last executing test programs: 3.80521769s ago: executing program 2 (id=1171): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x80000, 0x0) close(r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000900)={0x1, &(0x7f00000008c0)=[{0x6, 0x0, 0x0, 0x6}]}) socket$inet_tcp(0x2, 0x1, 0x0) close_range(r2, 0xffffffffffffffff, 0x0) 3.251938334s ago: executing program 4 (id=1176): sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900"], 0x7c}}, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x42002) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000003c0)={0x0, 0x0, 0x0, 'queue1\x00', 0x4}) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000140)={0x1e6, @tick=0x9}) 3.133747712s ago: executing program 4 (id=1177): close(0xffffffffffffffff) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x5b, 0x0, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eea", 0x0, 0x24, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002380)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x28080, 0x0) syz_emit_ethernet(0x2a, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000d84000)={0xa, 0x2, 0xfffffffc}, 0x1c) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r4, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r6, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r0, 0x4004f506, &(0x7f0000000000)=0x1) 2.636310183s ago: executing program 0 (id=1181): r0 = socket(0x10, 0x803, 0x0) r1 = socket$can_raw(0x1d, 0x3, 0x1) r2 = dup2(r1, r0) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r2, 0x84, 0x17, 0x0, 0x9) 2.440338906s ago: executing program 0 (id=1182): syz_usb_connect(0x3, 0x3f, &(0x7f0000000040)=ANY=[@ANYBLOB="1201000016038308c5109a8146e40102230109022d0001000000000904000003030000000905be"], 0x0) 1.838892201s ago: executing program 0 (id=1183): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x4, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r5 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) writev(r5, &(0x7f0000000000)=[{&(0x7f00000004c0)="0c377aed380c87ef23771d8666a6e063fdd4db2909ec7b95a5d795f505b624f9f6513eb1e96c01798e16ca7ad007b2c0040354faa791713210af6adedf1f6018aaf3f4490eca", 0x90}, {0x0}], 0x2) 1.741523971s ago: executing program 0 (id=1184): listen(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() setrlimit(0x8, &(0x7f0000000100)={0x0, 0x20000000}) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x2d) unshare(0x2040400) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r5, &(0x7f0000001fc0)=""/184, 0xb8) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000180)={0xa0, 0xfffffffffffffff5, 0x0, {{0x3, 0x1, 0x5, 0xa, 0x3, 0x1, {0x5, 0x17d, 0x8, 0x5, 0x100, 0x7cf4, 0x9, 0x7ffffffd, 0xfffffffe, 0x8000, 0x20000000, 0xee00, 0x0, 0x3ff, 0x1}}, {0x0, 0x11}}}, 0xa0) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r7, &(0x7f0000001340)=[{&(0x7f0000000580)=""/148, 0x94}], 0x1) 1.617654622s ago: executing program 4 (id=1185): ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(0xffffffffffffffff, 0xc04064a0, &(0x7f0000000140)={&(0x7f0000000040), 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x0, 0x7, 0x9}) r1 = syz_open_dev$dri(0x0, 0x1, 0x0) r2 = syz_open_dev$dri(&(0x7f00000008c0), 0xd21, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r2, 0xc04064a0, &(0x7f00000001c0)={0x0, &(0x7f00000000c0)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r2, 0xc06864a1, &(0x7f00000003c0)={0x0, 0x0, r3, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r2, 0xc06864ce, &(0x7f0000000200)={r4, 0x1, 0x800, 0x7, 0x0, [0x0, 0x0, 0x0, 0x0], [0x0, 0x6], [0xa, 0x8, 0x10000, 0x3], [0x1019cd22, 0x0, 0xe4, 0x21d]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r1, 0xc06864b8, &(0x7f0000000000)={0x0, 0x40, 0x3f, 0x30315559, 0x3, [r5, 0x0, r7, r6], [0xebf, 0x676, 0x39], [], [0x2]}) r8 = creat(&(0x7f0000000040)='./file0\x00', 0x4b) close(r8) r9 = syz_open_dev$dri(&(0x7f0000000180), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r9, 0xc04064a0, &(0x7f0000000140)={0x0, &(0x7f0000000380)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r8, 0xc06864a1, &(0x7f0000000300)={0x0, 0xfffffffffffffe7a, r10, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r9, 0xc06864ce, &(0x7f0000000600)={r11, 0x0, 0x0, 0x1, 0x3, [0x0, 0x0, 0x0, 0x0], [0x800000], [0x0, 0x1001000], [0x0, 0xfffffffffffffffc, 0xe8a6, 0x2]}) ioctl$DRM_IOCTL_MODE_ADDFB2(r8, 0xc06864b8, &(0x7f00000001c0)={0x0, 0xae, 0x3ff, 0x34325241, 0x0, [r12, 0x0, 0x0, r13], [0x2b8, 0x0, 0x0, 0xfffffffe]}) ioctl$DRM_IOCTL_GEM_OPEN(0xffffffffffffffff, 0xc010640b, &(0x7f0000000180)={0x0, 0x0}) r15 = syz_open_dev$dri(&(0x7f00000008c0), 0xd21, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r15, 0xc04064a0, &(0x7f00000001c0)={0x0, &(0x7f00000000c0)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_GETCRTC(r15, 0xc06864a1, &(0x7f0000000440)={0x0, 0x0, r16, 0x0}) ioctl$DRM_IOCTL_MODE_GETFB2(r15, 0xc06864ce, &(0x7f0000000340)={r17, 0x0, 0x0, 0x0, 0x0, [0x0], [0xffffffff], [], [0xfffffffffffffffc]}) ioctl$DRM_IOCTL_GEM_CLOSE(r15, 0x40086409, &(0x7f0000000080)={r18}) ioctl$DRM_IOCTL_MODE_ADDFB2(r0, 0xc06864b8, &(0x7f00000001c0)={0x0, 0x3, 0x400, 0xfffffffb, 0x0, [r5, r13, r14, r18], [0x8, 0x0, 0x800], [0x6, 0x2, 0x6, 0xcde000], [0x7, 0x2000000000, 0xfffffffffffffe01, 0x7]}) 1.551474397s ago: executing program 2 (id=1187): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0x3e57}, {0x6}]}, 0x10) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 1.464780802s ago: executing program 4 (id=1189): r0 = socket$can_j1939(0x1d, 0x2, 0x7) getsockopt$SO_J1939_SEND_PRIO(r0, 0x6b, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) 1.400058866s ago: executing program 2 (id=1191): r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="12010000090024206d041cc340000000000109022400010000a00009040000010301010009210008000122010009058103"], 0x0) syz_usb_control_io$hid(r0, &(0x7f0000000240)={0x24, &(0x7f0000000480)=ANY=[@ANYBLOB="00000c000000070001"], 0x0, 0x0, 0x0}, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000180)={0x84, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB=' '], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000001200)={0x84, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x20, 0x0, 0x4, {0x1}}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 1.38210495s ago: executing program 4 (id=1192): r0 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet6(0xa, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x1, 0x0) getpid() sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, 0x0, &(0x7f0000000180)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0xf00) 1.16483626s ago: executing program 0 (id=1196): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000400)={0x28, 0x2, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_DATA={0xc, 0x7, 0x0, 0x1, [@IPSET_ATTR_HASHSIZE={0x8, 0x12, 0x1, 0x0, 0x60000}]}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0xa}]}, 0x28}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c0100001200576d10000010fbdbdf2507"], 0x11c}, 0x1, 0x0, 0x0, 0x40084}, 0x4004040) 1.132896665s ago: executing program 4 (id=1197): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r2 = syz_clone3(&(0x7f0000000480)={0x4000000, &(0x7f0000000440), &(0x7f0000000280), &(0x7f00000002c0), {0x5}, &(0x7f0000000600)=""/186, 0xba, &(0x7f00000001c0)=""/18, &(0x7f00000004c0)}, 0x58) sched_setattr(r2, &(0x7f00000000c0)={0x38, 0x6, 0x8, 0x3, 0x0, 0xb, 0xfffffffffffffffe, 0xfffffe0000000001, 0xfa11, 0xfffffffe}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x21800, 0x0) openat$dsp(0xffffffffffffff9c, 0x0, 0x42, 0x0) sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xfffffffc}, 0x0) r3 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x389b0d52417bb201) pwritev2(r3, &(0x7f0000000240)=[{0x0}], 0x1, 0x7000, 0x0, 0x3) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) ioctl$VIDIOC_CREATE_BUFS(0xffffffffffffffff, 0xc100565c, &(0x7f00000006c0)={0x3ff, 0x81, 0x2, {0x3, @vbi={0x7, 0xfffffff9, 0x9123, 0x32314752, [0x4, 0x8], [0x8, 0xbff9], 0x2}}, 0x34f}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000800)={0x6, 0x4, 0x1a00}, 0x980) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, &(0x7f0000000040)={0x80b, 0x2}, 0x10) sendmsg$nl_route(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=@RTM_GETMDB={0x18, 0x56, 0xf23}, 0x18}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000240), r4) 1.061960181s ago: executing program 0 (id=1198): socket$packet(0x11, 0x3, 0x300) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r1, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x42000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) ioctl$TUNSETLINK(r2, 0x400454cd, 0x339) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)={0x14, 0x2, 0x6, 0x301, 0x0, 0x0, {0x3}}, 0x14}}, 0x0) close(r2) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000780), r5) sendmsg$NL80211_CMD_SET_TID_CONFIG(r5, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000480)=ANY=[@ANYBLOB="2c000000e3ba3a8740f227d7c0defea36d0a074098cfe12a421cb7db24182415ad37272da4fff067ad712fe010c9aa74a52656d01a3ff98de4fd5371a03fd4f67f", @ANYRES16=r6, @ANYBLOB="010027bd7000fedbdf258900000008000300", @ANYBLOB="10001d800c000080060005001500000014b7a1188ff167f1b4828d"], 0x2c}, 0x1, 0x0, 0x0, 0x40}, 0x20000040) setsockopt$inet_tcp_int(r4, 0x6, 0x80000000000002, &(0x7f0000000180)=0x7a, 0x4) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) r7 = syz_open_dev$dri(&(0x7f0000000000), 0x1, 0x0) ioctl$DRM_IOCTL_MODE_GETPROPERTY(r7, 0xc04064aa, &(0x7f00000003c0)={0x0, 0x0}) setsockopt$inet_tcp_TCP_CONGESTION(r4, 0x6, 0xd, &(0x7f00000000c0)='yeah\x00', 0x5) sendto$inet(r4, &(0x7f0000000300)="0906c422e0243219ff7b440e76a1b51b82ba23599f81b52c9d4db4486cec105e4b9f0f859f8a43eef6352f1e46e3145089b6a22f618ca14e288029b613a329c422481c6b7aff6806bce699cea461ecf591d9018b2a1d84e389a8d3127fd35913fe69754435c2", 0xffffffffffffffbb, 0x40040011, 0x0, 0x0) 992.193236ms ago: executing program 3 (id=1200): unshare(0x400) r0 = socket$rxrpc(0x21, 0x2, 0xa) getsockopt(r0, 0x7cb8, 0x7f, 0x0, 0x0) 977.040644ms ago: executing program 3 (id=1201): r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)=ANY=[@ANYBLOB="120100005938d74010973077339600000001090212000100001e000904"], 0x0) syz_usb_control_io(r0, 0x0, &(0x7f0000000800)={0x84, &(0x7f0000000780)=ANY=[@ANYBLOB="020082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) syz_usb_control_io$uac1(r0, 0x0, 0x0) syz_usb_control_io$hid(r0, 0x0, &(0x7f00000003c0)={0x2c, &(0x7f0000000200)={0x40, 0x5, 0x2, "c646"}, 0x0, 0x0, 0x0, 0x0}) syz_usb_control_io$uac1(r0, 0x0, 0x0) 843.76904ms ago: executing program 2 (id=1202): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f00000000c0)={'macsec0\x00', 0x400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'pimreg0\x00', 0x0}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x6, 0x3, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x100}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000140)={r4, r3, 0x25, 0x0, @val=@netfilter={0x1, 0x0, 0x7}}, 0x20) 636.266873ms ago: executing program 2 (id=1203): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000000000000001000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010029bd700000000000100000001800018014000200776c616e3100000000000000000000000800070000000011080008"], 0x3c}}, 0x0) 625.879802ms ago: executing program 1 (id=1204): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x6, 0x1b, &(0x7f0000001800)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000000000008500000017000000180100002020690000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000700)={r1, r3, 0x25, 0x0, @val=@perf_event}, 0x18) syz_emit_ethernet(0x3c, &(0x7f0000000200)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x2e, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @multicast1}, {0x0, 0x4e20, 0x1a, 0x0, @wg=@data={0x4, 0x6, 0x7, "521f"}}}}}}, 0x0) 601.434517ms ago: executing program 1 (id=1205): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000280)={@val={0x6f01, 0x800}, @val={0x1, 0x0, 0x27, 0xfffc, 0x27}, @mpls={[], @ipv4=@tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x84, 0x0, @empty=0x3fffffff, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x5, 0x6, 0x0, 0x0, 0x0, 0x28, {[@window={0x9, 0x3}]}}}}}}, 0x3a) 486.626498ms ago: executing program 1 (id=1206): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cgroup.events\x00', 0x26e1, 0x0) close(r0) socket$inet6_sctp(0xa, 0x801, 0x84) ioctl$SIOCSIFHWADDR(r0, 0x8b19, &(0x7f0000000000)={'wlan0\x00', @random="7cf1e97c9e4f"}) 462.453544ms ago: executing program 2 (id=1207): listen(0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() setrlimit(0x8, &(0x7f0000000100)={0x0, 0x20000000}) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x2d) unshare(0x2040400) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r3, &(0x7f0000001fc0)=""/184, 0xb8) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000180)={0xa0, 0xfffffffffffffff5, 0x0, {{0x3, 0x1, 0x5, 0xa, 0x3, 0x1, {0x5, 0x17d, 0x8, 0x5, 0x100, 0x7cf4, 0x9, 0x7ffffffd, 0xfffffffe, 0x8000, 0x20000000, 0xee00, 0x0, 0x3ff, 0x1}}, {0x0, 0x11}}}, 0xa0) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) readv(r5, &(0x7f0000001340)=[{&(0x7f0000000580)=""/148, 0x94}], 0x1) 352.245325ms ago: executing program 1 (id=1208): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x0, @any, 0x4, 0x1}, 0xe) listen(r0, 0x3) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x74, 0x0, 0x0) r4 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r4, 0xffffffffffffffff, 0x0) 352.030058ms ago: executing program 3 (id=1209): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x9, 0x5d032, 0xffffffffffffffff, 0x0) r0 = openat$iommufd(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$IOMMU_IOAS_ALLOC(r0, 0x3b81, &(0x7f00000003c0)={0xc, 0x0, 0x0}) ioctl$IOMMU_IOAS_MAP$PAGES(r0, 0x3b85, &(0x7f0000000040)={0x28, 0x5, r1, 0x0, &(0x7f0000fcf000/0x4000)=nil, 0x4000}) ioctl$IOMMU_IOAS_MAP$PAGES(r0, 0x3b85, &(0x7f00000000c0)={0x28, 0x6, r1, 0x0, &(0x7f0000f98000/0x2000)=nil, 0x2000, 0xffffffffffff8415}) ioctl$IOMMU_TEST_OP_CREATE_ACCESS(r0, 0x3ba0, &(0x7f0000000340)={0x48, 0x5, r1, 0x0, 0xffffffffffffffff, 0x1}) ioctl$IOMMU_TEST_OP_ACCESS_PAGES$syz(r0, 0x3ba0, &(0x7f0000000180)={0x48, 0x7, r2, 0x0, 0x10000, 0x0, 0x4, 0x12fbab, 0x2976b1}) 255.797248ms ago: executing program 3 (id=1210): socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41002, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x18) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000005140)={0x30, r3, 0x1, 0x70bd2a, 0x3, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}, @NBD_ATTR_SOCKETS={0x10, 0x7, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, {0x8, 0x1, r0}}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x4081}, 0x0) 198.254044ms ago: executing program 1 (id=1211): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x200000000000000) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0xf0ffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r0, &(0x7f000000fe80)={0x0, 0x0, &(0x7f000000fe40)={&(0x7f000000fb40)=@migrate={0xa0, 0x21, 0x9, 0x70bd27, 0x25dfdbfb, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @in=@loopback, 0x4e22, 0x1, 0x4e22, 0x6, 0x0, 0xa0, 0x80}, 0x6e6bb1}, [@migrate={0x50, 0x11, [{@in=@private=0xa010101, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@private=0xa010103, @in=@empty, 0x0, 0x0, 0x0, 0x3502, 0x2, 0xa}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x882}, 0x4000000) 36.17948ms ago: executing program 3 (id=1212): r0 = syz_open_dev$dri(&(0x7f0000000080), 0x1, 0x0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(r0, 0x4010640d, &(0x7f0000000000)={0x3, 0x2}) r1 = syz_open_dev$dri(&(0x7f0000000000), 0x1f, 0x0) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r1, 0xc04064a0, &(0x7f0000000200)={0x0, &(0x7f0000000140)=[0x0], 0x0, 0x0, 0x0, 0x1}) ioctl$DRM_IOCTL_MODE_OBJ_GETPROPERTIES(r1, 0xc02064b9, &(0x7f0000000280)={&(0x7f0000000400)=[0x0, 0x0], &(0x7f0000000280), 0x2, r2}) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000000040)={0x0, 