last executing test programs: 20.867313265s ago: executing program 3 (id=91): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x4}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:net,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}]}, 0x4c}}, 0x0) 20.77337174s ago: executing program 3 (id=92): ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f0000000280)=@urb_type_control={0x2, {0x9, 0x1}, 0x3, 0xab, &(0x7f0000000040)={0x1d, 0x0, 0xd, 0x4, 0x4}, 0x8, 0x7, 0x0, 0x0, 0x8001, 0x9, &(0x7f0000001240)}) r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) sendmsg$TIPC_CMD_ENABLE_BEARER(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x81}, 0x20000000) write$selinux_load(r0, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757813"], 0x65) 20.657224665s ago: executing program 3 (id=96): pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x3938700}, 0x0) syz_clone(0x1000000, 0x0, 0xfffffd11, 0x0, 0x0, 0x0) 20.625853028s ago: executing program 3 (id=98): r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x205, 0x2581) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x80, 0x0, 0x0, 0x0, 0x7995}, 0xfff7, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) 20.56952223s ago: executing program 3 (id=100): r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x8000003d) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000001c0)=0x10) 20.56927984s ago: executing program 3 (id=101): r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000440)={'filter\x00', 0xb001, 0xff03, 0x3f0, 0x0, 0x1f8, 0x1f8, 0x308, 0x308, 0x308, 0x7fffffe, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local, @empty, @multicast2, @empty, 0x2}}}, {{@uncond, 0xc0, 0xe8, 0x0, {0x0, 0x1e03}}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x7}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @rand_addr=0x640100fd, @rand_addr=0x64010101, 0x2, 0xffffffff}}}], {{'\x00', 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x440) 5.501726315s ago: executing program 32 (id=101): r0 = socket$inet(0xa, 0x801, 0x84) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000440)={'filter\x00', 0xb001, 0xff03, 0x3f0, 0x0, 0x1f8, 0x1f8, 0x308, 0x308, 0x308, 0x7fffffe, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local, @empty, @multicast2, @empty, 0x2}}}, {{@uncond, 0xc0, 0xe8, 0x0, {0x0, 0x1e03}}, @unspec=@NFQUEUE0={0x28, 'NFQUEUE\x00', 0x0, {0x7}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @rand_addr=0x640100fd, @rand_addr=0x64010101, 0x2, 0xffffffff}}}], {{'\x00', 0xc0, 0xe8}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x440) 2.733246624s ago: executing program 0 (id=638): r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000001080), 0x80000, 0x0) read(r0, &(0x7f00000010c0)=""/213, 0xd5) 2.733109484s ago: executing program 0 (id=639): mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r0 = syz_open_dev$MSR(&(0x7f0000000140), 0x0, 0x0) read$msr(r0, &(0x7f0000032680)=""/102392, 0x18ff8) 2.553397532s ago: executing program 0 (id=642): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000001, 0x12, r0, 0x0) r1 = socket(0x1e, 0x2, 0x0) setsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000480), 0x4) 2.553180752s ago: executing program 0 (id=643): mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x80000, 0x0) mount$bind(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18d883, 0x0) 2.511562035s ago: executing program 0 (id=644): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x201, 0x2000000, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWFLOWTABLE={0x58, 0x16, 0xa, 0x1, 0x0, 0x0, {0x1}, [@NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_HOOK={0x2c, 0x3, 0x0, 0x1, [@NFTA_FLOWTABLE_HOOK_NUM={0x6}, @NFTA_FLOWTABLE_HOOK_DEVS={0x18, 0x3, 0x0, 0x1, [{0x14, 0x1, 'veth1_to_bond\x00'}]}, @NFTA_FLOWTABLE_HOOK_PRIORITY={0x8}]}]}, @NFT_MSG_DELFLOWTABLE={0x5c, 0x16, 0xa, 0x101, 0xb00, 0x0, {0x1}, [@NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_FLOWTABLE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_FLOWTABLE_HOOK={0x30}]}], {0x14, 0x10}}, 0xfc}}, 0x0) 2.433864319s ago: executing program 0 (id=645): r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x80840) syz_usb_disconnect(r0) syz_usb_connect(0x4, 0x24, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$EVIOCRMFF(r0, 0xc0085508, &(0x7f0000000080)=0x400000) 2.271828767s ago: executing program 33 (id=645): r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x80840) syz_usb_disconnect(r0) syz_usb_connect(0x4, 0x24, &(0x7f00000000c0)=ANY=[], 0x0) ioctl$EVIOCRMFF(r0, 0xc0085508, &(0x7f0000000080)=0x400000) 1.528504084s ago: executing program 4 (id=673): r0 = creat(&(0x7f0000000200)='./file0\x00', 0x1) io_setup(0x5, &(0x7f00000000c0)=0x0) r2 = eventfd2(0x7, 0x800) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x5, r0, 0x0, 0x0, 0x0, 0x0, 0x1, r2}]) 1.421416729s ago: executing program 4 (id=676): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x1c1342, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) writev(r0, &(0x7f00000001c0)=[{&(0x7f0000000040)="89e7ee0c7cdad9b4b47380c988cafb", 0xf}, {&(0x7f0000000340)="448b7cff000000000000108a15df09", 0xf}], 0x2) 1.241486128s ago: executing program 4 (id=684): socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) 344.834093ms ago: executing program 5 (id=712): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000001000010000000000000000000010000a58000000060a0b160000000000000000020000082c0004802800018007000100637400001c00028008000140000000110500030001000000080002400000000c0900010073797a30000000000900020073797a320000000014000000110001"], 0x80}, 0x1, 0x0, 0x0, 0x850}, 0x4040884) r1 = socket(0x2, 0x3, 0xff) setsockopt$inet_int(r1, 0x0, 0x16, &(0x7f0000000000)=0x9, 0x4) sendmmsg$inet(r1, &(0x7f0000000440)=[{{&(0x7f00000001c0)={0x2, 0x0, @local}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a9050000002074640000000000003552bde5c064c6", 0x15}, {&(0x7f0000001140)="174640b6d80fb2eedc81ba60ccbb9d", 0xf}], 0x2}, 0xf5ffffff}], 0x1, 0x0) 344.630553ms ago: executing program 1 (id=713): lsetxattr$security_selinux(&(0x7f00000012c0)='.