last executing test programs: 6m55.170967165s ago: executing program 0 (id=291): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) r0 = socket$kcm(0x2b, 0x1, 0x0) close(r0) r1 = socket$kcm(0xa, 0x2, 0x73) sendmsg$inet(r1, &(0x7f0000001180)={&(0x7f0000000000)={0xa, 0x0, @empty}, 0xffac, &(0x7f0000001080)=[{&(0x7f0000000040)="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", 0x1000}, {&(0x7f0000001040)="9d7fcf3efc63f4a6a555ba8b4726d7ccaf8a207100e69cfac4377876021d7131b838059f96bd206d4776368ed2a92432e5af71", 0x33}], 0x8, &(0x7f0000001d00)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="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"], 0x6b}, 0x0) close(r0) 6m54.615552552s ago: executing program 0 (id=292): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3000001, 0x11, r0, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x972, &(0x7f0000006680)) mknod$loop(&(0x7f0000002180)='./file0\x00', 0x800, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, 0x0, 0x0, 0x405, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25}, 0x94) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000003ec0), 0xffffffffffffffff) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) 6m54.029364331s ago: executing program 0 (id=293): openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)={0x0, @dev, @multicast1}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000240)={0x18, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000e50003000000000085100000fcffffff250000001000000007000000faffffff95"], &(0x7f0000000140)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x4c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xa}, 0x94) 6m53.355977285s ago: executing program 0 (id=294): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='percpu_free_percpu\x00', r0, 0x0, 0xfffffffffffffff9}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x8}, 0x50) 6m53.12958482s ago: executing program 0 (id=296): ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x48141, 0x0) fcntl$setlease(r1, 0x400, 0x1) syz_genetlink_get_family_id$batadv(0x0, r0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) request_key(&(0x7f0000000640)='rxrpc\x00', &(0x7f0000001ffb)={'syz', 0x3}, &(0x7f0000000740)='R\x10r\x94\x00\x00\x00\x00\x12eF?\x12\xf0\xce\xd0\x98\x93\x1a\x94\x86\xd6/Z\x8d`\xad\x83\xac}\xd1\xd47\x17Y\x90\xf53\xd6\x03\xd9s\xa3\xc9\x1c#\xd7\x1a#\x11\x1f\xa2\x05x\x1f\x13Fl\x0e\xc6w\x11J\xc6\xeb\x1fAa\x9e\xc7\x9e\xde\x15\xa4H\xa7T\xf9\xa9\n\xb6\x86\xce8>\f\x1av\xfd@\\\xe44+?\a\a\xb9\x1d_x\x04\xb6\x95\xb9&\xe3\xdf\xa1\x93\xf0Q\xfe\xa75\xa6\x92\xb9\ru\xf0\xee\x0f\x05\xbam\xf6T%\xa8h!\xb6y\x12e\xdf\xf0\x01\xf2\xcc\x84\x1f-\xe4qO\x18\x866\x99w\xc8\xa2r\xaey\x00\xd5\xa7DS\x83\xc4\xa5\xc0\xd6\xa6|=r1\xe4?\xa4\xdb\x054\xb0\x9b\xbf\xcc\xa82\x04\xf6\b\xa1\x97b\xd5\xbe(f\xd5:\x80\xb4\r\x92\x9d5%?\x10\xa3,b\x9d8\xb6\x86i\x9e\x84\xa9\xd6\xd4\x05\xe4\xf0\x80\xf0\xa2+\xefT\xbc\x93\x1c\xc5', 0x0) 6m52.860528108s ago: executing program 0 (id=298): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000180)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000003060102000000f4000000000700000a05000100"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40814) 6m7.819350607s ago: executing program 32 (id=298): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000180)={0x4c, 0x2, 0x6, 0x101, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x3}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$IPSET_CMD_DESTROY(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c00000003060102000000f4000000000700000a05000100"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40814) 5m24.809148811s ago: executing program 1 (id=437): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x16, 0x0, 0x4, 0x7, 0x0, 0x1}, 0x50) r0 = socket$kcm(0xa, 0x5, 0x0) r1 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x2, 0x1, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000380)="c96508", 0x3}], 0x1}, 0x865) setsockopt$sock_attach_bpf(r1, 0x84, 0x1e, &(0x7f0000000240), 0x4) r2 = socket$kcm(0xa, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8916, &(0x7f0000000000)={r2}) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x8936, &(0x7f0000000000)={r2}) 5m23.439912742s ago: executing program 1 (id=442): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @cgroup_device, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='kfree\x00', r0, 0x0, 0x6}, 0x18) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000006c0), 0x48200, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x2) capset(&(0x7f0000000040)={0x20071026}, &(0x7f0000000080)={0x6, 0x6, 0x2, 0x87, 0xffffffff, 0x40}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000300)=0xf) 5m22.737759019s ago: executing program 1 (id=445): unshare(0x20000400) r0 = syz_open_dev$usbmon(&(0x7f0000000900), 0x7, 0x0) ioctl$MON_IOCX_MFETCH(r0, 0xc0109207, 0x0) 5m22.580154309s ago: executing program 1 (id=446): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xc, &(0x7f00000008c0)=ANY=[], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$IPT_SO_SET_REPLACE(r0, 0x4000000000000, 0x40, &(0x7f0000001200)=@raw={'raw\x00', 0x4001, 0x3, 0x3a0, 0x230, 0x700001b, 0x148, 0x2000000, 0x148, 0x308, 0x206, 0x240, 0x308, 0x240, 0x7fffffe, 0x0, {[{{@ip={@local, @rand_addr, 0x0, 0x0, 'tunl0\x00', 'bond_slave_1\x00', {0xff}}, 0x1ea, 0x1e8, 0x230, 0x0, {0x390, 0x8f00}, [@common=@inet=@hashlimit2={{0x150}, {'pim6reg1\x00', {0x5, 0x1ff, 0x1, 0x1, 0x1, 0x100, 0x1, 0x8, 0x20}, {0x8}}}, @common=@inet=@socket2={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x8, 0x9, 'snmp\x00', {0xc000}}}}, {{@uncond, 0x0, 0xb0, 0xd8, 0x0, {}, [@common=@set={{0x40}, {{0x0, [0x0, 0x6275dd3c01ecbf44, 0x2, 0x4, 0x4], 0x4, 0x2}}}]}, @common=@unspec=@NFQUEUE3={0x28}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x400) 5m22.168792576s ago: executing program 1 (id=448): bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000240)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e21, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80200}, 0xffffff3b) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000140), 0x4) getsockopt$bt_hci(r0, 0x11a, 0x2, 0x0, &(0x7f0000000700)) getpid() r1 = syz_io_uring_setup(0x5c6, &(0x7f0000000140)={0x0, 0x1001, 0x0, 0x4}, &(0x7f00000001c0)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r1, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) 5m15.040355429s ago: executing program 1 (id=456): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x81}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000000)='inet_sock_set_state\x00', r3, 0x0, 0x3}, 0x18) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r4, 0xfffffffc) 4m29.688011688s ago: executing program 33 (id=456): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x81}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000070000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000000)='inet_sock_set_state\x00', r3, 0x0, 0x3}, 0x18) r4 = socket$inet6_mptcp(0xa, 0x1, 0x106) listen(r4, 0xfffffffc) 4m10.327636102s ago: executing program 2 (id=540): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000c80)={'ip6gre0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001240)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0x4000000, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {0xffff, 0xffff}, {0xc}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_RTAB={0x404, 0x2, [0x7, 0x0, 0x1fc, 0x0, 0xfffffc80, 0x0, 0x6, 0x8, 0x0, 0x0, 0x0, 0x12, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x7, 0x0, 0x8, 0x1, 0x3f, 0x0, 0x0, 0x2, 0xffffffff, 0x2, 0xc00, 0x0, 0x10, 0x0, 0x1ff, 0x0, 0x0, 0x2, 0x0, 0x1000, 0xfffffffc, 0x0, 0x0, 0x8, 0x9, 0x0, 0x4000, 0x0, 0x0, 0xfffffffe, 0x6, 0x0, 0x0, 0x272, 0xb, 0xfffffffd, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffd, 0x0, 0x80007, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffc, 0x3, 0x0, 0x5, 0x0, 0xb97, 0x0, 0x0, 0x0, 0xfffffffd, 0x8, 0x0, 0x3, 0x5e, 0xfffffffc, 0x8, 0x0, 0x0, 0x1, 0x3, 0x0, 0x10, 0x0, 0x0, 0x7fff, 0x0, 0xfffffffc, 0x0, 0x0, 0x6, 0x0, 0x4, 0x0, 0xffff8000, 0x5, 0xffffffff, 0x1, 0x0, 0x9, 0x0, 0x0, 0x8, 0x6, 0x9, 0x0, 0x0, 0x0, 0xfffffff8, 0x4cc, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5, 0x0, 0x2000000, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb6, 0x0, 0x1, 0x0, 0x7, 0x0, 0x0, 0xffffffff, 0xffff, 0x0, 0x0, 0xb3c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x800004, 0x0, 0x0, 0x0, 0x9, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x2, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0xd79, 0x0, 0x0, 0xfffffffc, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4, 0x7, 0x102, 0x0, 0x8, 0xfffffffd, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe6]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x1, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xff, 0x2, 0x3, 0x0, 0x19, 0x40000000}, 0x0, 0x7f}}]}}]}, 0x45c}, 0x1, 0x0, 0x0, 0x8000}, 0x0) 4m10.05966109s ago: executing program 2 (id=541): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r1) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$F2FS_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0xf50f, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, '\x00\x00'}]}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a480000001e0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c000380180000800c000180060001"], 0x70}, 0x1, 0x0, 0x0, 0x4451099e661a63b1}, 0x0) 4m9.659174956s ago: executing program 2 (id=542): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000800030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0xc4}, 0x890) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="14000000100001e456b8aa00000000000000000a3c000000120a09000000000000000000020000000900020073797a310000000008000440080000000900010073797a3000000000080003400000000114000000110001"], 0x64}}, 0x4000010) socket$igmp(0x2, 0x3, 0x2) socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r1}, &(0x7f0000000740), &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c30000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r2, 0x0, 0x2}, 0x18) sendmsg$NFT_MSG_GETOBJ(r0, &(0x7f0000000180)={0x0, 0x34, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="34000000150a03000000000000000000020000000900020073797a310000000008000340000000010900010073797a30"], 0x34}}, 0x0) 4m9.30492814s ago: executing program 2 (id=544): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0xf, &(0x7f0000000d80)=ANY=[], &(0x7f0000000980)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='mm_page_free\x00', r2, 0x0, 0x1000000000000}, 0x18) listen(0xffffffffffffffff, 0x3) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, &(0x7f0000000080)={0x20, 0x3, 0x2, 0x3, 0x0, 0x3, 0x0}) 4m8.917955716s ago: executing program 2 (id=545): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) writev(r0, &(0x7f0000000100), 0x26) 4m8.670883202s ago: executing program 2 (id=546): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x9031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) 3m43.452935145s ago: executing program 3 (id=589): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000001b40)={0x4, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0xf}, [@call={0x85, 0x0, 0x0, 0x7d}]}, &(0x7f00000000c0)='syzkaller\x00', 0x8, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3ffffffc}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x28, 0xe, 0x0, &(0x7f0000000900)="e02742e8680d85ff9782762f86dd", 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = socket$netlink(0x10, 0x3, 0xf) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003300)={0x6, 0xb, &(0x7f0000003180)=ANY=[@ANYBLOB="18000000ffdf0000000000000200000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000020b7030000ff0f0000850000000600000095"], &(0x7f0000003200)='GPL\x00', 0x8, 0x0, 0x0, 0x41100, 0x1, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r2, &(0x7f0000001480)=ANY=[@ANYBLOB="1800000071009154090893b3520ba54a07", @ANYBLOB="eef06930e9"], 0xfe33) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) bind(0xffffffffffffffff, &(0x7f0000000240)=@ll={0x11, 0x15, r3, 0x1, 0xff, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x80) bind$netlink(r1, &(0x7f0000000a40)={0x10, 0x0, 0x25dfdbfb, 0x2ffffffff}, 0xc) sendmsg$SOCK_DIAG_BY_FAMILY(0xffffffffffffffff, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) unshare(0x60600) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r5}, &(0x7f0000000800), &(0x7f0000000840)=r6}, 0x20) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000003c0)=0x6, 0xdc) 3m43.037111323s ago: executing program 3 (id=590): r0 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r0, 0xf, 0x25, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xd0}]}, &(0x7f00000001c0)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x0, 0xe, 0x0, &(0x7f00000003c0)="e10ea784d36b8955d18c603fe212", 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x9, 0x1}, 0x50) 3m42.550019785s ago: executing program 3 (id=591): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x50) socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'syztnl0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x29, 0xd, 0x0, 0x1ff, 0x45, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @local, 0x7800, 0x7, 0x19, 0x9}}) syz_clone3(&(0x7f00000009c0)={0x2000, &(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0), {0x2f}, &(0x7f0000001180)=""/249, 0x3d, &(0x7f0000000900)=""/111, &(0x7f0000000980)=[0xffffffffffffffff], 0x1}, 0x58) syz_clone3(&(0x7f0000000ec0)={0x200000400, &(0x7f0000000c00), &(0x7f0000000c40), &(0x7f0000000c80), {0x13}, &(0x7f0000000cc0)=""/231, 0xe7, &(0x7f0000000dc0)=""/165, &(0x7f0000000e80)=[0x0], 0x1}, 0x58) pipe(&(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_DAEMON(0xffffffffffffffff, &(0x7f0000007580)={0x0, 0x0, &(0x7f0000007540)={&(0x7f0000000000)=ANY=[@ANYBLOB="14000000", @ANYRES16=0x0, @ANYBLOB="010b675eeda77add771a09000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000080}, 0x48040) syz_genetlink_get_family_id$devlink(&(0x7f0000000200), r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x42}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='bic', 0xff3d) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000300)=[@mss, @sack_perm, @sack_perm, @mss={0x2, 0xfff}, @window={0x3, 0x10, 0x4}, @sack_perm], 0x6) r3 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'veth1_vlan\x00'}) 3m41.57877445s ago: executing program 3 (id=592): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)) r2 = dup(r0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x4, 0x0, 0x0) 3m41.151713038s ago: executing program 3 (id=593): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="070000000400000008000000d9"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000008c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300000088b000850000001b000000b70000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000480)='mm_page_free\x00', r1, 0x0, 0x2}, 0x18) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) 3m35.159120825s ago: executing program 3 (id=594): creat(0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = openat$binfmt_register(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_register(r3, &(0x7f0000000200)={0x3a, 'syz3', 0x3a, 'M', 0x3a, 0xb, 0x3a, '/proc/sys/fs/binfmt_misc/register\x00', 0x3a, '/proc/sys/fs/binfmt_misc/register\x00', 0x3a, './file0/../file0'}, 0x74) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(0xffffffffffffffff, 0x4e14, 0x912a, 0x41, 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000600), 0x0) prctl$PR_GET_TSC(0x43, &(0x7f0000000040)) mknod$loop(&(0x7f0000000140)='./file0\x00', 0xfff, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) 3m22.782011497s ago: executing program 34 (id=546): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x9031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000ed074479000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000003c0)='sched_switch\x00', r3}, 0x18) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) syz_usb_disconnect(0xffffffffffffffff) 2m50.068831907s ago: executing program 35 (id=594): creat(0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f0000000380)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x6, 0xba, &(0x7f0000000140)=""/186, 0x41000, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x37}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f0000000040), 0x80002c1, 0x2, 0x0) r3 = openat$binfmt_register(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_register(r3, &(0x7f0000000200)={0x3a, 'syz3', 0x3a, 'M', 0x3a, 0xb, 0x3a, '/proc/sys/fs/binfmt_misc/register\x00', 0x3a, '/proc/sys/fs/binfmt_misc/register\x00', 0x3a, './file0/../file0'}, 0x74) syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(0xffffffffffffffff, 0x4e14, 0x912a, 0x41, 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000600), 0x0) prctl$PR_GET_TSC(0x43, &(0x7f0000000040)) mknod$loop(&(0x7f0000000140)='./file0\x00', 0xfff, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) 1m56.96627124s ago: executing program 5 (id=689): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000280)='kfree\x00', r1}, 0x18) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000004880)=ANY=[@ANYBLOB="240000003900070101000000fbe8df25037c000004008c800c000180060006008847"], 0x24}}, 0x0) socket$inet(0x2, 0x2, 0x1) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1m56.561867667s ago: executing program 5 (id=691): r0 = io_uring_setup(0x4459, &(0x7f0000000680)={0x0, 0xca6c, 0x40, 0x3, 0x37e}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, &(0x7f0000000100), 0x67) 1m56.20941073s ago: executing program 5 (id=693): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x6, 0x8, 0xae, 0x0, 0x1, 0x20727ff}, 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=@base={0xd, 0x2, 0x4, 0x4006, 0x5, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x8000000}, 0x50) 1m55.799755197s ago: executing program 5 (id=696): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$int_in(0xffffffffffffffff, 0x5452, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=ANY=[@ANYBLOB="0202000311000000000000000000000005000500000000000a00000000000000fe8000000000000000000000000000bb000000000000000002000100000007000000000b000000000200090000000000000000000000000005000600000000000a00000000000000fe8800000000000000000000000000010000000000000000010018"], 0x88}}, 0x0) 1m55.469697629s ago: executing program 5 (id=697): syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd606410a600083c00fc020000000000000000000000000000fe800000003e000000000000000000aa84000100f5000000"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00', r0}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r1 = syz_io_uring_setup(0xbdc, &(0x7f0000000080)={0x0, 0xec21, 0x80, 0x1, 0x40000333}, &(0x7f0000000340), &(0x7f0000000040)) io_uring_enter(r1, 0x847ba, 0x2000, 0xe, 0x0, 0x0) 1m55.019356279s ago: executing program 5 (id=700): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) 1m15.910224464s ago: executing program 4 (id=766): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000440)='kmem_cache_free\x00', r0}, 0x18) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) 1m15.735409825s ago: executing program 4 (id=767): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000080850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff0001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) lsetxattr$security_capability(&(0x7f0000002580)='./file0\x00', &(0x7f00000025c0), 0x0, 0x0, 0x0) write$binfmt_elf32(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="7f454c4601079704080000000000000002000600010000004300000038000000c0010000030000000100200002"], 0x78) close(r1) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 1m15.527647479s ago: executing program 4 (id=768): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000009c0)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030097850000007b00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xd}, 0x94) r0 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYBLOB], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x75, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0, r1, 0x0, 0x1}, 0x18) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) pipe(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='mm_page_free\x00', r3, 0x0, 0x1000000000000}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xc51e1000) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x40041) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) 1m11.929741518s ago: executing program 4 (id=769): unshare(0x600) r0 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_DISCONNECT_CLAIM(r0, 0x8108551b, &(0x7f0000000000)={0x0, 0x0, "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"}) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000006c0)={0x2, 0xf, 0x4, 0xff81, 0x3f00, 0x5, 0x0}) 1m11.609952609s ago: executing program 4 (id=770): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = syz_clone(0xa5144411, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$ETHTOOL_MSG_CHANNELS_SET(0xffffffffffffffff, 0x0, 0x8) ioprio_set$pid(0x4, r0, 0x4004) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_SCRNMAP(r1, 0x4b41, &(0x7f0000000f80)) 1m9.721440594s ago: executing program 4 (id=771): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0, 0xdfdcffff, 0x2000, 0x7, 0x2}, 0x20) 1m9.710861145s ago: executing program 36 (id=700): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x39) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32=0x0, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) 23.962807159s ago: executing program 37 (id=771): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x18, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) r1 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r1, 0x11b, 0x4, &(0x7f0000000240)={0x0, 0xdfdcffff, 0x2000, 0x7, 0x2}, 0x20) 5.069930493s ago: executing program 6 (id=799): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) readv(r0, &(0x7f0000000540)=[{&(0x7f00000004c0)=""/94, 0x5e}], 0x1) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000026c0)=ANY=[@ANYBLOB="400000001200050100"], 0x40}}, 0x20040810) 4.447996644s ago: executing program 6 (id=800): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0xa2f01, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x56, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000b00)='kmem_cache_free\x00', r1, 0x0, 0x1034}, 0x18) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) write$tun(r0, &(0x7f0000000200)={@val={0x0, 0x6005}, @void, @eth={@broadcast, @remote, @val={@val={0x88a8, 0x0, 0x0, 0x4}, {0x88a8, 0x0, 0x0, 0x2}}, {@ipv4={0x800, @generic={{0x5, 0x4, 0x1, 0x5, 0x1c, 0x67, 0x0, 0x7f, 0x32, 0x0, @private=0xa010101, @initdev={0xac, 0x1e, 0x3, 0x0}}, "15944cda148281bb"}}}}}, 0x36) 3.910678661s ago: executing program 6 (id=801): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b0000000700000008000000a6ad6a1a05"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) pipe2(&(0x7f00000006c0)={0xffffffffffffffff}, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) close_range(r2, 0xffffffffffffffff, 0x0) 3.61123404s ago: executing program 6 (id=802): r0 = socket$inet6(0xa, 0x1000080002, 0x100000000000088) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000000)={0x400, 0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x9}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x100000}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0xffffffef, 0x0, 0x0, 0x0, r2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r3}, 0x10) bind$inet6(r0, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @rand_addr, 0x3}, 0x1c) r4 = socket$inet6(0xa, 0x802, 0x88) sendto$inet6(r4, 0x0, 0x0, 0xcc844, &(0x7f0000000180)={0xa, 0x4e23, 0xa19, @mcast1}, 0x1c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000004d00000600000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/17], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6, 0x0, 0x2}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x3ff, &(0x7f0000000500)=0x0) io_getevents(r7, 0x4, 0x4, &(0x7f00000019c0)=[{}, {}, {}, {}], 0x0) 810.749316ms ago: executing program 6 (id=803): r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f00000005c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="a1ab23bd7000fdffffff3200000008001701"], 0x24}, 0x1, 0x0, 0x0, 0x50}, 0x0) 0s ago: executing program 6 (id=804): capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000080)={0x0, 0x0, 0x5}) r0 = socket$netlink(0x10, 0x3, 0xb) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000600)=0x1a, 0x4) kernel console output (not intermixed with test programs): ot:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.930391][ T29] audit: type=1400 audit(79.870:80): avc: denied { write } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 79.944078][ T3102] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 79.961300][ T3102] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 80.000906][ T3102] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 80.022572][ T3102] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 80.288634][ T3101] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 80.295738][ T3101] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 80.309054][ T3101] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 80.322023][ T3101] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 80.870990][ T3102] 8021q: adding VLAN 0 to HW filter on device bond0 [ 81.096171][ T3101] 8021q: adding VLAN 0 to HW filter on device bond0 [ 83.534941][ T3102] veth0_vlan: entered promiscuous mode [ 83.559570][ T3102] veth1_vlan: entered promiscuous mode [ 83.634317][ T3102] veth0_macvtap: entered promiscuous mode [ 83.655419][ T3102] veth1_macvtap: entered promiscuous mode [ 83.740649][ T1393] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.746117][ T12] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.748738][ T12] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.749114][ T12] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.876348][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 83.881412][ T29] audit: type=1400 audit(83.810:82): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 83.909888][ T29] audit: type=1400 audit(83.850:83): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/syzkaller.S6T8Cf/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 83.920216][ T29] audit: type=1400 audit(83.860:84): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 83.934156][ T29] audit: type=1400 audit(83.870:85): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/syzkaller.S6T8Cf/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 83.946450][ T29] audit: type=1400 audit(83.880:86): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/syzkaller.S6T8Cf/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=2119 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 83.972631][ T29] audit: type=1400 audit(83.910:87): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 83.984649][ T29] audit: type=1400 audit(83.920:88): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 83.990811][ T29] audit: type=1400 audit(83.930:89): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="gadgetfs" ino=2120 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 84.003128][ T29] audit: type=1400 audit(83.940:90): avc: denied { mount } for pid=3102 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 84.010971][ T29] audit: type=1400 audit(83.950:91): avc: denied { mounton } for pid=3102 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 84.091396][ T3102] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 84.091943][ T3101] veth0_vlan: entered promiscuous mode [ 84.123488][ T3101] veth1_vlan: entered promiscuous mode [ 84.252443][ T3101] veth0_macvtap: entered promiscuous mode [ 84.271259][ T3101] veth1_macvtap: entered promiscuous mode [ 84.368499][ T1393] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.370724][ T1393] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.372426][ T1393] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.372758][ T1393] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 85.654486][ T3711] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=3711 comm=syz.1.2 [ 89.034136][ T29] kauditd_printk_skb: 16 callbacks suppressed [ 89.035172][ T29] audit: type=1400 audit(88.970:108): avc: denied { create } for pid=3738 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 89.044720][ T29] audit: type=1400 audit(88.980:109): avc: denied { write } for pid=3738 comm="syz.1.9" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 89.061644][ T3739] netlink: 20 bytes leftover after parsing attributes in process `syz.1.9'. [ 89.323963][ T29] audit: type=1400 audit(89.260:110): avc: denied { create } for pid=3740 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 89.340596][ T29] audit: type=1400 audit(89.280:111): avc: denied { bind } for pid=3740 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 89.360559][ T29] audit: type=1400 audit(89.300:112): avc: denied { write } for pid=3740 comm="syz.1.10" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 89.400584][ T3733] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=3733 comm=syz.0.8 [ 89.701639][ T3744] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11'. [ 89.890103][ T29] audit: type=1400 audit(89.830:113): avc: denied { mount } for pid=3745 comm="syz.1.12" name="/" dev="ramfs" ino=2182 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 90.002406][ T29] audit: type=1400 audit(89.940:114): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 90.017606][ T29] audit: type=1400 audit(89.940:115): avc: denied { mount } for pid=3747 comm="syz.0.13" name="/" dev="configfs" ino=74 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 90.021775][ T29] audit: type=1400 audit(89.960:116): avc: denied { allowed } for pid=3747 comm="syz.0.13" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 90.043556][ T29] audit: type=1400 audit(89.980:117): avc: denied { create } for pid=3747 comm="syz.0.13" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 95.518271][ T3762] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3762 comm=syz.1.19 [ 95.523843][ T29] kauditd_printk_skb: 263 callbacks suppressed [ 95.527427][ T29] audit: type=1400 audit(95.460:381): avc: denied { kexec_image_load } for pid=3761 comm="syz.1.19" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 95.564197][ T29] audit: type=1400 audit(95.500:382): avc: denied { append } for pid=3792 comm="syz.0.27" name="loop-control" dev="devtmpfs" ino=633 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 96.147771][ T3797] capability: warning: `gtp' uses deprecated v2 capabilities in a way that may be insecure [ 96.192791][ T29] audit: type=1400 audit(96.130:383): avc: denied { name_bind } for pid=3796 comm="gtp" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 96.193265][ T29] audit: type=1400 audit(96.130:384): avc: denied { node_bind } for pid=3796 comm="gtp" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 97.109459][ T29] audit: type=1326 audit(97.050:385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3801 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 97.128015][ T29] audit: type=1326 audit(97.050:386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3801 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 97.128410][ T29] audit: type=1326 audit(97.060:387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3801 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 97.131676][ T29] audit: type=1326 audit(97.060:388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3801 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 97.131790][ T29] audit: type=1326 audit(97.060:389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3801 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 97.131842][ T29] audit: type=1326 audit(97.060:390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3801 comm="syz.0.31" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 99.917921][ T3818] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 101.385672][ T3824] mmap: syz.0.38 (3824) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 109.112616][ T29] kauditd_printk_skb: 218 callbacks suppressed [ 109.113005][ T29] audit: type=1400 audit(109.030:609): avc: denied { create } for pid=3842 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 109.186949][ T29] audit: type=1400 audit(109.110:610): avc: denied { getopt } for pid=3842 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 111.102965][ T29] audit: type=1400 audit(111.040:611): avc: denied { bind } for pid=3844 comm="syz.1.46" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 111.128218][ T3845] netlink: 4 bytes leftover after parsing attributes in process `syz.1.46'. [ 111.788144][ T3848] netdevsim netdevsim1: loading /lib/firmware/. failed with error -22 [ 111.789227][ T3848] netdevsim netdevsim1: Direct firmware load for . failed with error -22 [ 111.791305][ T3848] netdevsim netdevsim1: Falling back to sysfs fallback for: . [ 111.791359][ T29] audit: type=1400 audit(111.730:612): avc: denied { firmware_load } for pid=3844 comm="syz.1.46" scontext=system_u:system_r:kernel_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 113.532565][ T3894] syz_tun: entered allmulticast mode [ 113.909553][ T29] audit: type=1326 audit(113.850:613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3895 comm="syz.0.53" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x0 [ 117.041159][ T29] audit: type=1326 audit(116.980:614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3912 comm="syz.1.57" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 117.049354][ T29] audit: type=1326 audit(116.980:615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3912 comm="syz.1.57" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 117.050951][ T29] audit: type=1326 audit(116.990:616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3912 comm="syz.1.57" exe="/syz-executor" sig=0 arch=40000028 syscall=393 compat=0 ip=0x132320 code=0x7ffc0000 [ 117.052321][ T29] audit: type=1326 audit(116.990:617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3912 comm="syz.1.57" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 117.264686][ T29] audit: type=1400 audit(117.200:618): avc: denied { create } for pid=3918 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 117.280353][ T29] audit: type=1400 audit(117.220:619): avc: denied { write } for pid=3918 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 117.594883][ T3926] netlink: 4 bytes leftover after parsing attributes in process `syz.1.62'. [ 117.809677][ T29] audit: type=1400 audit(117.750:620): avc: denied { ioctl } for pid=3925 comm="syz.1.62" path="socket:[3590]" dev="sockfs" ino=3590 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 118.278570][ T3926] netlink: 4 bytes leftover after parsing attributes in process `syz.1.62'. [ 119.250789][ T29] audit: type=1400 audit(119.190:621): avc: denied { relabelfrom } for pid=3955 comm="syz.0.70" name="UDP" dev="sockfs" ino=2369 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 119.250876][ T3957] SELinux: Context system_u:object_r:var_lib_t:s0 is not valid (left unmapped). [ 119.258320][ T29] audit: type=1400 audit(119.200:622): avc: denied { relabelto } for pid=3955 comm="syz.0.70" name="UDP" dev="sockfs" ino=2369 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=udp_socket permissive=1 trawcon="system_u:object_r:var_lib_t:s0" [ 119.680013][ T29] audit: type=1400 audit(119.620:623): avc: denied { create } for pid=3964 comm="syz.1.73" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=1 [ 120.677202][ T3965] netlink: 4 bytes leftover after parsing attributes in process `syz.1.73'. [ 123.227502][ T29] kauditd_printk_skb: 13 callbacks suppressed [ 123.228855][ T29] audit: type=1326 audit(123.160:637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 123.238947][ T29] audit: type=1326 audit(123.180:638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 123.241806][ T29] audit: type=1326 audit(123.180:639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 123.243873][ T29] audit: type=1326 audit(123.180:640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 123.248643][ T29] audit: type=1326 audit(123.180:641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 123.250511][ T29] audit: type=1326 audit(123.180:642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 123.252195][ T29] audit: type=1326 audit(123.180:643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=168 compat=0 ip=0x132320 code=0x7ffc0000 [ 123.254381][ T29] audit: type=1326 audit(123.190:644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 123.256140][ T29] audit: type=1326 audit(123.190:645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 123.259571][ T29] audit: type=1326 audit(123.200:646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4008 comm="syz.1.85" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 123.886810][ C1] hrtimer: interrupt took 9834480 ns [ 124.414804][ T4013] Zero length message leads to an empty skb [ 126.648153][ T4021] netlink: 'syz.1.88': attribute type 12 has an invalid length. [ 131.617330][ T29] kauditd_printk_skb: 9 callbacks suppressed [ 131.620710][ T29] audit: type=1326 audit(131.540:656): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 131.622680][ T29] audit: type=1326 audit(131.560:657): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 131.709417][ T29] audit: type=1326 audit(131.630:658): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 131.817579][ T29] audit: type=1326 audit(131.750:659): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 131.821879][ T29] audit: type=1326 audit(131.760:660): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 131.827905][ T29] audit: type=1326 audit(131.760:661): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 131.829918][ T29] audit: type=1326 audit(131.760:662): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 131.833586][ T29] audit: type=1326 audit(131.770:663): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=4 compat=0 ip=0x1302b4 code=0x7ffc0000 [ 131.835816][ T29] audit: type=1326 audit(131.770:664): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 131.844013][ T29] audit: type=1326 audit(131.780:665): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4038 comm="syz.1.94" exe="/syz-executor" sig=0 arch=40000028 syscall=224 compat=0 ip=0x132320 code=0x7ffc0000 [ 145.500342][ T29] kauditd_printk_skb: 25 callbacks suppressed [ 145.507120][ T29] audit: type=1326 audit(145.440:691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4051 comm="syz.0.98" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 145.509093][ T29] audit: type=1326 audit(145.440:692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4051 comm="syz.0.98" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 145.511583][ T29] audit: type=1326 audit(145.450:693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4051 comm="syz.0.98" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x132320 code=0x7ffc0000 [ 145.516517][ T29] audit: type=1326 audit(145.450:694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4051 comm="syz.0.98" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 145.528659][ T29] audit: type=1326 audit(145.450:695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4051 comm="syz.0.98" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 145.530218][ T29] audit: type=1326 audit(145.450:696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4051 comm="syz.0.98" exe="/syz-executor" sig=0 arch=40000028 syscall=260 compat=0 ip=0x132320 code=0x7ffc0000 [ 145.531937][ T29] audit: type=1326 audit(145.450:697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4051 comm="syz.0.98" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 145.534102][ T29] audit: type=1326 audit(145.450:698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4051 comm="syz.0.98" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 146.014388][ T29] audit: type=1326 audit(145.950:699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4059 comm="syz.1.102" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 146.019267][ T29] audit: type=1326 audit(145.960:700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4059 comm="syz.1.102" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x1349dc code=0x7ffc0000 [ 146.762043][ T4072] serio: Serial port ptm0 [ 147.971066][ T4078] SELinux: Context system_u:object_r:tmp_t:s0 is not valid (left unmapped). [ 148.347247][ T4072] serio: Serial port ptm0 [ 149.687564][ T4089] Driver unsupported XDP return value 0 on prog (id 73) dev N/A, expect packet loss! [ 153.733521][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 153.734801][ T29] audit: type=1400 audit(153.670:721): avc: denied { watch watch_reads } for pid=4111 comm="syz.1.124" path="/65/file0" dev="tmpfs" ino=352 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 155.889434][ T29] audit: type=1326 audit(155.800:722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 155.889847][ T29] audit: type=1326 audit(155.820:723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x132320 code=0x7ffc0000 [ 155.894452][ T29] audit: type=1326 audit(155.820:724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 155.896049][ T29] audit: type=1326 audit(155.820:725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=42 compat=0 ip=0x132320 code=0x7ffc0000 [ 155.896149][ T29] audit: type=1326 audit(155.820:726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 155.901874][ T29] audit: type=1326 audit(155.840:727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 155.917416][ T29] audit: type=1326 audit(155.850:728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 155.930138][ T29] audit: type=1326 audit(155.870:729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 155.933783][ T29] audit: type=1326 audit(155.870:730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4133 comm="syz.1.134" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 157.291638][ T4157] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4157 comm=syz.1.143 [ 157.719136][ T4161] netlink: 96 bytes leftover after parsing attributes in process `syz.1.145'. [ 159.062954][ T4171] netlink: 40 bytes leftover after parsing attributes in process `syz.0.150'. [ 159.236580][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 159.257307][ T29] audit: type=1107 audit(159.160:775): pid=4172 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 159.503202][ T4179] netlink: 12 bytes leftover after parsing attributes in process `syz.0.153'. [ 159.504527][ T4179] netlink: 12 bytes leftover after parsing attributes in process `syz.0.153'. [ 160.337639][ T29] audit: type=1400 audit(160.270:776): avc: denied { write } for pid=4186 comm="syz.1.156" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 163.577944][ T4201] netlink: 'syz.1.162': attribute type 4 has an invalid length. [ 166.191155][ T29] audit: type=1400 audit(166.130:777): avc: denied { write } for pid=4219 comm="syz.0.169" name="fib_trie" dev="proc" ino=4026532760 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 167.859142][ T29] audit: type=1400 audit(167.800:778): avc: denied { connect } for pid=4225 comm="syz.0.172" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 169.647292][ T4232] netlink: 24 bytes leftover after parsing attributes in process `syz.0.174'. [ 172.518884][ T29] audit: type=1326 audit(172.460:779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4244 comm="syz.0.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 172.525113][ T29] audit: type=1326 audit(172.460:780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4244 comm="syz.0.177" exe="/syz-executor" sig=0 arch=40000028 syscall=40 compat=0 ip=0x132320 code=0x7ffc0000 [ 172.534909][ T29] audit: type=1326 audit(172.470:781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4244 comm="syz.0.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 172.591266][ T29] audit: type=1326 audit(172.480:782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4244 comm="syz.0.177" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 173.522010][ T29] audit: type=1400 audit(173.460:783): avc: denied { create } for pid=4248 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 173.661754][ T29] audit: type=1400 audit(173.600:784): avc: denied { bind } for pid=4248 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 173.722533][ T29] audit: type=1400 audit(173.640:785): avc: denied { listen } for pid=4248 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 173.798089][ T29] audit: type=1400 audit(173.730:786): avc: denied { connect } for pid=4248 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 173.872126][ T29] audit: type=1400 audit(173.790:787): avc: denied { write } for pid=4248 comm="syz.0.179" path="socket:[4049]" dev="sockfs" ino=4049 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 173.981716][ T29] audit: type=1400 audit(173.920:788): avc: denied { accept } for pid=4248 comm="syz.0.179" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 182.103251][ T4267] netlink: 12 bytes leftover after parsing attributes in process `syz.0.183'. [ 183.590995][ T4278] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 185.913196][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 185.914475][ T29] audit: type=1400 audit(185.850:792): avc: denied { setopt } for pid=4290 comm="syz.0.192" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 185.948565][ T29] audit: type=1400 audit(185.890:793): avc: denied { wake_alarm } for pid=4290 comm="syz.0.192" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 189.052180][ T29] audit: type=1400 audit(188.980:794): avc: denied { create } for pid=4296 comm="syz.0.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 193.061347][ T29] audit: type=1400 audit(193.000:795): avc: denied { create } for pid=4302 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 193.823770][ T29] audit: type=1400 audit(193.760:796): avc: denied { sqpoll } for pid=4310 comm="syz.0.198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 195.202440][ T4322] netlink: 60 bytes leftover after parsing attributes in process `syz.1.202'. [ 195.203220][ T4322] netlink: 60 bytes leftover after parsing attributes in process `syz.1.202'. [ 195.428727][ T4322] netlink: 60 bytes leftover after parsing attributes in process `syz.1.202'. [ 195.431860][ T4322] netlink: 60 bytes leftover after parsing attributes in process `syz.1.202'. [ 196.032665][ T4322] netlink: 60 bytes leftover after parsing attributes in process `syz.1.202'. [ 196.034338][ T4322] netlink: 60 bytes leftover after parsing attributes in process `syz.1.202'. [ 196.277030][ T29] audit: type=1400 audit(196.210:797): avc: denied { create } for pid=4331 comm="syz.1.205" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 196.695514][ T29] audit: type=1326 audit(196.630:798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4334 comm="syz.1.206" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 196.698558][ T29] audit: type=1326 audit(196.630:799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4334 comm="syz.1.206" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 196.698699][ T29] audit: type=1326 audit(196.630:800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4334 comm="syz.1.206" exe="/syz-executor" sig=0 arch=40000028 syscall=244 compat=0 ip=0x132320 code=0x7ffc0000 [ 196.698749][ T29] audit: type=1326 audit(196.630:801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4334 comm="syz.1.206" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 196.698801][ T29] audit: type=1326 audit(196.630:802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4334 comm="syz.1.206" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 197.871633][ T29] audit: type=1400 audit(197.810:803): avc: denied { watch watch_reads } for pid=4346 comm="syz.1.210" path="/100" dev="tmpfs" ino=524 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 201.633725][ T4371] serio: Serial port ptm0 [ 210.987121][ T29] audit: type=1400 audit(210.920:804): avc: denied { create } for pid=4410 comm="syz.1.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 211.398685][ T29] audit: type=1326 audit(211.340:805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4415 comm="syz.1.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 211.406328][ T29] audit: type=1326 audit(211.340:806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4415 comm="syz.1.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 211.408672][ T29] audit: type=1326 audit(211.340:807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4415 comm="syz.1.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 211.410712][ T29] audit: type=1326 audit(211.340:808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4415 comm="syz.1.229" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 211.413426][ T29] audit: type=1326 audit(211.340:809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4415 comm="syz.1.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 211.415932][ T29] audit: type=1326 audit(211.340:810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4415 comm="syz.1.