0x1, &(0x7f0000000380)=[r2], &(0x7f00000003c0)=[0x7], &(0x7f0000000100)=[r3], &(0x7f0000000180), 0x0, 0xff}) 34.373497ms ago: executing program 1 (id=1213): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xb, 0x81}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000340)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r3 = openat$uinput(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$uinput_user_dev(r3, &(0x7f0000000a00)={'syz1\x00', {0x6ec9, 0x7, 0x5, 0x5}, 0x3e, [0x9, 0xffffffff, 0x8, 0x2, 0x5334, 0x400, 0x80000000, 0x5, 0x8, 0x0, 0x6, 0xf5, 0x9, 0x39, 0x747d5a13, 0x8, 0xfffffb9a, 0xfffffffa, 0x4, 0xfffffffb, 0x4, 0x3, 0x4, 0xf252, 0x4, 0x800, 0x300000, 0x7, 0xe, 0x4623d, 0x0, 0x0, 0x1ff, 0x8000, 0x3ff, 0x3, 0xd, 0x3, 0x400ba55, 0x8da8, 0x2, 0x200, 0x2, 0x400008, 0xe, 0x4, 0x2, 0x0, 0x8, 0x9, 0x1, 0x199f, 0x8, 0x2, 0x7c, 0x1, 0x4, 0x6, 0x1000, 0x5, 0x40, 0x9, 0x7, 0x5], [0x6, 0x1e, 0x3, 0x8000, 0xfffffffe, 0x3, 0x0, 0x5, 0x7, 0xfffffffc, 0x4, 0x7fff, 0x72c, 0x1c32, 0x3, 0x9, 0x10000, 0x400, 0x8001, 0x3, 0x7, 0x297, 0x5, 0x0, 0x981, 0x4, 0x100, 0x3ff, 0x0, 0xfffffffe, 0x0, 0x1000001, 0x10, 0xfffffff9, 0x0, 0x5, 0x1, 0xffffffff, 0x4, 0x8, 0x800, 0xffff, 0x6, 0x96, 0xfffffffd, 0x101, 0x10, 0x2, 0x401, 0xc, 0x3, 0x379, 0x9, 0xe, 0x5, 0x7, 0x7, 0x2, 0x1, 0x1, 0x8, 0x6, 0x200, 0x6], [0x401, 0xc584, 0xffff, 0xcd4, 0x7, 0x20, 0x7, 0x4, 0x8, 0x10, 0x7, 0x9, 0xe8b, 0x4, 0x80000001, 0x8, 0xffffffff, 0x1000, 0x2, 0x13, 0x1, 0xfffffff9, 0xe55, 0x10, 0x80000001, 0x4, 0x4, 0x5, 0x9, 0x2, 0x20000005, 0x80, 0x4, 0x9, 0x47, 0x2, 0x3, 0x4, 0x7, 0x6d7e, 0x3, 0x8, 0x8001, 0xbf23, 0x6, 0x8, 0x95a, 0xffffffff, 0x4, 0x3, 0x6, 0x100fffd, 0x2005, 0x7, 0x4, 0xea, 0x9, 0x5, 0x6, 0xd9, 0x0, 0x7ff, 0x401, 0x5], [0x108e, 0x7fff, 0x3, 0x3, 0x0, 0x2, 0x6, 0x4, 0x50, 0x2, 0x763, 0xb, 0x402, 0x800, 0x2, 0x1000, 0x7f, 0x5, 0x3fa6, 0x4, 0x0, 0x5, 0x1e0, 0x0, 0xe47, 0x3, 0x3, 0x4, 0x200, 0x1000, 0x3b, 0x2, 0x5, 0x800, 0xa80a, 0x65f413f9, 0x4, 0x8, 0x8a8, 0x2, 0x40, 0x7, 0x16a, 0x4, 0x4, 0x10, 0x0, 0x0, 0x7fff, 0x2, 0xfffffff8, 0x9, 0x1, 0x200, 0x7, 0x4edf, 0xfffffffd, 0x7, 0xe, 0x2, 0xa, 0xf, 0x133, 0x6]}, 0x45c) ioctl$UI_DEV_CREATE(r3, 0x5501) readv(r3, 0x0, 0x0) write$input_event(r3, &(0x7f0000000000)={{0x77359400}, 0x15}, 0xfe4f) r4 = socket(0x400000000010, 0x3, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCXONC(r5, 0x540a, 0x0) ioctl$TCFLSH(r5, 0x400455c8, 0x4) ioctl$TIOCVHANGUP(r5, 0x5437, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000100)={'ip_vti0\x00', 0x0}) 0s ago: executing program 3 (id=1214): r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) bind$netlink(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): 4] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.711968][ T5844] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.719709][ T5844] bridge_slave_1: entered allmulticast mode [ 63.726466][ T5844] bridge_slave_1: entered promiscuous mode [ 63.733805][ T5850] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.741073][ T5850] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.748394][ T5850] bridge_slave_0: entered allmulticast mode [ 63.754963][ T5850] bridge_slave_0: entered promiscuous mode [ 63.762266][ T5850] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.769377][ T5850] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.776589][ T5850] bridge_slave_1: entered allmulticast mode [ 63.783305][ T5850] bridge_slave_1: entered promiscuous mode [ 63.797608][ T5843] bridge0: port 1(bridge_slave_0) entered blocking state [ 63.804691][ T5843] bridge0: port 1(bridge_slave_0) entered disabled state [ 63.811929][ T5843] bridge_slave_0: entered allmulticast mode [ 63.818707][ T5843] bridge_slave_0: entered promiscuous mode [ 63.826213][ T5843] bridge0: port 2(bridge_slave_1) entered blocking state [ 63.833966][ T5843] bridge0: port 2(bridge_slave_1) entered disabled state [ 63.841307][ T5843] bridge_slave_1: entered allmulticast mode [ 63.847999][ T5843] bridge_slave_1: entered promiscuous mode [ 63.916764][ T5844] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.928030][ T5850] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 63.939994][ T5850] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.965276][ T5844] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 63.994359][ T5843] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.032940][ T5843] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.059449][ T5850] team0: Port device team_slave_0 added [ 64.067820][ T5844] team0: Port device team_slave_0 added [ 64.073655][ T5855] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.081097][ T5855] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.089228][ T5855] bridge_slave_0: entered allmulticast mode [ 64.096001][ T5855] bridge_slave_0: entered promiscuous mode [ 64.119383][ T5850] team0: Port device team_slave_1 added [ 64.126357][ T5843] team0: Port device team_slave_0 added [ 64.133531][ T5844] team0: Port device team_slave_1 added [ 64.149362][ T5855] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.156558][ T5855] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.163636][ T5855] bridge_slave_1: entered allmulticast mode [ 64.171246][ T5855] bridge_slave_1: entered promiscuous mode [ 64.193172][ T5843] team0: Port device team_slave_1 added [ 64.225369][ T5846] bridge0: port 1(bridge_slave_0) entered blocking state [ 64.232571][ T5846] bridge0: port 1(bridge_slave_0) entered disabled state [ 64.240106][ T5846] bridge_slave_0: entered allmulticast mode [ 64.247531][ T5846] bridge_slave_0: entered promiscuous mode [ 64.268766][ T5844] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 64.275716][ T5844] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.301709][ T5844] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 64.321785][ T5846] bridge0: port 2(bridge_slave_1) entered blocking state [ 64.329136][ T5846] bridge0: port 2(bridge_slave_1) entered disabled state [ 64.336287][ T5846] bridge_slave_1: entered allmulticast mode [ 64.343130][ T5846] bridge_slave_1: entered promiscuous mode [ 64.350190][ T5850] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 64.357404][ T5850] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.383683][ T5850] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 64.399394][ T5843] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 64.406333][ T5843] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.432901][ T5843] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 64.444683][ T5844] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 64.452130][ T5844] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.478351][ T5844] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 64.490819][ T5855] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.518762][ T5850] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 64.525727][ T5850] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.552178][ T5850] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 64.569454][ T5843] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 64.576603][ T5843] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.603091][ T5843] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 64.620087][ T5855] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.631350][ T5846] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 64.642652][ T5846] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 64.676118][ T5846] team0: Port device team_slave_0 added [ 64.701007][ T5855] team0: Port device team_slave_0 added [ 64.710314][ T5846] team0: Port device team_slave_1 added [ 64.734685][ T5855] team0: Port device team_slave_1 added [ 64.800801][ T5843] hsr_slave_0: entered promiscuous mode [ 64.808828][ T5843] hsr_slave_1: entered promiscuous mode [ 64.818005][ T5850] hsr_slave_0: entered promiscuous mode [ 64.824130][ T5850] hsr_slave_1: entered promiscuous mode [ 64.830481][ T5850] debugfs: 'hsr0' already exists in 'hsr' [ 64.836252][ T5850] Cannot create hsr debugfs directory [ 64.854140][ T5844] hsr_slave_0: entered promiscuous mode [ 64.860348][ T5844] hsr_slave_1: entered promiscuous mode [ 64.866263][ T5844] debugfs: 'hsr0' already exists in 'hsr' [ 64.872318][ T5844] Cannot create hsr debugfs directory [ 64.878430][ T5846] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 64.885387][ T5846] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.911649][ T5846] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 64.923951][ T5846] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 64.931197][ T5846] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 64.957546][ T5846] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 64.970117][ T5855] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 64.977191][ T5855] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 65.003608][ T5170] Bluetooth: hci1: command tx timeout [ 65.003777][ T5849] Bluetooth: hci4: command tx timeout [ 65.011200][ T5855] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 65.015097][ T51] Bluetooth: hci0: command tx timeout [ 65.025381][ T5861] Bluetooth: hci3: command tx timeout [ 65.031588][ T5855] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 65.036848][ T5170] Bluetooth: hci2: command tx timeout [ 65.049538][ T5855] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 65.075619][ T5855] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 65.136979][ T5855] hsr_slave_0: entered promiscuous mode [ 65.143199][ T5855] hsr_slave_1: entered promiscuous mode [ 65.149535][ T5855] debugfs: 'hsr0' already exists in 'hsr' [ 65.155260][ T5855] Cannot create hsr debugfs directory [ 65.260069][ T5846] hsr_slave_0: entered promiscuous mode [ 65.266215][ T5846] hsr_slave_1: entered promiscuous mode [ 65.272573][ T5846] debugfs: 'hsr0' already exists in 'hsr' [ 65.278535][ T5846] Cannot create hsr debugfs directory [ 65.557634][ T5844] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 65.571007][ T5844] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 65.591349][ T5844] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 65.609996][ T5844] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 65.651402][ T5843] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 65.664214][ T5843] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 65.674808][ T5843] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 65.694821][ T5843] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 65.791147][ T5850] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 65.800841][ T5850] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 65.813003][ T5850] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 65.834673][ T5850] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 65.890733][ T5844] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.918858][ T5843] 8021q: adding VLAN 0 to HW filter on device bond0 [ 65.930753][ T5855] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 65.951359][ T5844] 8021q: adding VLAN 0 to HW filter on device team0 [ 65.959554][ T5855] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 65.984569][ T5843] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.000790][ T5855] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 66.011447][ T5855] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 66.050373][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.057597][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.068156][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.075253][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.091649][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.098776][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.129193][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.136285][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.153876][ T5846] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 66.165121][ T5846] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 66.175324][ T5846] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 66.195403][ T5846] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 66.297951][ T5850] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.351721][ T5850] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.371426][ T30] kauditd_printk_skb: 14 callbacks suppressed [ 66.371442][ T30] audit: type=1400 audit(1758504869.862:86): avc: denied { sys_module } for pid=5844 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 66.394407][ T5850] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 66.434665][ T5850] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 66.461877][ T1827] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.469002][ T1827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.484347][ T1827] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.491637][ T1827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.511283][ T5855] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.572491][ T5855] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.600550][ T5846] 8021q: adding VLAN 0 to HW filter on device bond0 [ 66.630835][ T1827] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.638012][ T1827] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.686172][ T1827] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.693340][ T1827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 66.770163][ T5844] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.787757][ T5843] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.808969][ T5846] 8021q: adding VLAN 0 to HW filter on device team0 [ 66.838986][ T3014] bridge0: port 1(bridge_slave_0) entered blocking state [ 66.846083][ T3014] bridge0: port 1(bridge_slave_0) entered forwarding state [ 66.876303][ T5850] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 66.896771][ T1827] bridge0: port 2(bridge_slave_1) entered blocking state [ 66.903878][ T1827] bridge0: port 2(bridge_slave_1) entered forwarding state [ 67.052486][ T5843] veth0_vlan: entered promiscuous mode [ 67.060166][ T5850] veth0_vlan: entered promiscuous mode [ 67.078701][ T51] Bluetooth: hci3: command tx timeout [ 67.084259][ T51] Bluetooth: hci0: command tx timeout [ 67.090438][ T5170] Bluetooth: hci2: command tx timeout [ 67.095948][ T5849] Bluetooth: hci4: command tx timeout [ 67.095969][ T5861] Bluetooth: hci1: command tx timeout [ 67.155428][ T5850] veth1_vlan: entered promiscuous mode [ 67.167302][ T5843] veth1_vlan: entered promiscuous mode [ 67.222859][ T5855] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.299368][ T5850] veth0_macvtap: entered promiscuous mode [ 67.314825][ T5843] veth0_macvtap: entered promiscuous mode [ 67.330480][ T5844] veth0_vlan: entered promiscuous mode [ 67.338523][ T5850] veth1_macvtap: entered promiscuous mode [ 67.352064][ T5843] veth1_macvtap: entered promiscuous mode [ 67.371130][ T5850] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 67.386343][ T5844] veth1_vlan: entered promiscuous mode [ 67.399577][ T5850] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 67.441817][ T5843] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 67.450548][ T2976] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.461461][ T2976] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.473782][ T5846] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 67.485270][ T5855] veth0_vlan: entered promiscuous mode [ 67.491391][ T2976] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.500313][ T2976] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.519406][ T5843] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 67.552899][ T5844] veth0_macvtap: entered promiscuous mode [ 67.567223][ T5855] veth1_vlan: entered promiscuous mode [ 67.581806][ T5844] veth1_macvtap: entered promiscuous mode [ 67.588976][ T50] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.598134][ T50] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.650727][ T50] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.659734][ T50] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.691775][ T2976] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.708598][ T2976] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.719852][ T5844] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 67.730151][ T5846] veth0_vlan: entered promiscuous mode [ 67.761082][ T5844] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 67.784880][ T79] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 67.794588][ T79] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 67.805915][ T13] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.817111][ T5855] veth0_macvtap: entered promiscuous mode [ 67.824016][ T13] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.842075][ T13] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.864228][ T30] audit: type=1400 audit(1758504871.352:87): avc: denied { mounton } for pid=5850 comm="syz-executor" path="/root/syzkaller.wsK4vs/syz-tmp" dev="sda1" ino=2041 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 67.902837][ T5855] veth1_macvtap: entered promiscuous mode [ 67.906627][ T30] audit: type=1400 audit(1758504871.352:88): avc: denied { mount } for pid=5850 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 67.927382][ T13] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 67.933278][ T30] audit: type=1400 audit(1758504871.352:89): avc: denied { mounton } for pid=5850 comm="syz-executor" path="/root/syzkaller.wsK4vs/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 67.944092][ T5846] veth1_vlan: entered promiscuous mode [ 67.968048][ T30] audit: type=1400 audit(1758504871.352:90): avc: denied { mount } for pid=5850 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 67.992614][ T30] audit: type=1400 audit(1758504871.352:91): avc: denied { mounton } for pid=5850 comm="syz-executor" path="/root/syzkaller.wsK4vs/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 68.034424][ T5850] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 68.051415][ T50] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.059807][ T50] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.067961][ T30] audit: type=1400 audit(1758504871.352:92): avc: denied { mounton } for pid=5850 comm="syz-executor" path="/root/syzkaller.wsK4vs/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=7611 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 68.117896][ T30] audit: type=1400 audit(1758504871.352:93): avc: denied { unmount } for pid=5850 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 68.123218][ T13] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.142517][ T5846] veth0_macvtap: entered promiscuous mode [ 68.160780][ T13] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.169897][ T30] audit: type=1400 audit(1758504871.382:94): avc: denied { mounton } for pid=5850 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=2784 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 68.179925][ T5855] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.200729][ T30] audit: type=1400 audit(1758504871.382:95): avc: denied { mount } for pid=5850 comm="syz-executor" name="/" dev="gadgetfs" ino=7613 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 68.246303][ T5846] veth1_macvtap: entered promiscuous mode [ 68.287555][ T5846] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 68.316149][ T5855] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.816030][ T79] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.824643][ T5964] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 68.825297][ T79] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.871543][ T5846] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 68.891720][ T3014] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.900821][ T3014] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.924406][ T12] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 68.933101][ T3014] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.939412][ T12] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 68.942821][ T3014] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 68.991596][ T3014] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.009731][ T3014] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.037185][ T12] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.063751][ T12] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.076543][ T3014] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.085299][ T3014] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 69.147354][ T5861] Bluetooth: hci1: command tx timeout [ 69.153632][ T5852] Bluetooth: hci2: command tx timeout [ 69.153683][ T5170] Bluetooth: hci4: command tx timeout [ 69.159083][ T5852] Bluetooth: hci0: command tx timeout [ 69.164396][ T5849] Bluetooth: hci3: command tx timeout [ 69.193298][ T3014] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.216204][ T3014] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.261953][ T13] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.278236][ T13] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 69.359329][ T3014] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 69.370640][ T3014] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 70.993411][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 71.003524][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 71.300049][ T5170] Bluetooth: hci4: command tx timeout [ 71.305260][ T51] Bluetooth: hci2: command tx timeout [ 71.316334][ T5861] Bluetooth: hci1: command tx timeout [ 71.321975][ T5852] Bluetooth: hci0: command tx timeout [ 71.327402][ T5849] Bluetooth: hci3: command tx timeout [ 72.113912][ T6004] netlink: 8 bytes leftover after parsing attributes in process `syz.2.9'. [ 72.184800][ T6002] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11'. [ 72.190257][ T6006] process 'syz.2.9' launched '/dev/fd/10' with NULL argv: empty string added [ 72.208160][ T30] kauditd_printk_skb: 46 callbacks suppressed [ 72.208178][ T30] audit: type=1400 audit(1758504875.672:142): avc: denied { execute } for pid=5993 comm="syz.2.9" dev="tmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 72.386038][ T6002] gretap0: entered promiscuous mode [ 72.391537][ T6002] macsec1: entered promiscuous mode [ 72.396938][ T6002] macsec1: entered allmulticast mode [ 72.402227][ T6002] gretap0: entered allmulticast mode [ 72.424647][ T30] audit: type=1400 audit(1758504875.692:143): avc: denied { execute_no_trans } for pid=5993 comm="syz.2.9" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 72.465152][ T6002] gretap0: left allmulticast mode [ 72.470475][ T6002] gretap0: left promiscuous mode [ 72.526296][ T30] audit: type=1400 audit(1758504876.012:144): avc: denied { write } for pid=6000 comm="syz.4.12" name="anycast6" dev="proc" ino=4026532883 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 72.888426][ T1214] cfg80211: failed to load regulatory.db [ 73.702306][ T30] audit: type=1400 audit(1758504877.182:145): avc: denied { read } for pid=6012 comm="syz.2.14" name="event2" dev="devtmpfs" ino=922 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 73.789954][ T30] audit: type=1400 audit(1758504877.182:146): avc: denied { open } for pid=6012 comm="syz.2.14" path="/dev/input/event2" dev="devtmpfs" ino=922 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 73.856201][ T30] audit: type=1400 audit(1758504877.182:147): avc: denied { ioctl } for pid=6012 comm="syz.2.14" path="/dev/input/event2" dev="devtmpfs" ino=922 ioctlcmd=0x45a0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 73.883727][ T6018] netlink: 'syz.1.10': attribute type 2 has an invalid length. [ 74.093259][ T30] audit: type=1400 audit(1758504877.252:148): avc: denied { name_bind } for pid=6011 comm="syz.4.16" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 74.116754][ T30] audit: type=1400 audit(1758504877.252:149): avc: denied { node_bind } for pid=6011 comm="syz.4.16" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 74.746050][ T30] audit: type=1400 audit(1758504877.612:150): avc: denied { create } for pid=6021 comm="syz.4.18" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 75.170525][ T30] audit: type=1400 audit(1758504878.212:151): avc: denied { create } for pid=6019 comm="syz.2.17" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 76.289251][ T5924] usb 4-1: new high-speed USB device number 2 using dummy_hcd [ 76.508609][ T5924] usb 4-1: Using ep0 maxpacket: 8 [ 76.549597][ T5924] usb 4-1: New USB device found, idVendor=0763, idProduct=2081, bcdDevice=d0.ab [ 76.576534][ T5924] usb 4-1: New USB device strings: Mfr=1, Product=228, SerialNumber=2 [ 76.594891][ T5924] usb 4-1: Product: syz [ 76.606440][ T5924] usb 4-1: Manufacturer: syz [ 76.611059][ T5924] usb 4-1: SerialNumber: syz [ 76.639310][ T5924] usb 4-1: config 0 descriptor?? [ 77.319350][ T30] kauditd_printk_skb: 15 callbacks suppressed [ 77.319382][ T30] audit: type=1400 audit(1758504880.812:167): avc: denied { read write } for pid=6053 comm="syz.0.26" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 77.452512][ T30] audit: type=1400 audit(1758504880.842:168): avc: denied { open } for pid=6053 comm="syz.0.26" path="/dev/kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 77.609072][ T30] audit: type=1400 audit(1758504880.862:169): avc: denied { ioctl } for pid=6053 comm="syz.0.26" path="/dev/kvm" dev="devtmpfs" ino=84 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 77.711315][ T6051] veth0_to_team: entered promiscuous mode [ 77.717299][ T6051] veth0_to_team: entered allmulticast mode [ 77.776543][ T10] usb 3-1: new high-speed USB device number 2 using dummy_hcd [ 77.950996][ T10] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 77.971967][ T10] usb 3-1: config 1 has 0 interfaces, different from the descriptor's value: 1 [ 77.992160][ T10] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 78.013106][ T10] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 78.021113][ T5924] usb 4-1: USB disconnect, device number 2 [ 78.049845][ T10] usb 3-1: SerialNumber: syz [ 78.663699][ T5895] usb 3-1: USB disconnect, device number 2 [ 78.670134][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 78.682970][ T5864] udevd[5864]: error opening ATTR{/sys/devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/sound/card3/controlC3/../uevent} for writing: No such file or directory [ 79.004043][ T30] audit: type=1400 audit(1758504882.492:170): avc: denied { write } for pid=6071 comm="syz.0.32" name="uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 79.517194][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 79.525531][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 79.534371][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 79.543253][ T0] NOHZ tick-stop error: local softirq work is pending, handler #200!!! [ 79.593955][ T0] NOHZ tick-stop error: local softirq work is pending, handler #140!!! [ 79.603154][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 79.798762][ T0] NOHZ tick-stop error: local softirq work is pending, handler #40!!! [ 79.948065][ T0] NOHZ tick-stop error: local softirq work is pending, handler #08!!! [ 79.956599][ T0] NOHZ tick-stop error: local softirq work is pending, handler #02!!! [ 80.713196][ T30] audit: type=1400 audit(1758504883.262:171): avc: denied { ioctl } for pid=6074 comm="syz.0.33" path="socket:[8655]" dev="sockfs" ino=8655 ioctlcmd=0x8922 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 81.282833][ T30] audit: type=1400 audit(1758504884.772:172): avc: denied { watch watch_reads } for pid=6088 comm="syz.2.37" path="/7" dev="tmpfs" ino=49 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 81.461678][ T6095] mmap: syz.2.39 (6095) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 81.589570][ T6096] overlayfs: failed to resolve './file0': -2 [ 81.596359][ T30] audit: type=1400 audit(1758504885.072:173): avc: denied { bind } for pid=6078 comm="syz.1.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 81.600687][ T6083] netlink: 4 bytes leftover after parsing attributes in process `syz.1.34'. [ 81.728406][ T30] audit: type=1400 audit(1758504885.212:174): avc: denied { bind } for pid=6097 comm="syz.2.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 81.868400][ T6083] netlink: 4 bytes leftover after parsing attributes in process `syz.1.34'. [ 82.905732][ T30] audit: type=1400 audit(1758504886.392:175): avc: denied { read } for pid=6115 comm="syz.0.48" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 83.572633][ T30] audit: type=1400 audit(1758504886.392:176): avc: denied { open } for pid=6115 comm="syz.0.48" path="/dev/cpu/0/msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 83.651009][ T30] audit: type=1400 audit(1758504886.422:177): avc: denied { connect } for pid=6115 comm="syz.0.48" lport=255 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 83.727387][ T30] audit: type=1400 audit(1758504886.422:178): avc: denied { write } for pid=6115 comm="syz.0.48" laddr=fe80::a8aa:aaff:feaa:aa16 lport=255 faddr=ff01::1 fport=65534 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 83.923098][ T6127] SELinux: Context #! ./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 84.041003][ T6134] input: syz1 as /devices/virtual/input/input6 [ 84.178459][ T30] audit: type=1400 audit(1758504887.502:179): avc: denied { append } for pid=6131 comm="syz.2.52" name="001" dev="devtmpfs" ino=745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 84.321742][ T30] audit: type=1400 audit(1758504887.732:180): avc: denied { read } for pid=5205 comm="acpid" name="event4" dev="devtmpfs" ino=2792 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 84.411852][ T30] audit: type=1400 audit(1758504887.732:181): avc: denied { open } for pid=5205 comm="acpid" path="/dev/input/event4" dev="devtmpfs" ino=2792 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 84.494231][ T30] audit: type=1400 audit(1758504887.742:182): avc: denied { ioctl } for pid=5205 comm="acpid" path="/dev/input/event4" dev="devtmpfs" ino=2792 ioctlcmd=0x4520 scontext=system_u:system_r:acpid_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 84.536059][ T30] audit: type=1400 audit(1758504887.872:183): avc: denied { mounton } for pid=6138 comm="syz.3.53" path="/8/file0" dev="tmpfs" ino=61 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 84.589970][ T30] audit: type=1400 audit(1758504888.072:184): avc: denied { create } for pid=6145 comm="syz.0.55" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 85.471454][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x1 [ 85.487779][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 85.504478][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 85.529159][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 85.573865][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 85.604323][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 85.604728][ T6169] netlink: 24 bytes leftover after parsing attributes in process `syz.0.63'. [ 85.637920][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 85.670391][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 85.691952][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 85.703265][ T10] hid-generic 0000:0000:0000.0001: unknown main item tag 0x2 [ 85.724777][ T10] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz0] on syz1 [ 86.114901][ T6173] fido_id[6173]: Failed to open report descriptor at '/sys/devices/virtual/misc/uhid/report_descriptor': No such file or directory [ 86.480452][ T6193] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 87.461733][ T6208] syzkaller0: entered promiscuous mode [ 87.468005][ T6208] syzkaller0: entered allmulticast mode [ 87.726571][ T6217] serio: Serial port ttyS3 [ 88.557182][ T30] kauditd_printk_skb: 16 callbacks suppressed [ 88.557213][ T30] audit: type=1400 audit(1758504892.042:201): avc: denied { create } for pid=6235 comm="syz.3.