last executing test programs: 6m48.40518037s ago: executing program 1 (id=174): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000440), r1) sendmsg$IEEE802154_START_REQ(r0, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000280)={0x24, r2, 0x101, 0x70bd26, 0x25dfdbfb, {}, [@IEEE802154_ATTR_COORD_PAN_ID={0x6, 0xa, 0x2}, @IEEE802154_ATTR_COORD_SHORT_ADDR={0x6, 0x8, 0xaaa0}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x8080) 6m48.067796363s ago: executing program 1 (id=175): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000200)={0x1, &(0x7f0000000100)=[{0x83c, 0x4, 0x80}]}) syz_emit_ethernet(0x42, &(0x7f0000000180)={@local, @random="000061d500", @val={@void, {0x8100, 0x0, 0x0, 0x2}}, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @dev={0xac, 0x14, 0x14, 0x14}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x0, 0xfb, 0x0, 0x0, {[@exp_smc={0xfe, 0x6}]}}}}}}}, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) r0 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r0, &(0x7f0000000400)={0xa, 0xfffd, 0x0, @empty, 0x5}, 0x1c) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000100)="88", 0xfdef}], 0x1) 6m46.74817699s ago: executing program 1 (id=176): r0 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000002100), 0x82, 0x0) read$FUSE(r1, 0x0, 0x0) write$FUSE_INIT(r1, 0x0, 0x0) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000040)={0x200000, 0x200000, 0x0, 0x0, 0x10000}) openat(0xffffffffffffff9c, 0x0, 0x20e01, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=@base={0x14, 0x4, 0x4, 0x22}, 0x50) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000040)=0x8, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000180)={r2, &(0x7f0000000280), &(0x7f0000000100)=@tcp=r3, 0x1}, 0x20) 6m46.58870278s ago: executing program 1 (id=177): r0 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$selinux_access(r0, &(0x7f0000000200)={'system_u:object_r:init_var_run_t:s0', 0x20, '/usr/sbin/ntpd', 0x20, 0x2}, 0x48) 6m46.489336116s ago: executing program 1 (id=178): mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) syz_open_dev$char_usb(0xc, 0xb4, 0x80000000) unshare(0x64000600) r0 = socket$netlink(0x10, 0x3, 0x9) bind$netlink(r0, &(0x7f0000000040)={0x10, 0x0, 0x25dfdbff, 0x800000}, 0xc) 6m45.949185532s ago: executing program 1 (id=179): socket$inet6(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x9031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x50) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_UNBLANKSCREEN(r3, 0x560f, 0x0) 6m0.655858884s ago: executing program 32 (id=179): socket$inet6(0xa, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x9031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x15, 0x10, 0x2}, 0x50) r3 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_UNBLANKSCREEN(r3, 0x560f, 0x0) 5m37.418296744s ago: executing program 2 (id=208): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x2afc0, 0x1c1, 0x6}, 0x18) openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40240, 0x6) setsockopt$ARPT_SO_SET_REPLACE(r4, 0x0, 0x60, &(0x7f0000000440)={'filter\x00', 0x104, 0x4, 0x3c8, 0xe8, 0x1d0, 0x1d0, 0x2e0, 0x2e0, 0x2e0, 0x7fffffe, 0x0, {[{{@arp={@remote, @multicast2, 0x0, 0x0, 0x7, 0x0, {@mac=@link_local={0x2, 0x80, 0xc2, 0x7}}, {}, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 'bridge0\x00', 'erspan0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x0, 0x100}}}, {{@arp={@rand_addr, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x0, 0xfc, {@empty, {[0xff, 0x0, 0x0, 0x0, 0x0, 0xff]}}, {@mac=@multicast, {[0xff]}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'bond_slave_1\x00', 'ipvlan1\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @empty, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100, 0x4, 0x1}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) setresuid(0xee00, 0xee00, 0x0) statx(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x400, 0x200, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) setsockopt$inet6_tcp_int(r0, 0x6, 0x10, &(0x7f0000000140)=0x1, 0x4) r5 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r5, &(0x7f0000000a00)={'syz1\x00', {0x9, 0x7, 0x5, 0x5}, 0x3f, [0x9, 0x2, 0x5, 0x6, 0x2, 0x400, 0x80400000, 0x0, 0x8, 0x0, 0x6, 0x2, 0xfffffffb, 0x39, 0x747d5e13, 0x800, 0xfffffb9a, 0xfffffffe, 0x0, 0xfffffffb, 0x2004, 0x3, 0x0, 0xf250, 0x80, 0x4800, 0x300000, 0x7, 0xe, 0x4623f, 0x0, 0x10001, 0x1ff, 0x8003, 0x0, 0x3, 0xd, 0x3, 0xba55, 0x8da8, 0x1, 0x200, 0x2, 0x4, 0xe, 0x4, 0x2, 0x6f, 0x8, 0x9, 0x1, 0x199d, 0x6, 0x2, 0x9, 0xfffbffff, 0x4, 0x6, 0x1000, 0x5, 0x3d, 0x8, 0xa, 0x5], [0x1, 0x1e, 0x3, 0x8000, 0xfffffffd, 0x3, 0x0, 0x25, 0x7, 0xfffffffc, 0x8, 0x7fff, 0x72c, 0x1c32, 0x3, 0x6, 0x10000, 0x400, 0x7ffd, 0x3, 0x1, 0xf, 0x5, 0x0, 0x981, 0x4, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x1000001, 0x10, 0xfffffff9, 0xfffffffd, 0x7, 0x1, 0xffffffff, 0x6, 0x8, 0x800, 0x7, 0x6, 0x96, 0xfffffff9, 0x2, 0x0, 0x2, 0x411, 0xc, 0x3, 0x379, 0x9, 0xe, 0x5, 0x7, 0x6, 0x2, 0x1, 0x1, 0x8, 0x7, 0xed, 0x3], [0x401, 0x8000c584, 0xffff, 0xcd3, 0x7, 0x1f, 0x404, 0x4, 0x4008, 0xc, 0x7, 0x0, 0xe8b, 0x5, 0x80000001, 0x8, 0x3f92, 0x1000, 0x0, 0x10, 0x1, 0xfffffff9, 0x0, 0x1000, 0x80040101, 0x5, 0x4, 0x5, 0x200003, 0x2, 0x5, 0x80, 0x9, 0x8001, 0x10000, 0x0, 0x7, 0x400004, 0x3, 0x6d7e, 0x3, 0x8, 0x3, 0xbf23, 0x6, 0x9, 0x1956, 0x0, 0x3ff, 0xe, 0x6, 0x100fffd, 0x2005, 0x9, 0x4, 0xea, 0x9, 0x20000005, 0x3, 0xd9, 0x0, 0x7d, 0x401, 0x5], [0x108e, 0x8000ffff, 0x7, 0x3, 0x88, 0x2, 0x4000000, 0x4, 0x4c, 0x2, 0x763, 0xb, 0x402, 0x1, 0x9, 0x4001000, 0x7f, 0x5, 0x3fa6, 0x4, 0x0, 0x5, 0x6, 0x4, 0xe47, 0x4, 0x3, 0x4, 0x2, 0x2851, 0x3b, 0x20000001, 0x5, 0x5, 0xa80a, 0x65f413f9, 0x4, 0x20006, 0x8a5, 0x86, 0x44, 0x409, 0x3, 0x4, 0x4, 0x10, 0x4, 0xffffffff, 0x7fff, 0xffff8a33, 0xfffffff9, 0x401, 0x3, 0x200, 0x7, 0x4edf, 0xfffffffd, 0xa, 0xe, 0x2, 0xf, 0xf, 0x136, 0x7fffffff]}, 0x45c) r6 = socket$netlink(0x10, 0x3, 0x4) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x0, 0x4}]}, 0x10) close_range(r6, 0xffffffffffffffff, 0x0) 5m23.35997912s ago: executing program 2 (id=215): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0xaa1c}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000e80)=@generic) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x121202, 0x0) ioctl$TIOCSTI(r5, 0x5412, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newsa={0x160, 0x10, 0x713, 0x70bd26, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0x4e22, 0x1, 0x0, 0x3, 0x2, 0x0, 0x0, 0x3a, 0x0, 0xffffffffffffffff}, {@in6=@remote, 0x0, 0x32}, @in6=@local, {0x0, 0x0, 0x8, 0xa, 0x6, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x2, 0xfffffffffffffff8}, {0xc, 0x0, 0x2}, 0x70bd29, 0x0, 0x2, 0x1, 0x0, 0x28}, [@algo_aead={0x68, 0x12, {{'rfc4543(gcm(aes))\x00'}, 0xe0, 0x80, "316f74eeac053deb73fc018493cc121927a9bca207141b9a451c00aa"}}, @tfcpad={0x8, 0x16, 0x4}]}, 0x160}, 0x1, 0x0, 0x0, 0xc0}, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00') epoll_create1(0x0) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002780)={0x2020}, 0x5ecfb203) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x1d, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9d}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@map_fd={0x18, 0xa, 0x1, 0x0, r6}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffff8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @call={0x85, 0x0, 0x0, 0x9a}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000580)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x43, '\x00', 0x0, 0x25, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x3, 0xe, 0x6, 0x1377}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, r6, r6, r6, r6, r6], 0x0, 0x10, 0xb0}, 0x94) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000004280)=@newsa={0x170, 0x10, 0x713, 0x0, 0x25dfdbfb, {{@in=@private=0xa010101, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x20, 0x80, 0x0, 0x0, 0xee00}, {@in=@remote, 0x4d5, 0x32}, @in6=@empty, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, {0x0, 0x0, 0x0, 0x4}, {0xfffffffd, 0x7, 0x7fffffc}, 0x70bd2a, 0x0, 0xa, 0x1, 0x0, 0x22}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x1, 0x4e22, 0x4e21, @in=@multicast2}}, @coaddr={0x14, 0xe, @in6=@loopback}, @tfcpad={0x8, 0x16, 0x1}]}, 0x170}}, 0x40050) 4m37.678131055s ago: executing program 33 (id=215): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0xaa1c}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFBR(r2, 0x8940, &(0x7f0000000e80)=@generic) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x121202, 0x0) ioctl$TIOCSTI(r5, 0x5412, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=@newsa={0x160, 0x10, 0x713, 0x70bd26, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @multicast2}, @in=@dev={0xac, 0x14, 0x14, 0x13}, 0x4e22, 0x1, 0x0, 0x3, 0x2, 0x0, 0x0, 0x3a, 0x0, 0xffffffffffffffff}, {@in6=@remote, 0x0, 0x32}, @in6=@local, {0x0, 0x0, 0x8, 0xa, 0x6, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x2, 0xfffffffffffffff8}, {0xc, 0x0, 0x2}, 0x70bd29, 0x0, 0x2, 0x1, 0x0, 0x28}, [@algo_aead={0x68, 0x12, {{'rfc4543(gcm(aes))\x00'}, 0xe0, 0x80, "316f74eeac053deb73fc018493cc121927a9bca207141b9a451c00aa"}}, @tfcpad={0x8, 0x16, 0x4}]}, 0x160}, 0x1, 0x0, 0x0, 0xc0}, 0x0) syz_open_procfs(0x0, &(0x7f0000000280)='fd/3\x00') epoll_create1(0x0) r6 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000002780)={0x2020}, 0x5ecfb203) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x1d, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x9d}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@map_fd={0x18, 0xa, 0x1, 0x0, r6}, @cb_func={0x18, 0x9, 0x4, 0x0, 0xfffffffffffffff8}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x2}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffffa}, @call={0x85, 0x0, 0x0, 0x9a}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000580)='syzkaller\x00', 0x5, 0x0, 0x0, 0x40f00, 0x43, '\x00', 0x0, 0x25, r6, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000680)={0x3, 0xe, 0x6, 0x1377}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000006c0)=[0xffffffffffffffff, r6, r6, r6, r6, r6], 0x0, 0x10, 0xb0}, 0x94) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000004280)=@newsa={0x170, 0x10, 0x713, 0x0, 0x25dfdbfb, {{@in=@private=0xa010101, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa, 0x20, 0x80, 0x0, 0x0, 0xee00}, {@in=@remote, 0x4d5, 0x32}, @in6=@empty, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, {0x0, 0x0, 0x0, 0x4}, {0xfffffffd, 0x7, 0x7fffffc}, 0x70bd2a, 0x0, 0xa, 0x1, 0x0, 0x22}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}, @encap={0x1c, 0x4, {0x1, 0x4e22, 0x4e21, @in=@multicast2}}, @coaddr={0x14, 