\x00', &(0x7f0000001280), &(0x7f0000001240)='system_u:object_r:fsadm_exec_t:s0\x00', 0x15, 0x0) mkdir(&(0x7f0000001080)='./file0\x00', 0xb33328a401cad7d9) 344.509433ms ago: executing program 2 (id=714): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)={0x48, r1, 0x1, 0x0, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0xc082}, 0x20004080) 344.418193ms ago: executing program 5 (id=715): unshare(0x66020080) 343.003123ms ago: executing program 2 (id=716): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000480)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000100), 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000001c0)=@gcm_256={{0x303}, "3d8b00", "eb8e7ba12faf3700", "8000", "c16cb41f00bd22fc"}, 0x38) sendto$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 295.324396ms ago: executing program 4 (id=717): r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200), 0x1, 0x0) write$vga_arbiter(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='decodes i'], 0xf) 251.279498ms ago: executing program 4 (id=718): r0 = socket$inet6(0xa, 0x3, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000280)={{{@in6=@dev={0xfe, 0x80, '\x00', 0x44}, @in=@local, 0x4e24, 0x56, 0x4e23, 0xfffc, 0x2}, {0x0, 0x0, 0x0, 0x2, 0xfffffffffffffff6, 0x2000000, 0x1, 0xfffffffffffffffd}, {0x1ff, 0x800000000000, 0x10004, 0xffffffffffffff7f}, 0x9, 0x0, 0x1, 0x0, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x2b}, 0x2, @in=@loopback, 0x3504, 0x3, 0x0, 0x5, 0xff7ffffb, 0x6, 0x4}}, 0xe8) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xff}}}, 0x1c) 251.014208ms ago: executing program 2 (id=719): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x25dfdbfc, {{@in, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x200000000000}, 0x0, 0x0, 0x1}}, 0xb8}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x8, 0x4) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) 250.850978ms ago: executing program 1 (id=720): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000002c0), r0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000200)={0x0, 0x500, &(0x7f0000000040)={&(0x7f0000000840)={0x50, r1, 0x1, 0x3, 0x0, {}, [@NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x5}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x1}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}]}, 0x50}, 0x1, 0x0, 0x0, 0xc082}, 0x20004080) 201.42237ms ago: executing program 5 (id=721): socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) mknod$loop(&(0x7f0000000180)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x2) r1 = dup2(r0, r0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x40, 0xe, 0x1, 0x5, 0x10}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$BLKTRACESTOP(r1, 0x1275, 0x0) 201.15079ms ago: executing program 2 (id=722): r0 = socket$inet6(0xa, 0x2, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) setsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f0000000000)={@mcast2}, 0x14) 201.06787ms ago: executing program 5 (id=723): r0 = socket$nl_generic(0x10, 0x3, 0x10) getgroups(0x2, &(0x7f00000004c0)=[0xee01, 0xee01]) fchown(r0, 0x0, r1) 193.061291ms ago: executing program 1 (id=724): r0 = syz_open_dev$evdev(&(0x7f00000000c0), 0xffffffffffffffc0, 0x141800) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f00000001c0)=""/161) 161.659642ms ago: executing program 5 (id=725): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80782, 0x0) ioctl$TIOCSPTLCK(r0, 0x40045431, &(0x7f0000000000)) r1 = ioctl$TIOCGPTPEER(r0, 0x5441, 0x80000000000006) setreuid(0x0, 0xee00) ioctl$TIOCCONS(r1, 0x541d) 161.450213ms ago: executing program 2 (id=726): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000011c0)=@allocspi={0x110, 0x16, 0x401, 0x70bd25, 0xfffffffe, {{{@in=@multicast2, @in=@multicast2, 0x4, 0x0, 0x4e20, 0x0, 0x0, 0x80, 0x20, 0x0, 0x0, 0xffffffffffffffff}, {@in6=@dev={0xfe, 0x80, '\x00', 0x10}, 0x4d7, 0x33}, @in6=@private1, {0x4, 0xfffffffffffffffe, 0x5, 0x0, 0x3, 0x0, 0x0, 0x2}, {0x4, 0x0, 0x0, 0x2}, {0x10000000, 0xfffffffd, 0x3}, 0xfffffffe, 0x0, 0xa, 0x0, 0x0, 0x90}, 0xc, 0xfffffffd}, [@sec_ctx={0xc, 0x8, {0x8, 0x8, 0x0, 0x5}}, @lastused={0xc, 0xf, 0x5}]}, 0x110}, 0x1, 0x0, 0x0, 0x24000040}, 0x0) 101.327295ms ago: executing program 1 (id=727): r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0xe22}, 0x1c) connect$inet6(r0, &(0x7f0000000600)={0x2, 0x4e23, 0x0, @private0, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e24, 0x8d3, @ipv4={'\x00', '\xff\xff', @local}, 0x107da6}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b45602117fffffff81004e230e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac710aa7d0000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) 101.039816ms ago: executing program 4 (id=728): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f0000000180), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r1, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, 0x0}) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000040)='/selinux/policy\x00', 0x0, 0xffffffffffffffff) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0xfd44) 100.882905ms ago: executing program 5 (id=729): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000005d40), r0) sendmsg$IEEE802154_ASSOCIATE_REQ(r0, &(0x7f0000005e00)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)={0x1c, r1, 0x1, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_CHANNEL={0x5, 0x7, 0xd}]}, 0x1c}, 0x1, 0x0, 0x0, 0x240148c4}, 0x0) 100.786425ms ago: executing program 1 (id=730): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, 0x0, &(0x7f0000000340)) 100.634605ms ago: executing program 2 (id=731): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000280)={0x4, 0x0, 0xb51b, 0x10}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)={0x14, 0x12, 0xa01, 0x4, 0x0, {0x80}}, 0x14}}, 0x24000010) 0s ago: executing program 1 (id=732): r0 = socket(0x1e, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2e, &(0x7f0000000040)=0x3, 0x4) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000380)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.47' (ED25519) to