last executing test programs: 4.230869111s ago: executing program 2 (id=67): bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0xb, 0x0, 0x0, &(0x7f0000000c40)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf51c}, 0x94) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x3, [@var={0x1, 0x0, 0x0, 0xe, 0x2, 0x3}]}, {0x0, [0x5f]}}, 0x0, 0x2b, 0x0, 0x5}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r0 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f00000001c0)='pagemap\x00') sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='asymmetPic@\xe6u\x18\x8f\x8d\xd0\xb9\xb4d\x97\xee\x9bY\xb3\xa0dI$(\xed\x98S\xdcB\xdf\x99J\x9c&#m\xd0\xb0\x134m\xa7se\x8fvS\x84:\"-\x94\x84\xbd\xf4X\xf2F6\xe44\x1f\xa7f\x82\xd7aLt@%a\x8a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbf\xb4\xc6m39\x9e)\xa5\xe7\xdb\xdc\xb3\xb6\x1f\x1d5\x13\xde\xab\x86\xf5`S<\xd5\xc7@-X0\xa9\xe4l\xab\xf0}\xf0\xeaco\x85kM\x8aS\x1bZ\xa1\xba\xb4E\xbc', 0x0) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0x0) keyctl$chown(0x4, r4, 0xee01, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) 1.82722771s ago: executing program 4 (id=78): r0 = socket(0x10, 0x3, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeeb, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000080), 0x40002df, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) write(r0, &(0x7f00000000c0)="1800000016005f0214fffffffffffff80700000001000000", 0x18) 1.747656094s ago: executing program 2 (id=79): syz_mount_image$fuse(0x0, 0x0, 0x6088, 0x0, 0x1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeeb, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x1, 0x1, [@remote]}, 0x14) r4 = syz_open_procfs(0x0, &(0x7f0000002180)='net/mcfilter\x00') preadv(r4, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/51, 0x33}, {&(0x7f0000000240)=""/52, 0x34}], 0x2, 0x4, 0xffffff7c) r5 = socket(0x10, 0x2, 0x0) write(r5, &(0x7f0000000200)="1c0000001a009b8a070000003b9b701f400004000000eb3f7a7f1de2", 0x1c) setsockopt$MRT6_ASSERT(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 1.675413397s ago: executing program 1 (id=80): r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x3ff}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) 1.317269245s ago: executing program 3 (id=84): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000340), 0x0}, 0x20) 1.269624347s ago: executing program 3 (id=86): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x2008042, &(0x7f0000000040), 0x1, 0x571, &(0x7f0000000780)="$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") r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) statx(r0, 0x0, 0x0, 0xffff4a9c0080ffff, &(0x7f0000000240)) 1.20965211s ago: executing program 0 (id=89): setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, 0x0, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') r2 = memfd_create(0x0, 0x0) write(r2, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) r3 = dup3(r1, r0, 0x0) fchdir(r3) creat(&(0x7f0000000040)='./bus\x00', 0x0) 1.209142931s ago: executing program 0 (id=90): mount$incfs(&(0x7f00000007c0)='.\x00', &(0x7f0000000800)='./bus\x00', &(0x7f0000000840), 0x1004002, 0x0) chdir(&(0x7f00000001c0)='./bus\x00') mkdirat(0xffffffffffffffff, &(0x7f00000004c0)='./bus/file0\x00', 0x2) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000001080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x1021408, 0x0, 0x1, 0x0, &(0x7f0000006380)) rename(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000180)='./bus/file0\x00') 1.180612852s ago: executing program 0 (id=91): syz_mount_image$exfat(&(0x7f00000000c0), &(0x7f0000000140)='./file2\x00', 0x2014410, &(0x7f0000000180)=ANY=[@ANYRES16=0x0, @ANYRESDEC, @ANYRES64, @ANYBLOB="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", @ANYRES16], 0xfe, 0x1518, &(0x7f00000022c0)="$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") open(&(0x7f0000000140)='./file1\x00', 0x141242, 0x40) 1.125447085s ago: executing program 3 (id=92): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000002000010000000000000000000a80"], 0x30}, 0x1, 0x0, 0x0, 0xc011}, 0x40000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x5c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @private2}]}}}]}, 0x5c}}, 0x0) 1.125029575s ago: executing program 3 (id=93): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000140)}, {&(0x7f0000000000)='n:', 0x2}], 0x2}, 0x0) 1.066591847s ago: executing program 3 (id=94): socket$nl_netfilter(0x10, 0x3, 0xc) fsopen(0x0, 0x0) userfaultfd(0x801) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180), 0x100, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000003, 0x28011, r2, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYRES64, @ANYRESOCT=r2], 0x44}}, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000000080)=""/124, 0xffffff23}], 0x1, 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x20002000, &(0x7f0000000000/0x2000)=nil}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, 0x0}], 0x1, 0x44, 0x0, 0x0) keyctl$join(0x1, &(0x7f0000000100)={'syz', 0x2}) ioctl$KVM_RUN(r3, 0xae80, 0x0) 1.043198439s ago: executing program 0 (id=95): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x3ff}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = mmap$KVM_VCPU(&(0x7f0000ffb000/0x2000)=nil, 0x930, 0x1000002, 0x4018831, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x80001) readv(r2, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/109, 0x6d}], 0x1) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000240)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x1}) syz_memcpy_off$KVM_EXIT_MMIO(r1, 0x20, &(0x7f0000000100)="64be365de974de7ab149b947a8218d12625b0c29c0496e90", 0x0, 0x18) 995.918851ms ago: executing program 0 (id=96): syz_mount_image$fuse(0x0, 0x0, 0x6088, 0x0, 0x1, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeeb, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0x23, 0x0, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000040)={@initdev={0xac, 0x1e, 0x0, 0x0}, @loopback, 0x1, 0x1, [@remote]}, 0x14) r4 = syz_open_procfs(0x0, &(0x7f0000002180)='net/mcfilter\x00') preadv(r4, &(0x7f00000002c0)=[{&(0x7f0000000000)=""/51, 