0xe, @in6=@loopback}, @tfcpad={0x8, 0x16, 0x1}]}, 0x170}}, 0x40050) 2m13.129750825s ago: executing program 3 (id=344): r0 = syz_usb_connect$uac1(0x0, 0xac, &(0x7f0000000240)=ANY=[@ANYBLOB="12010000000000106b1d010140000102030109029a0003010000000904000000010100000a24010000000201020c24020000000000000800000524050000082407000000009e0c240700000000a3e82f07070d240701060000fd80000000e80924030000000001"], 0x0) syz_usb_control_io(r0, &(0x7f0000000140)={0x2c, 0x0, &(0x7f0000000040)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x407}}, 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io$uac1(r0, &(0x7f0000001840)={0x14, 0x0, &(0x7f0000000080)={0x0, 0x3, 0x2, @string={0x2}}}, 0x0) syz_usb_control_io$uac1(r0, 0x0, &(0x7f0000000940)={0x44, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)={0x20, 0x83, 0x2, "d044"}, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f0000000e00)={0x84, &(0x7f0000000780)={0x40, 0x1, 0x2, "b4cf"}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, &(0x7f00000006c0)={0x84, &(0x7f00000002c0)={0x0, 0x18, 0x2, 'GW'}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) 2m13.04092357s ago: executing program 3 (id=345): r0 = syz_usb_connect(0x5, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x9e, 0x17, 0x36, 0x10, 0x17ef, 0x721e, 0xde06, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x2, 0x6}}]}}]}}, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f0000000500)={0x2c, &(0x7f0000000900)={0x0, 0x4, 0xf1, "63d525f69298447813b2c10ff325e73689cb2dc112d6bc77c302000000a827235d20320036eaaa4dcc748b0f12f764000001000000000097ca00000000000000055fca880836bf16e649683e5cfd70286d452bfcc10000000000ea8a33014891406140b15947f42ab5bdf90784e16eeb9ed7b0b1f3675adb77768bc7526e7a17636e189b59529e83610252f2c6f3fb8387403be0039411a451f35aa8e9c9935e7003e7dab688dff887986f075a3eaf9b5930be5a8958181aac9ecf4c669ad2532d340100000046b5663079044cbad5ff3eec1e625b14a4de1cbf5d9524567cd3294164db1374dd09718810b4c52f768e6e"}, 0x0, 0x0, 0x0, 0x0}) 2m12.961315266s ago: executing program 3 (id=346): r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)={0x14, 0x1f, 0x101, 0x70bd2d, 0x25dfdbfe, {0x7}}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) 2m12.951001266s ago: executing program 3 (id=347): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) syz_genetlink_get_family_id$wireguard(&(0x7f0000000600), 0xffffffffffffffff) 2m12.658327215s ago: executing program 3 (id=348): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000004c0)=ANY=[@ANYBLOB="600100001000130726bd70000000000000000000000000000000ffffffffffffac1414130000000000000000000000004e22000100000003020000003a000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="fe800000000000000000e2ffffffffba0000000032000000ff02000000000000000000000000000100000000b0a48104000000000000000008000000000000000a000000000000000600000000000000000000000000000000000000000000000300000000000000000000000000000000000000000000000200000000000000f8ffffffffffffff0c000000000000000200000029bd70000000000002000100280000000000000068001200726663343534332867636d2861657329040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e000000080"], 0x160}, 0x1, 0x0, 0x0, 0xc0}, 0x0) 2m12.068269653s ago: executing program 3 (id=349): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r0 = gettid() sched_setscheduler(r0, 0x1, &(0x7f0000000340)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x4, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005070000040000924211ec000000", @ANYRES32=r6, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}, {0xd}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r8) getsockname$packet(r8, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x55) sendmsg$nl_route_sched(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x50, 0x2c, 0xf31, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xf}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_fw={{0x7}, {0x24, 0x2, [@TCA_FW_CLASSID={0x8, 0x1, {0x1, 0x9}}, @TCA_FW_MASK={0x8, 0x5, 0x3}, @TCA_FW_MASK={0x8}, @TCA_FW_CLASSID={0x8, 0x1, {0xffe0, 0xb}}]}}]}, 0x50}, 0x1, 0x0, 0x0, 0x4008854}, 0x4010) 1m26.170946772s ago: executing program 34 (id=349): ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) r0 = gettid() sched_setscheduler(r0, 0x1, &(0x7f0000000340)=0x7) r1 = getpid() sched_setaffinity(0x0, 0x4, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x24}}, 0x0) getsockname$packet(r5, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="48000000100005070000040000924211ec000000", @ANYRES32=r6, @ANYBLOB="0000000200000000280012000c00010076657468"], 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000140)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xfff1, 0xffff}, {0xd}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket(0x10, 0x803, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r8) getsockname$packet(r8, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x55) sendmsg$nl_route_sched(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000900)=@delchain={0x50, 0x2c, 0xf31, 0x0, 0x25dfdbfe, {0x0, 0x0, 0x0, r9, {0xf}, {0xfff2, 0xffff}, {0xffff, 0x1}}, [@filter_kind_options=@f_fw={{0x7}, {0x24, 0x2, [@TCA_FW_CLASSID={0x8, 0x1, {0x1, 0x9}}, @TCA_FW_MASK={0x8, 0x5, 0x3}, @TCA_FW_MASK={0x8}, @TCA_FW_CLASSID={0x8, 0x1, {0xffe0, 0xb}}]}}]}, 0x50}, 0x1, 0x0, 0x0, 0x4008854}, 0x4010) 1m14.777716144s ago: executing program 0 (id=373): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$TIOCMGET(r0, 0x5415, &(0x7f00000000c0)) 1m14.68977773s ago: executing program 0 (id=375): r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000480)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000000)=0x9, 0x4) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) 1m14.3771841s ago: executing program 0 (id=378): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/key-users\x00', 0x0, 0x0) read$watch_queue(r0, &(0x7f0000000280)=""/40, 0x28) pread64(r0, &(0x7f0000000100)=""/164, 0xa4, 0x7) 1m14.038208252s ago: executing program 0 (id=379): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newsa={0x13c, 0x10, 0x413, 0x70bd27, 0x1, {{@in=@multicast2, @in6=@rand_addr=' \x01\x00', 0x0, 0x1, 0x4e24, 0x0, 0x2, 0x20, 0x20, 0x88}, {@in6=@dev={0xfe, 0x80, '\x00', 0x14}, 0x0, 0x3c}, @in=@broadcast, {0x4, 0x7, 0x0, 0x40000000000004, 0xffffffffffffffff, 0xfffffffffffffffe, 0x7f}, {0x0, 0x5, 0xcc, 0x4}, {0x5}, 0x0, 0xfffffffd, 0x2, 0x1, 0x1}, [@algo_aead={0x4c, 0x12, {{'rfc4309(ccm(aes))\x00'}, 0x0, 0x60}}]}, 0x13c}, 0x1, 0x0, 0x0, 0x48811}, 0x20040084) 1m13.7686546s ago: executing program 0 (id=381): r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) readv(r0, &(0x7f0000000280)=[{0x0}, {&(0x7f00000002c0)=""/140, 0x9}], 0x2) 1m13.489510777s ago: executing program 0 (id=382): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0xac5) syz_clone3(&(0x7f0000000900)={0x23800000, &(0x7f0000000040)=0xffffffffffffffff, 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r4, &(0x7f0000000280), 0x10) setsockopt$CAN_RAW_ERR_FILTER(r4, 0x65, 0x2, &(0x7f0000000080)=0x8, 0x4) setsockopt$CAN_RAW_FILTER(r4, 0x65, 0x1, &(0x7f0000000400)=[{{0x2, 0x1, 0x1, 0x1}, {0x3, 0x1, 0x1, 0x1}}, {{0x4, 0x1, 0x1}, {0x2, 0x0, 0x1, 0x1}}, {{0x4, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x2, 0x1, 0x1, 0x1}}, {{0x2, 0x0, 0x0, 0x1}, {0x3}}, {{0x2, 0x1, 0x1}, {0x2}}], 0x30) close(r4) io_setup(0x8, &(0x7f0000000600)=0x0) io_submit(r5, 0x1, &(0x7f0000001300)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x6, r3, 0x0}]) syz_emit_ethernet(0x66, &(0x7f0000000080)=ANY=[], 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r7) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYBLOB="01000000010000001c0012000c00010062"], 0x3c}}, 0x0) 27.975589883s ago: executing program 35 (id=382): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) socket$inet6(0xa, 0x2, 0x0) socket$packet(0x11, 0x3, 0x300) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x3, 0xac5) syz_clone3(&(0x7f0000000900)={0x23800000, &(0x7f0000000040)=0xffffffffffffffff, 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = socket$can_raw(0x1d, 0x3, 0x1) bind$can_raw(r4, &(0x7f0000000280), 0x10) setsockopt$CAN_RAW_ERR_FILTER(r4, 0x65, 0x2, &(0x7f0000000080)=0x8, 0x4) setsockopt$CAN_RAW_FILTER(r4, 0x65, 0x1, &(0x7f0000000400)=[{{0x2, 0x1, 0x1, 0x1}, {0x3, 0x1, 0x1, 0x1}}, {{0x4, 0x1, 0x1}, {0x2, 0x0, 0x1, 0x1}}, {{0x4, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x1, 0x1}, {0x2, 0x1, 0x1, 0x1}}, {{0x2, 0x0, 0x0, 0x1}, {0x3}}, {{0x2, 0x1, 0x1}, {0x2}}], 0x30) close(r4) io_setup(0x8, &(0x7f0000000600)=0x0) io_submit(r5, 0x1, &(0x7f0000001300)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x6, r3, 0x0}]) syz_emit_ethernet(0x66, &(0x7f0000000080)=ANY=[], 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r7) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYBLOB="01000000010000001c0012000c00010062"], 0x3c}}, 0x0) 12.578921512s ago: executing program 4 (id=406): clock_settime(0xb40c2cccfbb06704, &(0x7f0000001cc0)) 12.358561436s ago: executing program 4 (id=408): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x800c4, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='.