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 211.419984][ T29] audit: type=1326 audit(211.340:811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4415 comm="syz.1.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 211.424926][ T29] audit: type=1326 audit(211.340:812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4415 comm="syz.1.229" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 211.428101][ T29] audit: type=1326 audit(211.340:813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4415 comm="syz.1.229" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.423766][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 216.425227][ T29] audit: type=1326 audit(216.350:838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4436 comm="syz.1.236" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.429976][ T29] audit: type=1326 audit(216.370:839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4436 comm="syz.1.236" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.432253][ T29] audit: type=1326 audit(216.370:840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4436 comm="syz.1.236" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.437394][ T29] audit: type=1326 audit(216.370:841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4436 comm="syz.1.236" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.440136][ T29] audit: type=1326 audit(216.380:842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4436 comm="syz.1.236" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.449363][ T29] audit: type=1326 audit(216.390:843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4436 comm="syz.1.236" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.451351][ T29] audit: type=1326 audit(216.390:844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4436 comm="syz.1.236" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.467325][ T29] audit: type=1326 audit(216.400:845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4436 comm="syz.1.236" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.469111][ T29] audit: type=1326 audit(216.400:846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4436 comm="syz.1.236" exe="/syz-executor" sig=0 arch=40000028 syscall=428 compat=0 ip=0x132320 code=0x7ffc0000 [ 216.470724][ T29] audit: type=1326 audit(216.400:847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4436 comm="syz.1.236" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 223.137446][ T29] kauditd_printk_skb: 14 callbacks suppressed [ 223.139228][ T29] audit: type=1326 audit(223.050:862): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4454 comm="syz.1.243" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x0 [ 233.452853][ T4492] netlink: 20 bytes leftover after parsing attributes in process `syz.0.253'. [ 235.307840][ T29] audit: type=1400 audit(235.250:863): avc: denied { mount } for pid=4502 comm="syz.0.258" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 235.871463][ T29] audit: type=1326 audit(235.780:864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 235.899204][ T29] audit: type=1326 audit(235.840:865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 235.906233][ T29] audit: type=1326 audit(235.840:866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 235.908847][ T29] audit: type=1326 audit(235.840:867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=286 compat=0 ip=0x132320 code=0x7ffc0000 [ 235.927882][ T29] audit: type=1326 audit(235.860:868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 235.930821][ T29] audit: type=1326 audit(235.860:870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 235.931271][ T29] audit: type=1326 audit(235.860:869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=436 compat=0 ip=0x132320 code=0x7ffc0000 [ 235.931351][ T29] audit: type=1326 audit(235.860:871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4507 comm="syz.0.260" exe="/syz-executor" sig=0 arch=40000028 syscall=248 compat=0 ip=0x132320 code=0x7ffc0000 [ 236.180349][ T29] audit: type=1326 audit(236.120:872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4510 comm="syz.0.261" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 239.060286][ T4536] capability: warning: `syz.0.270' uses 32-bit capabilities (legacy support in use) [ 241.042301][ T4551] netlink: 'syz.0.275': attribute type 6 has an invalid length. [ 241.212551][ T29] kauditd_printk_skb: 6 callbacks suppressed [ 241.217364][ T29] audit: type=1400 audit(241.150:879): avc: denied { setopt } for pid=4552 comm="syz.0.276" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 242.907037][ T29] audit: type=1400 audit(242.840:880): avc: denied { map } for pid=4560 comm="syz.0.279" path="/dev/zero" dev="devtmpfs" ino=5 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 243.224366][ T29] audit: type=1326 audit(243.160:881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.0.280" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 243.225855][ T29] audit: type=1326 audit(243.160:882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.0.280" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 243.243872][ T29] audit: type=1326 audit(243.180:883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.0.280" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 243.262792][ T29] audit: type=1326 audit(243.190:884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.0.280" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132320 code=0x7ffc0000 [ 243.265573][ T29] audit: type=1326 audit(243.200:885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.0.280" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 243.265653][ T29] audit: type=1326 audit(243.200:886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.0.280" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 243.269854][ T29] audit: type=1326 audit(243.200:887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.0.280" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 243.274393][ T29] audit: type=1326 audit(243.210:888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4562 comm="syz.0.280" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 245.955770][ T4572] netlink: 12 bytes leftover after parsing attributes in process `syz.1.283'. [ 245.993966][ T4573] syz.0.284 uses obsolete (PF_INET,SOCK_PACKET) [ 246.648208][ T29] kauditd_printk_skb: 112 callbacks suppressed [ 246.650012][ T29] audit: type=1400 audit(246.590:1001): avc: denied { block_suspend } for pid=4578 comm="syz.1.286" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 250.610208][ T29] audit: type=1400 audit(250.540:1002): avc: denied { create } for pid=4600 comm="syz.0.291" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 254.779821][ T29] audit: type=1400 audit(254.720:1003): avc: denied { connect } for pid=4628 comm="syz.1.302" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 263.893812][ T4667] netlink: 3 bytes leftover after parsing attributes in process `syz.1.311'. [ 263.902458][ T4667] 0ªX¹¦À: renamed from veth0 (while UP) [ 263.909391][ T4667] 0ªX¹¦À: entered allmulticast mode [ 263.925620][ T4667] A link change request failed with some changes committed already. Interface 60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 265.495586][ T29] audit: type=1400 audit(265.430:1004): avc: denied { write } for pid=4673 comm="syz.1.314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 272.940119][ T29] audit: type=1400 audit(272.880:1005): avc: denied { connect } for pid=4697 comm="syz.1.323" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 273.131783][ T29] audit: type=1400 audit(273.070:1006): avc: denied { create } for pid=4697 comm="syz.1.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 273.153438][ T29] audit: type=1400 audit(273.090:1007): avc: denied { write } for pid=4697 comm="syz.1.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 273.898391][ T4698] sch_tbf: peakrate 7 is lower than or equals to rate 19 ! [ 276.042973][ T4699] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 276.043571][ T4699] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 276.043713][ T4699] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 276.043830][ T4699] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 276.043933][ T4699] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 276.044048][ T4699] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 276.044158][ T4699] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 276.044265][ T4699] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 276.044370][ T4699] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 276.044507][ T4699] hid-generic 0003:0004:0000.0001: unknown main item tag 0x0 [ 276.094632][ T4699] hid-generic 0003:0004:0000.0001: hidraw0: USB HID v0.00 Device [syz0] on syz0 [ 277.458914][ T29] audit: type=1400 audit(277.400:1008): avc: denied { create } for pid=4722 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 277.539642][ T29] audit: type=1400 audit(277.470:1009): avc: denied { setopt } for pid=4722 comm="syz.1.329" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 278.868900][ T29] audit: type=1326 audit(278.800:1010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4722 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 278.878666][ T29] audit: type=1326 audit(278.810:1011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4722 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 278.881728][ T29] audit: type=1326 audit(278.810:1012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4722 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 279.000039][ T29] audit: type=1326 audit(278.940:1013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4722 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 279.007638][ T29] audit: type=1326 audit(278.940:1014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4722 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=435 compat=0 ip=0x132320 code=0x7ffc0000 [ 280.485637][ T29] audit: type=1326 audit(280.380:1015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4722 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 280.496176][ T29] audit: type=1326 audit(280.430:1016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4725 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=265 compat=0 ip=0x15fdd4 code=0x7ffc0000 [ 282.051954][ T29] audit: type=1326 audit(281.990:1017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4725 comm="syz.1.329" exe="/syz-executor" sig=0 arch=40000028 syscall=1 compat=0 ip=0x132320 code=0x7ffc0000 [ 296.194125][ T4762] netlink: 28 bytes leftover after parsing attributes in process `syz.1.341'. [ 298.805277][ T29] audit: type=1400 audit(298.740:1018): avc: denied { connect } for pid=4774 comm="syz.1.346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 298.837281][ T29] audit: type=1326 audit(298.770:1019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4774 comm="syz.1.346" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 298.841235][ T29] audit: type=1326 audit(298.780:1020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4774 comm="syz.1.346" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 298.851200][ T29] audit: type=1326 audit(298.790:1021): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4774 comm="syz.1.346" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 298.864036][ T29] audit: type=1326 audit(298.800:1022): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4774 comm="syz.1.346" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 298.864997][ T29] audit: type=1326 audit(298.800:1023): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4774 comm="syz.1.346" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 298.872905][ T29] audit: type=1326 audit(298.810:1024): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4774 comm="syz.1.346" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 298.890779][ T29] audit: type=1326 audit(298.830:1025): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4774 comm="syz.1.346" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 298.899605][ T29] audit: type=1326 audit(298.830:1026): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4774 comm="syz.1.346" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 298.900297][ T29] audit: type=1326 audit(298.830:1027): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4774 comm="syz.1.346" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 303.787985][ T4771] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 303.802898][ T4771] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 304.249518][ T4948] netlink: 24 bytes leftover after parsing attributes in process `syz.1.356'. [ 307.803292][ T4771] hsr_slave_0: entered promiscuous mode [ 307.815170][ T4771] hsr_slave_1: entered promiscuous mode [ 307.818060][ T4771] debugfs: 'hsr0' already exists in 'hsr' [ 307.819071][ T4771] Cannot create hsr debugfs directory [ 309.670451][ T4771] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 309.683628][ T4771] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 309.702885][ T4771] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 309.715356][ T4771] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 309.929443][ T29] kauditd_printk_skb: 5 callbacks suppressed [ 309.935889][ T29] audit: type=1400 audit(309.870:1033): avc: denied { remount } for pid=5091 comm="syz.1.361" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 309.960521][ T29] audit: type=1400 audit(309.900:1034): avc: denied { unmount } for pid=3102 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 312.300044][ T4771] 8021q: adding VLAN 0 to HW filter on device bond0 [ 312.435013][ T29] audit: type=1326 audit(312.370:1035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5118 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 312.444206][ T29] audit: type=1326 audit(312.380:1036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5118 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 312.496440][ T29] audit: type=1326 audit(312.410:1037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5118 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 312.504687][ T29] audit: type=1326 audit(312.420:1038): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5118 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 312.530490][ T29] audit: type=1326 audit(312.460:1039): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5118 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 312.575825][ T29] audit: type=1326 audit(312.500:1040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5118 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 312.589691][ T29] audit: type=1326 audit(312.530:1041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5118 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 312.592379][ T29] audit: type=1326 audit(312.530:1042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5118 comm="syz.1.368" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 319.501747][ T5172] netlink: 'syz.1.379': attribute type 4 has an invalid length. [ 319.504631][ T5172] netlink: 'syz.1.379': attribute type 4 has an invalid length. [ 319.567281][ T29] kauditd_printk_skb: 65 callbacks suppressed [ 319.569272][ T29] audit: type=1400 audit(319.500:1108): avc: denied { validate_trans } for pid=5170 comm="syz.1.379" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 320.161722][ T5177] can0: slcan on ttyS3. [ 320.248258][ T5177] can0 (unregistered): slcan off ttyS3. [ 320.270039][ T5177] can0: slcan on ttyS3. [ 320.387863][ T5176] can0 (unregistered): slcan off ttyS3. [ 321.574140][ T4771] veth0_vlan: entered promiscuous mode [ 321.599589][ T4771] veth1_vlan: entered promiscuous mode [ 321.690283][ T4771] veth0_macvtap: entered promiscuous mode [ 321.696176][ T4771] veth1_macvtap: entered promiscuous mode [ 321.849015][ T1248] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.849534][ T1248] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.849632][ T1248] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 321.849744][ T1248] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 322.782138][ T5213] netlink: 16 bytes leftover after parsing attributes in process `syz.2.344'. [ 322.811833][ T5213] netlink: 52 bytes leftover after parsing attributes in process `syz.2.344'. [ 322.827293][ T5213] netlink: 4 bytes leftover after parsing attributes in process `syz.2.344'. [ 323.727575][ T29] audit: type=1400 audit(323.670:1109): avc: denied { load_policy } for pid=5223 