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 88.583008][ T1206] usb 3-1: new high-speed USB device number 3 using dummy_hcd [ 88.606194][ T30] audit: type=1400 audit(1758504892.042:202): avc: denied { connect } for pid=6235 comm="syz.3.88" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 88.747706][ T1206] usb 3-1: Using ep0 maxpacket: 16 [ 88.771713][ T1206] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 88.841249][ T1206] usb 3-1: config 0 interface 0 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 3 [ 88.895814][ T1206] usb 3-1: New USB device found, idVendor=046d, idProduct=08f0, bcdDevice=50.0d [ 88.927690][ T1206] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 88.959415][ T1206] usb 3-1: Product: syz [ 88.975104][ T1206] usb 3-1: Manufacturer: syz [ 88.995622][ T1206] usb 3-1: SerialNumber: syz [ 89.018163][ T1206] usb 3-1: config 0 descriptor?? [ 89.042592][ T1206] usb-storage 3-1:0.0: USB Mass Storage device detected [ 89.258223][ T1206] gspca_main: STV06xx-2.14.0 probing 046d:08f0 [ 89.264523][ T30] audit: type=1400 audit(1758504892.752:203): avc: denied { read write } for pid=6250 comm="syz.3.91" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 89.296766][ T1206] gspca_stv06xx: st6422 sensor detected [ 89.308602][ T30] audit: type=1400 audit(1758504892.752:204): avc: denied { open } for pid=6250 comm="syz.3.91" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 89.335629][ T6244] overlayfs: option "workdir=./file0" is useless in a non-upper mount, ignore [ 89.350630][ T6244] overlayfs: at least 2 lowerdir are needed while upperdir nonexistent [ 89.369926][ T6249] netlink: 580 bytes leftover after parsing attributes in process `syz.4.89'. [ 89.557759][ T1206] STV06xx 3-1:0.0: probe with driver STV06xx failed with error -71 [ 89.576093][ T30] audit: type=1400 audit(1758504893.052:205): avc: denied { bind } for pid=6254 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 89.614487][ T30] audit: type=1400 audit(1758504893.102:206): avc: denied { setopt } for pid=6254 comm="syz.1.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 89.708273][ T1206] usb 3-1: USB disconnect, device number 3 [ 91.814569][ T6268] netlink: 'syz.2.97': attribute type 5 has an invalid length. [ 91.826577][ T6268] binder: 6267:6268 unknown command 0 [ 91.836214][ T6268] binder: 6267:6268 ioctl c0306201 200000000440 returned -22 [ 92.236571][ T5908] usb 4-1: new high-speed USB device number 3 using dummy_hcd [ 92.546558][ T5908] usb 4-1: Using ep0 maxpacket: 16 [ 92.559534][ T5908] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 92.584990][ T5908] usb 4-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 92.609970][ T5908] usb 4-1: New USB device found, idVendor=045e, idProduct=07da, bcdDevice= 0.00 [ 92.620940][ T5908] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 93.086313][ T5908] usb 4-1: config 0 descriptor?? [ 93.137199][ T5977] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 93.150119][ T30] audit: type=1400 audit(1758504896.642:207): avc: denied { create } for pid=6289 comm="syz.2.106" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 93.225681][ T30] audit: type=1400 audit(1758504896.712:208): avc: denied { append } for pid=6292 comm="syz.0.107" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 93.355865][ T5977] usb 2-1: Using ep0 maxpacket: 32 [ 93.368044][ T5977] usb 2-1: config 0 has an invalid interface number: 196 but max is 0 [ 93.376247][ T5977] usb 2-1: config 0 has no interface number 0 [ 93.396191][ T5977] usb 2-1: config 0 interface 196 altsetting 1 bulk endpoint 0x2 has invalid maxpacket 528 [ 93.416470][ T5977] usb 2-1: config 0 interface 196 altsetting 1 endpoint 0x82 has an invalid bInterval 0, changing to 7 [ 93.446839][ T5977] usb 2-1: config 0 interface 196 altsetting 1 endpoint 0x82 has invalid wMaxPacketSize 0 [ 93.468400][ T5977] usb 2-1: config 0 interface 196 has no altsetting 0 [ 93.489605][ T5977] usb 2-1: New USB device found, idVendor=05ac, idProduct=77c2, bcdDevice=eb.3a [ 93.498868][ T5977] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 93.596523][ T6307] netlink: 4 bytes leftover after parsing attributes in process `syz.4.113'. [ 93.627795][ T6307] netlink: 12 bytes leftover after parsing attributes in process `syz.4.113'. [ 93.652575][ T30] audit: type=1400 audit(1758504897.002:209): avc: denied { mounton } for pid=6303 comm="syz.0.112" path="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=dir permissive=1 [ 93.680786][ T5908] HID 045e:07da: Invalid code 65791 type 1 [ 93.687323][ T5977] usb 2-1: Product: syz [ 93.691494][ T5977] usb 2-1: Manufacturer: syz [ 93.696086][ T5977] usb 2-1: SerialNumber: syz [ 93.709355][ T5908] input: HID 045e:07da as /devices/platform/dummy_hcd.3/usb4/4-1/4-1:0.0/0003:045E:07DA.0002/input/input7 [ 93.721330][ T5977] usb 2-1: config 0 descriptor?? [ 93.723409][ T6306] netlink: 3 bytes leftover after parsing attributes in process `syz.4.113'. [ 93.728731][ T6285] raw-gadget.1 gadget.1: fail, usb_ep_enable returned -22 [ 93.844299][ T6309] overlayfs: invalid redirect ((null)) [ 93.859829][ T30] audit: type=1400 audit(1758504897.322:210): avc: denied { mount } for pid=6303 comm="syz.0.112" name="/" dev="overlay" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 93.904126][ T5908] microsoft 0003:045E:07DA.0002: input,hidraw0: USB HID v0.00 Device [HID 045e:07da] on usb-dummy_hcd.3-1/input0 [ 94.111752][ T5908] usb 4-1: USB disconnect, device number 3 [ 94.124003][ T30] audit: type=1400 audit(1758504897.612:211): avc: denied { unmount } for pid=5850 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 94.182266][ T5977] ipheth 2-1:0.196: Unable to find endpoints [ 94.221826][ T5977] usb 2-1: USB disconnect, device number 2 [ 94.236492][ T30] audit: type=1400 audit(1758504897.662:212): avc: denied { mount } for pid=6284 comm="syz.1.104" name="/" dev="devpts" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 94.329023][ T30] audit: type=1400 audit(1758504897.822:213): avc: denied { ioctl } for pid=6315 comm="syz.0.114" path="socket:[9160]" dev="sockfs" ino=9160 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 94.490557][ T30] audit: type=1400 audit(1758504897.952:214): avc: denied { create } for pid=6315 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 94.821852][ T30] audit: type=1400 audit(1758504897.972:215): avc: denied { shutdown } for pid=6315 comm="syz.0.114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 94.873012][ T30] audit: type=1400 audit(1758504898.212:216): avc: denied { ioctl } for pid=6322 comm="syz.2.117" path="/dev/vhost-vsock" dev="devtmpfs" ino=1275 ioctlcmd=0xaf01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:vhost_device_t tclass=chr_file permissive=1 [ 94.923690][ T30] audit: type=1400 audit(1758504898.412:217): avc: denied { unmount } for pid=5843 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:devpts_t tclass=filesystem permissive=1 [ 95.029689][ T30] audit: type=1400 audit(1758504898.522:218): avc: denied { validate_trans } for pid=6328 comm="syz.1.118" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 96.436540][ T5908] usb 4-1: new high-speed USB device number 4 using dummy_hcd [ 96.463282][ T5895] usb 1-1: new low-speed USB device number 2 using dummy_hcd [ 96.600174][ T5908] usb 4-1: New USB device found, idVendor=9710, idProduct=7730, bcdDevice=96.33 [ 96.618482][ T5895] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 96.649085][ T5908] usb 4-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 96.657287][ T5895] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 96.657312][ T5895] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 96.683500][ T5895] usb 1-1: string descriptor 0 read error: -22 [ 96.716980][ T5895] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 96.726715][ T5908] usb 4-1: config 0 descriptor?? [ 96.763926][ T5895] usb 1-1: New USB device strings: Mfr=17, Product=2, SerialNumber=3 [ 96.841092][ T5895] usb 1-1: 0:2 : does not exist [ 97.107885][ T5977] usb 1-1: USB disconnect, device number 2 [ 97.345353][ T5908] usb 4-1: Cannot set autoneg [ 97.351825][ T5908] MOSCHIP usb-ethernet driver 4-1:0.0: probe with driver MOSCHIP usb-ethernet driver failed with error -71 [ 97.367265][ T5908] usb 4-1: USB disconnect, device number 4 [ 98.655594][ T6395] tipc: Can't bind to reserved service type 0 [ 98.664444][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 98.664460][ T30] audit: type=1400 audit(1758504902.142:224): avc: denied { bind } for pid=6394 comm="syz.2.143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 99.010940][ T30] audit: type=1400 audit(1758504902.502:225): avc: denied { write } for pid=6413 comm="syz.2.152" name="001" dev="devtmpfs" ino=745 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 99.116805][ T10] usb 2-1: new high-speed USB device number 3 using dummy_hcd [ 99.266858][ T10] usb 2-1: Using ep0 maxpacket: 32 [ 99.274091][ T10] usb 2-1: config 4 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 99.292098][ T10] usb 2-1: config 4 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 99.338807][ T10] usb 2-1: New USB device found, idVendor=046d, idProduct=c314, bcdDevice= 0.40 [ 99.348376][ T10] usb 2-1: New USB device strings: Mfr=255, Product=255, SerialNumber=0 [ 99.366349][ T10] usb 2-1: Product: syz [ 99.376328][ T10] usb 2-1: Manufacturer: syz [ 99.395637][ T10] hub 2-1:4.0: USB hub found [ 99.607801][ T6428] netlink: 8 bytes leftover after parsing attributes in process `syz.2.155'. [ 99.747098][ T30] audit: type=1400 audit(1758504903.122:226): avc: denied { firmware_load } for pid=6421 comm="syz.2.155" path="/lib/firmware/regulatory.db" dev="sda1" ino=448 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 99.957246][ T10] hub 2-1:4.0: 5 ports detected [ 100.149206][ T6428] syz.2.155 (6428) used greatest stack depth: 19112 bytes left [ 100.160696][ T10] hub 2-1:4.0: insufficient power available to use all downstream ports [ 100.171490][ T30] audit: type=1400 audit(1758504903.202:227): avc: denied { execute } for pid=6421 comm="syz.2.155" dev="tmpfs" ino=1064 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 100.207939][ T6432] netlink: 'syz.0.157': attribute type 4 has an invalid length. [ 100.223145][ T10] hub 2-1:4.0: hub_hub_status failed (err = -71) [ 100.237526][ T30] audit: type=1400 audit(1758504903.202:228): avc: denied { execute_no_trans } for pid=6421 comm="syz.2.155" path=2F6D656D66643A5B0BDB58AE5B1AA9FDFAADD16D64C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=1064 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 100.270349][ T10] hub 2-1:4.0: config failed, can't get hub status (err -71) [ 100.504376][ T10] usb 2-1: USB disconnect, device number 3 [ 101.198558][ T30] audit: type=1400 audit(1758504904.622:229): avc: denied { getopt } for pid=6443 comm="syz.2.163" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 102.024190][ T1206] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 102.372051][ T1206] usb 2-1: config 220 has an invalid interface number: 76 but max is 2 [ 102.498315][ T1206] usb 2-1: config 220 has an invalid descriptor of length 0, skipping remainder of the config [ 102.644892][ T1206] usb 2-1: config 220 has no interface number 2 [ 102.681215][ T1206] usb 2-1: config 220 interface 1 altsetting 5 has 0 endpoint descriptors, different from the interface descriptor's value: 12 [ 102.885877][ T1206] usb 2-1: config 220 interface 0 has no altsetting 0 [ 102.893029][ T1206] usb 2-1: config 220 interface 76 has no altsetting 0 [ 102.900233][ T1206] usb 2-1: config 220 interface 1 has no altsetting 0 [ 102.910354][ T1206] usb 2-1: New USB device found, idVendor=8086, idProduct=0b07, bcdDevice=6c.b9 [ 102.915802][ T6473] netlink: 4 bytes leftover after parsing attributes in process `syz.2.172'. [ 102.930044][ T1206] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 102.945079][ T6473] netlink: 12 bytes leftover after parsing attributes in process `syz.2.172'. [ 102.946347][ T1206] usb 2-1: Product: syz [ 103.207655][ T1206] usb 2-1: Manufacturer: syz [ 103.328036][ T1206] usb 2-1: SerialNumber: syz [ 103.393137][ T30] audit: type=1400 audit(1758504906.882:230): avc: denied { mounton } for pid=6442 comm="syz.3.165" path="/27/file0" dev="tmpfs" ino=157 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 103.393241][ T6478] 9pnet_fd: Insufficient options for proto=fd [ 103.708852][ T1206] usb 2-1: selecting invalid altsetting 0 [ 103.718779][ T1206] usb 2-1: Found UVC 7.01 device syz (8086:0b07) [ 103.725153][ T1206] usb 2-1: No valid video chain found. [ 103.739624][ T1206] usb 2-1: selecting invalid altsetting 0 [ 103.745389][ T1206] usbtest 2-1:220.1: probe with driver usbtest failed with error -22 [ 103.762663][ T1206] usb 2-1: USB disconnect, device number 4 [ 104.016092][ T30] audit: type=1400 audit(1758504907.502:231): avc: denied { relabelfrom } for pid=6494 comm="syz.2.180" name="" dev="pipefs" ino=11347 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 104.049071][ T6495] SELinux: Context 9p is not valid (left unmapped). [ 104.083518][ T30] audit: type=1400 audit(1758504907.552:232): avc: denied { relabelto } for pid=6494 comm="syz.2.180" name="" dev="pipefs" ino=11347 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=fifo_file permissive=1 trawcon="9p" [ 104.375986][ T30] audit: type=1400 audit(1758504907.852:233): avc: denied { mount } for pid=6498 comm="syz.4.181" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 105.796495][ T10] usb 2-1: new full-speed USB device number 5 using dummy_hcd [ 105.810777][ T6522] bridge0: port 3(vlan2) entered blocking state [ 105.850038][ T6522] bridge0: port 3(vlan2) entered disabled state [ 105.856560][ T6522] vlan2: entered allmulticast mode [ 105.861836][ T6522] bridge0: entered allmulticast mode [ 105.894848][ T6522] vlan2: left allmulticast mode [ 105.902506][ T6522] bridge0: left allmulticast mode [ 106.089203][ T10] usb 2-1: config 0 has an invalid interface number: 237 but max is 0 [ 106.097823][ T10] usb 2-1: config 0 has no interface number 0 [ 106.104032][ T10] usb 2-1: config 0 interface 237 altsetting 0 endpoint 0x3 has an invalid bInterval 0, changing to 10 [ 107.073981][ T10] usb 2-1: config 0 interface 237 altsetting 0 endpoint 0x3 has invalid wMaxPacketSize 0 [ 107.084001][ T10] usb 2-1: config 0 interface 237 altsetting 0 endpoint 0x8A has an invalid bInterval 0, changing to 10 [ 107.095266][ T10] usb 2-1: config 0 interface 237 altsetting 0 endpoint 0x8A has invalid wMaxPacketSize 0 [ 107.914724][ T30] audit: type=1404 audit(1758504911.252:234): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 107.933556][ T30] audit: type=1400 audit(1758504911.402:235): avc: denied { ioctl } for pid=6509 comm="syz.1.187" path="/dev/raw-gadget" dev="devtmpfs" ino=820 ioctlcmd=0x5503 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 108.028040][ T6532] SELinux: selinux_ima_measure_state_locked: failed to read policy -12. [ 108.126198][ T30] audit: type=1400 audit(1758504911.602:236): avc: denied { map_create } for pid=6534 comm="syz.0.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 108.140137][ T10] usb 2-1: string descriptor 0 read error: -71 [ 108.158199][ T10] usb 2-1: New USB device found, idVendor=045e, idProduct=84bd, bcdDevice=89.b6 [ 108.176911][ T10] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 108.188356][ T10] usb 2-1: config 0 descriptor?? [ 108.196773][ T10] usb 2-1: can't set config #0, error -71 [ 108.216614][ T10] usb 2-1: USB disconnect, device number 5 [ 108.222488][ T30] audit: type=1400 audit(1758504911.612:237): avc: denied { prog_load } for pid=6534 comm="syz.0.194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 108.244609][ T30] audit: type=1400 audit(1758504911.632:238): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 108.305154][ T30] audit: type=1400 audit(1758504911.692:239): avc: denied { create } for pid=6536 comm="syz.4.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 109.049573][ T30] audit: type=1400 audit(1758504911.722:240): avc: denied { map_create } for pid=6538 comm="syz.2.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.094110][ T30] audit: type=1400 audit(1758504911.732:241): avc: denied { prog_load } for pid=6538 comm="syz.2.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.173011][ T30] audit: type=1400 audit(1758504911.732:242): avc: denied { create } for pid=6538 comm="syz.2.