0x33}, {&(0x7f0000000240)=""/52, 0x34}], 0x2, 0x4, 0xffffff7c) r5 = socket(0x10, 0x2, 0x0) write(r5, &(0x7f0000000200)="1c0000001a009b8a070000003b9b701f400004000000eb3f7a7f1de2", 0x1c) setsockopt$MRT6_ASSERT(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 881.962167ms ago: executing program 4 (id=97): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB], 0x50) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r0, &(0x7f0000000340), 0x0}, 0x20) 859.432128ms ago: executing program 2 (id=98): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) 549.488963ms ago: executing program 1 (id=99): r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) r2 = openat$cgroup_int(r0, &(0x7f0000000080)='cpuset.memory_spread_page\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f0000000380)=0x4, 0x12) 498.308265ms ago: executing program 1 (id=100): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000200), 0x28100, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000440)={[0x0, 0x100000000, 0x0, 0x4000081, 0x100000, 0x0, 0x2004c8, 0x8000000, 0x0, 0x0, 0x7, 0x0, 0x7, 0x0, 0x2, 0xffffffffffffffff]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x4, 0x5, 0x6, 0x4004, 0x2, 0x4, 0xefffffffffffffff, 0x400000, 0x0, 0x2000000, 0x0, 0x1d, 0x0, 0xffffffffffffffff, 0x6], 0x0, 0x302000}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 498.066505ms ago: executing program 4 (id=101): setsockopt$XDP_UMEM_REG(0xffffffffffffffff, 0x11b, 0x4, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) bind$xdp(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, 0x0, 0x0) pipe2$9p(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') r2 = memfd_create(0x0, 0x0) write(r2, &(0x7f00000000c0)="6963e64243ea486da3a74e3deec6fc5bb9650b5de56946c568f95d22467190ba406d59a5958d6f156c9c8a2ac4677b00000000000000000000200000f8bf54da33", 0x41) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x0) r3 = dup3(r1, r0, 0x0) fchdir(r3) creat(&(0x7f0000000040)='./bus\x00', 0x0) 497.921015ms ago: executing program 2 (id=102): mount$incfs(&(0x7f00000007c0)='.\x00', &(0x7f0000000800)='./bus\x00', &(0x7f0000000840), 0x1004002, 0x0) chdir(&(0x7f00000001c0)='./bus\x00') mkdirat(0xffffffffffffffff, &(0x7f00000004c0)='./bus/file0\x00', 0x2) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000001080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x1021408, 0x0, 0x1, 0x0, &(0x7f0000006380)) rename(&(0x7f0000000080)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000180)='./bus/file0\x00') 497.622606ms ago: executing program 4 (id=103): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x2008042, &(0x7f0000000040), 0x1, 0x571, &(0x7f0000000780)="$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") r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) statx(r0, 0x0, 0x0, 0xffff4a9c0080ffff, &(0x7f0000000240)) 476.913337ms ago: executing program 1 (id=104): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000002000010000000000000000000a80"], 0x30}, 0x1, 0x0, 0x0, 0xc011}, 0x40000) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000002c0)=@newlink={0x5c, 0x10, 0x439, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x3c, 0x12, 0x0, 0x1, @ipip6={{0xb}, {0x2c, 0x2, 0x0, 0x1, [@IFLA_IPTUN_REMOTE={0x14, 0x3, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @IFLA_IPTUN_LOCAL={0x14, 0x2, @private2}]}}}]}, 0x5c}}, 0x0) 449.771798ms ago: executing program 1 (id=105): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = dup(r0) sendmsg$inet(r1, &(0x7f0000000780)={&(0x7f0000000100)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000140)}, {&(0x7f0000000000)='n:', 0x2}], 0x2}, 0x0) 449.499758ms ago: executing program 2 (id=106): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x3ff}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r1 = mmap$KVM_VCPU(&(0x7f0000ffb000/0x2000)=nil, 0x930, 0x1000002, 0x4018831, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x80001) readv(r2, &(0x7f00000005c0)=[{&(0x7f0000000000)=""/109, 0x6d}], 0x1) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000240)={{&(0x7f0000ffa000/0x3000)=nil, 0x3000}, 0x1}) syz_memcpy_off$KVM_EXIT_MMIO(r1, 0x20, &(0x7f0000000100)="64be365de974de7ab149b947a8218d12625b0c29c0496e90", 0x0, 0x18) 419.07862ms ago: executing program 3 (id=107): socket$netlink(0x10, 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) utimensat(r0, 0x0, 0x0, 0x0) socket(0x400000000010, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(0x0, 0x2, 0x0) r1 = syz_open_dev$MSR(&(0x7f00000001c0), 0x0, 0x0) read$msr(r1, &(0x7f0000019680)=""/102392, 0x18ff8) sched_setaffinity(0x0, 0xfffffef7, &(0x7f0000000740)=0x410000002) dup(0xffffffffffffffff) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000300)={0x3, 0x0, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="020300030f0000002cbd7040fcdbdf2503000900800000001cdc0dca1d9f68846960e56de42944af030006000000000002004e22ac1414bb0000000000000000020001000000000000fffd0705000080030005000000000002004e22ac14140a0000000000000000020013"], 0x78}, 0x1, 0x7}, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000180)='./file1\x00', 0x30040c6, &(0x7f0000000680)={[], [{@smackfsdef={'smackfsdef', 0x3d, 'h\x1fE\xfc\x15?\x8d\xb1B\x8e\xfe#9\x1f\x17Fk\x80\x9b\x9eOu\xdd\xc7\xb4\xb3(\x13\xef\xbc\x931@eT\xe5\xd5)\x1d\xd5\xa2V\xa8\xfc\xb2\xdc,\xe2\xd8\xcb\xb9\xa0\xa2\x01\x02\x86D\x9a\xd9u\x94?