\x00', 0x813) r2 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r2, &(0x7f0000004200)='t', 0x1) sendfile(r2, r0, 0x0, 0x3ffff) sendfile(r2, r0, 0x0, 0x7ffff000) r3 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r3, &(0x7f00000000c0)=[{}], 0x1) syslog(0x2, &(0x7f00000002c0)=""/123, 0x7b) 8.700229621s ago: executing program 4 (id=413): bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$igmp(0x2, 0x3, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000004c0)={'veth1_virt_wifi\x00', 0x0}) r4 = bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000800)={r2, r3, 0x25, 0x4, @val=@tcx}, 0x1c) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000009c0)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x20080, 0x80e1}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000680)={r4, r2, 0x4, r2}, 0x10) close_range(r1, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x83, 0x0, 0x0) 8.270289149s ago: executing program 4 (id=415): r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/key-users\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002200)={0x2020}, 0x2020) pread64(r0, &(0x7f0000002180)=""/114, 0x72, 0x59) read$FUSE(r0, &(0x7f0000004240)={0x2020}, 0x2020) 7.909514442s ago: executing program 4 (id=416): r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000280)={@mcast1, 0x800, 0x0, 0x103, 0x1}, 0x20) setsockopt$inet6_int(r0, 0x29, 0x1000000000021, &(0x7f0000000040)=0x5, 0x4) sendmsg$inet6(r0, &(0x7f0000000340)={&(0x7f00000008c0)={0xa, 0x4e20, 0x80000, @dev={0xfe, 0x80, '\x00', 0x1d}, 0xfffffffe}, 0x1c, 0x0}, 0x4004880) 7.716104735s ago: executing program 4 (id=418): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x1000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0xc, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r3, 0x107, 0x16, &(0x7f0000000000)=0x4, 0x4) 3.388261103s ago: executing program 5 (id=422): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000580)={'veth1_to_bridge\x00', &(0x7f00000003c0)=@ethtool_rxnfc={0x31, 0x0, 0x0, {0x0, @udp_ip4_spec={@empty, @multicast1}, {0x0, @random="339341c4940f"}, @esp_ip4_spec={@multicast1, @loopback}, {0x0, @local}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40}, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xf, &(0x7f0000000100)=0x207, 0x4) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'ip6tnl0\x00', 0x0}) sendto$packet(r1, &(0x7f00000002c0)="05031600d3fc140000004788031c09102c28", 0xfce0, 0x4, &(0x7f0000000140)={0x11, 0x86dd, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) 2.8099442s ago: executing program 5 (id=423): r0 = syz_open_dev$usbfs(&(0x7f0000000240), 0x75, 0x109301) ioctl$USBDEVFS_CLEAR_HALT(r0, 0x80045515, &(0x7f0000000000)={0x5}) 2.069204457s ago: executing program 5 (id=424): chdir(0x0) r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) io_setup(0x54, &(0x7f0000000100)=0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_submit(r1, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f00000bd000), 0x318, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) socket$inet6(0xa, 0x3, 0x7) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0x4028af11, &(0x7f0000001500)={0x1, 0x0, 0x0, 0x0, 0x0, 0x6000}) 946.54839ms ago: executing program 5 (id=425): r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket(0x11, 0x3, 0x4000000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000880)={'ip6gretap0\x00', 0x0}) bind$packet(r1, &(0x7f0000000540)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @multicast}, 0x14) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000080)=ANY=[@ANYBLOB="20000000110001000000000000000000100002000c0000"], 0x20}], 0x1}, 0x0) 247.629775ms ago: executing program 5 (id=426): r0 = userfaultfd(0x80001) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000080)={0xaa, 0x79}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000040)={{&(0x7f00000e2000/0xc00000)=nil, 0xc00000}, 0x1}) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000007, 0x31, r0, 0xd0fbb000) ioctl$UFFDIO_ZEROPAGE(r0, 0xc020aa04, &(0x7f00000003c0)={{&(0x7f0000c67000/0x4000)=nil, 0x4000}}) 0s ago: executing program 5 (id=427): timer_create(0xfffffffffffffffc, 0x0, &(0x7f0000001400)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) timer_create(0xfffffffd, 0x0, &(0x7f00000011c0)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000180)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) syz_open_dev$vcsa(0x0, 0x1, 0x102) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@ipv6_newrule={0x44, 0x20, 0x1, 0x0, 0x0, {0xa, 0x80, 0x40, 0x4, 0x0, 0x0, 0x0, 0x6}, [@FRA_SRC={0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, @FRA_DST={0x14, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}, 0x44}, 0x1, 0x0, 0x0, 0xc011}, 0x40000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=ANY=[@ANYBLOB="5c0000001000390400"/20, @ANYRES32=0x0, @ANYBLOB="00000000000000003c0012800b000100697036746e6c00002c23028014000357a5000085000000000000010100"/68], 0x5c}}, 0x0) timer_create(0x3, 0x0, &(0x7f0000000200)=0x0) timer_settime(r4, 0x1, &(0x7f0000000000)={{}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000940)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) kernel console output (not intermixed with test programs): [ 52.651826][ T28] audit: type=1400 audit(52.560:56): avc: denied { read write } for pid=3077 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 52.654920][ T28] audit: type=1400 audit(52.560:57): avc: denied { open } for pid=3077 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:25144' (ED25519) to the list of known hosts. [ 68.468109][ T28] audit: type=1400 audit(68.370:58): avc: denied { name_bind } for pid=3080 comm="sshd-session" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 70.793374][ T28] audit: type=1400 audit(70.700:59): avc: denied { execute } for pid=3081 comm="sh" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 70.815661][ T28] audit: type=1400 audit(70.730:60): avc: denied { execute_no_trans } for pid=3081 comm="sh" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 73.948659][ T28] audit: type=1400 audit(73.860:61): avc: denied { mounton } for pid=3081 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=806 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 73.952356][ T28] audit: type=1400 audit(73.860:62): avc: denied { mount } for pid=3081 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 73.963832][ T3081] cgroup: Unknown subsys name 'net' [ 73.970962][ T28] audit: type=1400 audit(73.880:63): avc: denied { unmount } for pid=3081 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 74.137417][ T3081] cgroup: Unknown subsys name 'cpuset' [ 74.144214][ T3081] cgroup: Unknown subsys name 'hugetlb' [ 74.146224][ T3081] cgroup: Unknown subsys name 'rlimit' [ 74.415042][ T28] audit: type=1400 audit(74.320:64): avc: denied { setattr } for pid=3081 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 74.417379][ T28] audit: type=1400 audit(74.330:65): avc: denied { mounton } for pid=3081 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 74.420724][ T28] audit: type=1400 audit(74.330:66): avc: denied { mount } for pid=3081 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 74.611661][ T3083] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 74.625342][ T28] audit: type=1400 audit(74.530:67): avc: denied { relabelto } for pid=3083 comm="mkswap" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 74.625642][ T28] audit: type=1400 audit(74.530:68): avc: denied { write } for pid=3083 comm="mkswap" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 74.653932][ T28] audit: type=1400 audit(74.560:69): avc: denied { read } for pid=3081 comm="syz-executor" name="swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 74.656269][ T28] audit: type=1400 audit(74.560:70): avc: denied { open } for pid=3081 comm="syz-executor" path="/swap-file" dev="vda" ino=809 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 82.923682][ T3081] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 85.096964][ T28] audit: type=1400 audit(85.010:71): avc: denied { execmem } for pid=3084 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 85.172424][ T28] audit: type=1400 audit(85.080:72): avc: denied { read } for pid=3086 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 85.185199][ T28] audit: type=1400 audit(85.090:73): avc: denied { open } for pid=3086 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 85.190347][ T28] audit: type=1400 audit(85.090:74): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 85.221025][ T28] audit: type=1400 audit(85.130:75): avc: denied { module_request } for pid=3087 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 85.225290][ T28] audit: type=1400 audit(85.130:76): avc: denied { module_request } for pid=3086 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 85.315423][ T28] audit: type=1400 audit(85.220:77): avc: denied { sys_module } for pid=3086 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 86.053655][ T28] audit: type=1400 audit(85.960:78): avc: denied { ioctl } for pid=3086 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=677 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 87.333149][ T3087] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.347464][ T3087] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 87.419163][ T3086] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 87.428309][ T3086] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 88.263625][ T3087] hsr_slave_0: entered promiscuous mode [ 88.269086][ T3087] hsr_slave_1: entered promiscuous mode [ 88.408064][ T3086] hsr_slave_0: entered promiscuous mode [ 88.410075][ T3086] hsr_slave_1: entered promiscuous mode [ 88.413552][ T3086] debugfs: 'hsr0' already exists in 'hsr' [ 88.416325][ T3086] Cannot create hsr debugfs directory [ 88.780581][ T28] audit: type=1400 audit(88.690:79): avc: denied { create } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.782669][ T28] audit: type=1400 audit(88.690:80): avc: denied { write } for pid=3087 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 88.810230][ T3087] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 88.840719][ T3087] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 88.862876][ T3087] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 88.881694][ T3087] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 89.041140][ T3086] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 89.050257][ T3086] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 89.066013][ T3086] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 89.078298][ T3086] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 89.788198][ T3087] 8021q: adding VLAN 0 to HW filter on device bond0 [ 89.962028][ T3086] 8021q: adding VLAN 0 to HW filter on device bond0 [ 92.951388][ T3087] veth0_vlan: entered promiscuous mode [ 92.981500][ T3087] veth1_vlan: entered promiscuous mode [ 93.012199][ T3086] veth0_vlan: entered promiscuous mode [ 93.031757][ T3087] veth0_macvtap: entered promiscuous mode [ 93.043411][ T3087] veth1_macvtap: entered promiscuous mode [ 93.047874][ T3086] veth1_vlan: entered promiscuous mode [ 93.101583][ T3086] veth0_macvtap: entered promiscuous mode [ 93.109078][ T3086] veth1_macvtap: entered promiscuous mode [ 93.171163][ T2616] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.183422][ T2616] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.186007][ T2616] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.206431][ T2616] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.208009][ T2616] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.251706][ T2616] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.252249][ T2616] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.254880][ T2616] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 93.330483][ T28] kauditd_printk_skb: 1 callbacks suppressed [ 93.331393][ T28] audit: type=1400 audit(93.240:82): avc: denied { mount } for pid=3086 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 93.343854][ T28] audit: type=1400 