the list of known hosts. [ 26.255247][ T36] audit: type=1400 audit(1774535056.790:64): avc: denied { mounton } for pid=282 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.256483][ T282] cgroup: Unknown subsys name 'net' [ 26.280160][ T36] audit: type=1400 audit(1774535056.790:65): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.309568][ T36] audit: type=1400 audit(1774535056.820:66): avc: denied { unmount } for pid=282 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.309727][ T282] cgroup: Unknown subsys name 'devices' [ 26.479256][ T282] cgroup: Unknown subsys name 'hugetlb' [ 26.485579][ T282] cgroup: Unknown subsys name 'rlimit' [ 26.578348][ T36] audit: type=1400 audit(1774535057.120:67): avc: denied { setattr } for pid=282 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=190 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.603460][ T36] audit: type=1400 audit(1774535057.120:68): avc: denied { mounton } for pid=282 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 26.630316][ T36] audit: type=1400 audit(1774535057.120:69): avc: denied { mount } for pid=282 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 26.640419][ T284] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 26.666107][ T36] audit: type=1400 audit(1774535057.200:70): avc: denied { relabelto } for pid=284 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.694609][ T36] audit: type=1400 audit(1774535057.200:71): avc: denied { write } for pid=284 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.756620][ T36] audit: type=1400 audit(1774535057.290:72): avc: denied { read } for pid=282 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.783306][ T36] audit: type=1400 audit(1774535057.290:73): avc: denied { open } for pid=282 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 26.783564][ T282] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.171808][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.179256][ T289] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.186675][ T289] bridge_slave_0: entered allmulticast mode [ 28.193254][ T289] bridge_slave_0: entered promiscuous mode [ 28.200280][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.208108][ T289] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.216367][ T289] bridge_slave_1: entered allmulticast mode [ 28.222975][ T289] bridge_slave_1: entered promiscuous mode [ 28.276390][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.284148][ T291] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.291471][ T291] bridge_slave_0: entered allmulticast mode [ 28.298510][ T291] bridge_slave_0: entered promiscuous mode [ 28.305439][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.313431][ T291] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.321788][ T291] bridge_slave_1: entered allmulticast mode [ 28.328549][ T291] bridge_slave_1: entered promiscuous mode [ 28.425869][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.433764][ T292] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.441579][ T292] bridge_slave_0: entered allmulticast mode [ 28.448499][ T292] bridge_slave_0: entered promiscuous mode [ 28.468760][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.476366][ T292] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.483698][ T292] bridge_slave_1: entered allmulticast mode [ 28.490541][ T292] bridge_slave_1: entered promiscuous mode [ 28.508899][ T290] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.517157][ T290] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.524805][ T290] bridge_slave_0: entered allmulticast mode [ 28.531636][ T290] bridge_slave_0: entered promiscuous mode [ 28.538687][ T290] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.546282][ T290] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.553929][ T290] bridge_slave_1: entered allmulticast mode [ 28.560491][ T290] bridge_slave_1: entered promiscuous mode [ 28.628336][ T291] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.636462][ T291] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.645094][ T291] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.652857][ T291] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.664834][ T289] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.672560][ T289] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.680344][ T289] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.688142][ T289] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.752556][ T292] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.760012][ T292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.768046][ T292] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.775380][ T292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.813456][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.821765][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.830704][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.838556][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.847029][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.855600][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.867214][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.874985][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.890712][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.898532][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.907669][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.915260][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.923295][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.931016][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 28.960141][ T13] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.967992][ T13] bridge0: port 1(bridge_slave_0) entered forwarding state [ 28.976537][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.984059][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.038495][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 29.045900][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 29.060593][ T291] veth0_vlan: entered