\xe5&\xa9\x0e6\rQ\xe2R\x8a\x12\x01\xc0A$\xc3\x1c\xcfr\xb9\xa5\x94\xa4M\xc96r\xc1Y\x90<\f\xcf\xb4\n\x17\x9b\xe2Kt-\xf7\xd6\x87le\x917\x04\xf7\xd9\x89\x9c\x90\'C\x84$=\x984\xc1'}}, {@uid_eq}, {@obj_role={'obj_role', 0x3d, '/dev/loop-\x18\x9ek\xee\xf4\x8b\xa9\xa6'}}]}, 0x12, 0x5b4, &(0x7f0000000e00)="$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") r3 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) fsmount(r3, 0x0, 0x5) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCINQ(r4, 0x541b, &(0x7f0000000400)) 418.75514ms ago: executing program 1 (id=108): r0 = socket(0x10, 0x3, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000240)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeeb, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000080), 0x40002df, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, 0x0, 0x0) write(r0, &(0x7f00000000c0)="1800000016005f0214fffffffffffff80700000001000000", 0x18) 418.56496ms ago: executing program 2 (id=109): r0 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x400000000000284, 0x2, 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000040)={0x0, 0x0, 0x8000, 0x3ff}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) 134.581614ms ago: executing program 4 (id=110): r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1, 0x0) pwrite64(r0, &(0x7f0000000140)='2', 0xfdef, 0xe7c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x143841, 0x114) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f00000003c0)={0x0, 0x2, 0x7fff, 0xffff}) 65.437147ms ago: executing program 0 (id=111): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0), 0x12) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$packet_fanout_data(0xffffffffffffffff, 0x107, 0x16, &(0x7f00000000c0)={0x0, &(0x7f0000000080)}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)=0x4, 0x12) 0s ago: executing program 4 (id=112): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = eventfd2(0xe5c, 0x80000) r3 = eventfd2(0x4001, 0x800) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000080)={r3, 0x8008001, 0x2, r3}) r4 = eventfd2(0x8, 0x80001) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000140)={r4, 0x7, 0x2, r2}) 0s ago: executing program 0 (id=113): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000003c0)=@newtfilter={0x84, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r6, {0xfff5, 0x4}, {}, {0x8, 0x2}}, [@filter_kind_options=@f_matchall={{0xd}, {0x50, 0x2, [@TCA_MATCHALL_ACT={0x4c, 0x2, [@m_gact={0x48, 0x1, 0x0, 0x0, {{0x9}, {0x1c, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x6, 0x7e, 0x1, 0xfffffffc, 0x8}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}]}]}}]}, 0x84}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000000) kernel console output (not intermixed with test programs): syzkaller syzkaller login: [ 9.621199][ T112] udevd (112) used greatest stack depth: 22912 bytes left [ 13.659579][ T30] kauditd_printk_skb: 31 callbacks suppressed [ 13.659594][ T30] audit: type=1400 audit(1774363330.199:59): avc: denied { transition } for pid=222 comm="sshd-session" path="/bin/sh" dev="sda1" ino=90 scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.671625][ T30] audit: type=1400 audit(1774363330.199:60): avc: denied { noatsecure } for pid=222 comm="sshd-session" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.681073][ T30] audit: type=1400 audit(1774363330.209:61): avc: denied { write } for pid=222 comm="sh" path="pipe:[14555]" dev="pipefs" ino=14555 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 13.703574][ T30] audit: type=1400 audit(1774363330.209:62): avc: denied { rlimitinh } for pid=222 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.722713][ T30] audit: type=1400 audit(1774363330.209:63): avc: denied { siginh } for pid=222 comm="sh" scontext=system_u:system_r:sshd_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 14.616842][ T226] sshd-session (226) used greatest stack depth: 21152 bytes left Warning: Permanently added '10.128.1.63' (ED25519) to the list of known hosts. [ 21.021139][ T30] audit: type=1400 audit(1774363337.559:64): avc: denied { mounton } for pid=273 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 21.025034][ T273] cgroup: Unknown subsys name 'net' [ 21.044034][ T30] audit: type=1400 audit(1774363337.569:65): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.071348][ T30] audit: type=1400 audit(1774363337.589:66): avc: denied { unmount } for pid=273 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 21.072731][ T273] cgroup: Unknown subsys name 'devices' [ 21.243923][ T273] cgroup: Unknown subsys name 'hugetlb' [ 21.249652][ T273] cgroup: Unknown subsys name 'rlimit' [ 21.480483][ T30] audit: type=1400 audit(1774363338.019:67): avc: denied { setattr } for pid=273 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.503779][ T30] audit: type=1400 audit(1774363338.019:68): avc: denied { mounton } for pid=273 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 21.528856][ T30] audit: type=1400 audit(1774363338.019:69): avc: denied { mount } for pid=273 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.543673][ T275] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). Setting up swapspace version 1, size = 127995904 bytes [ 21.560959][ T30] audit: type=1400 audit(1774363338.099:70): avc: denied { relabelto } for pid=275 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.586567][ T30] audit: type=1400 audit(1774363338.099:71): avc: denied { write } for pid=275 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.593036][ T273] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.612919][ T30] audit: type=1400 audit(1774363338.129:72): avc: denied { read } for pid=273 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.646920][ T30] audit: type=1400 audit(1774363338.129:73): avc: denied { open } for pid=273 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.363898][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.370986][ T282] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.378627][ T282] device bridge_slave_0 entered promiscuous mode [ 22.387139][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.394383][ T282] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.401961][ T282] device bridge_slave_1 entered promiscuous mode [ 22.479512][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.486642][ T281] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.494314][ T281] device bridge_slave_0 entered promiscuous mode [ 22.512658][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.519724][ T281] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.527301][ T281] device bridge_slave_1 entered promiscuous mode [ 22.559615][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.567092][ T283] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.574789][ T283] device bridge_slave_0 