audit(93.250:83): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/syzkaller.SbOomu/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 93.351512][ T28] audit: type=1400 audit(93.260:84): avc: denied { mount } for pid=3086 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 93.371823][ T28] audit: type=1400 audit(93.280:85): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/syzkaller.SbOomu/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 93.373797][ T28] audit: type=1400 audit(93.280:86): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/syzkaller.SbOomu/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=1007 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 93.393414][ T28] audit: type=1400 audit(93.300:87): avc: denied { unmount } for pid=3086 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 93.407172][ T28] audit: type=1400 audit(93.320:88): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 93.415189][ T28] audit: type=1400 audit(93.320:89): avc: denied { mount } for pid=3086 comm="syz-executor" name="/" dev="gadgetfs" ino=2381 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 93.426316][ T28] audit: type=1400 audit(93.330:90): avc: denied { mount } for pid=3086 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 93.437476][ T28] audit: type=1400 audit(93.350:91): avc: denied { mounton } for pid=3086 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 93.533055][ T3087] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 93.533057][ T3086] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 94.568919][ T3699] capability: warning: `syz.1.3' uses 32-bit capabilities (legacy support in use) [ 94.736875][ T3703] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 99.264671][ T28] kauditd_printk_skb: 20 callbacks suppressed [ 99.264874][ T28] audit: type=1400 audit(99.170:112): avc: denied { create } for pid=3724 comm="syz.1.11" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=1 [ 99.265045][ T28] audit: type=1400 audit(99.170:113): avc: denied { sys_admin } for pid=3724 comm="syz.1.11" capability=21 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=cap_userns permissive=1 [ 99.726451][ T3740] ip6erspan0: entered promiscuous mode [ 107.849097][ T28] audit: type=1400 audit(107.760:114): avc: denied { map_create } for pid=3761 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 107.877471][ T28] audit: type=1400 audit(107.790:115): avc: denied { map_read map_write } for pid=3761 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 107.933316][ T28] audit: type=1400 audit(107.840:116): avc: denied { prog_run } for pid=3761 comm="syz.1.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 107.979739][ T3764] tmpfs: Unsupported parameter 'huge' [ 111.533165][ T28] audit: type=1400 audit(111.440:117): avc: denied { getopt } for pid=3781 comm="syz.1.25" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 111.828312][ T28] audit: type=1326 audit(111.730:118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 111.830247][ T28] audit: type=1326 audit(111.740:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=172 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 111.836918][ T28] audit: type=1326 audit(111.740:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 111.845100][ T28] audit: type=1326 audit(111.740:121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 111.851632][ T28] audit: type=1326 audit(111.750:122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=54 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 111.856845][ T28] audit: type=1326 audit(111.750:123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 112.785843][ T3693] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 113.048284][ T3693] usb 1-1: Using ep0 maxpacket: 16 [ 113.111124][ T3693] usb 1-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 113.129127][ T3693] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 113.143988][ T3693] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 113.144687][ T3693] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 113.144967][ T3693] usb 1-1: Product: syz [ 113.145152][ T3693] usb 1-1: Manufacturer: syz [ 113.145198][ T3693] usb 1-1: SerialNumber: syz [ 113.680344][ T3693] usb 1-1: 0:2 : does not exist [ 114.160496][ T3693] usb 1-1: 5:0: failed to get current value for ch 0 (-22) [ 114.267861][ T3693] usb 1-1: USB disconnect, device number 2 [ 114.665207][ T3693] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 114.815268][ T3693] usb 1-1: Using ep0 maxpacket: 32 [ 114.827610][ T3693] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 114.828017][ T3693] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 114.828434][ T3693] usb 1-1: New USB device found, idVendor=046d, idProduct=c31c, bcdDevice= 0.40 [ 114.828497][ T3693] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 114.832069][ T3693] usb 1-1: config 0 descriptor?? [ 114.883884][ T3693] hub 1-1:0.0: USB hub found [ 115.102953][ T3693] hub 1-1:0.0: 1 port detected [ 115.752535][ T3693] usb 1-1: USB disconnect, device number 3 [ 116.356863][ T28] kauditd_printk_skb: 2 callbacks suppressed [ 116.358131][ T28] audit: type=1400 audit(116.270:126): avc: denied { name_bind } for pid=3828 comm="syz.0.30" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 117.356073][ T28] audit: type=1326 audit(117.250:127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 117.357456][ T28] audit: type=1326 audit(117.270:128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 117.369303][ T28] audit: type=1326 audit(117.280:129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=55 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 117.385401][ T28] audit: type=1326 audit(117.280:130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 117.385800][ T28] audit: type=1326 audit(117.280:131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 117.386029][ T28] audit: type=1326 audit(117.290:132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=125 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 117.386166][ T28] audit: type=1326 audit(117.290:133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 117.386235][ T28] audit: type=1326 audit(117.290:134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 117.409213][ T28] audit: type=1326 audit(117.320:135): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3785 comm="syz.1.27" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 122.668183][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 122.668877][ T28] audit: type=1400 audit(122.580:147): avc: denied { create } for pid=3847 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 122.679088][ T28] audit: type=1400 audit(122.590:148): avc: denied { bind } for pid=3847 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 122.690153][ T28] audit: type=1400 audit(122.600:149): avc: denied { listen } for pid=3847 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 122.738301][ T28] audit: type=1400 audit(122.650:150): avc: denied { connect } for pid=3847 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 122.772217][ T28] audit: type=1400 audit(122.680:151): avc: denied { write } for pid=3847 comm="syz.1.38" path="socket:[2566]" dev="sockfs" ino=2566 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 122.780048][ T28] audit: type=1400 audit(122.690:152): avc: denied { accept } for pid=3847 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 122.808520][ T28] audit: type=1400 audit(122.720:153): avc: denied { read } for pid=3847 comm="syz.1.38" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 127.917290][ T28] audit: type=1400 audit(127.830:154): avc: denied { write } for pid=3851 comm="syz.1.40" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 127.966246][ T28] audit: type=1400 audit(127.870:155): avc: denied { ioctl } for pid=3851 comm="syz.1.40" path="socket:[2570]" dev="sockfs" ino=2570 ioctlcmd=0x586f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 128.332250][ T28] audit: type=1400 audit(128.240:156): avc: denied { bind } for pid=3851 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 128.764734][ C1] hrtimer: interrupt took 9436144 ns [ 137.666120][ T28] audit: type=1400 audit(137.580:157): avc: denied { create } for pid=3859 comm="syz.0.43" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 137.678472][ T28] audit: type=1400 audit(137.590:158): avc: denied { mounton } for pid=3859 comm="syz.0.43" path="/21/file0" dev="tmpfs" ino=126 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 137.685184][ T3860] fuse: Bad value for 'fd' [ 137.696767][ T28] audit: type=1400 audit(137.600:159): avc: denied { write } for pid=3859 comm="syz.0.43" name="file0" dev="tmpfs" ino=126 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 137.720652][ T28] audit: type=1400 audit(137.630:160): avc: denied { unlink } for pid=3086 comm="syz-executor" name="file0" dev="tmpfs" ino=126 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 139.543376][ T3868] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 139.543911][ T3868] IPv6: NLM_F_CREATE should be set when creating new route [ 139.545046][ T3868] IPv6: NLM_F_CREATE should be set when creating new route [ 139.827050][ T28] audit: type=1400 audit(139.740:161): avc: denied { name_bind } for pid=3867 comm="syz.0.47" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 139.829014][ T28] audit: type=1400 audit(139.740:162): avc: denied { node_bind } for pid=3867 comm="syz.0.47" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 142.418269][ T28] audit: type=1400 audit(142.330:163): avc: denied { connect } for pid=3871 comm="syz.0.49" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 142.986441][ T3874] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 146.485016][ T3887] netlink: 25 bytes leftover after parsing attributes in process `syz.0.56'. [ 146.906289][ T28] audit: type=1400 audit(146.800:164): avc: denied { ioctl } for pid=3889 comm="syz.0.57" path="socket:[3220]" dev="sockfs" ino=3220 ioctlcmd=0x8955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 161.672977][ T28] audit: type=1400 audit(161.580:165): avc: denied { allowed } for pid=3905 comm="syz.1.64" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 161.712831][ T28] audit: type=1400 audit(161.620:166): avc: denied { create } for pid=3905 comm="syz.1.64" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 162.426710][ T28] audit: type=1400 audit(162.310:167): avc: denied { write } for pid=3909 comm="syz.1.66" name="ipv6_route" dev="proc" ino=4026532802 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 164.669461][ T28] audit: type=1400 audit(164.580:168): avc: denied { ioctl } for pid=3915 