promiscuous mode [ 29.069747][ T13] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.077358][ T13] bridge0: port 2(bridge_slave_1) entered forwarding state [ 29.092203][ T292] veth0_vlan: entered promiscuous mode [ 29.118736][ T289] veth0_vlan: entered promiscuous mode [ 29.125866][ T292] veth1_macvtap: entered promiscuous mode [ 29.144960][ T291] veth1_macvtap: entered promiscuous mode [ 29.158693][ T290] veth0_vlan: entered promiscuous mode [ 29.174400][ T289] veth1_macvtap: entered promiscuous mode [ 29.204635][ T290] veth1_macvtap: entered promiscuous mode [ 29.245746][ T292] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 29.936966][ T9] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 30.026182][ T371] Zero length message leads to an empty skb [ 30.072656][ T375] netlink: 8 bytes leftover after parsing attributes in process `syz.2.26'. [ 30.098110][ T9] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 30.139103][ T9] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 30.157477][ T9] usb 1-1: New USB device found, idVendor=054c, idProduct=0df2, bcdDevice=d6.af [ 30.167335][ T9] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 30.181671][ T9] usb 1-1: config 0 descriptor?? [ 30.402900][ T399] can: request_module (can-proto-6) failed. [ 30.591789][ T9] playstation 0003:054C:0DF2.0001: unknown main item tag 0x0 [ 30.604767][ T9] playstation 0003:054C:0DF2.0001: unknown main item tag 0x0 [ 30.615853][ T9] playstation 0003:054C:0DF2.0001: unknown main item tag 0x0 [ 30.646927][ T9] playstation 0003:054C:0DF2.0001: unknown main item tag 0x0 [ 30.663957][ T9] playstation 0003:054C:0DF2.0001: unknown main item tag 0x0 [ 30.699847][ T9] playstation 0003:054C:0DF2.0001: hidraw0: USB HID v1.01 Device [HID 054c:0df2] on usb-dummy_hcd.0-1/input0 [ 30.786175][ T436] netlink: 84 bytes leftover after parsing attributes in process `syz.2.55'. [ 31.015412][ T458] capability: warning: `syz.2.65' uses deprecated v2 capabilities in a way that may be insecure [ 31.328078][ T36] kauditd_printk_skb: 69 callbacks suppressed [ 31.328099][ T36] audit: type=1400 audit(1774535061.870:143): avc: denied { nlmsg_read } for pid=480 comm="syz.2.76" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 31.432102][ T36] audit: type=1400 audit(1774535061.930:144): avc: denied { write } for pid=483 comm="syz.3.77" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 31.469835][ T36] audit: type=1400 audit(1774535061.940:145): avc: denied { read } for pid=485 comm="syz.2.78" name="snapshot" dev="devtmpfs" ino=21 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 31.494538][ T36] audit: type=1400 audit(1774535061.940:146): avc: denied { open } for pid=485 comm="syz.2.78" path="/dev/snapshot" dev="devtmpfs" ino=21 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 31.525207][ T9] playstation 0003:054C:0DF2.0001: Failed to retrieve feature with reportID 5: -71 [ 31.530891][ T36] audit: type=1400 audit(1774535062.010:147): avc: denied { read } for pid=490 comm="syz.3.80" dev="nsfs" ino=4026532550 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.555505][ T9] playstation 0003:054C:0DF2.0001: Failed to retrieve DualSense calibration info: -71 [ 31.558499][ T36] audit: type=1400 audit(1774535062.010:148): avc: denied { open } for pid=490 comm="syz.3.80" path="net:[4026532550]" dev="nsfs" ino=4026532550 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 31.587040][ T9] playstation 0003:054C:0DF2.0001: Failed to get calibration data from DualSense [ 31.595606][ T36] audit: type=1400 audit(1774535062.010:149): avc: denied { bind } for pid=490 comm="syz.3.80" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 31.623645][ T9] playstation 0003:054C:0DF2.0001: Failed to create dualsense. [ 31.625261][ T36] audit: type=1400 audit(1774535062.020:150): avc: denied { ioctl } for pid=490 comm="syz.3.80" path="socket:[3892]" dev="sockfs" ino=3892 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 31.643228][ T9] playstation 0003:054C:0DF2.0001: probe with driver playstation failed with error -71 [ 31.660471][ T36] audit: type=1400 audit(1774535062.140:151): avc: denied { read } for pid=492 comm="syz.2.81" name="rtc0" dev="devtmpfs" ino=195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 31.696699][ T36] audit: type=1400 audit(1774535062.140:152): avc: denied { open } for pid=492 comm="syz.2.81" path="/dev/rtc0" dev="devtmpfs" ino=195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 31.751894][ T9] usb 1-1: USB disconnect, device number 2 [ 32.168795][ T515] SELinux: failed to load policy [ 32.182555][ T333] usb usb1: usbfs: interface 0 claimed by hub while 'syz.1.11' sets config #1 [ 32.944865][ T562] SELinux: failed to load policy [ 34.509100][ T641] netlink: 536 bytes leftover after parsing attributes in process `syz.0.148'. [ 34.601419][ T646] syz.0.150 uses obsolete (PF_INET,SOCK_PACKET) [ 34.848657][ T667] capability: warning: `syz.1.159' uses 32-bit capabilities (legacy support in use) [ 35.203496][ T705] tmpfs: Unsupported parameter 'mpol' [ 35.361850][ T718] usb usb7: usbfs: process 718 (syz.0.184) did not claim interface 0 before use [ 35.766376][ T738] netlink: 4 bytes leftover after parsing attributes in process `syz.0.194'. [ 35.900580][ T748] random: crng reseeded on system resumption [ 35.923178][ T750] SELinux: policydb string length 0 does not match expected length 8 [ 35.946974][ T750] SELinux: failed to load policy [ 35.948788][ T748] Unrecognized hibernate image header format! [ 35.960173][ T748] PM: hibernation: Image mismatch: architecture specific data [ 36.197922][ T781] ======================================================= [ 36.197922][ T781] WARNING: The mand mount option has been deprecated and [ 36.197922][ T781] and is ignored by this kernel. Remove the mand [ 36.197922][ T781] option from the mount to silence this warning. [ 36.197922][ T781] ======================================================= [ 36.442542][ T36] kauditd_printk_skb: 58 callbacks suppressed [ 36.442562][ T36] audit: type=1400 audit(1774535066.980:211): avc: denied { create } for pid=794 comm="syz.1.221" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=iucv_socket permissive=1 [ 36.496476][ T801] mmap: syz.1.224 (801) uses deprecated remap_file_pages() syscall. See Documentation/mm/remap_file_pages.rst. [ 36.525683][ T36] audit: type=1400 audit(1774535067.060:212): avc: denied { create } for pid=802 comm="syz.2.225" name="file7" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 36.575637][ T36] audit: type=1400 audit(1774535067.110:213): avc: denied { unlink } for pid=291 comm="syz-executor" name="file7" dev="tmpfs" ino=493 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 36.655244][ T36] audit: type=1400 audit(1774535067.180:214): avc: denied { nlmsg_write } for pid=810 comm="syz.1.230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 36.688694][ T36] audit: type=1326 audit(1774535067.200:215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=812 comm="syz.1.231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb37359c799 code=0x7ffc0000 [ 36.725624][ T36] audit: type=1326 audit(1774535067.200:216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=812 comm="syz.1.231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=155 compat=0 ip=0x7fb37359c799 code=0x7ffc0000 [ 36.756059][ T36] audit: type=1326 audit(1774535067.200:217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=812 comm="syz.1.231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb37359c799 code=0x7ffc0000 [ 36.769083][ T821] SELinux: failed to load policy [ 36.782071][ T36] audit: type=1326 audit(1774535067.200:218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=812 comm="syz.1.231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb37359c799 code=0x7ffc0000 [ 36.811695][ T36] audit: type=1400 audit(1774535067.220:219): avc: denied { watch watch_reads } for pid=815 comm="syz.1.232" path="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=dir permissive=1 [ 36.904265][ T36] audit: type=1400 audit(1774535067.440:220): avc: denied { read } for pid=828 comm="syz.1.239" name="binder0" dev="binder" ino=13 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 37.242087][ T871] netlink: 'syz.2.259': attribute type 32 has an invalid length. [ 37.785303][ T916] can: request_module (can-proto-6) failed. [ 39.507979][ T1009] netlink: 256 bytes leftover after parsing attributes in process `syz.1.325'. [ 39.614981][ T1025] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 39.652232][ T1028] netlink: 40 bytes leftover after parsing attributes in process `syz.0.334'. [ 41.555618][ T36] kauditd_printk_skb: 31 callbacks suppressed [ 41.555638][ T36] audit: type=1400 audit(1774535072.090:252): avc: denied { append } for pid=1219 comm="syz.0.421" name="rtc0" dev="devtmpfs" ino=195 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 41.757584][ T36] audit: type=1400 audit(1774535072.300:253): avc: denied { execute } for pid=1236 comm="syz.2.430" path="/161/file1" dev="tmpfs" ino=833 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 41.835102][ T36] audit: type=1400 audit(1774535072.360:254): avc: denied { bind } for pid=1246 comm="syz.0.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 41.870435][ T1249] can: request_module (can-proto-6) failed. [ 41.956976][ T36] audit: type=1400 audit(1774535072.360:255): avc: denied { setopt } for pid=1246 comm="syz.0.434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 42.134523][ T1261] netlink: 32 bytes leftover after parsing attributes in process `syz.2.440'. [ 42.176381][ T1261] tipc: Invalid UDP bearer configuration [ 42.176413][ T1261] tipc: Enabling of bearer rejected, failed to enable media [ 42.428077][ T36] audit: type=1400 audit(1774535072.970:256): avc: denied { create } for pid=1280 comm="syz.1.449" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_connector_socket permissive=1 [ 42.455245][ T36] audit: type=1400 audit(1774535072.990:257): avc: denied { write } for pid=1282 comm="syz.2.450" name="urandom" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:urandom_device_t tclass=chr_file permissive=1 [ 42.506946][ T31] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 42.546960][ T1289] usb usb8: usbfs: process 1289 (syz.2.453) did not claim interface 0 before use [ 42.638609][ T31] usb 1-1: device descriptor read/64, error -71 [ 42.876923][ T31] usb 1-1: device descriptor read/64, error -71 [ 43.116955][ T31] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 43.247835][ T31] usb 1-1: device descriptor read/64, error -71 [ 43.497298][ T31] usb 1-1: device descriptor read/64, error -71 [ 43.557958][ T36] audit: type=1400 audit(1774535074.100:258): avc: denied { write } for pid=1306 comm="syz.2.461" name="event2" dev="devtmpfs" ino=208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 43.636780][ T31] usb usb1-port1: attempt power cycle [ 43.691832][ T1317] netlink: 220 bytes leftover after parsing attributes in process `syz.2.465'. [ 43.701335][ T1317] netlink: 44 bytes leftover after parsing attributes in process `syz.2.465'. [ 43.711556][ T1317] netlink: 48 bytes leftover after parsing attributes in process `syz.2.465'. [ 43.721780][ T1316] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 43.722236][ T1317] tipc: MTU too low for tipc bearer [ 43.986967][ T31] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 44.011368][ T31] usb 1-1: device descriptor read/8, error -71 [ 44.058092][ T36] audit: type=1400 audit(1774535074.600:259): avc: denied { create } for pid=1347 comm="syz.1.480" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 44.095473][ T36] audit: type=1400 audit(1774535074.630:260): avc: denied { connect } for pid=1349 comm="syz.2.481" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 44.152580][ T31] usb 1-1: device descriptor read/8, error -71 [ 44.406905][ T31] usb 1-1: new high-speed USB device number 6 using dummy_hcd [ 44.427948][ T31] usb 1-1: device descriptor read/8, error -71 [ 44.568514][ T31] usb 1-1: device descriptor read/8, error -71 [ 44.697925][ T31] usb usb1-port1: unable to enumerate USB device [ 45.058072][ T1376] can: request_module (can-proto-6) failed. [ 45.306877][ T36] audit: type=1400 audit(1774535075.830:261): avc: denied { setopt } for pid=1384 comm="syz.1.499" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 45.474440][ T1397] SELinux: failed to load policy [ 45.910034][ T1417] usb usb1: usbfs: interface 0 claimed by hub while 'syz.1.512' sets config #5 [ 46.386920][ T31] usb 1-1: new high-speed USB device number 7 using dummy_hcd [ 46.527058][ T31] usb 1-1: device descriptor read/64, error -71 [ 46.766894][ T31] usb 1-1: device descriptor read/64, error -71 [ 47.006906][ T31] usb 1-1: new high-speed USB device number 8 using dummy_hcd [ 47.071539][ T1462] loop5: detected capacity change from 0 to 7 [ 47.079709][ C0] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 47.089190][ C0] Buffer I/O error on dev loop5, logical block 0, async page read [ 47.106863][ C0] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 47.116352][ C0] Buffer I/O error on dev loop5, logical block 0, async page read [ 47.124837][ T1462] loop5: unable to read partition table [ 47.132094][ T1462] loop_reread_partitions: partition scan of loop5 (Wý* %4FLQk݊5) failed (rc=-5) [ 47.144524][ C0] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 47.146977][ T31] usb 1-1: device descriptor read/64, error -71 [ 47.154720][ C0] Buffer I/O error on dev loop5, logical block 0, async page read [ 47.172842][ C0] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 47.186868][ C0] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 47.196302][ C0] Buffer I/O error on dev loop5, logical block 0, async page read [ 47.204760][ C0] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 47.215015][ C0] Buffer I/O error on dev loop5, logical block 0, async page read [ 47.226864][ C0] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 47.237360][ C0] Buffer I/O error on dev loop5, logical block 0, async page read [ 47.256868][ C0] I/O error, dev loop5, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 47.266639][ C0] Buffer I/O error on dev loop5, logical block 0, async page read [ 47.426901][ T31] usb 1-1: device descriptor read/64, error -71 [ 47.500453][ T1476] netlink: 76 bytes leftover after parsing attributes in process `syz.2.539'. [ 47.551036][ T31] usb usb1-port1: attempt power cycle [ 47.592683][ T36] kauditd_printk_skb: 5 callbacks suppressed [ 47.592745][ T36] audit: type=1400 audit(1774535078.130:267): avc: denied { setopt } for pid=1481 comm="syz.2.542" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 47.621705][ T36] audit: type=1400 audit(1774535078.140:268): avc: denied { mounton } for pid=1483 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 47.653796][ T306] bridge_slave_1: left allmulticast mode [ 47.661755][ T306] bridge_slave_1: left promiscuous mode [ 47.667988][ T306] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.676247][ T306] bridge_slave_0: left allmulticast mode [ 47.682654][ T306] bridge_slave_0: left promiscuous mode [ 47.688864][ T306] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.752220][ T1483] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.759541][ T1483] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.767327][ T1483] bridge_slave_0: entered allmulticast mode [ 47.774138][ T1483] bridge_slave_0: entered promiscuous mode [ 47.781099][ T1483] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.789084][ T1483] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.796991][ T1483] bridge_slave_1: entered allmulticast mode [ 47.803931][ T1483] bridge_slave_1: entered promiscuous mode [ 47.820559][ T306] veth1_macvtap: left promiscuous mode [ 47.826592][ T306] veth0_vlan: left promiscuous mode [ 47.901662][ T1483] bridge0: port 2(bridge_slave_1) entered blocking state [ 47.909232][ T1483] bridge0: port 2(bridge_slave_1) entered forwarding state [ 47.917460][ T1483] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.924652][ T1483] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.933221][ T31] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 47.951982][ T46] bridge0: port 1(bridge_slave_0) entered disabled state [ 47.960981][ T46] bridge0: port 2(bridge_slave_1) entered disabled state [ 47.969419][ T31] usb 1-1: device descriptor read/8, error -71 [ 47.976358][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 47.984389][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 47.992947][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 48.000244][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 48.026473][ T1483] veth0_vlan: entered promiscuous mode [ 48.039583][ T1483] veth1_macvtap: entered promiscuous mode [ 48.060159][ T36] audit: type=1400 audit(1774535078.600:269): avc: denied { mounton } for pid=1483 comm="syz-executor" path="/root/syzkaller.Y8lRli/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 48.090145][ T36] audit: type=1400 audit(1774535078.600:270): avc: denied { unmount } for pid=1483 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 48.113056][ T31] usb 1-1: device descriptor read/8, error -71 [ 48.143822][ T36] audit: type=1400 audit(1774535078.680:271): avc: denied { setopt } for pid=1489 comm="syz.4.543" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 48.348932][ T1509] tmpfs: Bad value for 'nr_inodes' [ 48.356963][ T31] usb 1-1: new high-speed USB device number 10 using dummy_hcd [ 48.374488][ T36] audit: type=1400 audit(1774535078.910:272): avc: denied { connect } for pid=1510 comm="syz.1.553" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 48.378178][ T31] usb 1-1: device descriptor read/8, error -71 [ 48.399279][ T36] audit: type=1400 audit(1774535078.940:273): avc: denied { read } for pid=1510 comm="syz.1.553" path="socket:[6948]" dev="sockfs" ino=6948 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 48.530988][ T31] usb 1-1: device descriptor read/8, error -71 [ 48.598045][ T36] audit: type=1400 audit(1774535079.130:274): avc: denied { map } for pid=1554 comm="syz.2.567" path="socket:[7971]" dev="sockfs" ino=7971 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 48.626655][ T36] audit: type=1400 audit(1774535079.130:275): avc: denied { read } for pid=1554 comm="syz.2.567" path="socket:[7971]" dev="sockfs" ino=7971 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 48.657069][ T31] usb usb1-port1: unable to enumerate USB device [ 48.678017][ T36] audit: type=1400 audit(1774535079.140:276): avc: denied { map } for pid=1554 comm="syz.2.567" path="socket:[7010]" dev="sockfs" ino=7010 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=udp_socket permissive=1 [ 48.796968][ T9] usb 1-1: new high-speed USB device number 11 using dummy_hcd [ 48.936950][ T9] usb 1-1: device descriptor read/64, error -71 [ 48.960468][ T1609] process 'syz.0.589' launched '/dev/fd/3' with NULL argv: empty string added [ 49.217746][ T1649] syzkaller1: entered promiscuous mode [ 49.223932][ T1649] syzkaller1: entered allmulticast mode [ 49.981498][ T1688] netlink: 'syz.2.629': attribute type 32 has an invalid length. [ 49.990855][ T1688] netlink: 28 bytes leftover after parsing attributes in process `syz.2.629'. [ 50.501475][ T13] bridge_slave_1: left allmulticast mode [ 50.534506][ T13] bridge_slave_1: left promiscuous mode [ 50.551023][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 50.579486][ T13] bridge_slave_0: left allmulticast mode [ 50.600398][ T13] bridge_slave_0: left promiscuous mode [ 50.620491][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 50.772547][ T13] veth1_macvtap: left promiscuous mode [ 50.791038][ T13] veth0_vlan: left promiscuous mode [ 51.211476][ T1730] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.219668][ T1730] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.228775][ T1730] bridge_slave_0: entered allmulticast mode [ 51.236265][ T1730] bridge_slave_0: entered promiscuous mode [ 51.245744][ T1730] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.253340][ T1730] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.261589][ T1730] bridge_slave_1: entered allmulticast mode [ 51.269641][ T1730] bridge_slave_1: entered promiscuous mode [ 51.371403][ T363] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 51.380612][ T363] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz0 [ 51.390505][ T1730] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.398000][ T1730] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.406356][ T1730] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.414105][ T1730] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.441820][ T1785] netlink: 2 bytes leftover after parsing attributes in process `syz.1.674'. [ 51.479055][ T1787] deleting an unspecified loop device is not supported. [ 51.505838][ T12] bridge0: port 1(bridge_slave_0) entered disabled state [ 51.527231][ T12] bridge0: port 2(bridge_slave_1) entered disabled state [ 51.548151][ T46] bridge0: port 1(bridge_slave_0) entered blocking state [ 51.555638][ T46] bridge0: port 1(bridge_slave_0) entered forwarding state [ 51.563892][ T46] bridge0: port 2(bridge_slave_1) entered blocking state [ 51.572040][ T46] bridge0: port 2(bridge_slave_1) entered forwarding state [ 51.605217][ T1799] SELinux: failed to load policy [ 51.617387][ T1789] syzkaller0: entered promiscuous mode [ 51.627409][ T1789] syzkaller0: entered allmulticast mode [ 51.675801][ T1730] veth0_vlan: entered promiscuous mode [ 51.719450][ T1730] veth1_macvtap: entered promiscuous mode [ 52.110913][ T1827] tipc: Started in network mode [ 52.116126][ T1827] tipc: Node identity 4, cluster identity 4711 [ 52.123402][ T1827] tipc: Node number set to 4 [ 52.130125][ T306] tipc: Subscription rejected, illegal request [ 52.588979][ T1870] SELinux: Context system_u:object_r:fsa is not valid (left unmapped). [ 52.621549][ T36] kauditd_printk_skb: 13 callbacks suppressed [ 52.621568][ T36] audit: type=1400 audit(1774535083.160:290): avc: denied { relabelto } for pid=1869 comm="syz.1.713" name="223" dev="tmpfs" ino=1141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsa" [ 52.672360][ T36] audit: type=1400 audit(1774535083.180:291): avc: denied { associate } for pid=1869 comm="syz.1.713" name="223" dev="tmpfs" ino=1141 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:fsa" [ 52.709952][ T36] audit: type=1400 audit(1774535083.200:292): avc: denied { write } for pid=1869 comm="syz.1.713" name="223" dev="tmpfs" ino=1141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsa" [ 52.765487][ T36] audit: type=1400 audit(1774535083.200:293): avc: denied { add_name } for pid=1869 comm="syz.1.713" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsa" [ 52.855798][ T36] audit: type=1400 audit(1774535083.200:294): avc: denied { create } for pid=1869 comm="syz.1.713" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 52.867980][ T1901] ------------[ cut here ]------------ [ 52.879245][ T36] audit: type=1400 audit(1774535083.200:295): avc: denied { associate } for pid=1869 comm="syz.1.713" name="file0" scontext=root:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 52.884115][ T1901] WARNING: CPU: 0 PID: 1901 at mm/page_alloc.c:5268 __alloc_pages_noprof+0x109/0x7e0 [ 52.906980][ T36] audit: type=1400 audit(1774535083.240:296): avc: denied { remove_name } for pid=290 comm="syz-executor" name="file0" dev="tmpfs" ino=1146 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsa" [ 52.916953][ T1901] Modules linked in: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 52.916973][ T1901] CPU: 0 UID: 0 PID: 1901 Comm: syz.4.728 Not tainted syzkaller #0 e5e4876e63e0994bd4350cd5f958f668e2098f7e [ 52.917003][ T1901] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 52.917016][ T1901] RIP: 0010:__alloc_pages_noprof+0x109/0x7e0 [ 52.978047][ T1901] Code: 00 0f 1f 44 00 00 83 fb 0b 72 28 b8 00 20 00 00 23 44 24 40 75 1d 80 3d 0a 7f 0b 06 00 0f 85 c2 00 00 00 c6 05 fd 7e 0b 06 01 <0f> 0b 31 c0 e9 b4 00 00 00 83 fb 0a 0f 87 a9 00 00 00 44 8b 64 24 [ 52.998748][ T1901] RSP: 0018:ffffc9000c967640 EFLAGS: 00010246 [ 53.005286][ T1901] RAX: 0000000000000000 RBX: 0000000000000016 RCX: 0000000000000000 [ 53.014346][ T1901] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffc9000c9676f8 [ 53.023304][ T1901] RBP: ffffc9000c967780 R08: ffffc9000c9676f7 R09: 0000000000000000 [ 53.028920][ T36] audit: type=1400 audit(1774535083.240:297): avc: denied { rmdir } for pid=290 comm="syz-executor" name="file0" dev="tmpfs" ino=1146 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:unlabeled_t tclass=dir permissive=1 [ 53.034228][ T1901] R10: ffffc9000c9676e0 R11: fffff5200192cedf R12: ffffc9000c967680 [ 53.067456][ T1901] R13: dffffc0000000000 R14: 1ffff9200192cecc R15: 0000000000000000 [ 53.076319][ T1901] FS: 00007f1ecc9986c0(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 53.079383][ T36] audit: type=1400 audit(1774535083.240:298): avc: denied { rmdir } for pid=290 comm="syz-executor" name="223" dev="tmpfs" ino=1141 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fsa" [ 53.085994][ T1901] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 53.121184][ T1901] CR2: 000020000000f000 CR3: 000000010c6f8000 CR4: 00000000003526b0 [ 53.129706][ T1901] Call Trace: [ 53.133388][ T1901] [ 53.137017][ T1901] ? __cfi___alloc_pages_noprof+0x10/0x10 [ 53.143672][ T1901] ? __kasan_slab_alloc+0x73/0x90 [ 53.149223][ T1901] ? kmem_cache_alloc_noprof+0x1e2/0x410 [ 53.155073][ T1901] ? hashtab_init+0xdb/0x1f0 [ 53.159977][ T36] audit: type=1400 audit(1774535083.280:299): avc: denied { write } for pid=1886 comm="syz.5.721" name="file0" dev="tmpfs" ino=123 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 53.159998][ T1901] ___kmalloc_large_node+0x81/0x210 [ 53.190611][ T1901] ? hashtab_init+0xdb/0x1f0 [ 53.195774][ T1901] __kmalloc_large_node_noprof+0x1e/0xd0 [ 53.202365][ T1901] ? hashtab_init+0xdb/0x1f0 [ 53.207737][ T1901] __kmalloc_noprof+0x326/0x500 [ 53.213802][ T1901] ? __cfi_ebitmap_read+0x10/0x10 [ 53.220097][ T1901] hashtab_init+0xdb/0x1f0 [ 53.225953][ T1901] ? policydb_read+0x87f/0x28b0 [ 53.231416][ T1901] symtab_init+0x44/0x70 [ 53.236067][ T1901] policydb_read+0x90e/0x28b0 [ 53.240941][ T1901] ? __kasan_kmalloc+0x96/0xb0 [ 53.246303][ T1901] ? __cfi_policydb_read+0x10/0x10 [ 53.252049][ T1901] ? security_load_policy+0x130/0x12d0 [ 53.258062][ T1901] security_load_policy+0x16a/0x12d0 [ 53.263484][ T1901] ? irqentry_exit+0x4a/0x60 [ 53.268325][ T1901] ? asm_exc_page_fault+0x2b/0x30 [ 53.273733][ T1901] ? __cfi_security_load_policy+0x10/0x10 [ 53.280310][ T1901] ? rep_movs_alternative+0x4a/0xa0 [ 53.285794][ T1901] sel_write_load+0x2a7/0x5f0 [ 53.290877][ T1901] ? __cfi_sel_write_load+0x10/0x10 [ 53.296560][ T1901] ? bpf_lsm_file_permission+0xd/0x20 [ 53.302500][ T1901] ? __cfi_sel_write_load+0x10/0x10 [ 53.308148][ T1901] vfs_write+0x3c5/0xf90 [ 53.312716][ T1901] ? __cfi_vfs_write+0x10/0x10 [ 53.317709][ T1901] ? __kasan_check_write+0x18/0x20 [ 53.323123][ T1901] ? mutex_lock+0x97/0x1d0 [ 53.327876][ T1901] ? __cfi_mutex_lock+0x10/0x10 [ 53.333248][ T1901] ? __fget_files+0x2c5/0x340 [ 53.338292][ T1901] ksys_write+0x145/0x260 [ 53.342954][ T1901] ? xfd_validate_state+0x68/0x140 [ 53.348463][ T1901] ? __cfi_ksys_write+0x10/0x10 [ 53.354005][ T1901] ? __kasan_check_write+0x18/0x20 [ 53.359849][ T1901] ? fpregs_restore_userregs+0x11c/0x260 [ 53.365943][ T1901] __x64_sys_write+0x7f/0x90 [ 53.371394][ T1901] x64_sys_call+0x271c/0x2ee0 [ 53.377202][ T1901] do_syscall_64+0x57/0xf0 [ 53.381995][ T1901] ? clear_bhb_loop+0x50/0xa0 [ 53.386903][ T1901] entry_SYSCALL_64_after_hwframe+0x76/0x7e [ 53.393455][ T1901] RIP: 0033:0x7f1ecbb9c799 [ 53.398230][ T1901] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 53.421192][ T1901] RSP: 002b:00007f1ecc998028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 53.430287][ T1901] RAX: ffffffffffffffda RBX: 00007f1ecbe15fa0 RCX: 00007f1ecbb9c799 [ 53.439984][ T1901] RDX: 000000000000fd44 RSI: 0000200000000000 RDI: 0000000000000003 [ 53.449347][ T1901] RBP: 00007f1ecbc32c99 R08: 0000000000000000 R09: 0000000000000000 [ 53.458863][ T1901] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 53.468833][ T1901] R13: 00007f1ecbe16038 R14: 00007f1ecbe15fa0 R15: 00007ffeeefa3528 [ 53.477091][ T1901] [ 53.480568][ T1901] ---[ end trace 0000000000000000 ]--- [ 53.507937][ T1901] SELinux: failed to load policy [ 53.571444][ T13] bridge_slave_1: left allmulticast mode [ 53.578554][ T13] bridge_slave_1: left promiscuous mode [ 53.584562][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 53.592702][ T13] bridge_slave_0: left allmulticast mode [ 53.599384][ T13] bridge_slave_0: left promiscuous mode [ 53.605912][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 53.738460][ T13] tipc: Left network mode [ 53.743537][ T13] veth1_macvtap: left promiscuous mode [ 53.749891][ T13] veth0_vlan: left promiscuous mode [ 54.019013][ T13] bridge_slave_1: left allmulticast mode [ 54.024748][ T13] bridge_slave_1: left promiscuous mode [ 54.031080][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.040279][ T13] bridge_slave_0: left allmulticast mode [ 54.047054][ T13] bridge_slave_0: left promiscuous mode [ 54.053746][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.062189][ T13] bridge_slave_1: left allmulticast mode [ 54.068783][ T13] bridge_slave_1: left promiscuous mode [ 54.074817][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.083851][ T13] bridge_slave_0: left allmulticast mode [ 54.089936][ T13] bridge_slave_0: left promiscuous mode [ 54.096222][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.299892][ T13] veth1_macvtap: left promiscuous mode [ 54.305789][ T13] veth0_vlan: left promiscuous mode [ 54.311805][ T13] veth1_macvtap: left promiscuous mode [ 54.317990][ T13] veth0_vlan: left promiscuous mode [ 54.739299][ T13] bridge_slave_1: left allmulticast mode [ 54.745251][ T13] bridge_slave_1: left promiscuous mode [ 54.751036][ T13] bridge0: port 2(bridge_slave_1) entered disabled state [ 54.759620][ T13] bridge_slave_0: left allmulticast mode [ 54.765386][ T13] bridge_slave_0: left promiscuous mode [ 54.771553][ T13] bridge0: port 1(bridge_slave_0) entered disabled state [ 54.859241][ T13] veth1_macvtap: left promiscuous mode [ 54.865246][ T13] veth0_vlan: left promiscuous mode