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 109.195305][ T30] audit: type=1400 audit(1758504911.732:243): avc: denied { create } for pid=6538 comm="syz.2.196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 109.221789][ T30] audit: type=1400 audit(1758504911.772:244): avc: denied { prog_load } for pid=6541 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.264911][ T30] audit: type=1400 audit(1758504911.772:245): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 109.343938][ T30] audit: type=1400 audit(1758504911.832:246): avc: denied { allowed } for pid=6536 comm="syz.4.195" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 109.406431][ T30] audit: type=1400 audit(1758504911.882:247): avc: denied { map_create } for pid=6541 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.458114][ T30] audit: type=1400 audit(1758504911.882:248): avc: denied { prog_load } for pid=6541 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 109.512049][ T30] audit: type=1400 audit(1758504911.882:249): avc: denied { prog_load } for pid=6541 comm="syz.0.197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 110.080016][ T6597] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 110.087516][ T6597] IPv6: NLM_F_CREATE should be set when creating new route [ 110.100482][ T6597] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 112.086765][ T6660] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=64 sclass=netlink_tcpdiag_socket pid=6660 comm=syz.2.246 [ 113.902551][ T6721] netlink: 28 bytes leftover after parsing attributes in process `syz.4.272'. [ 113.923410][ T6721] bridge0: port 2(bridge_slave_1) entered disabled state [ 113.933213][ T6721] bridge_slave_1: left allmulticast mode [ 113.964425][ T6721] bridge_slave_1: left promiscuous mode [ 113.974908][ T6721] bridge0: port 2(bridge_slave_1) entered disabled state [ 114.356549][ T30] kauditd_printk_skb: 255 callbacks suppressed [ 114.356565][ T30] audit: type=1400 audit(1758504917.842:505): avc: denied { create } for pid=6724 comm="syz.4.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 114.392813][ T30] audit: type=1400 audit(1758504917.882:506): avc: denied { create } for pid=6724 comm="syz.4.273" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 114.428403][ T30] audit: type=1400 audit(1758504917.882:507): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 114.455322][ T30] audit: type=1400 audit(1758504917.942:508): avc: denied { create } for pid=6729 comm="syz.1.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 114.505611][ T30] audit: type=1400 audit(1758504917.952:509): avc: denied { create } for pid=6729 comm="syz.1.274" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 114.563771][ T30] audit: type=1400 audit(1758504917.972:510): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 114.651686][ T30] audit: type=1400 audit(1758504917.982:511): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 114.743593][ T30] audit: type=1400 audit(1758504918.032:512): avc: denied { create } for pid=6732 comm="syz.2.277" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 114.812181][ T30] audit: type=1400 audit(1758504918.032:513): avc: denied { execmem } for pid=6732 comm="syz.2.277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 114.842252][ T30] audit: type=1400 audit(1758504918.042:514): avc: denied { map_create } for pid=6703 comm="syz.3.266" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 116.711690][ T6794] wireguard0: entered promiscuous mode [ 116.719464][ T6794] wireguard0: entered allmulticast mode [ 116.882782][ T6792] netlink: 'syz.1.299': attribute type 1 has an invalid length. [ 116.890598][ T6792] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 117.433191][ T6823] netlink: 'syz.1.310': attribute type 4 has an invalid length. [ 119.437971][ T30] kauditd_printk_skb: 164 callbacks suppressed [ 119.437986][ T30] audit: type=1400 audit(1758504922.932:679): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 119.512995][ T30] audit: type=1400 audit(1758504923.002:680): avc: denied { read write } for pid=6847 comm="syz.1.319" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 119.564613][ T30] audit: type=1400 audit(1758504923.052:681): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 119.612953][ T30] audit: type=1400 audit(1758504923.102:682): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 119.682530][ T30] audit: type=1400 audit(1758504923.172:683): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 119.741484][ T6854] bridge0: entered promiscuous mode [ 119.755946][ T6854] macsec1: entered promiscuous mode [ 119.769630][ T6854] bridge0: port 3(macsec1) entered blocking state [ 119.789453][ T6854] bridge0: port 3(macsec1) entered disabled state [ 119.800960][ T30] audit: type=1400 audit(1758504923.212:684): avc: denied { map_create } for pid=6853 comm="syz.3.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 119.804743][ T6854] macsec1: entered allmulticast mode [ 120.026443][ T6854] bridge0: entered allmulticast mode [ 120.037982][ T6854] macsec1: left allmulticast mode [ 120.053706][ T6854] bridge0: left allmulticast mode [ 120.067756][ T30] audit: type=1400 audit(1758504923.212:685): avc: denied { prog_load } for pid=6853 comm="syz.3.322" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 120.094345][ T30] audit: type=1400 audit(1758504923.242:686): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 120.094562][ T6854] bridge0: left promiscuous mode [ 120.135944][ T30] audit: type=1400 audit(1758504923.262:687): avc: denied { execmem } for pid=6855 comm="syz.1.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 120.158455][ T30] audit: type=1400 audit(1758504923.322:688): avc: denied { prog_load } for pid=6855 comm="syz.1.323" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 120.198068][ T6863] capability: warning: `syz.2.325' uses 32-bit capabilities (legacy support in use) [ 121.591262][ T6901] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 122.374726][ T6919] wg2: entered promiscuous mode [ 122.382934][ T6919] wg2: entered allmulticast mode [ 124.004829][ T6964] bridge1: entered allmulticast mode [ 124.566420][ T30] kauditd_printk_skb: 196 callbacks suppressed [ 124.566436][ T30] audit: type=1400 audit(1758504928.042:885): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 124.663536][ T30] audit: type=1400 audit(1758504928.152:886): avc: denied { execmem } for pid=6978 comm="syz.2.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 124.726621][ T30] audit: type=1400 audit(1758504928.192:887): avc: denied { read } for pid=6978 comm="syz.2.372" name="msr" dev="devtmpfs" ino=87 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=0 [ 124.763879][ T30] audit: type=1400 audit(1758504928.192:888): avc: denied { read } for pid=6978 comm="syz.2.372" dev="nsfs" ino=4026532932 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=0 [ 124.813182][ T30] audit: type=1400 audit(1758504928.192:889): avc: denied { create } for pid=6978 comm="syz.2.372" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=0 [ 124.864780][ T30] audit: type=1400 audit(1758504928.252:890): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 124.930192][ T30] audit: type=1400 audit(1758504928.352:891): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 125.056436][ T30] audit: type=1400 audit(1758504928.392:892): avc: denied { prog_load } for pid=6983 comm="syz.0.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 125.126472][ T30] audit: type=1400 audit(1758504928.392:893): avc: denied { execmem } for pid=6983 comm="syz.0.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 125.149798][ T6990] futex_wake_op: syz.1.377 tries to shift op by -1; fix this program [ 125.194091][ T30] audit: type=1400 audit(1758504928.392:894): avc: denied { map_create } for pid=6983 comm="syz.0.374" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 125.751354][ T7016] netlink: 4 bytes leftover after parsing attributes in process `syz.2.387'. [ 125.772329][ T7016] gretap0: entered promiscuous mode [ 125.779925][ T7016] macsec1: entered promiscuous mode [ 125.785305][ T7016] macsec1: entered allmulticast mode [ 125.791021][ T7016] gretap0: entered allmulticast mode [ 125.809299][ T7016] gretap0: left allmulticast mode [ 125.820290][ T7016] gretap0: left promiscuous mode [ 126.946802][ T7039] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 128.916641][ T7087] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 128.934910][ T7089] netlink: 4 bytes leftover after parsing attributes in process `syz.1.413'. [ 129.690513][ T30] kauditd_printk_skb: 182 callbacks suppressed [ 129.690528][ T30] audit: type=1400 audit(1758504934.168:1077): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 129.810921][ T30] audit: type=1400 audit(1758504934.238:1078): avc: denied { map_create } for pid=7105 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 129.862196][ T30] audit: type=1400 audit(1758504934.248:1079): avc: denied { prog_load } for pid=7106 comm="syz.1.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 129.905250][ T30] audit: type=1400 audit(1758504934.248:1080): avc: denied { prog_load } for pid=7105 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 129.924441][ T30] audit: type=1400 audit(1758504934.258:1081): avc: denied { create } for pid=7105 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 129.944029][ T7107] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 129.944196][ T30] audit: type=1400 audit(1758504934.258:1082): avc: denied { prog_load } for pid=7105 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 129.980874][ T30] audit: type=1400 audit(1758504934.258:1083): avc: denied { execmem } for pid=7105 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 130.020383][ T30] audit: type=1400 audit(1758504934.258:1084): avc: denied { map_create } for pid=7105 comm="syz.0.418" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 130.066219][ T30] audit: type=1400 audit(1758504934.358:1085): avc: denied { map_create } for pid=7106 comm="syz.1.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 130.100556][ T30] audit: type=1400 audit(1758504934.358:1086): avc: denied { prog_load } for pid=7106 comm="syz.1.419" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 130.351072][ T7119] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 130.664317][ T7128] netlink: 12 bytes leftover after parsing attributes in process `syz.2.426'. [ 131.028482][ T7136] netlink: 4 bytes leftover after parsing attributes in process `syz.0.429'. [ 132.431027][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 132.438436][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 134.728037][ T30] kauditd_printk_skb: 181 callbacks suppressed [ 134.728054][ T30] audit: type=1400 audit(1758504939.208:1268): avc: denied { execmem } for pid=7202 comm="syz.1.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 134.793433][ T30] audit: type=1400 audit(1758504939.268:1269): avc: denied { read write } for pid=7202 comm="syz.1.452" name="uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 [ 134.840827][ T30] audit: type=1400 audit(1758504939.298:1270): avc: denied { sys_module } for pid=7202 comm="syz.1.452" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 134.881694][ T30] audit: type=1400 audit(1758504939.298:1271): avc: denied { module_request } for pid=7202 comm="syz.1.452" kmod="tty-ldisc-30" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 134.911579][ T30] audit: type=1400 audit(1758504939.298:1272): avc: denied { create } for pid=7202 comm="syz.1.452" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 134.947980][ T30] audit: type=1400 audit(1758504939.428:1273): avc: denied { execmem } for pid=7207 comm="syz.0.454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 135.029219][ T30] audit: type=1400 audit(1758504939.508:1274): avc: denied { prog_load } for pid=7207 comm="syz.0.454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 135.067963][ T30] audit: type=1400 audit(1758504939.528:1275): avc: denied { prog_load } for pid=7207 comm="syz.0.454" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 135.109820][ T30] audit: type=1400 audit(1758504939.538:1276): avc: denied { mounton } for pid=7207 comm="syz.0.454" path="/80/file0" dev="tmpfs" ino=424 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=0 [ 135.183241][ T30] audit: type=1400 audit(1758504939.628:1277): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 136.151705][ T7241] netlink: 4 bytes leftover after parsing attributes in process `syz.1.467'. [ 136.522322][ T7260] netlink: 'syz.0.474': attribute type 2 has an invalid length. [ 136.766179][ T7267] sctp: [Deprecated]: syz.1.477 (pid 7267) Use of struct sctp_assoc_value in delayed_ack socket option. [ 136.766179][ T7267] Use struct sctp_sack_info instead [ 136.853470][ T7269] bridge1: entered allmulticast mode [ 139.594491][ T7334] Zero length message leads to an empty skb [ 139.772671][ T30] kauditd_printk_skb: 131 callbacks suppressed [ 139.772696][ T30] audit: type=1400 audit(1758504944.248:1409): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 139.835905][ T30] audit: type=1400 audit(1758504944.298:1410): avc: denied { create } for pid=7336 comm="syz.4.504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 139.916301][ T30] audit: type=1400 audit(1758504944.308:1411): avc: denied { create } for pid=7336 comm="syz.4.504" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 139.969861][ T30] audit: type=1400 audit(1758504944.388:1412): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 140.076784][ T30] audit: type=1400 audit(1758504944.418:1413): avc: denied { execmem } for pid=7340 comm="syz.4.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 140.125393][ T30] audit: type=1400 audit(1758504944.488:1414): avc: denied { prog_load } for pid=7340 comm="syz.4.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 140.286240][ T30] audit: type=1400 audit(1758504944.488:1415): avc: denied { map_create } for pid=7340 comm="syz.4.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 140.317763][ T30] audit: type=1400 audit(1758504944.488:1416): avc: denied { prog_load } for pid=7340 comm="syz.4.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 140.361114][ T30] audit: type=1400 audit(1758504944.488:1417): avc: denied { create } for pid=7340 comm="syz.4.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 140.422451][ T30] audit: type=1400 audit(1758504944.488:1418): avc: denied { prog_load } for pid=7340 comm="syz.4.506" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 141.454286][ T7371] netlink: 'syz.4.517': attribute type 10 has an invalid length. [ 141.594715][ T7371] bond0: (slave wlan1): Enslaving as an active interface with an up link [ 142.187786][ T7393] netlink: 'syz.2.524': attribute type 4 has an invalid length. [ 142.404348][ T7395] netlink: 36 bytes leftover after parsing attributes in process `syz.3.523'. [ 143.782851][ T7415] netlink: 'syz.2.531': attribute type 21 has an invalid length. [ 143.918221][ T7415] netlink: 156 bytes leftover after parsing attributes in process `syz.2.531'. [ 144.716500][ T5170] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 144.880127][ T30] kauditd_printk_skb: 90 callbacks suppressed [ 144.880142][ T30] audit: type=1400 audit(1758504949.358:1509): avc: denied { create } for pid=7426 comm="syz.0.