comm="syz.0.69" path="socket:[2659]" dev="sockfs" ino=2659 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 165.718257][ T28] audit: type=1400 audit(165.630:169): avc: denied { ioctl } for pid=3919 comm="syz.0.71" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=2664 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 166.275147][ T28] audit: type=1400 audit(166.180:170): avc: denied { write } for pid=3921 comm="syz.0.72" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 171.045016][ T28] audit: type=1400 audit(170.950:171): avc: denied { create } for pid=3928 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 171.189108][ T28] audit: type=1400 audit(171.100:172): avc: denied { bind } for pid=3928 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 171.203465][ T28] audit: type=1400 audit(171.100:173): avc: denied { setopt } for pid=3928 comm="syz.0.74" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 172.144769][ T28] audit: type=1400 audit(172.050:174): avc: denied { map } for pid=3928 comm="syz.0.74" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2712 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 172.145116][ T28] audit: type=1400 audit(172.050:175): avc: denied { read write } for pid=3928 comm="syz.0.74" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=2712 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 180.968702][ T28] audit: type=1400 audit(180.880:176): avc: denied { getopt } for pid=3954 comm="syz.1.76" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 182.495744][ T28] audit: type=1400 audit(182.400:177): avc: denied { create } for pid=3961 comm="syz.1.79" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 182.518832][ T28] audit: type=1400 audit(182.430:178): avc: denied { mounton } for pid=3961 comm="syz.1.79" path="/32/file0" dev="tmpfs" ino=179 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 182.526984][ T3962] fuse: Bad value for 'fd' [ 182.589504][ T28] audit: type=1400 audit(182.490:179): avc: denied { unlink } for pid=3087 comm="syz-executor" name="file0" dev="tmpfs" ino=179 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 185.251689][ T3972] fuse: Bad value for 'fd' [ 188.083851][ T3983] fuse: Bad value for 'fd' [ 188.595853][ T28] audit: type=1400 audit(188.510:180): avc: denied { write } for pid=3984 comm="syz.1.90" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 188.996089][ T3987] fuse: Bad value for 'fd' [ 191.196981][ T3994] fuse: Bad value for 'fd' [ 191.367639][ T28] audit: type=1400 audit(191.280:181): avc: denied { read } for pid=3993 comm="syz.0.94" name="file0" dev="tmpfs" ino=259 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 191.378440][ T28] audit: type=1400 audit(191.290:182): avc: denied { open } for pid=3993 comm="syz.0.94" path="/47/file0" dev="tmpfs" ino=259 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 191.988251][ T3998] fuse: Bad value for 'fd' [ 192.808723][ T4006] fuse: Bad value for 'fd' [ 193.486754][ T4011] fuse: Bad value for 'fd' [ 194.510505][ T4017] fuse: Bad value for 'fd' [ 195.051494][ T28] audit: type=1400 audit(194.960:183): avc: denied { setopt } for pid=4018 comm="syz.0.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 195.537364][ T28] audit: type=1400 audit(195.450:184): avc: denied { mounton } for pid=4020 comm="syz.1.108" path="/proc/115/task" dev="proc" ino=3359 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 197.257339][ T4032] fuse: Bad value for 'fd' [ 202.323493][ T4038] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 208.706073][ T28] audit: type=1400 audit(208.620:185): avc: denied { write } for pid=4039 comm="syz.1.112" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 208.710681][ T4040] netlink: 12 bytes leftover after parsing attributes in process `syz.1.112'. [ 208.711171][ T4040] netlink: 16 bytes leftover after parsing attributes in process `syz.1.112'. [ 209.085910][ T4046] fuse: Bad value for 'fd' [ 209.222811][ T4048] capability: warning: `syz.1.116' uses deprecated v2 capabilities in a way that may be insecure [ 210.107905][ T4054] fuse: Bad value for 'fd' [ 214.347266][ T28] audit: type=1400 audit(214.260:186): avc: denied { mount } for pid=4070 comm="syz.0.126" name="/" dev="pstore" ino=392 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:pstore_t tclass=filesystem permissive=1 [ 215.468218][ T28] audit: type=1400 audit(215.380:187): avc: denied { create } for pid=4085 comm="syz.1.133" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 224.586578][ T28] audit: type=1400 audit(224.500:188): avc: denied { write } for pid=4108 comm="syz.0.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 224.590331][ T28] audit: type=1400 audit(224.500:189): avc: denied { nlmsg_write } for pid=4108 comm="syz.0.141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 251.728235][ T28] audit: type=1400 audit(251.640:190): avc: denied { ioctl } for pid=4151 comm="syz.0.159" path="socket:[3583]" dev="sockfs" ino=3583 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 251.738832][ T28] audit: type=1400 audit(251.650:191): avc: denied { bind } for pid=4151 comm="syz.0.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 251.746790][ T28] audit: type=1400 audit(251.660:192): avc: denied { setopt } for pid=4151 comm="syz.0.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 251.752653][ T28] audit: type=1400 audit(251.660:193): avc: denied { write } for pid=4151 comm="syz.0.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 251.788779][ T28] audit: type=1400 audit(251.700:194): avc: denied { setopt } for pid=4151 comm="syz.0.159" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 253.345027][ T28] audit: type=1400 audit(253.250:195): avc: denied { load_policy } for pid=4177 comm="syz.1.170" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 253.358043][ T4178] SELinux: failed to load policy [ 255.569442][ T28] audit: type=1400 audit(255.480:196): avc: denied { mount } for pid=4190 comm="syz.1.176" name="/" dev="ramfs" ino=3638 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 255.691640][ T28] audit: type=1400 audit(255.600:197): avc: denied { compute_member } for pid=4192 comm="syz.1.177" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 277.012650][ T4247] fuse: Bad value for 'fd' [ 277.629867][ T4253] netlink: 48 bytes leftover after parsing attributes in process `syz.0.193'. [ 295.689704][ T28] audit: type=1400 audit(295.600:198): avc: denied { map } for pid=4272 comm="syz.0.199" path="socket:[3699]" dev="sockfs" ino=3699 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 295.705884][ T28] audit: type=1400 audit(295.620:199): avc: denied { read } for pid=4272 comm="syz.0.199" path="socket:[3699]" dev="sockfs" ino=3699 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 296.026289][ T28] audit: type=1400 audit(295.940:200): avc: denied { setopt } for pid=4274 comm="syz.0.200" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 296.049449][ T28] audit: type=1400 audit(295.960:201): avc: denied { read } for pid=4274 comm="syz.0.200" path="socket:[3704]" dev="sockfs" ino=3704 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 311.258900][ T4292] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 311.296848][ T4292] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 313.737950][ T4292] hsr_slave_0: entered promiscuous mode [ 313.739689][ T4292] hsr_slave_1: entered promiscuous mode [ 313.740912][ T4292] debugfs: 'hsr0' already exists in 'hsr' [ 313.741201][ T4292] Cannot create hsr debugfs directory [ 314.507516][ T4292] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 314.513401][ T4292] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 314.625719][ T4292] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 314.650447][ T4292] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 316.399046][ T4292] 8021q: adding VLAN 0 to HW filter on device bond0 [ 324.303001][ T4292] veth0_vlan: entered promiscuous mode [ 324.356745][ T4292] veth1_vlan: entered promiscuous mode [ 324.499667][ T4292] veth0_macvtap: entered promiscuous mode [ 324.520514][ T4292] veth1_macvtap: entered promiscuous mode [ 324.632555][ T4577] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.633864][ T4577] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.643494][ T4577] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 324.644139][ T4577] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 342.545380][ T28] audit: type=1400 audit(342.450:202): avc: denied { read } for pid=4626 comm="syz.2.215" dev="sockfs" ino=4548 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 343.116863][ T4640] fuse: Bad value for 'fd' [ 358.108874][ T1410] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 358.217675][ T1410] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 358.307662][ T1410] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 358.388821][ T1410] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 359.013201][ T1410] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 359.025438][ T1410] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 359.050396][ T1410] bond0 (unregistering): Released all slaves [ 359.131500][ T1410] hsr_slave_0: left promiscuous mode [ 359.140750][ T1410] hsr_slave_1: left promiscuous mode [ 359.156262][ T1410] veth1_macvtap: left promiscuous mode [ 359.156855][ T1410] veth0_macvtap: left promiscuous mode [ 359.157166][ T1410] veth1_vlan: left promiscuous mode [ 359.157433][ T1410] veth0_vlan: left promiscuous mode [ 359.343516][ T4672] fuse: Bad value for 'fd' [ 385.677877][ T4812] fuse: Bad value for 'fd' [ 387.195278][ T28] audit: type=1400 audit(387.100:203): avc: denied { mounton } for pid=4881 comm="syz.0.230" path="/133/file0" dev="tmpfs" ino=709 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 387.409373][ T4765] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 387.422231][ T4765] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 388.365081][ T4765] hsr_slave_0: entered promiscuous mode [ 388.366013][ T4765] hsr_slave_1: entered promiscuous mode [ 388.742301][ T4765] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 388.753193][ T4765] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 388.767172][ T4765] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 388.780814][ T4765] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 389.457640][ T4765] 8021q: adding VLAN 0 to HW filter on device bond0 [ 392.212966][ T4765] veth0_vlan: entered promiscuous mode [ 392.232961][ T4765] veth1_vlan: entered promiscuous mode [ 392.308163][ T4765] veth0_macvtap: entered promiscuous mode [ 392.319673][ T4765] veth1_macvtap: entered promiscuous mode [ 392.382873][ T1410] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 392.388778][ T1410] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 392.391406][ T1410] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 392.392663][ T1410] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 393.253510][ T28] audit: type=1326 audit(393.160:204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5097 comm="syz.0.