entered promiscuous mode [ 22.583325][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.590604][ T283] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.598233][ T283] device bridge_slave_1 entered promiscuous mode [ 22.664255][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.671350][ T285] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.678955][ T285] device bridge_slave_0 entered promiscuous mode [ 22.687486][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.694674][ T285] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.702065][ T285] device bridge_slave_1 entered promiscuous mode [ 22.711907][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.718973][ T284] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.726495][ T284] device bridge_slave_0 entered promiscuous mode [ 22.742709][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.749778][ T284] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.757243][ T284] device bridge_slave_1 entered promiscuous mode [ 22.766888][ T282] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.774367][ T282] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.781801][ T282] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.788836][ T282] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.920183][ T281] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.927278][ T281] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.934647][ T281] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.941694][ T281] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.956581][ T283] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.963775][ T283] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.971060][ T283] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.978519][ T283] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.000639][ T284] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.007758][ T284] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.015362][ T284] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.022422][ T284] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.036187][ T285] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.043369][ T285] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.050685][ T285] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.057767][ T285] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.067729][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.075833][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.083212][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.090428][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.098284][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.105679][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.113241][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.120473][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 23.127889][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.135212][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 23.143455][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.150876][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.167852][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.195801][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.204213][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.211256][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.219101][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.227317][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.234402][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.263821][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.272057][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.279354][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.286921][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.295553][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.304146][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.311190][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.318724][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.326870][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.334942][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.346280][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.366173][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.376482][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.384815][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.392242][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.399720][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.408060][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.415245][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.422724][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.438342][ T281] device veth0_vlan entered promiscuous mode [ 23.450715][ T282] device veth0_vlan entered promiscuous mode [ 23.457492][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.466010][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.474670][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.482234][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.489643][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.497668][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.505949][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.514412][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.522946][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.529962][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.537650][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.546063][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.554537][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.562516][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.570848][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.578524][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.586221][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.593820][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.616570][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.625355][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.635520][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.642775][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.650427][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 