_thread+0x10/0x10 [ 371.966688][ T12] kthread+0x3c2/0x780 [ 371.966699][ T12] ? __pfx_kthread+0x10/0x10 [ 371.966710][ T12] ? __pfx_kthread+0x10/0x10 [ 371.966720][ T12] ? __pfx_kthread+0x10/0x10 [ 371.966731][ T12] ? __pfx_kthread+0x10/0x10 [ 371.966742][ T12] ? rcu_is_watching+0x12/0xc0 [ 371.966755][ T12] ? __pfx_kthread+0x10/0x10 [ 371.966767][ T12] ret_from_fork+0x45/0x80 [ 371.966779][ T12] ? __pfx_kthread+0x10/0x10 [ 371.966790][ T12] ret_from_fork_asm+0x1a/0x30 [ 371.966811][ T12] [ 372.231104][ T30] audit: type=1400 audit(1743183151.669:15099): avc: denied { create } for pid=10384 comm="syz.2.1429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 372.237184][ T12] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:564 [ 372.251002][ T30] audit: type=1400 audit(1743183151.709:15100): avc: denied { ioctl } for pid=10384 comm="syz.2.1429" path="socket:[27247]" dev="sockfs" ino=27247 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 372.260288][ T12] in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 12, name: kworker/u8:0 [ 372.294345][ T12] preempt_count: 0, expected: 0 [ 372.295232][ T30] audit: type=1400 audit(1743183151.979:15101): avc: denied { search } for pid=10387 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 372.299174][ T12] RCU nest depth: 1, expected: 0 [ 372.326483][ T12] INFO: lockdep is turned off. [ 372.331238][ T12] CPU: 1 UID: 0 PID: 12 Comm: kworker/u8:0 Tainted: G W 6.14.0-syzkaller-07422-gacb4f33713b9 #0 PREEMPT(full) [ 372.331263][ T12] Tainted: [W]=WARN [ 372.331268][ T12] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 372.331278][ T12] Workqueue: bond0 bond_mii_monitor [ 372.331306][ T12] Call Trace: [ 372.331311][ T12] [ 372.331317][ T12] dump_stack_lvl+0x16c/0x1f0 [ 372.331337][ T12] __might_resched+0x3c0/0x5e0 [ 372.331358][ T12] ? __pfx___might_resched+0x10/0x10 [ 372.331379][ T12] __mutex_lock+0x106/0xb90 [ 372.331398][ T12] ? __ethtool_get_link_ksettings+0x14f/0x200 [ 372.331419][ T12] ? tee_netdev_event+0x8a/0x3d0 [ 372.331442][ T12] ? __pfx___mutex_lock+0x10/0x10 [ 372.331459][ T12] ? ib_device_get_by_netdev+0x1b8/0x520 [ 372.331476][ T12] ? net_generic+0xea/0x2a0 [ 372.331496][ T12] ? rcu_is_watching+0x12/0xc0 [ 372.331519][ T12] ? lock_release+0x201/0x2f0 [ 372.331544][ T12] ? tee_netdev_event+0x8a/0x3d0 [ 372.331565][ T12] tee_netdev_event+0x8a/0x3d0 [ 372.331586][ T12] ? mutex_is_locked+0x17/0x60 [ 372.331600][ T12] ? rtnl_is_locked+0x15/0x20 [ 372.331620][ T12] notifier_call_chain+0xb9/0x410 [ 372.331642][ T12] ? __pfx_tee_netdev_event+0x10/0x10 [ 372.331665][ T12] call_netdevice_notifiers_info+0xbe/0x140 [ 372.331685][ T12] netdev_state_change+0x113/0x150 [ 372.331701][ T12] ? __pfx_netdev_state_change+0x10/0x10 [ 372.331723][ T12] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 372.331750][ T12] linkwatch_do_dev+0x12b/0x160 [ 372.331768][ T12] linkwatch_sync_dev+0x181/0x210 [ 372.331787][ T12] ? __pfx_ethtool_op_get_link+0x10/0x10 [ 372.331803][ T12] ethtool_op_get_link+0x1d/0x70 [ 372.331819][ T12] bond_check_dev_link+0x196/0x480 [ 372.331838][ T12] ? __pfx_bond_check_dev_link+0x10/0x10 [ 372.331862][ T12] bond_mii_monitor+0x3c0/0x2dc0 [ 372.331887][ T12] ? __pfx_bond_mii_monitor+0x10/0x10 [ 372.331912][ T12] ? rcu_is_watching+0x12/0xc0 [ 372.331931][ T12] process_one_work+0x9cc/0x1b70 [ 372.331951][ T12] ? __pfx_batadv_nc_worker+0x10/0x10 [ 372.331974][ T12] ? __pfx_process_one_work+0x10/0x10 [ 372.331993][ T12] ? assign_work+0x1a0/0x250 [ 372.332008][ T12] worker_thread+0x6c8/0xf10 [ 372.332028][ T12] ? __pfx_worker_thread+0x10/0x10 [ 372.332045][ T12] kthread+0x3c2/0x780 [ 372.332060][ T12] ? __pfx_kthread+0x10/0x10 [ 372.332073][ T12] ? __pfx_kthread+0x10/0x10 [ 372.332087][ T12] ? __pfx_kthread+0x10/0x10 [ 372.332101][ T12] ? __pfx_kthread+0x10/0x10 [ 372.332114][ T12] ? rcu_is_watching+0x12/0xc0 [ 372.332130][ T12] ? __pfx_kthread+0x10/0x10 [ 372.332144][ T12] ret_from_fork+0x45/0x80 [ 372.332160][ T12] ? __pfx_kthread+0x10/0x10 [ 372.332174][ T12] ret_from_fork_asm+0x1a/0x30 [ 372.332201][ T12] [ 372.368982][T10359] chnl_net:chnl_flowctrl_cb(): NET flowctrl func called flow: CLOSE/DEINIT [ 372.652535][T10359] chnl_net:chnl_net_open(): state disconnected [ 372.665976][T10359] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 372.767732][T10374] macvlan1: entered promiscuous mode [ 372.773715][T10374] ipvlan0: entered promiscuous mode [ 372.781636][T10374] ipvlan0: left promiscuous mode [ 372.865287][T10374] macvlan1: left promiscuous mode [ 372.994476][ T7877] bond0: (slave bond_slave_0): link status definitely down, disabling slave [ 373.003282][ T7877] bond0: (slave bond_slave_1): link status definitely down, disabling slave [ 373.074299][T10385] bond0: option fail_over_mac: unable to set because the bond device has slaves [ 373.431133][T10354] bridge0: port 3(syz_tun) entered disabled state [ 373.488482][T10354] syz_tun (unregistering): left allmulticast mode [ 373.508737][T10354] syz_tun (unregistering): left promiscuous mode [ 373.530123][T10354] bridge0: port 3(syz_tun) entered disabled state [ 375.334671][ T5867] page_pool_release_retry() stalled pool shutdown: id 33, 1 inflight 60 sec [ 375.351750][ T30] kauditd_printk_skb: 109 callbacks suppressed [ 375.351762][ T30] audit: type=1400 audit(1743183156.559:15211): avc: denied { read } for pid=5177 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 375.442100][ T30] audit: type=1400 audit(1743183156.559:15212): avc: denied { search } for pid=5177 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 375.504164][ T30] audit: type=1400 audit(1743183156.559:15213): avc: denied { append } for pid=5177 comm="syslogd" name="messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 375.563867][T10407] audit: audit_backlog=65 > audit_backlog_limit=64 [ 375.570601][ T30] audit: type=1400 audit(1743183156.559:15214): avc: denied { append open } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 375.585944][T10407] audit: audit_lost=1960 audit_rate_limit=0 audit_backlog_limit=64 [ 375.638700][T10407] audit: backlog limit exceeded [ 375.650649][T10407] audit: audit_backlog=65 > audit_backlog_limit=64 [ 375.665625][ T30] audit: type=1400 audit(1743183156.559:15215): avc: denied { getattr } for pid=5177 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=8 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 375.668260][T10407] audit: audit_lost=1961 audit_rate_limit=0 audit_backlog_limit=64 [ 378.135736][ T1295] ieee802154 phy0 wpan0: encryption failed: -22