comm="syz.1.390" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 323.729263][ T5224] SELinux: policydb table sizes (512,0) do not match mine (8,7) [ 323.738666][ T5224] SELinux: failed to load policy [ 324.206557][ T5230] syzkaller0: entered promiscuous mode [ 324.217485][ T5230] syzkaller0: entered allmulticast mode [ 324.524508][ T29] audit: type=1326 audit(324.460:1110): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.538292][ T29] audit: type=1326 audit(324.460:1111): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.542936][ T29] audit: type=1326 audit(324.480:1112): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.544433][ T29] audit: type=1326 audit(324.480:1113): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.544541][ T29] audit: type=1326 audit(324.480:1114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.551554][ T29] audit: type=1326 audit(324.490:1115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.561905][ T29] audit: type=1326 audit(324.500:1116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.569040][ T29] audit: type=1326 audit(324.510:1117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.577454][ T29] audit: type=1326 audit(324.510:1118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.579500][ T29] audit: type=1326 audit(324.520:1119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.580488][ T29] audit: type=1326 audit(324.520:1120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.588267][ T29] audit: type=1326 audit(324.530:1121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.589546][ T29] audit: type=1326 audit(324.530:1122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.592695][ T29] audit: type=1326 audit(324.530:1123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=459 compat=0 ip=0x132320 code=0x7ffc0000 [ 324.598617][ T29] audit: type=1326 audit(324.540:1124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5238 comm="syz.2.395" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 329.333992][ T29] audit: type=1326 audit(329.270:1125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5270 comm="syz.2.405" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 329.358603][ T29] audit: type=1326 audit(329.300:1126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5270 comm="syz.2.405" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 329.364021][ T29] audit: type=1326 audit(329.300:1127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5270 comm="syz.2.405" exe="/syz-executor" sig=0 arch=40000028 syscall=62 compat=0 ip=0x132320 code=0x7ffc0000 [ 331.156451][ T5284] netlink: 12 bytes leftover after parsing attributes in process `syz.1.408'. [ 331.170023][ T5284] netlink: 12 bytes leftover after parsing attributes in process `syz.1.408'. [ 331.854827][ T5287] netlink: 24 bytes leftover after parsing attributes in process `syz.1.409'. [ 334.438989][ T29] kauditd_printk_skb: 4 callbacks suppressed [ 334.439698][ T29] audit: type=1326 audit(334.370:1132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.1.417" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 334.443484][ T29] audit: type=1326 audit(334.380:1133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.1.417" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 334.460321][ T29] audit: type=1326 audit(334.400:1134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.1.417" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 334.467387][ T29] audit: type=1326 audit(334.400:1135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.1.417" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 334.469576][ T29] audit: type=1326 audit(334.410:1136): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.1.417" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 334.472657][ T29] audit: type=1326 audit(334.410:1137): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.1.417" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 334.475311][ T29] audit: type=1326 audit(334.410:1138): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.1.417" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 334.483000][ T29] audit: type=1326 audit(334.420:1139): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.1.417" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 334.485932][ T29] audit: type=1326 audit(334.420:1140): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.1.417" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 334.489143][ T29] audit: type=1326 audit(334.430:1141): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5307 comm="syz.1.417" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 336.069335][ T5320] syzkaller1: entered promiscuous mode [ 336.069975][ T5320] syzkaller1: entered allmulticast mode [ 336.182307][ T5324] netlink: 'syz.2.420': attribute type 4 has an invalid length. [ 336.411418][ T5324] netlink: 'syz.2.420': attribute type 4 has an invalid length. [ 338.840476][ T5352] netlink: 16 bytes leftover after parsing attributes in process `ÿ'. [ 349.979632][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 349.987136][ T29] audit: type=1107 audit(349.920:1144): pid=5434 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 350.713355][ T5442] netlink: 'syz.2.457': attribute type 1 has an invalid length. [ 350.801035][ T5442] bond1: entered promiscuous mode [ 350.803127][ T5442] 8021q: adding VLAN 0 to HW filter on device bond1 [ 350.881959][ T5442] 8021q: adding VLAN 0 to HW filter on device bond1 [ 350.883784][ T5442] bond1: (slave wireguard0): The slave device specified does not support setting the MAC address [ 350.887903][ T5442] bond1: (slave wireguard0): Setting fail_over_mac to active for active-backup mode [ 350.902877][ T5442] bond1: (slave wireguard0): making interface the new active one [ 350.904856][ T5442] wireguard0: entered promiscuous mode [ 350.911479][ T5442] bond1: (slave wireguard0): Enslaving as an active interface with an up link [ 350.928610][ T5442] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 350.929309][ T5442] IPv6: NLM_F_CREATE should be set when creating new route [ 350.929520][ T5442] IPv6: NLM_F_CREATE should be set when creating new route [ 353.787161][ T29] audit: type=1326 audit(353.720:1145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5484 comm="syz.2.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 353.801365][ T29] audit: type=1326 audit(353.740:1146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5484 comm="syz.2.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 353.804023][ T29] audit: type=1326 audit(353.740:1148): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5484 comm="syz.2.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 353.806323][ T29] audit: type=1326 audit(353.740:1149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5484 comm="syz.2.458" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 353.808511][ T29] audit: type=1326 audit(353.740:1147): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5484 comm="syz.2.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 353.821947][ T29] audit: type=1326 audit(353.760:1150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5484 comm="syz.2.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 353.822339][ T29] audit: type=1326 audit(353.760:1151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5484 comm="syz.2.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 353.823860][ T29] audit: type=1326 audit(353.760:1152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5484 comm="syz.2.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 353.823945][ T29] audit: type=1326 audit(353.760:1153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5484 comm="syz.2.458" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 359.331644][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 359.332739][ T29] audit: type=1400 audit(359.270:1177): avc: denied { read } for pid=5525 comm="syz.2.469" path="socket:[6133]" dev="sockfs" ino=6133 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 371.971419][ T29] audit: type=1326 audit(371.910:1178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5530 comm="syz.2.470" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 371.977325][ T29] audit: type=1326 audit(371.910:1179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5530 comm="syz.2.470" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 371.989944][ T29] audit: type=1326 audit(371.930:1180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5530 comm="syz.2.470" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 371.995706][ T29] audit: type=1326 audit(371.930:1181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5530 comm="syz.2.470" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.007370][ T29] audit: type=1326 audit(371.930:1182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5530 comm="syz.2.470" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.008947][ T29] audit: type=1326 audit(371.950:1183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5530 comm="syz.2.470" exe="/syz-executor" sig=0 arch=40000028 syscall=329 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.010797][ T29] audit: type=1326 audit(371.950:1184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5530 comm="syz.2.470" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.013293][ T29] audit: type=1326 audit(371.950:1185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5530 comm="syz.2.470" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.014841][ T29] audit: type=1326 audit(371.950:1186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5530 comm="syz.2.470" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 372.017841][ T29] audit: type=1326 audit(371.960:1187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5530 comm="syz.2.470" exe="/syz-executor" sig=0 arch=40000028 syscall=431 compat=0 ip=0x132320 code=0x7ffc0000 [ 375.172628][ T5557] pim6reg1: entered promiscuous mode [ 375.172924][ T5557] pim6reg1: entered allmulticast mode [ 376.485228][ T5570] netlink: 8 bytes leftover after parsing attributes in process `syz.2.487'. [ 376.710629][ T5572] SELinux: failed to load policy [ 377.399168][ T5574] netlink: 'syz.2.489': attribute type 1 has an invalid length. [ 377.399709][ T5574] netlink: 'syz.2.489': attribute type 2 has an invalid length. [ 377.407839][ T5574] netlink: 4 bytes leftover after parsing attributes in process `syz.2.489'. [ 377.673542][ T29] kauditd_printk_skb: 28 callbacks suppressed [ 377.685753][ T29] audit: type=1400 audit(377.610:1216): avc: denied { bind } for pid=5575 comm="syz.2.490" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 377.701152][ T5576] netlink: 68 bytes leftover after parsing attributes in process `syz.2.490'. [ 385.538881][ T5593] veth0: entered promiscuous mode [ 385.618485][ T5593] netlink: 4 bytes leftover after parsing attributes in process `syz.2.498'. [ 389.949660][ T29] audit: type=1400 audit(389.880:1217): avc: denied { create } for pid=5612 comm="syz.2.503" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 390.567401][ T5615] syzkaller1: entered promiscuous mode [ 390.568628][ T5615] syzkaller1: entered allmulticast mode [ 390.839212][ T5621] SELinux: Context system_u:object_r:user_cron_spool_t:s0 is not valid (left unmapped). [ 390.844536][ T29] audit: type=1400 audit(390.780:1218): avc: denied { relabelto } for pid=5620 comm="syz.2.505" name="UDPv6" dev="sockfs" ino=6671 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=udp_socket permissive=1 trawcon="system_u:object_r:user_cron_spool_t:s0" [ 393.862963][ T5628] netlink: 76 bytes leftover after parsing attributes in process `syz.2.508'. [ 394.520843][ T5634] netlink: 12 bytes leftover after parsing attributes in process `syz.2.511'. [ 394.521389][ T5634] netlink: 20 bytes leftover after parsing attributes in process `syz.2.511'. [ 400.125550][ T5642] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 400.130811][ T5642] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 402.513014][ T5642] hsr_slave_0: entered promiscuous mode [ 402.544168][ T5642] hsr_slave_1: entered promiscuous mode [ 402.547445][ T5642] debugfs: 'hsr0' already exists in 'hsr' [ 402.547769][ T5642] Cannot create hsr debugfs directory [ 403.351847][ T5642] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 403.373597][ T5642] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 403.462583][ T5642] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 403.485110][ T5642] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 405.734538][ T5642] 8021q: adding VLAN 0 to HW filter on device bond0 [ 408.718480][ T29] audit: type=1326 audit(408.650:1219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5954 comm="syz.2.528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 408.719804][ T29] audit: type=1326 audit(408.660:1220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5954 comm="syz.2.528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 408.722910][ T29] audit: type=1326 audit(408.660:1221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5954 comm="syz.2.528" exe="/syz-executor" sig=0 arch=40000028 syscall=217 compat=0 ip=0x132320 code=0x7ffc0000 [ 408.757023][ T29] audit: type=1326 audit(408.680:1222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5954 comm="syz.2.528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 408.757392][ T29] audit: type=1326 audit(408.680:1223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5954 comm="syz.2.528" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 414.074583][ T5642] veth0_vlan: entered promiscuous mode [ 414.182407][ T5642] veth1_vlan: entered promiscuous mode [ 414.289770][ T5642] veth0_macvtap: entered promiscuous mode [ 414.320430][ T5642] veth1_macvtap: entered promiscuous mode [ 414.589730][ T12] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 414.590239][ T12] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 414.590352][ T12] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 414.590424][ T12] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 415.188212][ T6003] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 415.538943][ T6006] netlink: 8 bytes leftover after parsing attributes in process `syz.2.541'. [ 415.539365][ T6006] netlink: 8 bytes leftover after parsing attributes in process `syz.2.541'. [ 415.752052][ T6009] netlink: 4 bytes leftover after parsing attributes in process `syz.2.542'. [ 415.755815][ T6009] netlink: 4 bytes leftover after parsing attributes in process `syz.2.542'. [ 415.898668][ T29] audit: type=1400 audit(415.840:1224): avc: denied { name_bind } for pid=6010 comm="syz.3.543" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 417.760496][ T6022] netlink: 28 bytes leftover after parsing attributes in process `syz.3.548'. [ 419.708779][ T29] audit: type=1326 audit(419.640:1225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6029 comm="syz.3.552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 419.757984][ T29] audit: type=1326 audit(419.690:1226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6029 comm="syz.3.552" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 419.780504][ T29] audit: type=1326 audit(419.720:1227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6029 comm="syz.3.552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 419.820741][ T29] audit: type=1326 audit(419.750:1228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6029 comm="syz.3.552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 419.822933][ T29] audit: type=1326 audit(419.760:1229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6029 comm="syz.3.552" exe="/syz-executor" sig=0 arch=40000028 syscall=75 compat=0 ip=0x132320 code=0x7ffc0000 [ 419.825488][ T29] audit: type=1326 audit(419.760:1230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6029 comm="syz.3.552" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 423.097296][ T29] audit: type=1326 audit(423.030:1231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.3.559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 423.124958][ T29] audit: type=1326 audit(423.060:1232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.3.559" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 423.132633][ T29] audit: type=1326 audit(423.070:1233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.3.559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 423.135403][ T29] audit: type=1326 