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 144.911173][ T30] audit: type=1400 audit(1758504949.358:1510): avc: denied { create } for pid=7426 comm="syz.0.535" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=0 [ 144.935140][ T30] audit: type=1400 audit(1758504949.358:1511): avc: denied { module_request } for pid=7426 comm="syz.0.535" kmod="netdev-syzkaller0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=0 [ 144.960046][ T30] audit: type=1400 audit(1758504949.358:1512): avc: denied { sys_module } for pid=7426 comm="syz.0.535" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=0 [ 144.990615][ T30] audit: type=1400 audit(1758504949.388:1513): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 145.024880][ T30] audit: type=1400 audit(1758504949.498:1514): avc: denied { mounton } for pid=7430 comm="syz.1.536" path="/93/file0" dev="tmpfs" ino=491 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 145.073800][ T30] audit: type=1400 audit(1758504949.548:1515): avc: denied { mounton } for pid=7430 comm="syz.1.536" path="/" dev="tmpfs" ino=491 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 145.098617][ T30] audit: type=1400 audit(1758504949.568:1516): avc: denied { execmem } for pid=7430 comm="syz.1.536" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 145.313226][ T30] audit: type=1400 audit(1758504949.638:1517): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 145.342309][ T30] audit: type=1400 audit(1758504949.708:1518): avc: denied { create } for pid=7433 comm="syz.2.537" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 148.384306][ T7496] ptrace attach of "./syz-executor exec"[5843] was attempted by "./syz-executor exec"[7496] [ 149.905945][ T30] kauditd_printk_skb: 81 callbacks suppressed [ 149.905961][ T30] audit: type=1400 audit(1758504954.378:1600): avc: denied { create } for pid=7514 comm="syz.2.566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rose_socket permissive=0 [ 149.958843][ T30] audit: type=1400 audit(1758504954.418:1601): avc: denied { create } for pid=7508 comm="syz.1.564" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 150.051190][ T30] audit: type=1400 audit(1758504954.468:1602): avc: denied { map_create } for pid=7516 comm="syz.4.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 150.101583][ T30] audit: type=1400 audit(1758504954.468:1603): avc: denied { prog_load } for pid=7516 comm="syz.4.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 150.206660][ T30] audit: type=1400 audit(1758504954.468:1604): avc: denied { allowed } for pid=7516 comm="syz.4.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 150.229195][ T30] audit: type=1400 audit(1758504954.468:1605): avc: denied { allowed } for pid=7516 comm="syz.4.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 150.252006][ T30] audit: type=1400 audit(1758504954.508:1606): avc: denied { create } for pid=7514 comm="syz.2.566" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 150.278313][ T30] audit: type=1326 audit(1758504954.518:1607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7514 comm="syz.2.566" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4d77f8ec29 code=0x7ffc0000 [ 150.589643][ T30] audit: type=1326 audit(1758504954.518:1608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7514 comm="syz.2.566" exe="/root/syz-executor" sig=0 arch=c000003e syscall=314 compat=0 ip=0x7f4d77f8ec29 code=0x7ffc0000 [ 150.884298][ T30] audit: type=1326 audit(1758504954.518:1609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7514 comm="syz.2.566" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4d77f8ec29 code=0x7ffc0000 [ 152.345078][ T7561] IPVS: set_ctl: invalid protocol: 50 172.20.20.47:20000 [ 152.470345][ T7565] netlink: 8 bytes leftover after parsing attributes in process `syz.0.578'. [ 152.574130][ T7566] block nbd0: Attempted send on invalid socket [ 152.580779][ T7566] I/O error, dev nbd0, sector 0 op 0x0:(READ) flags 0x800 phys_seg 1 prio class 2 [ 152.967965][ T7565] netdevsim netdevsim0 netdevsim0: entered allmulticast mode [ 154.930169][ T30] kauditd_printk_skb: 88 callbacks suppressed [ 154.930186][ T30] audit: type=1400 audit(1758504959.408:1698): avc: denied { create } for pid=7598 comm="syz.2.589" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 155.071320][ T30] audit: type=1400 audit(1758504959.548:1699): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 155.115230][ T7607] TCP: TCP_TX_DELAY enabled [ 155.123993][ T30] audit: type=1400 audit(1758504959.588:1700): avc: denied { create } for pid=7596 comm="syz.1.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 155.176121][ T30] audit: type=1400 audit(1758504959.588:1701): avc: denied { read write } for pid=7596 comm="syz.1.590" name="mice" dev="devtmpfs" ino=916 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=0 [ 155.205917][ T30] audit: type=1400 audit(1758504959.588:1702): avc: denied { allowed } for pid=7596 comm="syz.1.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 155.228710][ T30] audit: type=1400 audit(1758504959.598:1703): avc: denied { read } for pid=7596 comm="syz.1.590" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 155.252821][ T30] audit: type=1400 audit(1758504959.598:1704): avc: denied { read write } for pid=7596 comm="syz.1.590" name="video36" dev="devtmpfs" ino=1044 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:v4l_device_t tclass=chr_file permissive=0 [ 155.283024][ T30] audit: type=1400 audit(1758504959.598:1705): avc: denied { execmem } for pid=7596 comm="syz.1.590" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 155.304873][ T30] audit: type=1400 audit(1758504959.598:1706): avc: denied { read } for pid=7606 comm="syz.2.592" name="binder0" dev="binder" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 155.338399][ T30] audit: type=1400 audit(1758504959.628:1707): avc: denied { read } for pid=7606 comm="syz.2.592" name="binder0" dev="binder" ino=16 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 157.747565][ T7652] netlink: 24 bytes leftover after parsing attributes in process `syz.3.609'. [ 157.835564][ T7652] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=7652 comm=syz.3.609 [ 157.884721][ T7652] netlink: 'syz.3.609': attribute type 4 has an invalid length. [ 157.902255][ T7652] netlink: 152 bytes leftover after parsing attributes in process `syz.3.609'. [ 157.954576][ T7652] A link change request failed with some changes committed already. Interface bond0 may have been left with an inconsistent configuration, please check. [ 158.940878][ T7698] netlink: 4 bytes leftover after parsing attributes in process `syz.0.626'. [ 159.964400][ T30] kauditd_printk_skb: 105 callbacks suppressed [ 159.964415][ T30] audit: type=1400 audit(1758504964.438:1813): avc: denied { prog_load } for pid=7719 comm="syz.4.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 160.060952][ T30] audit: type=1400 audit(1758504964.478:1814): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 160.220739][ T7728] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 160.228005][ T7728] IPv6: NLM_F_CREATE should be set when creating new route [ 160.773189][ T30] audit: type=1400 audit(1758504964.478:1815): avc: denied { create } for pid=7711 comm="syz.2.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=0 [ 161.077483][ T30] audit: type=1400 audit(1758504964.478:1816): avc: denied { allowed } for pid=7711 comm="syz.2.632" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 161.166917][ T30] audit: type=1400 audit(1758504964.488:1817): avc: denied { read write } for pid=7715 comm="syz.1.633" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 161.203095][ T7744] netlink: 'syz.4.639': attribute type 4 has an invalid length. [ 161.301314][ T30] audit: type=1400 audit(1758504964.538:1818): avc: denied { execmem } for pid=7719 comm="syz.4.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 161.324383][ T30] audit: type=1400 audit(1758504964.568:1819): avc: denied { map_create } for pid=7719 comm="syz.4.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.345723][ T30] audit: type=1400 audit(1758504964.608:1820): avc: denied { prog_load } for pid=7719 comm="syz.4.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.374839][ T30] audit: type=1400 audit(1758504964.608:1821): avc: denied { prog_load } for pid=7719 comm="syz.4.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 161.406535][ T30] audit: type=1400 audit(1758504964.608:1822): avc: denied { prog_load } for pid=7719 comm="syz.4.634" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 162.698874][ T7794] 8021q: adding VLAN 0 to HW filter on device macvlan2 [ 163.151344][ T7812] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=7812 comm=syz.4.670 [ 164.967232][ T30] kauditd_printk_skb: 128 callbacks suppressed [ 164.967247][ T30] audit: type=1400 audit(1758504969.448:1951): avc: denied { create } for pid=7841 comm="syz.1.679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 165.009399][ T30] audit: type=1400 audit(1758504969.478:1952): avc: denied { create } for pid=7846 comm="syz.4.680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 165.035668][ T30] audit: type=1400 audit(1758504969.488:1953): avc: denied { create } for pid=7841 comm="syz.1.679" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 165.381668][ T30] audit: type=1400 audit(1758504969.598:1954): avc: denied { create } for pid=7846 comm="syz.4.680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 165.478070][ T30] audit: type=1326 audit(1758504969.608:1955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7846 comm="syz.4.680" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1d338ec29 code=0x7ffc0000 [ 165.537889][ T30] audit: type=1326 audit(1758504969.608:1956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7846 comm="syz.4.680" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc1d338ec29 code=0x7ffc0000 [ 165.600167][ T7866] netlink: 'syz.0.685': attribute type 4 has an invalid length. [ 165.646331][ T30] audit: type=1400 audit(1758504969.608:1957): avc: denied { create } for pid=7846 comm="syz.4.680" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 165.711391][ T30] audit: type=1326 audit(1758504969.608:1958): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7846 comm="syz.4.680" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc1d338ec29 code=0x7ffc0000 [ 165.977856][ T7884] audit: audit_backlog=65 > audit_backlog_limit=64 [ 165.985578][ T7885] audit: audit_backlog=65 > audit_backlog_limit=64 [ 168.933968][ T7927] netlink: 4 bytes leftover after parsing attributes in process `syz.2.702'. [ 169.420103][ T7934] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=7934 comm=syz.3.704 [ 169.636501][ T5852] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 169.644805][ T5170] Bluetooth: hci5: command 0x1003 tx timeout [ 169.985209][ T30] kauditd_printk_skb: 124 callbacks suppressed [ 169.985224][ T30] audit: type=1400 audit(1758504974.458:2076): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 170.147094][ T30] audit: type=1400 audit(1758504974.618:2077): avc: denied { create } for pid=7938 comm="syz.0.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 170.202621][ T30] audit: type=1400 audit(1758504974.618:2078): avc: denied { execmem } for pid=7938 comm="syz.0.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 170.241877][ T30] audit: type=1400 audit(1758504974.618:2079): avc: denied { execmem } for pid=7938 comm="syz.0.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 170.451736][ T30] audit: type=1400 audit(1758504974.618:2080): avc: denied { prog_load } for pid=7938 comm="syz.0.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 170.505642][ T30] audit: type=1400 audit(1758504974.618:2081): avc: denied { create } for pid=7938 comm="syz.0.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 170.583960][ T30] audit: type=1400 audit(1758504974.618:2082): avc: denied { prog_load } for pid=7938 comm="syz.0.707" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 170.703183][ T30] audit: type=1400 audit(1758504974.698:2083): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 170.848988][ T30] audit: type=1400 audit(1758504974.808:2084): avc: denied { prog_load } for pid=7942 comm="syz.0.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 170.914699][ T30] audit: type=1400 audit(1758504974.808:2085): avc: denied { prog_load } for pid=7942 comm="syz.0.708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 171.217096][ T7966] bridge2: entered allmulticast mode [ 173.835322][ T8019] netlink: 20 bytes leftover after parsing attributes in process `syz.4.735'. [ 173.869824][ T8019] vlan0: entered promiscuous mode [ 174.453440][ T8041] warning: `syz.3.746' uses wireless extensions which will stop working for Wi-Fi 7 hardware; use nl80211 [ 175.208712][ T30] kauditd_printk_skb: 118 callbacks suppressed [ 175.208731][ T30] audit: type=1400 audit(1758504979.678:2204): avc: denied { create } for pid=8046 comm="syz.1.749" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=0 [ 175.220134][ T30] audit: type=1400 audit(1758504979.698:2205): avc: denied { map_create } for pid=8061 comm="syz.4.752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 175.245277][ T30] audit: type=1400 audit(1758504979.718:2206): avc: denied { read } for pid=8058 comm="syz.3.751" name="binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 175.245314][ T30] audit: type=1400 audit(1758504979.718:2207): avc: denied { read } for pid=8058 comm="syz.3.751" name="binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=0 [ 175.346431][ T30] audit: type=1400 audit(1758504979.818:2208): avc: denied { create } for pid=8061 comm="syz.4.752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 175.346479][ T30] audit: type=1400 audit(1758504979.818:2209): avc: denied { create } for pid=8061 comm="syz.4.752" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 175.995305][ T30] audit: type=1400 audit(1758504980.468:2210): avc: denied { execmem } for pid=8068 comm="syz.0.753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 176.167796][ T30] audit: type=1400 audit(1758504980.628:2211): avc: denied { prog_load } for pid=8068 comm="syz.0.753" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 176.455692][ T30] audit: type=1400 audit(1758504980.928:2212): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 176.731639][ T30] audit: type=1400 audit(1758504981.198:2213): avc: denied { read write } for pid=8072 comm="syz.3.754" name="raw-gadget" dev="devtmpfs" ino=820 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 177.042915][ T8079] syz.3.754 uses obsolete (PF_INET,SOCK_PACKET) [ 178.147743][ T8106] netlink: 56 bytes leftover after parsing attributes in process `syz.0.764'. [ 179.869633][ T5852] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 180.326550][ T30] kauditd_printk_skb: 47 callbacks suppressed [ 180.326569][ T30] audit: type=1400 audit(1758504984.798:2261): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 180.378492][ T8129] netlink: 20 bytes leftover after parsing attributes in process `syz.1.772'. [ 180.391078][ T8129] vlan0: entered promiscuous mode [ 180.466503][ T30] audit: type=1400 audit(1758504984.898:2262): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 180.563612][ T30] audit: type=1400 audit(1758504984.918:2263): avc: denied { prog_load } for pid=8130 comm="syz.3.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 180.595371][ T30] audit: type=1400 audit(1758504984.918:2264): avc: denied { execmem } for pid=8130 comm="syz.3.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 180.646620][ T30] audit: type=1400 audit(1758504984.928:2265): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 180.674844][ T30] audit: type=1400 audit(1758504984.928:2266): avc: denied { map_create } for pid=8130 comm="syz.3.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 180.731614][ T30] audit: type=1400 audit(1758504984.928:2267): avc: denied { prog_load } for pid=8130 comm="syz.3.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 180.806189][ T30] audit: type=1400 audit(1758504984.928:2268): avc: denied { prog_load } for pid=8130 comm="syz.3.