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 393.263271][ T28] audit: type=1326 audit(393.170:205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5097 comm="syz.0.235" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 393.281497][ T28] audit: type=1326 audit(393.190:206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5097 comm="syz.0.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 393.298278][ T28] audit: type=1326 audit(393.210:207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5097 comm="syz.0.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 393.300587][ T28] audit: type=1326 audit(393.210:208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5097 comm="syz.0.235" exe="/syz-executor" sig=0 arch=40000028 syscall=258 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 393.307633][ T28] audit: type=1326 audit(393.210:209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5097 comm="syz.0.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 393.310907][ T28] audit: type=1326 audit(393.210:210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5097 comm="syz.0.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 393.316467][ T28] audit: type=1326 audit(393.210:211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5097 comm="syz.0.235" exe="/syz-executor" sig=0 arch=40000028 syscall=257 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 393.325764][ T28] audit: type=1326 audit(393.210:212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5097 comm="syz.0.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 393.329236][ T28] audit: type=1326 audit(393.210:213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5097 comm="syz.0.235" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 398.231814][ T5110] binfmt_misc: register: failed to install interpreter file ./file0 [ 418.191261][ T5123] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 418.197614][ T5123] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 418.736032][ T2616] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.828681][ T2616] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.931461][ T2616] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 419.007804][ T2616] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 419.370857][ T2616] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 419.389663][ T2616] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 419.397635][ T2616] bond0 (unregistering): Released all slaves [ 419.531228][ T2616] hsr_slave_0: left promiscuous mode [ 419.533159][ T2616] hsr_slave_1: left promiscuous mode [ 419.566096][ T2616] veth1_macvtap: left promiscuous mode [ 419.567226][ T2616] veth0_macvtap: left promiscuous mode [ 419.570992][ T2616] veth1_vlan: left promiscuous mode [ 419.571877][ T2616] veth0_vlan: left promiscuous mode [ 420.795363][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 420.796062][ T28] audit: type=1400 audit(420.700:217): avc: denied { write } for pid=5146 comm="dhcpcd-run-hook" name="null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 420.796205][ T28] audit: type=1400 audit(420.700:218): avc: denied { open } for pid=5146 comm="dhcpcd-run-hook" path="/dev/null" dev="devtmpfs" ino=4 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 421.221619][ T28] audit: type=1400 audit(421.130:219): avc: denied { read } for pid=5148 comm="syz-executor" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 421.278563][ T28] audit: type=1400 audit(421.190:220): avc: denied { map_create } for pid=5148 comm="syz.3.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 421.288962][ T28] audit: type=1400 audit(421.200:221): avc: denied { create } for pid=5148 comm="syz.3.249" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 421.363468][ T28] audit: type=1400 audit(421.270:222): avc: denied { search } for pid=5147 comm="dhcpcd-run-hook" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 421.364019][ T28] audit: type=1400 audit(421.270:223): avc: denied { search } for pid=5147 comm="dhcpcd-run-hook" name="dhcpcd" dev="tmpfs" ino=11 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 421.365169][ T28] audit: type=1400 audit(421.270:224): avc: denied { search } for pid=5147 comm="dhcpcd-run-hook" name="hook-state" dev="tmpfs" ino=15 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 421.365276][ T28] audit: type=1400 audit(421.270:225): avc: denied { search } for pid=5147 comm="dhcpcd-run-hook" name="resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 421.414760][ T28] audit: type=1400 audit(421.320:226): avc: denied { read open } for pid=5150 comm="dhcpcd-run-hook" path="/run/dhcpcd/hook-state/resolv.conf" dev="tmpfs" ino=16 scontext=system_u:system_r:dhcpc_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 422.549094][ T5156] binfmt_misc: register: failed to install interpreter file ./file0 [ 425.915047][ T28] kauditd_printk_skb: 14 callbacks suppressed [ 425.915631][ T28] audit: type=1400 audit(425.810:241): avc: denied { create } for pid=5176 comm="syz.0.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 425.930862][ T28] audit: type=1400 audit(425.840:242): avc: denied { write } for pid=5176 comm="syz.0.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 425.931304][ T28] audit: type=1400 audit(425.840:243): avc: denied { nlmsg_read } for pid=5176 comm="syz.0.254" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 426.865282][ T28] audit: type=1400 audit(426.770:244): avc: denied { execmem } for pid=5182 comm="syz.0.256" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 432.945401][ T28] audit: type=1400 audit(432.850:245): avc: denied { create } for pid=5205 comm="syz.0.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 432.948446][ T28] audit: type=1400 audit(432.860:246): avc: denied { create } for pid=5205 comm="syz.0.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 432.955659][ T28] audit: type=1400 audit(432.870:247): avc: denied { prog_load } for pid=5205 comm="syz.0.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 432.958654][ T28] audit: type=1400 audit(432.870:248): avc: denied { bpf } for pid=5205 comm="syz.0.260" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 432.962882][ T28] audit: type=1400 audit(432.870:249): avc: denied { perfmon } for pid=5205 comm="syz.0.260" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 433.098066][ T28] audit: type=1400 audit(432.990:250): avc: denied { prog_run } for pid=5205 comm="syz.0.260" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 433.292762][ T28] audit: type=1400 audit(433.200:251): avc: denied { ioctl } for pid=5205 comm="syz.0.260" path="socket:[6201]" dev="sockfs" ino=6201 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 434.194127][ T4577] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 434.195376][ T4577] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 434.195564][ T4577] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 434.195668][ T4577] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 434.456935][ T5210] fuse: Unknown parameter 'user_id00000000000000000000' [ 434.461493][ T28] audit: type=1400 audit(434.370:252): avc: denied { mounton } for pid=5209 comm="syz.0.261" path="/153/file0" dev="tmpfs" ino=811 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 438.311406][ T5226] fuse: Bad value for 'fd' [ 440.992406][ T28] audit: type=1400 audit(440.900:253): avc: denied { setopt } for pid=5233 comm="syz.3.268" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 441.006634][ T28] audit: type=1400 audit(440.920:254): avc: denied { write } for pid=5233 comm="syz.3.268" path="/net/tun" dev="devtmpfs" ino=677 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 441.207401][ T28] audit: type=1400 audit(441.120:255): avc: denied { create } for pid=5227 comm="syz.0.267" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 441.210404][ T28] audit: type=1400 audit(441.120:256): avc: denied { ioctl } for pid=5227 comm="syz.0.267" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=6230 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 441.346851][ T28] audit: type=1400 audit(441.260:257): avc: denied { setopt } for pid=5236 comm="syz.3.269" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 441.471438][ T28] audit: type=1400 audit(441.380:258): avc: denied { map } for pid=5236 comm="syz.3.269" path="socket:[6231]" dev="sockfs" ino=6231 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 441.495394][ T28] audit: type=1400 audit(441.400:259): avc: denied { read } for pid=5236 comm="syz.3.269" path="socket:[6231]" dev="sockfs" ino=6231 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 441.558691][ T28] audit: type=1400 audit(441.470:260): avc: denied { create } for pid=5243 comm="syz.0.271" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 441.567476][ T28] audit: type=1400 audit(441.480:261): avc: denied { read write } for pid=5243 comm="syz.0.271" name="file0" dev="tmpfs" ino=853 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 441.569635][ T28] audit: type=1400 audit(441.480:262): avc: denied { open } for pid=5243 comm="syz.0.271" path="/161/file0" dev="tmpfs" ino=853 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 460.430533][ T28] kauditd_printk_skb: 4 callbacks suppressed [ 460.430874][ T28] audit: type=1326 audit(460.340:267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.3.282" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 460.436636][ T28] audit: type=1326 audit(460.340:268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.3.282" exe="/syz-executor" sig=0 arch=40000028 syscall=430 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 460.439694][ T28] audit: type=1326 audit(460.350:269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.3.282" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 460.451756][ T28] audit: type=1326 audit(460.360:270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.3.282" exe="/syz-executor" sig=0 arch=40000028 syscall=431 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 460.458558][ T28] audit: type=1400 audit(460.370:271): avc: denied { mount } for pid=5286 comm="syz.3.282" name="/" dev="ramfs" ino=5587 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 