audit(423.070:1234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.3.559" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 423.145597][ T29] audit: type=1326 audit(423.080:1235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.3.559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 423.208359][ T29] audit: type=1326 audit(423.140:1236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.3.559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 423.218824][ T29] audit: type=1326 audit(423.160:1237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.3.559" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 423.240612][ T29] audit: type=1326 audit(423.170:1238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.3.559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 423.258542][ T29] audit: type=1326 audit(423.190:1239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.3.559" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132320 code=0x7ffc0000 [ 423.272502][ T29] audit: type=1326 audit(423.210:1240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6052 comm="syz.3.559" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 424.416103][ T5129] Process accounting resumed [ 430.580270][ T6072] SELinux: failed to load policy [ 430.848613][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 430.850238][ T29] audit: type=1400 audit(430.780:1243): avc: denied { name_bind } for pid=6073 comm="syz.3.567" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 435.569048][ T29] audit: type=1400 audit(435.510:1244): avc: denied { create } for pid=6086 comm="syz.3.572" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 435.573953][ T29] audit: type=1400 audit(435.510:1245): avc: denied { write } for pid=6086 comm="syz.3.572" name="file0" dev="tmpfs" ino=155 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 435.578209][ T29] audit: type=1400 audit(435.510:1246): avc: denied { open } for pid=6086 comm="syz.3.572" path="/27/file0" dev="tmpfs" ino=155 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 435.643810][ T29] audit: type=1400 audit(435.570:1247): avc: denied { unlink } for pid=5642 comm="syz-executor" name="file0" dev="tmpfs" ino=155 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 436.010259][ T6089] netlink: 156 bytes leftover after parsing attributes in process `syz.3.573'. [ 438.017349][ T6105] syzkaller0: entered promiscuous mode [ 438.017549][ T6105] syzkaller0: entered allmulticast mode [ 438.300503][ T6111] netlink: 16 bytes leftover after parsing attributes in process `syz.3.581'. [ 439.291878][ T6118] process 'syz.3.584' launched './file0' with NULL argv: empty string added [ 439.299082][ T29] audit: type=1400 audit(439.240:1248): avc: denied { execute_no_trans } for pid=6117 comm="syz.3.584" path="/39/file0" dev="tmpfs" ino=217 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 441.068643][ T6124] TCP: request_sock_TCP: Possible SYN flooding on port [::]:20002. Sending cookies. [ 468.673508][ T6146] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 468.707862][ T6146] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 470.749462][ T6146] hsr_slave_0: entered promiscuous mode [ 470.759957][ T6146] hsr_slave_1: entered promiscuous mode [ 470.765430][ T6146] debugfs: 'hsr0' already exists in 'hsr' [ 470.768758][ T6146] Cannot create hsr debugfs directory [ 471.540847][ T6146] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 471.563070][ T6146] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 471.599187][ T6146] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 471.610915][ T6146] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 473.493544][ T6146] 8021q: adding VLAN 0 to HW filter on device bond0 [ 485.511404][ T6146] veth0_vlan: entered promiscuous mode [ 485.607959][ T6146] veth1_vlan: entered promiscuous mode [ 485.861851][ T6146] veth0_macvtap: entered promiscuous mode [ 485.904229][ T6146] veth1_macvtap: entered promiscuous mode [ 486.120724][ T12] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 486.141100][ T12] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 486.143702][ T12] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 486.147593][ T12] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 486.529016][ T29] audit: type=1400 audit(486.470:1249): avc: denied { unmount } for pid=6146 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 487.629267][ T29] audit: type=1400 audit(487.560:1250): avc: denied { relabelfrom } for pid=6459 comm="syz.4.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 487.633756][ T29] audit: type=1400 audit(487.570:1251): avc: denied { relabelto } for pid=6459 comm="syz.4.596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 488.372952][ T29] audit: type=1326 audit(488.310:1252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6471 comm="syz.4.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 488.391868][ T29] audit: type=1326 audit(488.330:1253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6471 comm="syz.4.598" exe="/syz-executor" sig=0 arch=40000028 syscall=350 compat=0 ip=0x132320 code=0x7ffc0000 [ 488.399481][ T29] audit: type=1326 audit(488.340:1254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6471 comm="syz.4.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 488.418451][ T29] audit: type=1326 audit(488.360:1255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6471 comm="syz.4.598" exe="/syz-executor" sig=0 arch=40000028 syscall=354 compat=0 ip=0x132320 code=0x7ffc0000 [ 488.422921][ T29] audit: type=1326 audit(488.360:1256): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6471 comm="syz.4.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 488.433735][ T29] audit: type=1326 audit(488.370:1257): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6471 comm="syz.4.598" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 492.597032][ T29] audit: type=1400 audit(492.520:1258): avc: denied { allowed } for pid=6473 comm="syz.4.599" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 493.166323][ T29] audit: type=1326 audit(493.100:1259): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6478 comm="syz.4.601" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 493.169645][ T29] audit: type=1326 audit(493.110:1260): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6478 comm="syz.4.601" exe="/syz-executor" sig=0 arch=40000028 syscall=226 compat=0 ip=0x132320 code=0x7ffc0000 [ 493.173968][ T29] audit: type=1326 audit(493.110:1261): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6478 comm="syz.4.601" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 494.578992][ T29] audit: type=1326 audit(494.520:1262): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6490 comm="syz.4.605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 494.583263][ T29] audit: type=1326 audit(494.520:1263): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6490 comm="syz.4.605" exe="/syz-executor" sig=0 arch=40000028 syscall=459 compat=0 ip=0x132320 code=0x7ffc0000 [ 494.587835][ T29] audit: type=1326 audit(494.530:1264): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6490 comm="syz.4.605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 494.593327][ T29] audit: type=1326 audit(494.530:1265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6490 comm="syz.4.605" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 495.497655][ T29] audit: type=1326 audit(495.430:1266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6496 comm="syz.4.608" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 495.514255][ T29] audit: type=1326 audit(495.450:1267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6496 comm="syz.4.608" exe="/syz-executor" sig=0 arch=40000028 syscall=8 compat=0 ip=0x132320 code=0x7ffc0000 [ 497.660526][ T29] kauditd_printk_skb: 10 callbacks suppressed [ 497.661240][ T29] audit: type=1326 audit(497.570:1278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6509 comm="syz.4.611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 497.662546][ T29] audit: type=1326 audit(497.590:1279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6509 comm="syz.4.611" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 497.663777][ T29] audit: type=1326 audit(497.590:1280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6509 comm="syz.4.611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 497.665073][ T29] audit: type=1326 audit(497.600:1281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6509 comm="syz.4.611" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 497.666046][ T29] audit: type=1326 audit(497.600:1282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6509 comm="syz.4.611" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 501.949720][ T6499] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 501.971396][ T6499] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 502.958776][ T6661] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6661 comm=syz.4.616 [ 505.222767][ T97] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 505.483259][ T97] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 505.591228][ T97] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 505.679603][ T97] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 505.885231][ T6499] hsr_slave_0: entered promiscuous mode [ 505.889661][ T6499] hsr_slave_1: entered promiscuous mode [ 505.891832][ T6499] debugfs: 'hsr0' already exists in 'hsr' [ 505.905051][ T6499] Cannot create hsr debugfs directory [ 506.941844][ T97] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 506.968627][ T97] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 506.975268][ T97] bond0 (unregistering): Released all slaves [ 507.089659][ T97] hsr_slave_0: left promiscuous mode [ 507.093447][ T97] hsr_slave_1: left promiscuous mode [ 507.179803][ T97] veth1_macvtap: left promiscuous mode [ 507.180977][ T97] veth0_macvtap: left promiscuous mode [ 507.182136][ T97] veth1_vlan: left promiscuous mode [ 507.183042][ T97] veth0_vlan: left promiscuous mode [ 508.884598][ T6499] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 508.922147][ T6499] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 508.978717][ T6499] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 509.038463][ T6499] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 511.758081][ T6499] 8021q: adding VLAN 0 to HW filter on device bond0 [ 523.234345][ T6499] veth0_vlan: entered promiscuous mode [ 523.293362][ T6499] veth1_vlan: entered promiscuous mode [ 523.548291][ T6499] veth0_macvtap: entered promiscuous mode [ 523.584204][ T6499] veth1_macvtap: entered promiscuous mode [ 523.987884][ T1371] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 523.990539][ T1371] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 523.992045][ T1371] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 523.993371][ T1371] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 524.405443][ T29] audit: type=1326 audit(524.340:1283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.4.628" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 524.417894][ T29] audit: type=1326 audit(524.340:1284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.4.628" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 524.427592][ T29] audit: type=1326 audit(524.360:1285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.4.628" exe="/syz-executor" sig=0 arch=40000028 syscall=45 compat=0 ip=0x132320 code=0x7ffc0000 [ 524.429930][ T29] audit: type=1326 audit(524.360:1286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6902 comm="syz.4.628" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 524.948886][ T6905] bond0: (slave bond_slave_0): Releasing backup interface [ 525.042049][ T6905] bond0: (slave bond_slave_1): Releasing backup interface [ 525.128689][ T6905] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 526.345132][ T29] audit: type=1400 audit(526.280:1287): avc: denied { setcurrent } for pid=6918 comm="syz.5.633" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 526.720288][ T29] audit: type=1326 audit(526.660:1288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6921 comm="syz.5.634" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 526.739985][ T29] audit: type=1326 audit(526.680:1289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6921 comm="syz.5.634" exe="/syz-executor" sig=0 arch=40000028 syscall=243 compat=0 ip=0x132320 code=0x7ffc0000 [ 526.747115][ T29] audit: type=1326 audit(526.680:1290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6921 comm="syz.5.634" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 526.749659][ T29] audit: type=1326 audit(526.690:1291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6921 comm="syz.5.634" exe="/syz-executor" sig=0 arch=40000028 syscall=399 compat=0 ip=0x132320 code=0x7ffc0000 [ 526.751179][ T29] audit: type=1326 audit(526.690:1292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6921 comm="syz.5.634" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 528.239040][ T6937] netlink: 8 bytes leftover after parsing attributes in process `syz.4.640'. [ 530.503547][ T6322] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 530.685848][ T6322] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 530.879275][ T6322] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 531.085733][ T6322] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 531.979551][ T6322] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 532.001442][ T6322] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 532.028058][ T6322] bond0 (unregistering): Released all slaves [ 532.139707][ T6322] hsr_slave_0: left promiscuous mode [ 532.149510][ T6322] hsr_slave_1: left promiscuous mode [ 532.201026][ T6322] veth1_macvtap: left promiscuous mode [ 532.201463][ T6322] veth0_macvtap: left promiscuous mode [ 534.004695][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 534.005884][ T29] audit: type=1326 audit(533.940:1294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.4.654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 534.009357][ T29] audit: type=1326 audit(533.950:1295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.4.654" exe="/syz-executor" sig=0 arch=40000028 syscall=322 compat=0 ip=0x132320 code=0x7ffc0000 [ 534.019829][ T29] audit: type=1326 audit(533.960:1296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.4.654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 534.029415][ T29] audit: type=1326 audit(533.970:1297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.4.654" exe="/syz-executor" sig=0 arch=40000028 syscall=237 compat=0 ip=0x132320 code=0x7ffc0000 [ 534.057638][ T29] audit: type=1326 audit(534.000:1298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6986 comm="syz.4.654" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 536.338143][ T29] audit: type=1400 audit(536.280:1299): avc: denied { create } for pid=6969 comm="syz.5.649" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 536.545510][ T6973] netlink: 4 bytes leftover after parsing attributes in process `syz.5.649'. [ 543.390726][ T29] audit: type=1326 audit(543.330:1300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7051 comm="syz.4.672" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 543.395927][ T29] audit: type=1326 audit(543.330:1301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7051 comm="syz.4.672" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 543.428948][ T29] audit: type=1326 audit(543.370:1302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7051 comm="syz.4.672" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 543.430875][ T29] audit: type=1326 audit(543.370:1303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7051 comm="syz.4.672" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 543.437124][ T29] audit: type=1326 audit(543.370:1304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7051 comm="syz.4.672" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 543.440430][ T29] audit: type=1326 audit(543.370:1305): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7051 comm="syz.4.672" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 543.455051][ T29] audit: type=1326 audit(543.390:1306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7051 comm="syz.4.672" exe="/syz-executor" sig=0 arch=40000028 syscall=296 compat=0 ip=0x132320 code=0x7ffc0000 [ 543.462505][ T29] audit: type=1326 