23.658118][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.665687][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 23.674238][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.682871][ T45] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.689904][ T45] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.697479][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 23.706067][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.714387][ T45] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.721421][ T45] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.740906][ T284] device veth0_vlan entered promiscuous mode [ 23.748923][ T281] device veth1_macvtap entered promiscuous mode [ 23.756230][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.764691][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.772543][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.779983][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.788403][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.796959][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.804970][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.813424][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.821574][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.832026][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.840371][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.848841][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.856996][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 23.865290][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.874373][ T282] device veth1_macvtap entered promiscuous mode [ 23.893453][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.901295][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.909819][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.918825][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.927186][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.935393][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.943910][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.952475][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.960574][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.968737][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.977097][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.004165][ T282] request_module fs-gadgetfs succeeded, but still no fs? [ 24.019807][ T285] device veth0_vlan entered promiscuous mode [ 24.031323][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.043610][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.057602][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.066202][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.074228][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.081833][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.090226][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.138328][ T283] device veth0_vlan entered promiscuous mode [ 24.145390][ T284] device veth1_macvtap entered promiscuous mode [ 24.153925][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 24.162892][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 24.172343][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 24.180315][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 24.204980][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 24.215609][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 24.224632][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.233620][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.266468][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.276052][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.286834][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.313157][ T285] device veth1_macvtap entered promiscuous mode [ 24.349012][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 24.373521][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 24.395201][ T283] device veth1_macvtap entered promiscuous mode [ 24.421171][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.590261][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.613955][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.624442][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 27.909537][ T30] kauditd_printk_skb: 25 callbacks suppressed [ 27.909739][ T30] audit: type=1400 audit(1774363341.399:99): avc: denied { create } for pid=314 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 28.292633][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 28.301230][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 28.315303][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 28.323944][ T45] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 28.360578][ T30] audit: type=1400 audit(1774363341.499:100): avc: denied { setopt } for pid=314 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 28.381365][ T30] audit: type=1400 audit(1774363341.619:101): avc: denied { create } for pid=314 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 28.450978][ T30] audit: type=1400 audit(1774363341.719:102): avc: denied { bind } for pid=314 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 28.470628][ T30] audit: type=1400 audit(1774363341.819:103): avc: denied { setopt } for pid=314 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 28.511363][ T30] audit: type=1400 audit(1774363342.429:104): avc: denied { create } for pid=314 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 28.535529][ T340] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/l1tf.html for details. [ 28.552234][ T30] audit: type=1400 audit(1774363342.729:105): avc: denied { prog_load } for pid=314 comm="syz.2.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 28.611820][ T30] audit: type=1400 audit(1774363344.889:106): avc: denied { create } for pid=327 comm="syz.2.