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 180.847231][ T30] audit: type=1400 audit(1758504984.928:2269): avc: denied { prog_load } for pid=8130 comm="syz.3.773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 180.872228][ T30] audit: type=1400 audit(1758504984.988:2270): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 182.298896][ T8179] netlink: 20 bytes leftover after parsing attributes in process `syz.0.791'. [ 182.311787][ T8179] netlink: 20 bytes leftover after parsing attributes in process `syz.0.791'. [ 183.171937][ T8208] A link change request failed with some changes committed already. Interface netdevsim0 may have been left with an inconsistent configuration, please check. [ 183.682262][ T8221] netlink: 4 bytes leftover after parsing attributes in process `syz.1.806'. [ 183.694186][ T8221] bridge_slave_1: left allmulticast mode [ 183.717516][ T8221] bridge_slave_1: left promiscuous mode [ 183.723615][ T8221] bridge0: port 2(bridge_slave_1) entered disabled state [ 183.787297][ T8221] bridge_slave_0: left allmulticast mode [ 183.793017][ T8221] bridge_slave_0: left promiscuous mode [ 183.804612][ T8221] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.678291][ T30] kauditd_printk_skb: 125 callbacks suppressed [ 185.678302][ T30] audit: type=1400 audit(1758504990.158:2396): avc: denied { read } for pid=8261 comm="syz.3.822" name="mISDNtimer" dev="devtmpfs" ino=1269 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=0 [ 185.717435][ T30] audit: type=1400 audit(1758504990.188:2397): avc: denied { create } for pid=8261 comm="syz.3.822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 185.746496][ T30] audit: type=1400 audit(1758504990.188:2398): avc: denied { allowed } for pid=8261 comm="syz.3.822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 185.765884][ T30] audit: type=1400 audit(1758504990.188:2399): avc: denied { create } for pid=8261 comm="syz.3.822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 185.798578][ T5863] Bluetooth: hci0: command 0x0406 tx timeout [ 185.804614][ T5863] Bluetooth: hci2: command 0x0406 tx timeout [ 185.816470][ T5854] Bluetooth: hci1: command 0x0406 tx timeout [ 185.816474][ T5863] Bluetooth: hci4: command 0x0406 tx timeout [ 185.816506][ T5854] Bluetooth: hci3: command 0x0406 tx timeout [ 185.862393][ T30] audit: type=1400 audit(1758504990.188:2400): avc: denied { map_create } for pid=8261 comm="syz.3.822" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 185.893548][ T30] audit: type=1400 audit(1758504990.218:2401): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 185.950025][ T30] audit: type=1400 audit(1758504990.418:2402): avc: denied { create } for pid=8263 comm="syz.3.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 186.086525][ T30] audit: type=1400 audit(1758504990.418:2403): avc: denied { create } for pid=8263 comm="syz.3.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 186.131881][ T30] audit: type=1400 audit(1758504990.428:2404): avc: denied { execmem } for pid=8263 comm="syz.3.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 186.174810][ T30] audit: type=1400 audit(1758504990.428:2405): avc: denied { map_create } for pid=8263 comm="syz.3.823" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 186.681976][ T8276] netlink: 8 bytes leftover after parsing attributes in process `syz.4.827'. [ 187.046320][ T8293] netlink: 'syz.2.830': attribute type 4 has an invalid length. [ 189.354627][ T8330] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 189.988322][ T8335] netlink: 4 bytes leftover after parsing attributes in process `syz.0.850'. [ 190.101765][ T8342] netlink: 'syz.4.851': attribute type 4 has an invalid length. [ 190.194466][ T8335] vlan0: entered promiscuous mode [ 190.895990][ T30] kauditd_printk_skb: 72 callbacks suppressed [ 190.896002][ T30] audit: type=1400 audit(1758504995.368:2478): avc: denied { create } for pid=8355 comm="syz.4.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 190.993144][ T30] audit: type=1400 audit(1758504995.428:2479): avc: denied { prog_load } for pid=8355 comm="syz.4.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 191.026675][ T30] audit: type=1400 audit(1758504995.438:2480): avc: denied { execmem } for pid=8355 comm="syz.4.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 191.047882][ T30] audit: type=1400 audit(1758504995.438:2481): avc: denied { map_create } for pid=8355 comm="syz.4.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 191.073207][ T30] audit: type=1400 audit(1758504995.438:2482): avc: denied { prog_load } for pid=8355 comm="syz.4.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 191.121349][ T30] audit: type=1400 audit(1758504995.438:2483): avc: denied { prog_load } for pid=8355 comm="syz.4.856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 191.160960][ T30] audit: type=1400 audit(1758504995.638:2484): avc: denied { prog_load } for pid=8357 comm="syz.0.857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 191.223988][ T30] audit: type=1400 audit(1758504995.638:2485): avc: denied { create } for pid=8357 comm="syz.0.857" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=0 [ 191.285544][ T30] audit: type=1400 audit(1758504995.748:2486): avc: denied { create } for pid=8361 comm="syz.0.859" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 191.392844][ T8364] netlink: 4 bytes leftover after parsing attributes in process `syz.4.860'. [ 191.401813][ T8364] netlink: 4 bytes leftover after parsing attributes in process `syz.4.860'. [ 191.410692][ T8364] netlink: 4 bytes leftover after parsing attributes in process `syz.4.860'. [ 191.548615][ T30] audit: type=1400 audit(1758504995.868:2487): avc: denied { create } for pid=8363 comm="syz.4.860" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 191.557545][ T8364] netlink: 4 bytes leftover after parsing attributes in process `syz.4.860'. [ 191.600869][ T8364] netlink: 4 bytes leftover after parsing attributes in process `syz.4.860'. [ 191.620026][ T8364] netlink: 4 bytes leftover after parsing attributes in process `syz.4.860'. [ 191.666468][ T8364] netlink: 4 bytes leftover after parsing attributes in process `syz.4.860'. [ 191.680392][ T8364] netlink: 4 bytes leftover after parsing attributes in process `syz.4.860'. [ 191.694912][ T8364] netlink: 4 bytes leftover after parsing attributes in process `syz.4.860'. [ 192.370370][ T8378] IPv6: sit1: Disabled Multicast RS [ 193.894117][ T1299] ieee802154 phy0 wpan0: encryption failed: -22 [ 193.927093][ T1299] ieee802154 phy1 wpan1: encryption failed: -22 [ 196.043115][ T30] kauditd_printk_skb: 74 callbacks suppressed [ 196.043133][ T30] audit: type=1400 audit(1758505000.508:2562): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 196.188358][ T8447] __nla_validate_parse: 43 callbacks suppressed [ 196.188370][ T8447] netlink: 24 bytes leftover after parsing attributes in process `syz.4.888'. [ 196.259380][ T8448] netlink: 24 bytes leftover after parsing attributes in process `syz.4.888'. [ 196.320999][ T30] audit: type=1400 audit(1758505000.778:2563): avc: denied { create } for pid=8444 comm="syz.4.888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 196.354591][ T30] audit: type=1400 audit(1758505000.788:2564): avc: denied { create } for pid=8444 comm="syz.4.888" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 196.674976][ T30] audit: type=1400 audit(1758505000.798:2565): avc: denied { create } for pid=8449 comm="syz.1.889" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=0 [ 196.725232][ T30] audit: type=1400 audit(1758505001.128:2566): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 196.898971][ T30] audit: type=1400 audit(1758505001.178:2567): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 196.926479][ T30] audit: type=1400 audit(1758505001.188:2568): avc: denied { read write } for pid=8451 comm="syz.2.890" name="nullb0" dev="devtmpfs" ino=696 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=0 [ 196.956518][ T30] audit: type=1400 audit(1758505001.248:2569): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 197.086452][ T30] audit: type=1400 audit(1758505001.558:2570): avc: denied { create } for pid=8455 comm="syz.2.892" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 197.197498][ T30] audit: type=1400 audit(1758505001.598:2571): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 197.301619][ T8465] netlink: 32 bytes leftover after parsing attributes in process `syz.1.897'. [ 198.767161][ T8490] netlink: 4 bytes leftover after parsing attributes in process `syz.3.904'. [ 199.079763][ T8511] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 199.979150][ T8529] netlink: 28 bytes leftover after parsing attributes in process `syz.0.917'. [ 201.093093][ T30] kauditd_printk_skb: 80 callbacks suppressed [ 201.093110][ T30] audit: type=1400 audit(1758505005.568:2652): avc: denied { prog_load } for pid=8551 comm="syz.1.925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 201.232749][ T30] audit: type=1400 audit(1758505005.608:2653): avc: denied { create } for pid=8551 comm="syz.1.925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 201.274833][ T30] audit: type=1400 audit(1758505005.608:2654): avc: denied { create } for pid=8551 comm="syz.1.925" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=0 [ 202.027974][ T30] audit: type=1400 audit(1758505006.498:2655): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 202.104955][ T30] audit: type=1400 audit(1758505006.578:2656): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 202.179850][ T30] audit: type=1400 audit(1758505006.628:2657): avc: denied { create } for pid=8564 comm="syz.4.930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=0 [ 202.200367][ T30] audit: type=1400 audit(1758505006.628:2658): avc: denied { name_bind } for pid=8564 comm="syz.4.930" src=3618 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=0 [ 202.629251][ T30] audit: type=1400 audit(1758505006.728:2659): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 202.973927][ T30] audit: type=1400 audit(1758505006.758:2660): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 203.072381][ T30] audit: type=1400 audit(1758505006.768:2661): avc: denied { execmem } for pid=8570 comm="syz.4.932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 203.984058][ T8597] netlink: 'syz.4.940': attribute type 5 has an invalid length. [ 204.040938][ T8599] netlink: 24 bytes leftover after parsing attributes in process `syz.3.941'. [ 204.161152][ T8599] netlink: 'syz.3.941': attribute type 4 has an invalid length. [ 204.189362][ T8599] netlink: 152 bytes leftover after parsing attributes in process `syz.3.941'. [ 204.207698][ T8599] A link change request failed with some changes committed already. Interface bond0 may have been left with an inconsistent configuration, please check. [ 205.618385][ T8614] A link change request failed with some changes committed already. Interface bridge_slave_1 may have been left with an inconsistent configuration, please check. [ 205.963079][ T8622] netlink: 20 bytes leftover after parsing attributes in process `syz.2.949'. [ 206.410850][ T30] kauditd_printk_skb: 104 callbacks suppressed [ 206.410865][ T30] audit: type=1400 audit(1758505010.888:2766): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.458718][ T30] audit: type=1400 audit(1758505010.938:2767): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.535648][ T30] audit: type=1400 audit(1758505010.998:2768): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 206.587418][ T30] audit: type=1400 audit(1758505011.008:2769): avc: denied { mounton } for pid=8633 comm="syz.4.954" path="/204/file0" dev="tmpfs" ino=1055 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 206.633535][ T30] audit: type=1400 audit(1758505011.008:2770): avc: denied { mounton } for pid=8633 comm="syz.4.954" path="/" dev="tmpfs" ino=1055 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 206.680570][ T30] audit: type=1400 audit(1758505011.008:2771): avc: denied { execmem } for pid=8633 comm="syz.4.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 206.760096][ T30] audit: type=1400 audit(1758505011.008:2772): avc: denied { prog_load } for pid=8633 comm="syz.4.954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.782755][ T30] audit: type=1400 audit(1758505011.008:2773): avc: denied { mounton } for pid=8633 comm="syz.4.954" path="/" dev="tmpfs" ino=1055 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 206.839047][ T30] audit: type=1400 audit(1758505011.048:2774): avc: denied { prog_load } for pid=8635 comm="syz.1.955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 206.904683][ T30] audit: type=1400 audit(1758505011.048:2775): avc: denied { prog_load } for pid=8635 comm="syz.1.955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 208.777504][ T5170] Bluetooth: hci5: command 0x1003 tx timeout [ 208.784423][ T5861] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 209.570494][ T5861] Bluetooth: hci1: command 0x0406 tx timeout [ 211.419584][ T30] kauditd_printk_skb: 85 callbacks suppressed [ 211.419599][ T30] audit: type=1400 audit(1758505015.898:2861): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 211.855784][ T30] audit: type=1400 audit(1758505015.938:2862): avc: denied { allowed } for pid=8744 comm="syz.3.997" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 211.940416][ T30] audit: type=1400 audit(1758505016.188:2863): avc: denied { mounton } for pid=8753 comm="syz.0.999" path="/210" dev="tmpfs" ino=1080 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=0 [ 211.978791][ T30] audit: type=1400 audit(1758505016.218:2864): avc: denied { read } for pid=8757 comm="syz.1.1000" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 212.430891][ T30] audit: type=1400 audit(1758505016.238:2865): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 212.459707][ T30] audit: type=1400 audit(1758505016.248:2866): avc: denied { prog_load } for pid=8759 comm="syz.1.1001" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 212.483181][ T30] audit: type=1400 audit(1758505016.308:2867): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 212.944342][ T30] audit: type=1400 audit(1758505016.378:2868): avc: denied { map_create } for pid=8761 comm="syz.0.1002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 213.039074][ T30] audit: type=1400 audit(1758505016.378:2869): avc: denied { prog_load } for pid=8761 comm="syz.0.1002" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 213.181897][ T30] audit: type=1400 audit(1758505016.398:2870): avc: denied { create } for pid=8764 comm="syz.1.1003" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=0 [ 213.759135][ T8798] netlink: 8 bytes leftover after parsing attributes in process `syz.2.1016'. [ 213.799663][ T8798] netdevsim netdevsim2 netdevsim0: entered allmulticast mode [ 213.971218][ T8806] syzkaller0: entered promiscuous mode [ 213.990728][ T8806] syzkaller0: entered allmulticast mode [ 214.259896][ T8823] netlink: 24 bytes leftover after parsing attributes in process `syz.2.1024'. [ 216.303893][ T8843] netlink: 'syz.4.1032': attribute type 13 has an invalid length. [ 216.452638][ T30] kauditd_printk_skb: 49 callbacks suppressed [ 216.452657][ T30] audit: type=1400 audit(1758505020.928:2920): avc: denied { create } for pid=8844 comm="syz.0.1033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 216.558626][ T30] audit: type=1400 audit(1758505021.038:2921): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 216.639405][ T30] audit: type=1400 audit(1758505021.098:2922): avc: denied { read } for pid=8847 comm="syz.3.1034" name="kvm" dev="devtmpfs" ino=84 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=0 [ 216.677120][ T30] audit: type=1400 audit(1758505021.118:2923): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 216.880872][ T30] audit: type=1400 audit(1758505021.358:2924): avc: denied { execmem } for pid=8857 comm="syz.0.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 216.946833][ T30] audit: type=1400 audit(1758505021.428:2925): avc: denied { prog_load } for pid=8857 comm="syz.0.