audit(543.390:1307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7051 comm="syz.4.672" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 543.468012][ T29] audit: type=1326 audit(543.400:1308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7051 comm="syz.4.672" exe="/syz-executor" sig=0 arch=40000028 syscall=281 compat=0 ip=0x132320 code=0x7ffc0000 [ 543.470114][ T29] audit: type=1326 audit(543.400:1309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7051 comm="syz.4.672" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 544.953920][ T7064] netlink: 76 bytes leftover after parsing attributes in process `syz.5.674'. [ 545.652351][ C1] af_packet: tpacket_rcv: packet too big, clamped from 5290 to 3944. macoff=96 [ 546.688706][ T7084] netlink: 28 bytes leftover after parsing attributes in process `syz.4.682'. [ 550.071938][ T29] kauditd_printk_skb: 304 callbacks suppressed [ 550.074330][ T29] audit: type=1326 audit(550.010:1614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7127 comm="syz.5.697" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 550.074728][ T29] audit: type=1326 audit(550.010:1615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7127 comm="syz.5.697" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 550.076092][ T29] audit: type=1326 audit(550.010:1616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7127 comm="syz.5.697" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 550.097701][ T29] audit: type=1326 audit(550.020:1617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7127 comm="syz.5.697" exe="/syz-executor" sig=0 arch=40000028 syscall=425 compat=0 ip=0x132320 code=0x7ffc0000 [ 550.098143][ T29] audit: type=1326 audit(550.030:1618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7127 comm="syz.5.697" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132358 code=0x7ffc0000 [ 550.098355][ T29] audit: type=1326 audit(550.030:1619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7127 comm="syz.5.697" exe="/syz-executor" sig=0 arch=40000028 syscall=192 compat=0 ip=0x132358 code=0x7ffc0000 [ 550.122322][ T29] audit: type=1326 audit(550.060:1620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7128 comm="syz.4.698" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 550.125448][ T29] audit: type=1326 audit(550.060:1621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7128 comm="syz.4.698" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 550.131314][ T29] audit: type=1326 audit(550.070:1622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7128 comm="syz.4.698" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 550.133876][ T29] audit: type=1326 audit(550.070:1623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7128 comm="syz.4.698" exe="/syz-executor" sig=0 arch=40000028 syscall=65 compat=0 ip=0x132320 code=0x7ffc0000 [ 550.338759][ T7132] netlink: 'syz.4.699': attribute type 74 has an invalid length. [ 552.483136][ T4044] Process accounting resumed [ 560.157864][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 560.159342][ T29] audit: type=1326 audit(560.090:1669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.4.719" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 560.161375][ T29] audit: type=1326 audit(560.100:1670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.4.719" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 560.163881][ T29] audit: type=1326 audit(560.100:1671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.4.719" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 560.168865][ T29] audit: type=1326 audit(560.110:1672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.4.719" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 560.170807][ T29] audit: type=1326 audit(560.110:1673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.4.719" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 560.189884][ T29] audit: type=1326 audit(560.130:1674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.4.719" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 560.205520][ T29] audit: type=1326 audit(560.130:1675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.4.719" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 560.214526][ T29] audit: type=1326 audit(560.150:1676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.4.719" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 560.239451][ T29] audit: type=1326 audit(560.180:1677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.4.719" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 560.245197][ T29] audit: type=1326 audit(560.180:1678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7201 comm="syz.4.719" exe="/syz-executor" sig=0 arch=40000028 syscall=311 compat=0 ip=0x132320 code=0x7ffc0000 [ 564.022305][ T7215] netlink: 256 bytes leftover after parsing attributes in process `syz.4.724'. [ 564.023384][ T7215] netlink: 56 bytes leftover after parsing attributes in process `syz.4.724'. [ 566.114804][ T7224] netlink: 'syz.4.727': attribute type 6 has an invalid length. [ 566.470049][ T7228] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 566.471816][ T7228] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 566.603406][ T29] kauditd_printk_skb: 11 callbacks suppressed [ 566.603807][ T29] audit: type=1326 audit(566.540:1690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7231 comm="syz.4.730" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 566.607936][ T29] audit: type=1326 audit(566.550:1691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7231 comm="syz.4.730" exe="/syz-executor" sig=0 arch=40000028 syscall=449 compat=0 ip=0x132320 code=0x7ffc0000 [ 566.608992][ T29] audit: type=1326 audit(566.550:1692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7231 comm="syz.4.730" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 566.617118][ T29] audit: type=1326 audit(566.550:1693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7231 comm="syz.4.730" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 570.581140][ T7249] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=7249 comm=syz.4.734 [ 576.218780][ T29] audit: type=1326 audit(576.140:1694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.739" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 576.219790][ T29] audit: type=1326 audit(576.160:1695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.739" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 576.224044][ T29] audit: type=1326 audit(576.160:1696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.739" exe="/syz-executor" sig=0 arch=40000028 syscall=225 compat=0 ip=0x132320 code=0x7ffc0000 [ 576.230061][ T29] audit: type=1326 audit(576.170:1697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.739" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 576.237197][ T29] audit: type=1326 audit(576.170:1698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7274 comm="syz.4.739" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 577.435019][ T29] audit: type=1400 audit(577.370:1699): avc: denied { getopt } for pid=7282 comm="syz.4.743" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 578.668703][ T7293] syzkaller0: entered promiscuous mode [ 578.669210][ T7293] syzkaller0: entered allmulticast mode [ 580.795197][ T7311] netlink: 4 bytes leftover after parsing attributes in process `syz.4.752'. [ 580.830336][ T7311] dummy0: entered promiscuous mode [ 580.832335][ T7311] macvtap1: entered promiscuous mode [ 580.837655][ T7311] macvtap1: entered allmulticast mode [ 580.838802][ T7311] dummy0: entered allmulticast mode [ 580.850321][ T7311] macvtap1: left promiscuous mode [ 580.851575][ T7311] macvtap1: left allmulticast mode [ 580.859003][ T7311] dummy0: left allmulticast mode [ 581.022359][ T7315] netlink: 4 bytes leftover after parsing attributes in process `syz.4.753'. [ 581.734712][ T7319] netlink: 20 bytes leftover after parsing attributes in process `syz.4.755'. [ 582.017271][ T29] audit: type=1400 audit(581.950:1700): avc: denied { ioctl } for pid=7318 comm="syz.4.755" path="socket:[11666]" dev="sockfs" ino=11666 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 583.173726][ T29] audit: type=1326 audit(583.110:1701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7327 comm="syz.4.756" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 583.176402][ T29] audit: type=1326 audit(583.110:1702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7327 comm="syz.4.756" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 583.179053][ T29] audit: type=1326 audit(583.120:1703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7327 comm="syz.4.756" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 583.191647][ T29] audit: type=1326 audit(583.120:1704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7327 comm="syz.4.756" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 583.194210][ T29] audit: type=1326 audit(583.130:1705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7327 comm="syz.4.756" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 583.211338][ T29] audit: type=1326 audit(583.150:1706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7327 comm="syz.4.756" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 583.214866][ T29] audit: type=1326 audit(583.150:1707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7327 comm="syz.4.756" exe="/syz-executor" sig=0 arch=40000028 syscall=165 compat=0 ip=0x132320 code=0x7ffc0000 [ 583.222014][ T29] audit: type=1326 audit(583.160:1708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7327 comm="syz.4.756" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 583.223293][ T29] audit: type=1326 audit(583.160:1709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7327 comm="syz.4.756" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.812821][ T29] kauditd_printk_skb: 3 callbacks suppressed [ 587.820854][ T29] audit: type=1326 audit(587.750:1713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7339 comm="syz.4.762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.821243][ T29] audit: type=1326 audit(587.750:1714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7339 comm="syz.4.762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.860908][ T29] audit: type=1326 audit(587.800:1716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7339 comm="syz.4.762" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.967305][ T29] audit: type=1326 audit(587.810:1717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7339 comm="syz.4.762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.969189][ T29] audit: type=1326 audit(587.810:1718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7339 comm="syz.4.762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.971681][ T29] audit: type=1326 audit(587.750:1715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7339 comm="syz.4.762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.974629][ T29] audit: type=1326 audit(587.910:1719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7339 comm="syz.4.762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.979300][ T29] audit: type=1326 audit(587.920:1720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7339 comm="syz.4.762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.981479][ T29] audit: type=1326 audit(587.920:1721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7339 comm="syz.4.762" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 587.985895][ T29] audit: type=1326 audit(587.920:1722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7339 comm="syz.4.762" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 594.519812][ T6780] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 594.613594][ T6780] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 594.927682][ T6780] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.129278][ T6780] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 595.925121][ T6780] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 595.933007][ T6780] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 595.961959][ T6780] bond0 (unregistering): Released all slaves [ 595.984397][ T6780] bond1 (unregistering): (slave wireguard0): Releasing backup interface [ 595.985327][ T6780] wireguard0: left promiscuous mode [ 596.119757][ T6780] bond1 (unregistering): Released all slaves [ 596.422189][ T6780] hsr_slave_0: left promiscuous mode [ 596.427336][ T6780] hsr_slave_1: left promiscuous mode [ 596.448886][ T6780] veth1_macvtap: left promiscuous mode [ 596.449929][ T6780] veth0_macvtap: left promiscuous mode [ 596.453569][ T6780] veth1_vlan: left promiscuous mode [ 596.454659][ T6780] veth0_vlan: left promiscuous mode [ 602.644263][ T7381] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 602.650658][ T7381] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 605.278565][ T7381] hsr_slave_0: entered promiscuous mode [ 605.282033][ T7381] hsr_slave_1: entered promiscuous mode [ 605.866147][ T7381] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 605.923110][ T7381] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 605.984572][ T7381] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 606.027838][ T7381] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 606.263067][ T4617] syz_tun (unregistering): left allmulticast mode [ 606.505857][ T6780] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.142045][ T6780] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.230705][ T6780] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 607.344196][ T6780] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 608.045161][ T6780] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 608.066150][ T6780] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 608.074489][ T6780] bond0 (unregistering): Released all slaves [ 608.174486][ T6780] hsr_slave_0: left promiscuous mode [ 608.209116][ T6780] hsr_slave_1: left promiscuous mode [ 608.224671][ T6780] veth1_macvtap: left promiscuous mode [ 608.238609][ T6780] veth0_macvtap: left promiscuous mode [ 608.240858][ T6780] veth1_vlan: left promiscuous mode [ 608.247540][ T6780] veth0_vlan: left promiscuous mode [ 609.816130][ T7381] 8021q: adding VLAN 0 to HW filter on device bond0 [ 619.895503][ T7381] veth0_vlan: entered promiscuous mode [ 620.020173][ T7381] veth1_vlan: entered promiscuous mode [ 620.151419][ T7381] veth0_macvtap: entered promiscuous mode [ 620.184248][ T7381] veth1_macvtap: entered promiscuous mode [ 620.490757][ T6357] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 620.491437][ T6357] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 620.491599][ T6357] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 620.491688][ T6357] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 622.933068][ T7773] can0: slcan on ttyS3. [ 623.083346][ T7773] can0 (unregistered): slcan off ttyS3. [ 623.463813][ T29] kauditd_printk_skb: 33 callbacks suppressed [ 623.481861][ T29] audit: type=1326 audit(623.400:1756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7781 comm="syz.6.774" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 623.482264][ T29] audit: type=1326 audit(623.410:1757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7781 comm="syz.6.774" exe="/syz-executor" sig=0 arch=40000028 syscall=178 compat=0 ip=0x132320 code=0x7ffc0000 [ 623.482343][ T29] audit: type=1326 audit(623.410:1758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7781 comm="syz.6.774" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 623.722717][ T7785] netlink: 104 bytes leftover after parsing attributes in process `syz.6.775'. [ 628.968593][ T29] audit: type=1326 audit(628.910:1759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.6.786" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 628.970604][ T29] audit: type=1326 audit(628.910:1760): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.6.786" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 628.974484][ T29] audit: type=1326 audit(628.910:1761): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.6.786" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 629.058024][ T29] audit: type=1326 audit(628.970:1762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.6.786" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 629.062466][ T29] audit: type=1326 audit(629.000:1763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.6.786" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 629.068639][ T29] audit: type=1326 audit(629.010:1764): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.6.786" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 629.078736][ T29] audit: type=1326 audit(629.020:1765): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.6.786" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 629.083695][ T29] audit: type=1326 audit(629.020:1766): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.6.786" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 629.088755][ T29] audit: type=1326 audit(629.030:1767): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.6.786" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 629.098738][ T29] audit: type=1326 audit(629.040:1768): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.6.786" exe="/syz-executor" sig=0 arch=40000028 syscall=276 compat=0 ip=0x132320 code=0x7ffc0000 [ 646.605918][ T7859] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 646.617994][ T7859] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 648.645169][ T7859] hsr_slave_0: entered promiscuous mode [ 648.660677][ T7859] hsr_slave_1: entered promiscuous mode [ 648.662221][ T7859] debugfs: 'hsr0' already exists in 'hsr' [ 648.664159][ T7859] Cannot create hsr debugfs directory [ 649.522046][ T7859] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 649.541110][ T7859] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 649.588322][ T7859] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 649.605076][ T7859] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 651.779810][ T7859] 8021q: adding VLAN 0 to HW filter on device bond0 [ 654.393733][ T1344] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 654.575088][ T1344] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 654.738663][ T1344] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 654.884310][ T1344] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 655.609980][ T1344] bond0 (unregistering): Released all slaves [ 655.897789][ T1344] hsr_slave_0: left promiscuous mode [ 655.918630][ T1344] hsr_slave_1: left promiscuous mode [ 655.988647][ T1344] veth1_macvtap: left promiscuous mode [ 655.989739][ T1344] veth0_macvtap: left promiscuous mode [ 655.990857][ T1344] veth1_vlan: left promiscuous mode [ 655.997439][ T1344] veth0_vlan: left promiscuous mode [ 657.773867][ T1344] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 657.950147][ T1344] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 658.006665][ T29] kauditd_printk_skb: 2 callbacks suppressed [ 658.008639][ T29] audit: type=1400 audit(657.940:1771): avc: denied { setopt } for pid=8201 comm="syz.6.793" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 658.057428][ T1344] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 658.151314][ T1344] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 658.327786][ T29] audit: type=1326 audit(658.250:1772): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8205 comm="syz.6.794" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 658.333183][ T29] audit: type=1326 audit(658.270:1773): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8205 comm="syz.6.794" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 658.335886][ T29] audit: type=1326 audit(658.270:1775): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8205 comm="syz.6.794" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 658.340557][ T29] audit: type=1326 audit(658.270:1774): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8205 comm="syz.6.794" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 658.356487][ T29] audit: type=1326 audit(658.290:1776): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8205 comm="syz.6.794" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 658.371705][ T29] audit: type=1326 audit(658.310:1777): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8205 comm="syz.6.794" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 658.373011][ T29] audit: type=1326 audit(658.310:1778): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8205 comm="syz.6.794" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 658.373142][ T29] audit: type=1326 audit(658.310:1779): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8205 comm="syz.6.794" exe="/syz-executor" sig=0 arch=40000028 syscall=386 compat=0 ip=0x132320 code=0x7ffc0000 [ 658.373185][ T29] audit: type=1326 audit(658.310:1780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8205 comm="syz.6.794" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x132320 code=0x7ffc0000 [ 659.109333][ T1344] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 659.124406][ T1344] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 659.132415][ T1344] bond0 (unregistering): Released all slaves [ 659.279090][ T1344] hsr_slave_0: left promiscuous mode [ 659.307770][ T1344] hsr_slave_1: left promiscuous mode [ 659.328452][ T1344] veth1_macvtap: left promiscuous mode [ 659.330366][ T1344] veth0_macvtap: left promiscuous mode [ 659.331885][ T1344] veth1_vlan: left promiscuous mode [ 659.333143][ T1344] veth0_vlan: left promiscuous mode [ 659.459932][ T8229] SELinux: Context system_u:object_r:fsadm_exec_t:s0 is not valid (left unmapped). [ 660.857610][ T8239] netlink: 48 bytes leftover after parsing attributes in process `syz.6.799'. [ 664.910964][ T7859] veth0_vlan: entered promiscuous mode [ 664.951208][ T7859] veth1_vlan: entered promiscuous mode [ 665.119753][ T7859] veth0_macvtap: entered promiscuous mode [ 665.147399][ T7859] veth1_macvtap: entered promiscuous mode [ 665.381297][ T1344] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.383907][ T1344] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.384051][ T1344] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.384128][ T1344] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 665.639208][ T7859] 8<--- cut here --- [ 665.640228][ T29] kauditd_printk_skb: 20 callbacks suppressed [ 665.641176][ T29] audit: type=1400 audit(665.570:1801): avc: denied { add_name } for pid=7859 comm="syz-executor" name="syz7" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsadm_exec_t:s0" [ 665.642865][ T29] audit: type=1400 audit(665.580:1802): avc: denied { create } for pid=7859 comm="syz-executor" name="syz7" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 665.644651][ T29] audit: type=1400 audit(665.580:1803): avc: denied { associate } for pid=7859 comm="syz-executor" name="syz7" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 665.646115][ T29] audit: type=1400 audit(665.580:1804): avc: denied { read } for pid=2909 comm="syslogd" name="log" dev="vda" ino=795 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 665.648800][ T29] audit: type=1400 audit(665.580:1805): avc: denied { search } for pid=2909 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 665.651539][ T29] audit: type=1400 audit(665.580:1806): avc: denied { search } for pid=2909 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 665.653233][ T29] audit: type=1400 audit(665.580:1807): avc: denied { add_name } for pid=2909 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 665.654817][ T29] audit: type=1400 audit(665.580:1808): avc: denied { create } for pid=2909 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 665.656386][ T29] audit: type=1400 audit(665.580:1809): avc: denied { append open } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 665.658772][ T7859] Unable to handle kernel NULL pointer dereference at virtual address 00000038 when read [ 665.660494][ T7859] [00000038] *pgd=859c7003, *pmd=dfb82003 [ 665.668394][ T7859] Internal error: Oops: 205 [#1] SMP ARM [ 665.670329][ T7859] Modules linked in: [ 665.671281][ T7859] CPU: 1 UID: 0 PID: 7859 Comm: syz-executor Not tainted syzkaller #0 PREEMPT [ 665.671723][ T7859] Hardware name: ARM-Versatile Express [ 665.672206][ T7859] PC is at simple_xattrs_free+0x1c/0x8c [ 665.673355][ T7859] LR is at __kernfs_new_node+0x1c0/0x228 [ 665.673720][ T7859] pc : [<805a5784>] lr : [<806360e8>] psr: 60000013 [ 665.674136][ T7859] sp : ea7e9d70 ip : ea7e9d90 fp : ea7e9d8c [ 665.674415][ T7859] r10: 8309f49c r9 : 8522e000 r8 : 82498a44 [ 665.674711][ T7859] r7 : 00000038 r6 : 00000000 r5 : 8309f480 r4 : 867e6e70 [ 665.675035][ T7859] r3 : 8522e000 r2 : 00000000 r1 : 00000000 r0 : 00000038 [ 665.675534][ T7859] Flags: nZCv IRQs on FIQs on Mode SVC_32 ISA ARM Segment none [ 665.675943][ T7859] Control: 30c5387d Table: 85d56400 DAC: 00000000 [ 665.676372][ T7859] Register r0 information: non-paged memory [ 665.677315][ T7859] Register r1 information: NULL pointer [ 665.677594][ T7859] Register r2 information: NULL pointer [ 665.677917][ T7859] Register r3 information: slab task_struct start 8522e000 pointer offset 0 size 3072 [ 665.679091][ T7859] Register r4 information: slab kernfs_node_cache start 867e6e70 pointer offset 0 size 88 [ 665.679626][ T7859] Register r5 information: slab kmalloc-192 start 8309f480 pointer offset 0 size 192 [ 665.680096][ T7859] Register r6 information: NULL pointer [ 665.680360][ T7859] Register r7 information: non-paged memory [ 665.680660][ T7859] Register r8 information: non-slab/vmalloc memory [ 665.681061][ T7859] Register r9 information: slab task_struct start 8522e000 pointer offset 0 size 3072 [ 665.681636][ T7859] Register r10 information: slab kmalloc-192 start 8309f480 pointer offset 28 size 192 [ 665.682110][ T7859] Register r11 information: 2-page vmalloc region starting at 0xea7e8000 allocated at kernel_clone+0xac/0x3ec [ 665.682771][ T7859] Register r12 information: 2-page vmalloc region starting at 0xea7e8000 allocated at kernel_clone+0xac/0x3ec [ 665.683385][ T7859] Process syz-executor (pid: 7859, stack limit = 0xea7e8000) [ 665.683882][ T7859] Stack: (0xea7e9d70 to 0xea7ea000) [ 665.684296][ T7859] 9d60: 867e6e70 8309f480 8624ecc0 830a31b8 [ 665.684777][ T7859] 9d80: ea7e9e2c ea7e9d90 806360e8 805a5774 00000820 ea7e9da0 8309f488 00000001 [ 665.685152][ T7859] 9da0: 000000f1 000041c0 00000000 ffffffff 60000013 84be56c0 824986c8 deffc548 [ 665.685587][ T7859] 9dc0: 84be56c0 a40a9b54 00005b54 00000008 ea7e9e6c ea7e9de0 804b74a0 804b5ed8 [ 665.685959][ T7859] 9de0: 807ae09c 83001240 86bbe408 00000dc0 00000000 0000001c ea7e9e14 cd3d2337 [ 665.686395][ T7859] 9e00: 8053a368 830a31b8 000041c0 00000000 00000001 00000000 854ea02c 8309f480 [ 665.687072][ T7859] 9e20: ea7e9e6c ea7e9e30 80637bbc 80635f34 00000000 00000000 00000001 cd3d2337 [ 665.687620][ T7859] 9e40: 00000000 828fa180 830a31b8 830a31b8 854ea02c 000001c0 00000000 86bbe408 [ 665.687971][ T7859] 9e60: ea7e9e8c ea7e9e70 80638104 80637b48 00000000 00000001 828fa180 86bbe400 [ 665.688313][ T7859] 9e80: ea7e9edc ea7e9e90 803613c4 806380e4 00000000 86bbe400 00000000 cd3d2337 [ 665.688698][ T7859] 9ea0: 00000002 837d9040 828fa140 00000000 8291fa94 830a31b8 828fa090 854ea000 [ 665.689339][ T7859] 9ec0: 000001c0 8522e000 00000000 000001c0 ea7e9efc ea7e9ee0 80637adc 803612ac [ 665.689867][ T7859] 9ee0: 837d9040 80637a70 854ea000 8291fa94 ea7e9f44 ea7e9f00 8057b868 80637a7c [ 665.690424][ T7859] 9f00: ffffff9c 84f93190 854ea000 cd3d2337 00000000 00000000 ea7e9f44 854ea000 [ 665.690835][ T7859] 9f20: 00000000 83955000 000001ff ffffff9c 8522e000 00000002 ea7e9f8c ea7e9f48 [ 665.691364][ T7859] 9f40: 8058222c 8057b658 ea7e9f50 8099f7d0 00000000 84f93190 835a8a18 cd3d2337 [ 665.691711][ T7859] 9f60: 8020029c 000001ff 00000001 7e8afa98 00000027 8020029c 8522e000 00000027 [ 665.692055][ T7859] 9f80: ea7e9fa4 ea7e9f90 805822e8 805820b4 00300000 00000001 00000000 ea7e9fa8 [ 665.692504][ T7859] 9fa0: 80200060 805822cc 00300000 00000001 7e8afa98 000001ff 00000000 00000000 [ 665.692953][ T7859] 9fc0: 00300000 00000001 7e8afa98 00000027 7e8afc80 002e8000 7e8afc84 00000008 [ 665.693410][ T7859] 9fe0: 00000003 7e8afa4c 000287a8 0012feac 60000010 7e8afa98 00000000 00000000 [ 665.694052][ T7859] Call trace: [ 665.694488][ T7859] [<805a5768>] (simple_xattrs_free) from [<806360e8>] (__kernfs_new_node+0x1c0/0x228) [ 665.695141][ T7859] r7:830a31b8 r6:8624ecc0 r5:8309f480 r4:867e6e70 [ 665.695477][ T7859] [<80635f28>] (__kernfs_new_node) from [<80637bbc>] (kernfs_new_node+0x80/0xa4) [ 665.695937][ T7859] r10:8309f480 r9:854ea02c r8:00000000 r7:00000001 r6:00000000 r5:000041c0 [ 665.696331][ T7859] r4:830a31b8 [ 665.696795][ T7859] [<80637b3c>] (kernfs_new_node) from [<80638104>] (kernfs_create_dir_ns+0x2c/0x80) [ 665.697433][ T7859] r10:86bbe408 r9:00000000 r8:000001c0 r7:854ea02c r6:830a31b8 r5:830a31b8 [ 665.697806][ T7859] r4:828fa180 [ 665.697981][ T7859] [<806380d8>] (kernfs_create_dir_ns) from [<803613c4>] (cgroup_mkdir+0x124/0x52c) [ 665.698352][ T7859] r5:86bbe400 r4:828fa180 [ 665.698548][ T7859] [<803612a0>] (cgroup_mkdir) from [<80637adc>] (kernfs_iop_mkdir+0x6c/0x90) [ 665.698937][ T7859] r10:000001c0 r9:00000000 r8:8522e000 r7:000001c0 r6:854ea000 r5:828fa090 [ 665.699250][ T7859] r4:830a31b8 [ 665.699601][ T7859] [<80637a70>] (kernfs_iop_mkdir) from [<8057b868>] (vfs_mkdir+0x21c/0x2fc) [ 665.700094][ T7859] r7:8291fa94 r6:854ea000 r5:80637a70 r4:837d9040 [ 665.700347][ T7859] [<8057b64c>] (vfs_mkdir) from [<8058222c>] (do_mkdirat+0x184/0x1e0) [ 665.700777][ T7859] r10:00000002 r9:8522e000 r8:ffffff9c r7:000001ff r6:83955000 r5:00000000 [ 665.701153][ T7859] r4:854ea000 [ 665.701317][ T7859] [<805820a8>] (do_mkdirat) from [<805822e8>] (sys_mkdir+0x28/0x2c) [ 665.701705][ T7859] r10:00000027 r9:8522e000 r8:8020029c r7:00000027 r6:7e8afa98 r5:00000001 [ 665.702121][ T7859] r4:000001ff [ 665.702276][ T7859] [<805822c0>] (sys_mkdir) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 665.702705][ T7859] Exception stack(0xea7e9fa8 to 0xea7e9ff0) [ 665.703021][ T7859] 9fa0: 00300000 00000001 7e8afa98 000001ff 00000000 00000000 [ 665.703351][ T7859] 9fc0: 00300000 00000001 7e8afa98 00000027 7e8afc80 002e8000 7e8afc84 00000008 [ 665.703748][ T7859] 9fe0: 00000003 7e8afa4c 000287a8 0012feac [ 665.704023][ T7859] r5:00000001 r4:00300000 [ 665.704774][ T7859] Code: e2516000 e1a07000 13a03000 15863000 (e5903000) [ 665.707379][ T7859] ---[ end trace 0000000000000000 ]--- [ 665.707881][ T29] audit: type=1400 audit(665.610:1810): avc: denied { getattr } for pid=2909 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=5 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 665.757997][ T7859] Kernel panic - not syncing: Fatal exception [ 665.761537][ T7859] Rebooting in 86400 seconds.. VM DIAGNOSIS: 11:47:37 Registers: info registers vcpu 0 CPU#0 R00=00000000 R01=76dde700 R02=7ec72da0 R03=00000008 R04=00000000 R05=7ec72da0 R06=00000000 R07=000000af R08=00000000 R09=01a82bdc R10=01a805b8 R11=7ec76e73 R12=76ed5dc4 R13=dff45ff8 R14=76cbf424 R15=76cbf424 PSR=40080093 -Z-- A S svc32 s00=7273752f s01=6e69622f d00=6e69622f7273752f s02=00000000 s03=00000000 d01=0000000000000000 s04=00f80000 s05=00f80000 d02=00f8000000f80000 s06=00000000 s07=00000000 d03=0000000000000000 s08=c0300800 s09=00000000 d04=00000000c0300800 s10=00000000 s11=00000000 d05=0000000000000000 s12=08040201 s13=80402010 d06=8040201008040201 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=00e33000 R01=00000001 R02=00e33000 R03=76a92e40 R04=ffff0000 R05=00e43000 R06=76a96e0c R07=0000002d R08=0000209f R09=76a935fc R10=00db6008 R11=7ee1a2bc R12=00000040 R13=7ee1a0ac R14=76a192fc R15=76a142c8 PSR=80010010 N--- A S usr32 s00=0411c003 s01=ffffffff d00=ffffffff0411c003 s02=11d00303 s03=bc800800 d01=bc80080011d00303 s04=80022208 s05=30080008 d02=3008000880022208 s06=00098003 s07=88030204 d03=8803020400098003 s08=03000209 s09=0c040000 d04=0c04000003000209 s10=02000403 s11=0603028a d05=0603028a02000403 s12=030e0200 s13=82080008 d06=82080008030e0200 s14=0fffe080 s15=06015494 d07=060154940fffe080 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00059803 s33=04808208 d16=0480820800059803 s34=0005a003 s35=028c0008 d17=028c00080005a003 s36=08000600 s37=0380020a d18=0380020a08000600 s38=02a80800 s39=04088003 d19=0408800302a80800 s40=80030180 s41=ffdf0801 d20=ffdf080180030180 s42=ffffffff s43=01ffffff d21=01ffffffffffffff s44=6d656d6b s45=6361635f d22=6361635f6d656d6b s46=665f6568 s47=00656572 d23=00656572665f6568 s48=00000001 s49=00000000 d24=0000000000000001 s50=00000000 s51=00000000 d25=0000000000000000 s52=3738af6e s53=53df8d50 d26=53df8d503738af6e s54=47aa2a7d s55=7ce8d4ac d27=7ce8d4ac47aa2a7d s56=a47a5385 s57=c7cc33e6 d28=c7cc33e6a47a5385 s58=05bf7eaa s59=20cb476a d29=20cb476a05bf7eaa s60=60af45db s61=41ac8064 d30=41ac806460af45db s62=df517249 s63=e2098a71 d31=e2098a71df517249 FPSCR: 00000000