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 28.672195][ T30] audit: type=1400 audit(1774363344.889:107): avc: denied { create } for pid=323 comm="syz.3.6" dev="anon_inodefs" ino=15718 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 34.653251][ T30] audit: type=1400 audit(1774363344.889:108): avc: denied { ioctl } for pid=323 comm="syz.3.6" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=15718 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 34.679736][ T30] audit: type=1400 audit(1774363344.889:109): avc: denied { read } for pid=323 comm="syz.3.6" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=15718 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 34.704428][ T30] audit: type=1400 audit(1774363344.889:110): avc: denied { bind } for pid=327 comm="syz.2.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 34.724715][ T30] audit: type=1400 audit(1774363344.889:111): avc: denied { listen } for pid=327 comm="syz.2.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 34.744328][ T30] audit: type=1400 audit(1774363344.899:112): avc: denied { create } for pid=330 comm="syz.1.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 34.763614][ T30] audit: type=1400 audit(1774363344.949:113): avc: denied { setopt } for pid=330 comm="syz.1.8" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 34.783910][ T30] audit: type=1400 audit(1774363344.949:114): avc: denied { connect } for pid=330 comm="syz.1.8" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 34.804530][ T30] audit: type=1400 audit(1774363344.949:115): avc: denied { write } for pid=330 comm="syz.1.8" laddr=fe80::ac14:140c lport=58 faddr=ff02::1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 34.841808][ T30] audit: type=1400 audit(1774363345.079:116): avc: denied { ioctl } for pid=339 comm="syz.1.10" path="/dev/kvm" dev="devtmpfs" ino=82 ioctlcmd=0xae01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:kvm_device_t tclass=chr_file permissive=1 [ 34.870631][ T30] audit: type=1400 audit(1774363345.129:117): avc: denied { read write } for pid=339 comm="syz.1.10" name="event1" dev="devtmpfs" ino=257 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 37.199336][ T388] hub 9-0:1.0: USB hub found [ 37.204448][ T388] hub 9-0:1.0: 1 port detected [ 44.907349][ T30] kauditd_printk_skb: 5 callbacks suppressed [ 44.907365][ T30] audit: type=1400 audit(1774363361.449:123): avc: denied { remount } for pid=384 comm="syz.3.26" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 44.945808][ T30] audit: type=1400 audit(1774363361.489:124): avc: denied { read write } for pid=392 comm="syz.0.27" name="raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 44.992752][ T30] audit: type=1400 audit(1774363361.489:125): avc: denied { open } for pid=392 comm="syz.0.27" path="/dev/raw-gadget" dev="devtmpfs" ino=254 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 45.034691][ T30] audit: type=1400 audit(1774363361.489:126): avc: denied { ioctl } for pid=392 comm="syz.0.27" path="/dev/raw-gadget" dev="devtmpfs" ino=254 ioctlcmd=0x5500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 50.856811][ T313] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 51.050182][ T30] audit: type=1400 audit(1774363367.589:127): avc: denied { append } for pid=421 comm="syz.1.37" name="001" dev="devtmpfs" ino=160 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 51.746253][ T313] usb 1-1: device descriptor read/64, error -71 [ 52.602256][ T448] loop2: detected capacity change from 0 to 128 [ 52.693483][ T313] usb 1-1: device descriptor read/64, error -71 [ 53.011830][ T30] audit: type=1400 audit(1774363369.519:128): avc: denied { mount } for pid=447 comm="syz.2.46" name="/" dev="loop2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 59.042424][ T313] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 59.061567][ T30] audit: type=1400 audit(1774363375.509:129): avc: denied { unmount } for pid=284 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dosfs_t tclass=filesystem permissive=1 [ 59.083287][ T463] loop3: detected capacity change from 0 to 256 [ 59.228037][ T466] hub 9-0:1.0: USB hub found [ 59.232904][ T466] hub 9-0:1.0: 1 port detected [ 60.049184][ T30] audit: type=1400 audit(1774363376.589:130): avc: denied { map_create } for pid=477 comm="syz.0.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 60.199999][ T30] audit: type=1400 audit(1774363376.609:131): avc: denied { perfmon } for pid=477 comm="syz.0.57" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 60.824604][ T30] audit: type=1400 audit(1774363377.309:132): avc: denied { create } for pid=477 comm="syz.0.57" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 60.851888][ T30] audit: type=1400 audit(1774363377.309:133): avc: denied { name_bind } for pid=477 comm="syz.0.57" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 60.866051][ T486] input: syz0 as /devices/virtual/input/input4 [ 60.880934][ T30] audit: type=1400 audit(1774363377.309:134): avc: denied { node_bind } for pid=477 comm="syz.0.57" saddr=255.255.255.255 src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 60.906429][ T30] audit: type=1400 audit(1774363377.369:135): avc: denied { ioctl } for pid=477 comm="syz.0.57" path="socket:[16592]" dev="sockfs" ino=16592 ioctlcmd=0x52d2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 60.949257][ T30] audit: type=1400 audit(1774363377.399:136): avc: denied { ioctl } for pid=480 comm="syz.2.58" path="/dev/uinput" dev="devtmpfs" ino=258 ioctlcmd=0x5564 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:event_device_t tclass=chr_file permissive=1 [ 61.051560][ T492] loop0: detected capacity change from 0 to 256 [ 61.159573][ T492] exFAT-fs (loop0): failed to load upcase table (idx : 0x00011a39, chksum : 0xd7c18d7b, utbl_chksum : 0xe619d30d) [ 61.282732][ T30] audit: type=1400 audit(1774363377.819:137): avc: denied { write } for pid=491 comm="syz.0.61" name="file0" dev="loop0" ino=1048597 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 61.293236][ T492] exFAT-fs (loop0): error, invalid size(size(0) > aligned(9223372036854777344) [ 61.293236][ T492] [ 61.318599][ T30] audit: type=1400 audit(1774363377.819:138): avc: denied { remove_name } for pid=491 comm="syz.0.61" name="file0" dev="loop0" ino=1048598 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 61.342813][ T492] exFAT-fs (loop0): Filesystem has been set read-only [ 63.310889][ T509] hub 9-0:1.0: USB hub found [ 63.315698][ T509] hub 9-0:1.0: 1 port detected [ 63.345179][ T516] usb usb1: usbfs: process 516 (syz.1.70) did not claim interface 0 before use [ 63.430175][ T518] loop3: detected capacity change from 0 to 512 [ 63.455642][ T518] ======================================================= [ 63.455642][ T518] WARNING: The mand mount option has been deprecated and [ 63.455642][ T518] and is ignored by this kernel. Remove the mand [ 63.455642][ T518] option from the mount to silence this warning. [ 63.455642][ T518] ======================================================= [ 63.641656][ T518] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 63.654572][ T518] ext4 filesystem being mounted at /13/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 63.854939][ T538] loop1: detected capacity change from 0 to 256 [ 63.887314][ T538] exFAT-fs (loop1): failed to load upcase table (idx : 0x00011a39, chksum : 0xd7c18d7b, utbl_chksum : 0xe619d30d) [ 64.033377][ T550] usb usb1: usbfs: process 550 (syz.3.82) did not claim interface 0 before use [ 64.385973][ T565] loop3: detected capacity change from 0 to 512 [ 64.430740][ T30] kauditd_printk_skb: 9 callbacks suppressed [ 64.430755][ T30] audit: type=1400 audit(1774363380.969:148): avc: denied { associate } for pid=570 comm="syz.0.89" name="bus" scontext=root:object_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 64.460163][ T565] EXT4-fs (loop3): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 64.476714][ T565] ext4 filesystem being mounted at /19/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 64.500638][ T577] loop0: detected capacity change from 0 to 256 [ 64.528870][ T579] netlink: 20 bytes leftover after parsing attributes in process `syz.3.92'. [ 64.561884][ T577] exFAT-fs (loop0): failed to load upcase table (idx : 0x00011a39, chksum : 0xd7c18d7b, utbl_chksum : 0xe619d30d) [ 64.576040][ T30] audit: type=1400 audit(1774363381.119:149): avc: denied { create } for pid=582 comm="syz.3.94" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 65.178601][ T605] loop4: detected capacity change from 0 to 512 [ 65.198082][ T609] netlink: 20 bytes leftover after parsing attributes in process `syz.1.104'. [ 65.273379][ T605] EXT4-fs (loop4): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: writeback. [ 65.310861][ T30] audit: type=1400 audit(1774363381.849:150): avc: denied { read } for pid=620 comm="syz.3.107" name="msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 65.311643][ T605] ext4 filesystem being mounted at /17/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 65.333393][ T30] audit: type=1400 audit(1774363381.849:151): avc: denied { open } for pid=620 comm="syz.3.107" path="/dev/cpu/0/msr" dev="devtmpfs" ino=85 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 65.401568][ T30] audit: type=1400 audit(1774363381.939:152): avc: denied { create } for pid=620 comm="syz.3.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 65.499624][ T623] loop3: detected capacity change from 0 to 1024 [ 65.526289][ T30] audit: type=1400 audit(1774363381.979:153): avc: denied { write } for pid=620 comm="syz.3.107" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 65.639705][ T623] EXT4-fs (loop3): Unrecognized mount option "smackfsdef=hE?B#9FkOuǴ(31@eT)բV" or missing value [ 65.715948][ T634] ================================================================== [ 65.724259][ T634] BUG: KASAN: slab-out-of-bounds in tc_setup_flow_action+0x870/0x3240 [ 65.732447][ T634] Read of size 8 at addr ffff888117a61ac0 by task syz.0.113/634 [ 65.740110][ T634] [ 65.742458][ T634] CPU: 0 PID: 634 Comm: syz.0.113 Not tainted syzkaller #0 [ 65.749773][ T634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 [ 65.759943][ T634] Call Trace: [ 65.763269][ T634] [ 65.766240][ T634] __dump_stack+0x21/0x30 [ 65.770598][ T634] dump_stack_lvl+0x110/0x170 [ 65.775411][ T634] ? show_regs_print_info+0x20/0x20 [ 65.780626][ T634] ? load_image+0x3e0/0x3e0 [ 65.785158][ T634] print_address_description+0x7f/0x2c0 [ 65.790736][ T634] ? tc_setup_flow_action+0x870/0x3240 [ 65.796246][ T634] kasan_report+0xf1/0x140 [ 65.800681][ T634] ? tc_setup_flow_action+0x870/0x3240 [ 65.806267][ T634] __asan_report_load8_noabort+0x14/0x20 [ 65.812008][ T634] tc_setup_flow_action+0x870/0x3240 [ 65.817324][ T634] mall_replace_hw_filter+0x2cc/0x8b0 [ 65.822716][ T634] ? pcpu_block_update_hint_alloc+0x8c4/0xc50 [ 65.828822][ T634] ? mall_set_parms+0x520/0x520 [ 65.833711][ T634] ? tcf_exts_destroy+0xb0/0xb0 [ 65.838582][ T634] ? pcpu_alloc+0x1170/0x16e0 [ 65.843313][ T634] ? mall_set_parms+0x1e8/0x520 [ 65.848384][ T634] mall_change+0x544/0x760 [ 65.852819][ T634] ? __kasan_check_write+0x14/0x20 [ 65.857951][ T634] ? mall_get+0xa0/0xa0 [ 65.862148][ T634] ? tcf_chain_tp_insert_unique+0xac1/0xc10 [ 65.868080][ T634] tc_new_tfilter+0x12e5/0x18e0 [ 65.873356][ T634] ? tcf_gate_entry_destructor+0x20/0x20 [ 65.879275][ T634] ? security_capable+0x87/0xb0 [ 65.884236][ T634] ? ns_capable+0x8c/0xf0 [ 65.888690][ T634] ? netlink_net_capable+0x125/0x160 [ 65.893988][ T634] ? tcf_gate_entry_destructor+0x20/0x20 [ 65.899911][ T634] rtnetlink_rcv_msg+0x871/0xce0 [ 65.904872][ T634] ? rtnetlink_bind+0x80/0x80 [ 65.909824][ T634] ? avc_has_perm_noaudit+0x391/0x490 [ 65.915503][ T634] ? memcpy+0x56/0x70 [ 65.919502][ T634] ? avc_has_perm_noaudit+0x30b/0x490 [ 65.924889][ T634] ? arch_stack_walk+0xee/0x140 [ 65.929775][ T634] ? avc_denied+0x1b0/0x1b0 [ 65.934402][ T634] ? stack_trace_save+0xa6/0xf0 [ 65.939290][ T634] ? avc_has_perm+0x163/0x250 [ 65.944007][ T634] ? avc_has_perm_noaudit+0x490/0x490 [ 65.949406][ T634] ? x64_sys_call+0x4b/0x9a0 [ 65.954021][ T634] ? selinux_nlmsg_lookup+0x416/0x4c0 [ 65.959523][ T634] netlink_rcv_skb+0x1f5/0x440 [ 65.964665][ T634] ? rtnetlink_bind+0x80/0x80 [ 65.969368][ T634] ? netlink_ack+0xb50/0xb50 [ 65.973982][ T634] ? __netlink_lookup+0x387/0x3b0 [ 65.979021][ T634] rtnetlink_rcv+0x1c/0x20 [ 65.983483][ T634] netlink_unicast+0x876/0xa40 [ 65.988353][ T634] netlink_sendmsg+0x879/0xb80 [ 65.993136][ T634] ? netlink_getsockopt+0x530/0x530 [ 65.998471][ T634] ? do_futex+0xde8/0x2800 [ 66.002915][ T634] ? security_socket_sendmsg+0x82/0xa0 [ 66.008392][ T634] ? netlink_getsockopt+0x530/0x530 [ 66.013710][ T634] ____sys_sendmsg+0x5b7/0x8f0 [ 66.018498][ T634] ? __sys_sendmsg_sock+0x40/0x40 [ 66.023648][ T634] ? import_iovec+0x7c/0xb0 [ 66.028266][ T634] ___sys_sendmsg+0x236/0x2e0 [ 66.032964][ T634] ? __sys_sendmsg+0x280/0x280 [ 66.037758][ T634] ? sock_show_fdinfo+0xa0/0xa0 [ 66.042637][ T634] ? __fdget+0x1a1/0x230 [ 66.046891][ T634] __x64_sys_sendmsg+0x206/0x2f0 [ 66.051845][ T634] ? ___sys_sendmsg+0x2e0/0x2e0 [ 66.056927][ T634] ? __kasan_check_write+0x14/0x20 [ 66.062055][ T634] ? switch_fpu_return+0x15d/0x2c0 [ 66.067198][ T634] x64_sys_call+0x4b/0x9a0 [ 66.071625][ T634] do_syscall_64+0x4c/0xa0 [ 66.076053][ T634] ? clear_bhb_loop+0x50/0xa0 [ 66.080747][ T634] ? clear_bhb_loop+0x50/0xa0 [ 66.085435][ T634] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.091361][ T634] RIP: 0033:0x7f5fbeb4a799 [ 66.095801][ T634] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 66.115551][ T634] RSP: 002b:00007f5fbd5a5028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 66.124410][ T634] RAX: ffffffffffffffda RBX: 00007f5fbedc3fa0 RCX: 00007f5fbeb4a799 [ 66.132406][ T634] RDX: 0000000020000000 RSI: 0000200000000580 RDI: 0000000000000004 [ 66.140688][ T634] RBP: 00007f5fbebe0c99 R08: 0000000000000000 R09: 0000000000000000 [ 66.148772][ T634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 66.156763][ T634] R13: 00007f5fbedc4038 R14: 00007f5fbedc3fa0 R15: 00007ffeccfb04b8 [ 66.164755][ T634] [ 66.167802][ T634] [ 66.170149][ T634] Allocated by task 634: [ 66.174400][ T634] __kasan_kmalloc+0xda/0x110 [ 66.179096][ T634] __kmalloc+0x13d/0x2c0 [ 66.183356][ T634] tcf_idr_create+0x5f/0x790 [ 66.187964][ T634] tcf_idr_create_from_flags+0x61/0x70 [ 66.193442][ T634] tcf_gact_init+0x342/0x570 [ 66.198048][ T634] tcf_action_init_1+0x3ff/0x6b0 [ 66.203010][ T634] tcf_action_init+0x233/0x7a0 [ 66.207783][ T634] tcf_exts_validate+0x24a/0x580 [ 66.212732][ T634] mall_set_parms+0x48/0x520 [ 66.217389][ T634] mall_change+0x478/0x760 [ 66.221833][ T634] tc_new_tfilter+0x12e5/0x18e0 [ 66.226787][ T634] rtnetlink_rcv_msg+0x871/0xce0 [ 66.231745][ T634] netlink_rcv_skb+0x1f5/0x440 [ 66.236640][ T634] rtnetlink_rcv+0x1c/0x20 [ 66.241097][ T634] netlink_unicast+0x876/0xa40 [ 66.245880][ T634] netlink_sendmsg+0x879/0xb80 [ 66.250745][ T634] ____sys_sendmsg+0x5b7/0x8f0 [ 66.255650][ T634] ___sys_sendmsg+0x236/0x2e0 [ 66.260336][ T634] __x64_sys_sendmsg+0x206/0x2f0 [ 66.265289][ T634] x64_sys_call+0x4b/0x9a0 [ 66.269724][ T634] do_syscall_64+0x4c/0xa0 [ 66.274169][ T634] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 66.280076][ T634] [ 66.282422][ T634] The buggy address belongs to the object at ffff888117a61a00 [ 66.282422][ T634] which belongs to the cache kmalloc-192 of size 192 [ 66.296671][ T634] The buggy address is located 0 bytes to the right of [ 66.296671][ T634] 192-byte region [ffff888117a61a00, ffff888117a61ac0) [ 66.310429][ T634] The buggy address belongs to the page: [ 66.316083][ T634] page:ffffea00045e9840 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x117a61 [ 66.326358][ T634] flags: 0x4000000000000200(slab|zone=1) [ 66.332029][ T634] raw: 4000000000000200 ffffea00045cf440 0000000500000005 ffff888100042c00 [ 66.340797][ T634] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 66.349525][ T634] page dumped because: kasan: bad access detected [ 66.355944][ T634] page_owner tracks the page as allocated [ 66.361666][ T634] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x12cc0(GFP_KERNEL|__GFP_NOWARN|__GFP_NORETRY), pid 101, ts 6419047183, free_ts 0 [ 66.376791][ T634] post_alloc_hook+0x192/0x1b0 [ 66.381577][ T634] prep_new_page+0x1c/0x110 [ 66.386244][ T634] get_page_from_freelist+0x2d3a/0x2dc0 [ 66.391809][ T634] __alloc_pages+0x1a2/0x460 [ 66.396512][ T634] new_slab+0xa1/0x4d0 [ 66.400694][ T634] ___slab_alloc+0x381/0x810 [ 66.405303][ T634] __slab_alloc+0x49/0x90 [ 66.409773][ T634] kmem_cache_alloc_trace+0x146/0x270 [ 66.415260][ T634] kernfs_fop_open+0x343/0xb30 [ 66.420056][ T634] do_dentry_open+0x834/0x1010 [ 66.424937][ T634] vfs_open+0x73/0x80 [ 66.428999][ T634] path_openat+0x26a6/0x2f20 [ 66.433872][ T634] do_filp_open+0x1e2/0x410 [ 66.438416][ T634] do_sys_openat2+0x15e/0x7f0 [ 66.443119][ T634] __x64_sys_openat+0x136/0x160 [ 66.448089][ T634] x64_sys_call+0x219/0x9a0 [ 66.452634][ T634] page_owner free stack trace missing [ 66.458101][ T634] [ 66.460439][ T634] Memory state around the buggy address: [ 66.466077][ T634] ffff888117a61980: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.474150][ T634] ffff888117a61a00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 66.482312][ T634] >ffff888117a61a80: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc [ 66.490586][ T634] ^ [ 66.496920][ T634] ffff888117a61b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 66.505098][ T634] ffff888117a61b80: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 66.513347][ T634] ================================================================== [ 66.521672][ T634] Disabling lock debugging due to kernel taint [ 66.550995][ T30] audit: type=1400 audit(1774363383.089:154): avc: denied { read } for pid=83 comm="syslogd" name="log" dev="sda1" ino=2010 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 [ 66.606989][ T30] audit: type=1400 audit(1774363383.089:155): avc: denied { search } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 66.628591][ T30] audit: type=1400 audit(1774363383.089:156): avc: denied { write } for pid=83 comm="syslogd" name="/" dev="tmpfs" ino=1 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1 [ 66.651113][ T30] audit: type=1400 audit(1774363383.099:157): avc: denied { add_name } for pid=83 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=dir permissive=1