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 216.991471][ T30] audit: type=1400 audit(1758505021.428:2926): avc: denied { create } for pid=8857 comm="syz.0.1038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 217.358748][ T30] audit: type=1400 audit(1758505021.838:2927): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 217.413330][ T30] audit: type=1400 audit(1758505021.888:2928): avc: denied { read write } for pid=5843 comm="syz-executor" name="loop1" dev="devtmpfs" ino=648 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 217.459166][ T30] audit: type=1400 audit(1758505021.918:2929): avc: denied { read write } for pid=8860 comm="syz.2.1039" name="fuse" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=0 [ 217.485414][ T8843] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 218.454876][ T8922] dummy0: Caught tx_queue_len zero misconfig [ 218.489993][ T8925] netlink: 33836 bytes leftover after parsing attributes in process `syz.4.1066'. [ 219.384977][ T8972] netlink: 'syz.2.1088': attribute type 2 has an invalid length. [ 219.486935][ T8978] tap0: tun_chr_ioctl cmd 1074812118 [ 220.211567][ T5170] Bluetooth: hci5: command 0x1003 tx timeout [ 220.231812][ T5861] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 221.456779][ T30] kauditd_printk_skb: 160 callbacks suppressed [ 221.456797][ T30] audit: type=1400 audit(1758505025.938:3090): avc: denied { create } for pid=9034 comm="syz.0.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 221.544888][ T30] audit: type=1400 audit(1758505025.978:3091): avc: denied { create } for pid=9034 comm="syz.0.1113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 221.647728][ T30] audit: type=1400 audit(1758505026.118:3092): avc: denied { create } for pid=9036 comm="syz.0.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 221.735467][ T30] audit: type=1400 audit(1758505026.128:3093): avc: denied { create } for pid=9036 comm="syz.0.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 221.837717][ T30] audit: type=1400 audit(1758505026.148:3094): avc: denied { create } for pid=9036 comm="syz.0.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 221.880413][ T30] audit: type=1400 audit(1758505026.148:3095): avc: denied { name_bind } for pid=9036 comm="syz.0.1114" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=0 [ 221.933798][ T30] audit: type=1400 audit(1758505026.158:3096): avc: denied { create } for pid=9036 comm="syz.0.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 222.065320][ T30] audit: type=1400 audit(1758505026.158:3097): avc: denied { create } for pid=9036 comm="syz.0.1114" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=0 [ 222.185460][ T30] audit: type=1400 audit(1758505026.258:3098): avc: denied { create } for pid=9038 comm="syz.0.1115" anonclass=[userfaultfd] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=0 [ 222.301823][ T30] audit: type=1400 audit(1758505026.448:3099): avc: denied { allowed } for pid=9043 comm="syz.4.1117" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=0 [ 222.666838][ T51] Bluetooth: hci5: command 0x1003 tx timeout [ 222.667788][ T5861] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 224.426551][ T5170] Bluetooth: hci6: Opcode 0x1003 failed: -110 [ 225.222184][ T9116] netlink: 33828 bytes leftover after parsing attributes in process `syz.3.1146'. [ 225.366846][ T9122] pim6reg1: entered promiscuous mode [ 225.374446][ T9122] pim6reg1: entered allmulticast mode [ 225.401647][ T9122] netlink: 'syz.3.1149': attribute type 27 has an invalid length. [ 225.483773][ T9122] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.491382][ T9122] bridge0: port 1(bridge_slave_0) entered disabled state [ 225.590912][ T9122] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 225.604831][ T9122] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 225.759378][ T9122] pim6reg1: left promiscuous mode [ 225.767775][ T9122] pim6reg1: left allmulticast mode [ 225.778685][ T5974] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.807434][ T79] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.822032][ T79] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.841720][ T79] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 225.946480][ T51] Bluetooth: hci5: command 0x1003 tx timeout [ 225.953574][ T5861] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 226.570611][ T30] kauditd_printk_skb: 121 callbacks suppressed [ 226.570625][ T30] audit: type=1400 audit(1758505031.048:3221): avc: denied { map_create } for pid=9161 comm="syz.4.1166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 226.598660][ T30] audit: type=1400 audit(1758505031.078:3222): avc: denied { prog_load } for pid=9161 comm="syz.4.1166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 226.619473][ T30] audit: type=1400 audit(1758505031.098:3223): avc: denied { map_create } for pid=9161 comm="syz.4.1166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 226.643949][ T30] audit: type=1400 audit(1758505031.098:3224): avc: denied { prog_load } for pid=9161 comm="syz.4.1166" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 226.694142][ T30] audit: type=1400 audit(1758505031.168:3225): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 226.886740][ T30] audit: type=1400 audit(1758505031.308:3226): avc: denied { map_create } for pid=9167 comm="syz.2.1167" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 227.540734][ T30] audit: type=1400 audit(1758505032.018:3227): avc: denied { execmem } for pid=9174 comm="syz.4.1169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=0 [ 227.593831][ T30] audit: type=1400 audit(1758505032.068:3228): avc: denied { prog_load } for pid=9174 comm="syz.4.1169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 227.615068][ T30] audit: type=1400 audit(1758505032.068:3229): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 227.639780][ T30] audit: type=1400 audit(1758505032.088:3230): avc: denied { create } for pid=9174 comm="syz.4.1169" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 [ 227.706696][ T5170] Bluetooth: hci6: Opcode 0x1003 failed: -110 [ 228.106508][ T5861] Bluetooth: hci5: Opcode 0x1003 failed: -110 [ 228.112919][ T51] Bluetooth: hci5: command 0x1003 tx timeout [ 228.511599][ T9202] netlink: 'syz.4.1177': attribute type 4 has an invalid length. [ 230.362362][ T9246] netlink: 'syz.0.1196': attribute type 5 has an invalid length. [ 230.372572][ T9247] netlink: 'syz.3.1195': attribute type 4 has an invalid length. [ 231.656909][ T30] kauditd_printk_skb: 118 callbacks suppressed [ 231.656926][ T30] audit: type=1400 audit(1758505036.138:3349): avc: denied { prog_load } for pid=9285 comm="syz.1.1213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 231.715176][ T1206] ================================================================== [ 231.723244][ T1206] BUG: KASAN: slab-use-after-free in hci_uart_write_work+0x82d/0x960 [ 231.731292][ T1206] Read of size 4 at addr ffff888051da6bb0 by task kworker/1:2/1206 [ 231.739154][ T1206] [ 231.741455][ T1206] CPU: 1 UID: 0 PID: 1206 Comm: kworker/1:2 Not tainted syzkaller #0 PREEMPT(full) [ 231.741469][ T1206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 231.741476][ T1206] Workqueue: events hci_uart_write_work [ 231.741494][ T1206] Call Trace: [ 231.741500][ T1206] [ 231.741505][ T1206] dump_stack_lvl+0x116/0x1f0 [ 231.741520][ T1206] print_report+0xcd/0x630 [ 231.741533][ T1206] ? __virt_addr_valid+0x81/0x610 [ 231.741548][ T1206] ? __phys_addr+0xe8/0x180 [ 231.741562][ T1206] ? hci_uart_write_work+0x82d/0x960 [ 231.741578][ T1206] kasan_report+0xe0/0x110 [ 231.741590][ T1206] ? hci_uart_write_work+0x82d/0x960 [ 231.741606][ T1206] hci_uart_write_work+0x82d/0x960 [ 231.741619][ T1206] ? __pfx_pty_write+0x10/0x10 [ 231.741632][ T1206] process_one_work+0x9cc/0x1b70 [ 231.741647][ T1206] ? __pfx_process_one_work+0x10/0x10 [ 231.741661][ T1206] ? assign_work+0x1a0/0x250 [ 231.741673][ T1206] worker_thread+0x6c8/0xf10 [ 231.741687][ T1206] ? __kthread_parkme+0x19e/0x250 [ 231.741703][ T1206] ? __pfx_worker_thread+0x10/0x10 [ 231.741715][ T1206] kthread+0x3c2/0x780 [ 231.741725][ T1206] ? __pfx_kthread+0x10/0x10 [ 231.741736][ T1206] ? rcu_is_watching+0x12/0xc0 [ 231.741750][ T1206] ? __pfx_kthread+0x10/0x10 [ 231.741761][ T1206] ret_from_fork+0x56a/0x730 [ 231.741771][ T1206] ? __pfx_kthread+0x10/0x10 [ 231.741782][ T1206] ret_from_fork_asm+0x1a/0x30 [ 231.741798][ T1206] [ 231.741802][ T1206] [ 231.882257][ T1206] Allocated by task 5861: [ 231.886570][ T1206] kasan_save_stack+0x33/0x60 [ 231.891258][ T1206] kasan_save_track+0x14/0x30 [ 231.895922][ T1206] __kasan_slab_alloc+0x89/0x90 [ 231.900762][ T1206] kmem_cache_alloc_node_noprof+0x1d5/0x3b0 [ 231.906645][ T1206] __alloc_skb+0x2b2/0x380 [ 231.911071][ T1206] hci_cmd_sync_alloc+0x39/0x3a0 [ 231.915990][ T1206] __hci_cmd_sync_sk+0x157/0xc90 [ 231.920908][ T1206] hci_read_local_features_sync+0x2c/0x160 [ 231.926691][ T1206] hci_dev_open_sync+0x16f6/0x2430 [ 231.931779][ T1206] hci_dev_do_open+0x2a/0x90 [ 231.936344][ T1206] hci_power_on+0x131/0x610 [ 231.940841][ T1206] process_one_work+0x9cc/0x1b70 [ 231.945763][ T1206] worker_thread+0x6c8/0xf10 [ 231.950331][ T1206] kthread+0x3c2/0x780 [ 231.954380][ T1206] ret_from_fork+0x56a/0x730 [ 231.958952][ T1206] ret_from_fork_asm+0x1a/0x30 [ 231.963721][ T1206] [ 231.966019][ T1206] The buggy address belongs to the object at ffff888051da6b40 [ 231.966019][ T1206] which belongs to the cache skbuff_head_cache of size 240 [ 231.980590][ T1206] The buggy address is located 112 bytes inside of [ 231.980590][ T1206] freed 240-byte region [ffff888051da6b40, ffff888051da6c30) [ 231.994364][ T1206] [ 231.996668][ T1206] The buggy address belongs to the physical page: [ 232.003054][ T1206] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x51da6 [ 232.011794][ T1206] flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff) [ 232.018880][ T1206] page_type: f5(slab) [ 232.022837][ T1206] raw: 00fff00000000000 ffff88801eed88c0 dead000000000122 0000000000000000 [ 232.031409][ T1206] raw: 0000000000000000 00000000000c000c 00000000f5000000 0000000000000000 [ 232.039973][ T1206] page dumped because: kasan: bad access detected [ 232.046365][ T1206] page_owner tracks the page as allocated [ 232.052058][ T1206] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52820(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid 36, tgid 36 (kworker/u8:2), ts 231684018732, free_ts 231585179113 [ 232.071131][ T1206] post_alloc_hook+0x1c0/0x230 [ 232.075885][ T1206] get_page_from_freelist+0x132b/0x38e0 [ 232.081404][ T1206] __alloc_frozen_pages_noprof+0x261/0x23f0 [ 232.087273][ T1206] alloc_pages_mpol+0x1fb/0x550 [ 232.092099][ T1206] new_slab+0x247/0x330 [ 232.096235][ T1206] ___slab_alloc+0xcf2/0x1750 [ 232.100897][ T1206] __slab_alloc.constprop.0+0x56/0xb0 [ 232.106262][ T1206] kmem_cache_alloc_node_noprof+0xf5/0x3b0 [ 232.112041][ T1206] __alloc_skb+0x2b2/0x380 [ 232.116447][ T1206] nsim_dev_trap_report_work+0x2b1/0xcf0 [ 232.122059][ T1206] process_one_work+0x9cc/0x1b70 [ 232.126973][ T1206] worker_thread+0x6c8/0xf10 [ 232.131549][ T1206] kthread+0x3c2/0x780 [ 232.135588][ T1206] ret_from_fork+0x56a/0x730 [ 232.140154][ T1206] ret_from_fork_asm+0x1a/0x30 [ 232.144898][ T1206] page last free pid 9286 tgid 9285 stack trace: [ 232.151191][ T1206] __free_frozen_pages+0x7d5/0x10f0 [ 232.156371][ T1206] __put_partials+0x165/0x1c0 [ 232.161042][ T1206] qlist_free_all+0x4d/0x120 [ 232.165613][ T1206] kasan_quarantine_reduce+0x195/0x1e0 [ 232.171044][ T1206] __kasan_slab_alloc+0x69/0x90 [ 232.175870][ T1206] kmem_cache_alloc_node_noprof+0x1d5/0x3b0 [ 232.181735][ T1206] __alloc_skb+0x2b2/0x380 [ 232.186125][ T1206] alloc_skb_with_frags+0xe0/0x860 [ 232.191220][ T1206] sock_alloc_send_pskb+0x7fb/0x990 [ 232.196412][ T1206] unix_dgram_sendmsg+0x3e9/0x17f0 [ 232.201512][ T1206] ____sys_sendmsg+0xa95/0xc70 [ 232.206269][ T1206] ___sys_sendmsg+0x134/0x1d0 [ 232.210925][ T1206] __sys_sendmmsg+0x200/0x420 [ 232.215580][ T1206] __x64_sys_sendmmsg+0x9c/0x100 [ 232.220505][ T1206] do_syscall_64+0xcd/0x4e0 [ 232.225013][ T1206] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 232.230883][ T1206] [ 232.233185][ T1206] Memory state around the buggy address: [ 232.238788][ T1206] ffff888051da6a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc fc [ 232.246833][ T1206] ffff888051da6b00: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 232.254869][ T1206] >ffff888051da6b80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 232.262902][ T1206] ^ [ 232.268504][ T1206] ffff888051da6c00: fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc fc [ 232.276543][ T1206] ffff888051da6c80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 232.284585][ T1206] ================================================================== Sep 22 01:37:16 syzkaller kern.alert kernel: [ 232.046365][ T1206] page_owner tracks the page as allocated Sep 22 01:37:16 syzkaller kern.aler[ 232.333853][ T30] audit: type=1400 audit(1758505036.138:3350): avc: denied { read write } for pid=9285 comm="syz.1.1213" name="uinput" dev="devtmpfs" ino=920 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=0 t kernel: [ 232.052058][ T1206] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x52820(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP), pid[ 232.372167][ T30] audit: type=1400 audit(1758505036.788:3351): avc: denied { create } for pid=9285 comm="syz.1.1213" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=0 36, tgid 36 (kw[ 232.392907][ T30] audit: type=1400 audit(1758505036.798:3352): avc: denied { read } for pid=5202 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 orker/u8:2), ts [ 232.415961][ T30] audit: type=1400 audit(1758505036.798:3353): avc: denied { read } for pid=5202 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 231684018732, free_ts 231585179113 Sep 22 01:37:16 syzkaller kern.alert kernel: [ 232.144898][ T1206] page las[ 232.447695][ T30] audit: type=1400 audit(1758505036.808:3354): avc: denied { read } for pid=5202 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=0 t free pid 9286 [ 232.470962][ T30] audit: type=1400 audit(1758505036.818:3355): avc: denied { read write } for pid=5846 comm="syz-executor" name="loop3" dev="devtmpfs" ino=650 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 tgid 9285 stack [ 232.497030][ T30] audit: type=1400 audit(1758505036.928:3356): avc: denied { read write } for pid=5855 comm="syz-executor" name="loop2" dev="devtmpfs" ino=649 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 trace: [ 232.599233][ T1206] Kernel panic - not syncing: KASAN: panic_on_warn set ... [ 232.606444][ T1206] CPU: 1 UID: 0 PID: 1206 Comm: kworker/1:2 Not tainted syzkaller #0 PREEMPT(full) [ 232.615800][ T1206] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 232.625833][ T1206] Workqueue: events hci_uart_write_work [ 232.631368][ T1206] Call Trace: [ 232.634626][ T1206] [ 232.637538][ T1206] dump_stack_lvl+0x3d/0x1f0 [ 232.642128][ T1206] vpanic+0x6e8/0x7a0 [ 232.646090][ T1206] ? __pfx_vpanic+0x10/0x10 [ 232.650569][ T1206] ? __pfx_vprintk_emit+0x10/0x10 [ 232.655589][ T1206] ? hci_uart_write_work+0x82d/0x960 [ 232.660849][ T1206] panic+0xca/0xd0 [ 232.664546][ T1206] ? __pfx_panic+0x10/0x10 [ 232.668951][ T1206] ? hci_uart_write_work+0x82d/0x960 [ 232.674219][ T1206] ? preempt_schedule_common+0x44/0xc0 [ 232.679658][ T1206] ? preempt_schedule_thunk+0x16/0x30 [ 232.685016][ T1206] ? check_panic_on_warn+0x1f/0xb0 [ 232.690114][ T1206] check_panic_on_warn+0xab/0xb0 [ 232.695030][ T1206] end_report+0x107/0x170 [ 232.699342][ T1206] kasan_report+0xee/0x110 [ 232.703738][ T1206] ? hci_uart_write_work+0x82d/0x960 [ 232.709008][ T1206] hci_uart_write_work+0x82d/0x960 [ 232.714098][ T1206] ? __pfx_pty_write+0x10/0x10 [ 232.718840][ T1206] process_one_work+0x9cc/0x1b70 [ 232.723762][ T1206] ? __pfx_process_one_work+0x10/0x10 [ 232.729118][ T1206] ? assign_work+0x1a0/0x250 [ 232.733685][ T1206] worker_thread+0x6c8/0xf10 [ 232.738259][ T1206] ? __kthread_parkme+0x19e/0x250 [ 232.743275][ T1206] ? __pfx_worker_thread+0x10/0x10 [ 232.748366][ T1206] kthread+0x3c2/0x780 [ 232.752414][ T1206] ? __pfx_kthread+0x10/0x10 [ 232.756989][ T1206] ? rcu_is_watching+0x12/0xc0 [ 232.761735][ T1206] ? __pfx_kthread+0x10/0x10 [ 232.766301][ T1206] ret_from_fork+0x56a/0x730 [ 232.770871][ T1206] ? __pfx_kthread+0x10/0x10 [ 232.775443][ T1206] ret_from_fork_asm+0x1a/0x30 [ 232.780193][ T1206] [ 232.783410][ T1206] Kernel Offset: disabled [ 232.787723][ T1206] Rebooting in 86400 seconds..