460.468701][ T28] audit: type=1326 audit(460.380:272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5286 comm="syz.3.282" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 461.153621][ T28] audit: type=1400 audit(461.060:273): avc: denied { open } for pid=5288 comm="syz.3.283" path="/dev/raw-gadget" dev="devtmpfs" ino=693 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 461.167120][ T28] audit: type=1400 audit(461.080:274): avc: denied { ioctl } for pid=5288 comm="syz.3.283" path="/dev/raw-gadget" dev="devtmpfs" ino=693 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 461.175931][ T5289] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 461.177862][ T5289] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 466.141871][ T28] audit: type=1400 audit(466.050:275): avc: denied { write } for pid=5308 comm="syz.3.290" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 466.143979][ T5309] netlink: 40 bytes leftover after parsing attributes in process `syz.3.290'. [ 466.576124][ T28] audit: type=1400 audit(466.490:276): avc: denied { mounton } for pid=5314 comm="syz.3.293" path="/proc/58/task" dev="proc" ino=6272 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 466.585316][ T28] audit: type=1400 audit(466.490:277): avc: denied { mount } for pid=5314 comm="syz.3.293" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 466.738472][ T28] audit: type=1400 audit(466.650:278): avc: denied { nlmsg_write } for pid=5317 comm="syz.3.294" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 466.755052][ T5318] netlink: 104 bytes leftover after parsing attributes in process `syz.3.294'. [ 466.916919][ T5320] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 466.919899][ T5320] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 467.700940][ T28] audit: type=1400 audit(467.600:279): avc: denied { getopt } for pid=5325 comm="syz.3.297" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 468.676338][ T28] audit: type=1400 audit(468.580:280): avc: denied { module_request } for pid=5328 comm="syz.0.299" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 468.836527][ T28] audit: type=1400 audit(468.750:281): avc: denied { sys_module } for pid=5328 comm="syz.0.299" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 469.097034][ T28] audit: type=1400 audit(469.010:282): avc: denied { write } for pid=5327 comm="syz.3.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 469.122305][ T28] audit: type=1400 audit(469.020:283): avc: denied { read } for pid=5327 comm="syz.3.298" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 469.251767][ T28] audit: type=1326 audit(469.160:284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5333 comm="syz.0.300" exe="/syz-executor" sig=0 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x7ffc0000 [ 469.879404][ T5338] netlink: 32 bytes leftover after parsing attributes in process `syz.0.302'. [ 492.529287][ T28] kauditd_printk_skb: 11 callbacks suppressed [ 492.529879][ T28] audit: type=1400 audit(492.440:296): avc: denied { write } for pid=5380 comm="syz.3.317" lport=1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 492.553990][ C1] IPv4: Oversized IP packet from 127.0.0.1 [ 493.030461][ T28] audit: type=1400 audit(492.940:297): avc: denied { execute } for pid=5382 comm="syz.3.318" path=2F6D656D66643AF365099C9138C020FDD78E7F89B8C53B0C1E741090ED505701F2119DEDE8D4420ECF5E39BE202864656C6574656429 dev="tmpfs" ino=1049 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 494.276586][ T28] audit: type=1400 audit(494.180:298): avc: denied { read } for pid=5369 comm="syz.0.312" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=5692 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 494.502613][ T28] audit: type=1326 audit(494.410:299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5385 comm="syz.3.319" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x0 [ 495.001987][ T28] audit: type=1400 audit(494.910:300): avc: denied { lock } for pid=5388 comm="syz.0.320" path="socket:[5694]" dev="sockfs" ino=5694 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 498.493563][ T28] audit: type=1400 audit(498.400:301): avc: denied { mounton } for pid=5402 comm="syz.3.327" path="/40/file0" dev="tmpfs" ino=222 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 499.027366][ T28] audit: type=1400 audit(498.940:302): avc: denied { mount } for pid=5402 comm="syz.3.327" name="/" dev="fuse" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 499.108467][ T5405] Driver unsupported XDP return value 0 on prog (id 24) dev N/A, expect packet loss! [ 500.253176][ T28] audit: type=1400 audit(500.160:303): avc: denied { unmount } for pid=4765 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 501.352188][ T5417] netlink: 140 bytes leftover after parsing attributes in process `syz.3.331'. [ 504.988090][ T28] audit: type=1400 audit(504.900:304): avc: denied { create } for pid=5422 comm="syz.3.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 505.087307][ T28] audit: type=1400 audit(505.000:305): avc: denied { setopt } for pid=5422 comm="syz.3.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 506.096529][ T5427] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 506.097063][ T5427] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 508.999981][ T5437] netlink: 36 bytes leftover after parsing attributes in process `syz.0.340'. [ 513.648905][ T28] audit: type=1326 audit(513.560:306): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5434 comm="syz.3.339" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x1300f0 code=0x0 [ 529.132842][ T5450] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 529.138621][ T5450] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 529.217333][ T5454] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 529.218917][ T5454] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 530.005119][ T5462] netlink: 8 bytes leftover after parsing attributes in process `syz.3.348'. [ 535.469151][ T5470] netlink: 24 bytes leftover after parsing attributes in process `syz.3.349'. [ 535.935341][ T5470] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=5470 comm=syz.3.349 [ 545.176914][ T28] audit: type=1400 audit(545.090:307): avc: denied { setattr } for pid=5489 comm="syz.0.354" name="file0" dev="tmpfs" ino=1062 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 545.957771][ T28] audit: type=1400 audit(545.870:308): avc: denied { wake_alarm } for pid=5501 comm="syz.0.360" capability=35 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 576.108048][ T28] audit: type=1400 audit(576.020:309): avc: denied { execute } for pid=5503 comm="syz-executor" name="syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 576.115044][ T28] audit: type=1400 audit(576.020:310): avc: denied { execute_no_trans } for pid=5503 comm="syz-executor" path="/syz-executor" dev="vda" ino=805 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 576.163868][ T28] audit: type=1400 audit(576.070:311): avc: denied { read } for pid=5504 comm="syz-executor" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 576.166478][ T28] audit: type=1400 audit(576.070:312): avc: denied { open } for pid=5504 comm="syz-executor" path="net:[4026531833]" dev="nsfs" ino=4026531833 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 576.171455][ T28] audit: type=1400 audit(576.080:313): avc: denied { mounton } for pid=5504 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 579.139124][ T5504] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 579.159028][ T5504] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 579.703131][ T5651] netlink: 96 bytes leftover after parsing attributes in process `syz.0.364'. [ 580.878055][ T5504] hsr_slave_0: entered promiscuous mode [ 580.880394][ T5504] hsr_slave_1: entered promiscuous mode [ 580.886264][ T5504] debugfs: 'hsr0' already exists in 'hsr' [ 580.887071][ T5504] Cannot create hsr debugfs directory [ 581.262753][ T5504] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 581.279679][ T5504] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 581.290186][ T5504] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 581.297566][ T5504] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 582.165792][ T5504] 8021q: adding VLAN 0 to HW filter on device bond0 [ 585.153787][ T28] audit: type=1400 audit(585.060:314): avc: denied { mount } for pid=5818 comm="syz.0.367" name="/" dev="configfs" ino=1096 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 585.161012][ T28] audit: type=1400 audit(585.070:315): avc: denied { search } for pid=5818 comm="syz.0.367" name="/" dev="configfs" ino=1096 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 585.167218][ T28] audit: type=1400 audit(585.080:316): avc: denied { search } for pid=5818 comm="syz.0.367" name="/" dev="configfs" ino=1096 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 585.171068][ T28] audit: type=1400 audit(585.080:317): avc: denied { read open } for pid=5818 comm="syz.0.367" path="/" dev="configfs" ino=1096 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 586.599649][ T5504] veth0_vlan: entered promiscuous mode [ 586.622495][ T5504] veth1_vlan: entered promiscuous mode [ 586.687512][ T5504] veth0_macvtap: entered promiscuous mode [ 586.700209][ T5504] veth1_macvtap: entered promiscuous mode [ 586.815494][ T30] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.816456][ T30] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.816649][ T30] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.816747][ T30] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 586.913467][ T28] audit: type=1400 audit(586.820:318): avc: denied { mounton } for pid=5504 comm="syz-executor" path="/syzkaller.89dX0C/syz-tmp" dev="vda" ino=818 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 586.923949][ T28] audit: type=1400 audit(586.830:319): avc: denied { mount } for pid=5504 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 586.938925][ T28] audit: type=1400 audit(586.850:320): avc: denied { mounton } for pid=5504 comm="syz-executor" path="/syzkaller.89dX0C/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 586.941060][ T28] audit: type=1400 audit(586.850:321): avc: denied { mounton } for pid=5504 comm="syz-executor" path="/syzkaller.89dX0C/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=6982 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 586.948654][ T28] audit: type=1400 audit(586.860:322): avc: denied { unmount } for pid=5504 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 586.957514][ T28] audit: type=1400 audit(586.860:323): avc: denied { mounton } for pid=5504 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=772 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 587.117315][ T5854] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 587.121020][ T5854] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 587.279762][ T5859] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 587.280870][ T5859] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 587.515352][ T5867] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 587.516013][ T5867] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 588.026868][ T5876] netlink: 220 bytes leftover after parsing attributes in process `syz.4.377'. [ 590.317754][ T28] kauditd_printk_skb: 3 callbacks suppressed [ 590.324711][ T28] audit: type=1400 audit(590.230:327): avc: denied { create } for pid=5890 comm="syz.4.384" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 590.347279][ T28] audit: type=1400 audit(590.260:328): avc: denied { mounton } for pid=5890 comm="syz.4.384" path="/7/file0" dev="tmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 592.825426][ T28] audit: type=1400 audit(592.730:329): avc: denied { unlink } for pid=5504 comm="syz-executor" name="file0" dev="tmpfs" ino=53 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 593.948730][ T5903] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 593.951030][ T5903] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 594.238419][ T28] audit: type=1400 audit(594.110:330): avc: denied { bind } for pid=5885 comm="syz.0.382" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 594.240110][ T5906] netlink: 4 bytes leftover after parsing attributes in process `syz.0.382'. [ 594.288246][ T5906] netlink: 16 bytes leftover after parsing attributes in process `syz.0.382'. [ 596.808743][ T28] audit: type=1400 audit(596.720:331): avc: denied { map } for pid=5914 comm="syz.4.390" path="socket:[6001]" dev="sockfs" ino=6001 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tcp_socket permissive=1 [ 597.977579][ T28] audit: type=1400 audit(597.890:332): avc: denied { name_bind } for pid=5919 comm="syz.4.392" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 610.229254][ T4577] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 610.338741][ T4577] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 610.425396][ T4577] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 610.518821][ T4577] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 610.962004][ T4577] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 610.978058][ T4577] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 610.988688][ T4577] bond0 (unregistering): Released all slaves [ 611.072306][ T4577] hsr_slave_0: left promiscuous mode [ 611.080809][ T4577] hsr_slave_1: left promiscuous mode [ 611.092549][ T4577] veth1_macvtap: left promiscuous mode [ 611.092954][ T4577] veth0_macvtap: left promiscuous mode [ 611.093358][ T4577] veth1_vlan: left promiscuous mode [ 611.093520][ T4577] veth0_vlan: left promiscuous mode [ 631.461988][ T6003] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 631.463673][ T6003] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 631.548686][ T6007] netlink: 132 bytes leftover after parsing attributes in process `syz.4.398'. [ 631.551119][ T6007] netlink: 84 bytes leftover after parsing attributes in process `syz.4.398'. [ 632.806973][ T4577] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 632.816092][ T4577] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 632.817558][ T4577] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 632.822591][ T4577] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 633.676080][ T28] audit: type=1400 audit(633.590:333): avc: denied { ioctl } for pid=6020 comm="syz.4.401" path="socket:[7226]" dev="sockfs" ino=7226 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 633.691070][ T6021] netlink: 4 bytes leftover after parsing attributes in process `syz.4.401'. [ 634.625217][ T6036] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 634.626211][ T6036] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 640.270690][ T6034] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 640.278355][ T6034] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 643.458380][ T6034] hsr_slave_0: entered promiscuous mode [ 643.468492][ T6034] hsr_slave_1: entered promiscuous mode [ 645.062592][ T6034] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 645.075542][ T6034] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 645.085899][ T6034] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 645.095761][ T6034] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 645.843670][ T6034] 8021q: adding VLAN 0 to HW filter on device bond0 [ 648.906940][ T6034] veth0_vlan: entered promiscuous mode [ 648.924054][ T6034] veth1_vlan: entered promiscuous mode [ 648.980015][ T6034] veth0_macvtap: entered promiscuous mode [ 648.996367][ T6034] veth1_macvtap: entered promiscuous mode [ 649.082393][ T12] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 649.083152][ T12] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 649.083601][ T12] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 649.083695][ T12] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 649.405839][ T28] audit: type=1400 audit(649.320:334): avc: denied { setcurrent } for pid=6349 comm="syz.4.407" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 650.168056][ T4577] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 650.168432][ T4577] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 650.168491][ T4577] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 650.168579][ T4577] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 650.282474][ T28] audit: type=1400 audit(650.190:335): avc: denied { watch watch_reads } for pid=6358 comm="syz.4.408" path="/29" dev="tmpfs" ino=160 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 654.397391][ T28] audit: type=1400 audit(654.310:336): avc: denied { setcheckreqprot } for pid=6377 comm="syz.5.414" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 655.139903][ T28] audit: type=1400 audit(655.050:337): avc: denied { load_policy } for pid=6381 comm="syz.5.417" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 655.176489][ T6384] SELinux: policydb string SE L does not match my string SE Linux [ 655.177999][ T6384] SELinux: failed to load policy [ 661.667289][ T28] audit: type=1400 audit(661.580:338): avc: denied { bind } for pid=6400 comm="syz.5.425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 668.143468][ T6411] ------------[ cut here ]------------ [ 668.144139][ T6411] WARNING: kernel/bpf/verifier.c:2763 at reg_bounds_sanity_check+0x3c0/0x428, CPU#0: syz.5.427/6411 [ 668.147748][ T6411] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xffffdfcd, 0xffffffffffffdfcc] s64=[0x80000000ffffdfcd, 0x7fffffffffffdfcc] u32=[0xffffdfcd, 0xffffdfcc] s32=[0xffffdfcd, 0xffffdfcc] var_off=(0xffffdfcc, 0xffffffff00000000) [ 668.148546][ T6411] Modules linked in: [ 668.149501][ T6411] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 668.150659][ T6411] CPU: 0 UID: 0 PID: 6411 Comm: syz.5.427 Not tainted syzkaller #0 PREEMPT [ 668.151250][ T6411] Hardware name: ARM-Versatile Express [ 668.151831][ T6411] Call trace: [ 668.152398][ T6411] [<80201a14>] (dump_backtrace) from [<80201b08>] (show_stack+0x18/0x1c) [ 668.153156][ T6411] r7:8281f940 r6:00000000 r5:822a7824 r4:00000001 [ 668.153836][ T6411] [<80201af0>] (show_stack) from [<8021e45c>] (dump_stack_lvl+0x5c/0x70) [ 668.154396][ T6411] [<8021e400>] (dump_stack_lvl) from [<8021e488>] (dump_stack+0x18/0x1c) [ 668.155042][ T6411] r7:8281f940 r6:00000000 r5:833c6000 r4:82a80d14 [ 668.155344][ T6411] [<8021e470>] (dump_stack) from [<802025f4>] (vpanic+0x114/0x320) [ 668.155860][ T6411] [<802024e0>] (vpanic) from [<80202834>] (trace_suspend_resume+0x0/0x104) [ 668.156370][ T6411] r7:803e0584 [ 668.156568][ T6411] [<80202800>] (panic) from [<80250a68>] (get_taint+0x0/0x1c) [ 668.157069][ T6411] r3:8280c544 r2:00000001 r1:8228e5c8 r0:82295e80 [ 668.157413][ T6411] [<802509f0>] (check_panic_on_warn) from [<80250be4>] (__warn+0x98/0x1ac) [ 668.157762][ T6411] [<80250b4c>] (__warn) from [<80250ee0>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 668.158163][ T6411] r8:00000009 r7:822ae15c r6:df9458c4 r5:833c6000 r4:00000000 [ 668.158448][ T6411] [<80250cfc>] (warn_slowpath_fmt) from [<803e0584>] (reg_bounds_sanity_check+0x3c0/0x428) [ 668.158867][ T6411] r10:860b8000 r9:ffffdfcd r8:80000000 r7:ffffdfcd r6:ffffdfcc r5:822ae8c0 [ 668.159208][ T6411] r4:853e3a30 [ 668.159387][ T6411] [<803e01c4>] (reg_bounds_sanity_check) from [<803ed2ac>] (reg_set_min_max+0x1c4/0x288) [ 668.159808][ T6411] r10:00000001 r9:00000010 r8:860b8000 r7:85d6d310 r6:853e3b10 r5:853e3a30 [ 668.160125][ T6411] r4:85d6d230 [ 668.160325][ T6411] [<803ed0e8>] (reg_set_min_max) from [<803fdef0>] (check_cond_jmp_op+0xc7c/0x1980) [ 668.160717][ T6411] r10:853e3800 r9:00000010 r8:84dec200 r7:ffffffff r6:80000000 r5:85ff93c0 [ 668.161013][ T6411] r4:df92f0c0 r3:85d6d230 [ 668.161218][ T6411] [<803fd274>] (check_cond_jmp_op) from [<80404560>] (do_check_common+0x259c/0x3228) [ 668.161574][ T6411] r10:84dec200 r9:860b8000 r8:df92f0c0 r7:860be000 r6:00000018 r5:df92f078 [ 668.161879][ T6411] r4:df92f000 [ 668.162046][ T6411] [<80401fc4>] (do_check_common) from [<804081b4>] (bpf_check+0x22e4/0x2d30) [ 668.162410][ T6411] r10:860be000 r9:00000001 r8:860b8000 r7:00000a7b r6:860b88bc r5:00000000 [ 668.162691][ T6411] r4:00000016 [ 668.162864][ T6411] [<80405ed0>] (bpf_check) from [<803d98d4>] (bpf_prog_load+0x5b8/0xdec) [ 668.163239][ T6411] r10:df92f000 r9:833c6000 r8:85d52b30 r7:df945d18 r6:00000000 r5:00000000 [ 668.163537][ T6411] r4:df945eb0 [ 668.163725][ T6411] [<803d931c>] (bpf_prog_load) from [<803db0fc>] (__sys_bpf+0x2d8/0x2008) [ 668.164067][ T6411] r10:00000005 r9:00000000 r8:df945e50 r7:00000048 r6:833c6000 r5:200054c0 [ 668.164691][ T6411] r4:00000000 [ 668.164835][ T6411] [<803dae24>] (__sys_bpf) from [<803dd3c4>] (sys_bpf+0x2c/0x48) [ 668.165688][ T6411] r10:00000182 r9:833c6000 r8:8020029c r7:00000182 r6:00346450 r5:00000000 [ 668.166027][ T6411] r4:00000000 [ 668.166422][ T6411] [<803dd398>] (sys_bpf) from [<80200060>] (ret_fast_syscall+0x0/0x1c) [ 668.166910][ T6411] Exception stack(0xdf945fa8 to 0xdf945ff0) [ 668.167319][ T6411] 5fa0: 00000000 00000000 00000005 200054c0 00000048 00000000 [ 668.167691][ T6411] 5fc0: 00000000 00000000 00346450 00000182 00346418 00000000 00000001 76fb90dc [ 668.168173][ T6411] 5fe0: 76fb8e88 76fb8e78 00018ba0 001300f0 [ 668.170793][ T6411] Rebooting in 86400 seconds..